Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
apple iphone os 3.0.1 vulnerabilities and exploits
(subscribe to this query)
436
VMScore
CVE-2010-1776
Find My iPhone on iOS 2.0 up to and including 3.1.3 for iPhone 3G and later and iOS 2.1 up to and including 3.1.3 for iPod touch (2nd generation) and later, when Find My iPhone is disabled, allows remote authenticated users with an associated MobileMe account to wipe the device.
Apple Iphone Os 2.1.1
Apple Iphone Os 3.1.3
Apple Iphone Os 2.2.1
Apple Iphone Os 3.0
Apple Iphone Os 3.0.1
Apple Iphone Os 3.1
Apple Iphone Os 3.1.2
Apple Iphone Os 2.1
Apple Iphone Os 2.2
231
VMScore
CVE-2013-5137
IOKit in Apple iOS prior to 7 allows malicious users to send user-interface events to the foreground app by leveraging control over a background app and using the (1) task-completion API or (2) VoIP API.
Apple Iphone Os 1.1.2
Apple Iphone Os 1.1.3
Apple Iphone Os 1.1.4
Apple Iphone Os 1.1.5
Apple Iphone Os 2.0
Apple Iphone Os
Apple Iphone Os 1.0.0
Apple Iphone Os 2.1.1
Apple Iphone Os 2.2
Apple Iphone Os 2.2.1
Apple Iphone Os 3.0
Apple Iphone Os 4.2.5
Apple Iphone Os 4.2.8
Apple Iphone Os 4.3.0
Apple Iphone Os 4.3.1
Apple Iphone Os 4.3.2
Apple Iphone Os 1.0.1
Apple Iphone Os 1.1.0
Apple Iphone Os 2.0.0
Apple Iphone Os 2.0.2
Apple Iphone Os 3.1
Apple Iphone Os 3.1.3
828
VMScore
CVE-2013-5139
The IOSerialFamily driver in Apple iOS prior to 7 allows malicious users to execute arbitrary code or cause a denial of service (out-of-bounds array access) via a crafted application.
Apple Iphone Os
Apple Iphone Os 1.0.0
Apple Iphone Os 1.1.5
Apple Iphone Os 2.0
Apple Iphone Os 2.2.1
Apple Iphone Os 3.0
Apple Iphone Os 3.2.2
Apple Iphone Os 4.0
Apple Iphone Os 4.3.1
Apple Iphone Os 4.3.2
Apple Iphone Os 6.0
Apple Iphone Os 6.0.1
Apple Iphone Os 1.1.0
Apple Iphone Os 1.1.1
Apple Iphone Os 2.0.2
Apple Iphone Os 2.1
Apple Iphone Os 3.1.2
Apple Iphone Os 3.1.3
Apple Iphone Os 4.1
Apple Iphone Os 4.2.1
Apple Iphone Os 5.0
Apple Iphone Os 5.0.1
694
VMScore
CVE-2013-5140
The kernel in Apple iOS prior to 7 allows remote malicious users to cause a denial of service (assertion failure and device restart) via an invalid packet fragment.
Apple Iphone Os 1.1.5
Apple Iphone Os 2.0
Apple Iphone Os 2.0.0
Apple Iphone Os 2.0.1
Apple Iphone Os 4.0
Apple Iphone Os 4.0.1
Apple Iphone Os 4.0.2
Apple Iphone Os 4.1
Apple Iphone Os 1.0.0
Apple Iphone Os 1.0.1
Apple Iphone Os 1.0.2
Apple Iphone Os 1.1.0
Apple Iphone Os 2.2.1
Apple Iphone Os 3.0
Apple Iphone Os 3.0.1
Apple Iphone Os 3.1
Apple Iphone Os 3.1.2
Apple Iphone Os 4.3.1
Apple Iphone Os 4.3.2
Apple Iphone Os 4.3.3
Apple Iphone Os 4.3.5
Apple Iphone Os 6.0
632
VMScore
CVE-2013-5141
The kernel in Apple iOS prior to 7 uses an incorrect data size for a certain integer variable, which allows malicious users to cause a denial of service (infinite loop and device hang) via a crafted application, related to an "integer truncation vulnerability."
Apple Iphone Os 1.0.2
Apple Iphone Os 1.1.0
Apple Iphone Os 2.0.0
Apple Iphone Os 2.0.1
Apple Iphone Os 3.0.1
Apple Iphone Os 3.1
Apple Iphone Os 4.0.2
Apple Iphone Os 4.1
Apple Iphone Os 4.3.3
Apple Iphone Os 4.3.5
Apple Iphone Os 6.0.2
Apple Iphone Os 6.1
Apple Iphone Os
Apple Iphone Os 1.1.3
Apple Iphone Os 1.1.4
Apple Iphone Os 2.1.1
Apple Iphone Os 2.2
Apple Iphone Os 3.2.1
Apple Iphone Os 3.2.2
Apple Iphone Os 4.2.8
Apple Iphone Os 4.3.0
Apple Iphone Os 5.1
436
VMScore
CVE-2013-5142
The kernel in Apple iOS prior to 7 does not initialize unspecified kernel data structures, which allows local users to obtain sensitive information from kernel stack memory via the (1) msgctl API or (2) segctl API.
