Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
apple iphone os 5.1 vulnerabilities and exploits
(subscribe to this query)
8.8
CVSSv3
CVE-2018-4373
Multiple memory corruption issues were addressed with improved memory handling. This issue affected versions prior to iOS 12.1, watchOS 5.1, Safari 12.0.1, iTunes 12.9.1, iCloud for Windows 7.8.
Apple Safari
Apple Iphone Os
Apple Watchos
Apple Icloud
Apple Itunes
8.8
CVSSv3
CVE-2018-4378
A memory corruption issue was addressed with improved validation. This issue affected versions prior to iOS 12.1, tvOS 12.1, watchOS 5.1, Safari 12.0.1, iTunes 12.9.1, iCloud for Windows 7.8.
Apple Tvos
Apple Safari
Apple Iphone Os
Apple Watchos
Apple Icloud
Apple Itunes
1 Github repository
8.8
CVSSv3
CVE-2018-4386
Multiple memory corruption issues were addressed with improved memory handling. This issue affected versions prior to iOS 12.1, tvOS 12.1, watchOS 5.1, Safari 12.0.1, iTunes 12.9.1, iCloud for Windows 7.8.
Apple Safari
Apple Tvos
Apple Iphone Os
Apple Watchos
Apple Itunes
Apple Icloud
1 Github repository
8.8
CVSSv3
CVE-2018-4376
Multiple memory corruption issues were addressed with improved memory handling. This issue affected versions prior to iOS 12.1, watchOS 5.1, Safari 12.0.1, iTunes 12.9.1, iCloud for Windows 7.8.
Apple Iphone Os
Apple Safari
Apple Watchos
Apple Icloud
Apple Itunes
8.8
CVSSv3
CVE-2018-4382
Multiple memory corruption issues were addressed with improved memory handling. This issue affected versions prior to iOS 12.1, tvOS 12.1, watchOS 5.1, Safari 12.0.1, iTunes 12.9.1, iCloud for Windows 7.8.
Apple Watchos
Apple Iphone Os
Apple Tvos
Apple Safari
Apple Icloud
Apple Itunes
8.8
CVSSv3
CVE-2018-4416
Multiple memory corruption issues were addressed with improved memory handling. This issue affected versions prior to iOS 12.1, tvOS 12.1, watchOS 5.1, Safari 12.0.1, iTunes 12.9.1, iCloud for Windows 7.8.
Apple Iphone Os
Apple Tvos
Apple Watchos
Apple Safari
Apple Itunes
Apple Icloud
8.8
CVSSv3
CVE-2018-4372
Multiple memory corruption issues were addressed with improved memory handling. This issue affected versions prior to iOS 12.1, tvOS 12.1, watchOS 5.1, Safari 12.0.1, iTunes 12.9.1, iCloud for Windows 7.8.
Apple Watchos
Apple Iphone Os
Apple Safari
Apple Tvos
Apple Icloud
Apple Itunes
1 Github repository
8.8
CVSSv3
CVE-2018-4375
Multiple memory corruption issues were addressed with improved memory handling. This issue affected versions prior to iOS 12.1, watchOS 5.1, Safari 12.0.1, iTunes 12.9.1, iCloud for Windows 7.8.
Apple Watchos
Apple Iphone Os
Apple Safari
Apple Itunes
Apple Icloud
8.8
CVSSv3
CVE-2018-4392
Multiple memory corruption issues were addressed with improved memory handling. This issue affected versions prior to iOS 12.1, tvOS 12.1, watchOS 5.1, Safari 12.0.1, iTunes 12.9.1, iCloud for Windows 7.8.
Apple Iphone Os
Apple Tvos
Apple Watchos
Apple Safari
Apple Icloud
Apple Itunes
8.1
CVSSv3
CVE-2019-9506
The Bluetooth BR/EDR specification up to and including version 5.1 permits sufficiently low encryption key length and does not prevent an attacker from influencing the key length negotiation. This allows practical brute-force attacks (aka "KNOB") that can decrypt traffi...
Google Android -
Apple Mac Os X 10.12.6
Apple Mac Os X 10.14.5
Apple Watchos 5.3
Apple Iphone Os 12.4
Apple Mac Os X 10.13.6
Apple Tvos 12.4
Canonical Ubuntu Linux 16.04
Canonical Ubuntu Linux 18.04
Canonical Ubuntu Linux 19.04
Debian Debian Linux 8.0
Opensuse Leap 15.0
Opensuse Leap 15.1
Redhat Mrg Realtime 2.0
Redhat Virtualization Host Eus 4.2
Redhat Enterprise Linux 8.0
Redhat Enterprise Linux Aus 7.5
Redhat Enterprise Linux Eus 7.6
Redhat Enterprise Linux Eus 7.7
Redhat Enterprise Linux Eus 8.1
Redhat Enterprise Linux Eus 8.2
Redhat Enterprise Linux Eus 8.4
5 Github repositories
2 Articles
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-3201
CVE-2024-4779
CVE-2024-35090
CVE-2024-5084
hard-coded
CVE-2024-4985
HTML injection
CVE-2024-33655
local file inclusion
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
3
4
5
6
NEXT »