Apple Iphone Os 1.0.0
Apple Iphone Os 1.0.1
Apple Iphone Os 1.1.5
Apple Iphone Os 2.0
Apple Iphone Os 2.0.0
Apple Iphone Os 3.0
Apple Iphone Os 3.0.1
Apple Iphone Os 4.0
Apple Iphone Os 4.0.1
Apple Iphone Os 4.3.2
Apple Iphone Os 4.3.3
Apple Iphone Os 6.0.1
Apple Iphone Os 6.0.2
Apple Iphone Os 1.1.1
Apple Iphone Os 1.1.2
Apple Iphone Os 2.1
Apple Iphone Os 2.1.1
Apple Iphone Os 3.1.3
Apple Iphone Os 3.2
Apple Iphone Os 4.2.1
Apple Iphone Os 4.2.5
Apple Iphone Os 5.0.1
375
VMScore
CVE-2013-5147
Passcode Lock in Apple iOS prior to 7 does not properly manage the lock state, which allows physically proximate malicious users to bypass an intended passcode requirement by leveraging a race condition involving phone calls and ejection of a SIM card.
Apple Iphone Os 1.0.0
Apple Iphone Os 1.0.1
Apple Iphone Os 2.0
Apple Iphone Os 2.0.0
Apple Iphone Os 3.0
Apple Iphone Os 3.0.1
Apple Iphone Os 4.0
Apple Iphone Os 4.0.1
Apple Iphone Os 4.3.2
Apple Iphone Os 4.3.3
Apple Iphone Os 6.0.1
Apple Iphone Os 6.0.2
Apple Iphone Os 1.1.2
Apple Iphone Os 1.1.3
Apple Iphone Os 2.1
Apple Iphone Os 2.1.1
Apple Iphone Os 3.1.3
Apple Iphone Os 3.2
Apple Iphone Os 4.2.5
Apple Iphone Os 4.2.8
Apple Iphone Os 5.0.1
Apple Iphone Os 5.1
1 EDB exploit
383
VMScore
CVE-2013-5152
Mobile Safari in Apple iOS prior to 7 allows remote malicious users to spoof the URL bar via a crafted web site.
Apple Iphone Os 1.1.0
Apple Iphone Os 1.1.1
Apple Iphone Os 1.1.2
Apple Iphone Os 1.1.3
Apple Iphone Os 3.1.2
Apple Iphone Os 3.1.3
Apple Iphone Os 3.2
Apple Iphone Os 3.2.1
Apple Iphone Os 4.3.5
Apple Iphone Os 5.0
Apple Iphone Os 5.0.1
Apple Iphone Os 5.1
Apple Iphone Os 2.0.1
Apple Iphone Os 2.0.2
Apple Iphone Os 2.1
Apple Iphone Os 2.1.1
Apple Iphone Os 4.1
Apple Iphone Os 4.2.1
Apple Iphone Os 4.2.5
Apple Iphone Os 4.2.8
Apple Iphone Os 6.1.2
Apple Iphone Os 6.1.3
632
VMScore
CVE-2013-5155
The Sandbox subsystem in Apple iOS prior to 7 allows malicious users to cause a denial of service (infinite loop) via an application that writes crafted values to /dev/random.
Apple Iphone Os 1.0.1
Apple Iphone Os 1.0.2
Apple Iphone Os 1.1.0
Apple Iphone Os 1.1.1
Apple Iphone Os 3.0.1
Apple Iphone Os 3.1
Apple Iphone Os 3.1.2
Apple Iphone Os 3.1.3
Apple Iphone Os 4.3.3
Apple Iphone Os 4.3.5
Apple Iphone Os 5.0
Apple Iphone Os 5.0.1
Apple Iphone Os 2.0.0
Apple Iphone Os 2.0.1
Apple Iphone Os 2.0.2
Apple Iphone Os 2.1
Apple Iphone Os 4.0.1
Apple Iphone Os 4.0.2
Apple Iphone Os 4.1
Apple Iphone Os 4.2.1
Apple Iphone Os 6.0.2
Apple Iphone Os 6.1
383
VMScore
CVE-2013-5156
The Telephony subsystem in Apple iOS prior to 7 does not require API conformity for access to telephony-daemon interfaces, which allows malicious users to bypass intended restrictions on phone calls via a crafted app that sends direct requests to the daemon.
Apple Iphone Os 1.0.0
Apple Iphone Os 1.0.1
Apple Iphone Os 1.0.2
Apple Iphone Os 1.1.0
Apple Iphone Os 3.0
Apple Iphone Os 3.0.1
Apple Iphone Os 3.1
Apple Iphone Os 3.1.2
Apple Iphone Os 4.3.1
Apple Iphone Os 4.3.2
Apple Iphone Os 4.3.3
Apple Iphone Os 4.3.5
Apple Iphone Os 5.0
Apple Iphone Os 1.1.5
Apple Iphone Os 2.0
Apple Iphone Os 2.0.0
Apple Iphone Os 2.0.1
Apple Iphone Os 2.0.2
Apple Iphone Os 4.0
Apple Iphone Os 4.0.1
Apple Iphone Os 4.0.2
Apple Iphone Os 4.1
VMScore
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2023-40673
CVE-2024-36674
CVE-2024-27348
unspecified
CVE-2024-24919
CVE-2024-4870
malicious code
CVE-2024-2019
hard-coded
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
3
4
5
6
NEXT »