Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
apple iphone os 5.1.1 vulnerabilities and exploits
(subscribe to this query)
8.3
CVSSv2
CVE-2016-0801
The Broadcom Wi-Fi driver in the kernel in Android 4.x prior to 4.4.4, 5.x prior to 5.1.1 LMY49G, and 6.x prior to 2016-02-01 allows remote malicious users to execute arbitrary code or cause a denial of service (memory corruption) via crafted wireless control message packets, aka...
Apple Iphone Os
Apple Mac Os X
Apple Tvos
Apple Watchos
Google Android 6.0.1
Google Android 5.0
Google Android 4.4.4
Google Android 6.0
Google Android 5.1.1
1 EDB exploit
2 Github repositories
8.3
CVSSv2
CVE-2016-0802
The Broadcom Wi-Fi driver in the kernel in Android 4.x prior to 4.4.4, 5.x prior to 5.1.1 LMY49G, and 6.x prior to 2016-02-01 allows remote malicious users to execute arbitrary code or cause a denial of service (memory corruption) via crafted wireless control message packets, aka...
Google Android 6.0.1
Google Android 6.0
Google Android 5.1.1
Google Android 5.0
Google Android 4.4.4
Apple Watchos
Apple Iphone Os
Apple Mac Os X
Apple Tvos
7.8
CVSSv2
CVE-2013-5140
The kernel in Apple iOS prior to 7 allows remote malicious users to cause a denial of service (assertion failure and device restart) via an invalid packet fragment.
Apple Iphone Os 1.1.5
Apple Iphone Os 2.0
Apple Iphone Os 2.0.0
Apple Iphone Os 2.0.1
Apple Iphone Os 4.0
Apple Iphone Os 4.0.1
Apple Iphone Os 4.0.2
Apple Iphone Os 4.1
Apple Iphone Os 1.0.0
Apple Iphone Os 1.0.1
Apple Iphone Os 1.0.2
Apple Iphone Os 1.1.0
Apple Iphone Os 2.2.1
Apple Iphone Os 3.0
Apple Iphone Os 3.0.1
Apple Iphone Os 3.1
Apple Iphone Os 3.1.2
Apple Iphone Os 4.3.1
Apple Iphone Os 4.3.2
Apple Iphone Os 4.3.3
Apple Iphone Os 4.3.5
Apple Iphone Os 6.0
4.7
CVSSv2
CVE-2013-5138
IOCatalogue in IOKitUser in Apple iOS prior to 7 allows malicious users to cause a denial of service (NULL pointer dereference and device crash) via a crafted application.
Apple Iphone Os 1.0.0
Apple Iphone Os 1.0.1
Apple Iphone Os 2.0
Apple Iphone Os 2.0.0
Apple Iphone Os 3.0
Apple Iphone Os 3.0.1
Apple Iphone Os 4.0
Apple Iphone Os 4.0.1
Apple Iphone Os 4.3.2
Apple Iphone Os 4.3.3
Apple Iphone Os 6.0.1
Apple Iphone Os 6.0.2
Apple Iphone Os 1.1.1
Apple Iphone Os 1.1.2
Apple Iphone Os 1.1.3
Apple Iphone Os 2.1
Apple Iphone Os 2.1.1
Apple Iphone Os 3.1.3
Apple Iphone Os 3.2
Apple Iphone Os 4.2.5
Apple Iphone Os 4.2.8
Apple Iphone Os 5.0.1
7.1
CVSSv2
CVE-2013-5141
The kernel in Apple iOS prior to 7 uses an incorrect data size for a certain integer variable, which allows malicious users to cause a denial of service (infinite loop and device hang) via a crafted application, related to an "integer truncation vulnerability."
Apple Iphone Os 1.0.2
Apple Iphone Os 1.1.0
Apple Iphone Os 2.0.0
Apple Iphone Os 2.0.1
Apple Iphone Os 3.0.1
Apple Iphone Os 3.1
Apple Iphone Os 4.0.2
Apple Iphone Os 4.1
Apple Iphone Os 4.3.3
Apple Iphone Os 4.3.5
Apple Iphone Os 6.0.2
Apple Iphone Os 6.1
Apple Iphone Os
Apple Iphone Os 1.1.3
Apple Iphone Os 1.1.4
Apple Iphone Os 2.1.1
Apple Iphone Os 2.2
Apple Iphone Os 3.2.1
Apple Iphone Os 3.2.2
Apple Iphone Os 4.2.8
Apple Iphone Os 4.3.0
Apple Iphone Os 5.1
6.3
CVSSv2
CVE-2013-5145
kextd in Kext Management in Apple iOS prior to 7 does not properly verify authorization for IPC messages, which allows local users to (1) load or (2) unload kernel extensions via a crafted message.
Apple Iphone Os 1.0.0
Apple Iphone Os 1.0.1
Apple Iphone Os 1.1.5
Apple Iphone Os 2.0
Apple Iphone Os 2.0.0
Apple Iphone Os 3.0
Apple Iphone Os 3.0.1
Apple Iphone Os 4.0
Apple Iphone Os 4.0.1
Apple Iphone Os 4.3.2
Apple Iphone Os 4.3.3
Apple Iphone Os 6.0.1
Apple Iphone Os 6.0.2
Apple Iphone Os 1.1.1
Apple Iphone Os 1.1.2
Apple Iphone Os 2.1
Apple Iphone Os 2.1.1
Apple Iphone Os 3.1.3
Apple Iphone Os 3.2
Apple Iphone Os 4.2.1
Apple Iphone Os 4.2.5
Apple Iphone Os 5.0.1
4.3
CVSSv2
CVE-2013-5149
The Push Notifications subsystem in Apple iOS prior to 7 provides the push-notification token to an app without user approval, which allows malicious users to obtain sensitive information via an app that employs a crafted push-notification registration process.
Apple Iphone Os 1.1.2
Apple Iphone Os 1.1.3
Apple Iphone Os 1.1.4
Apple Iphone Os 1.1.5
Apple Iphone Os 3.2
Apple Iphone Os 3.2.1
Apple Iphone Os 3.2.2
Apple Iphone Os 4.0
Apple Iphone Os 5.0.1
Apple Iphone Os 5.1
Apple Iphone Os 5.1.1
Apple Iphone Os 6.0
Apple Iphone Os 6.0.1
Apple Iphone Os
Apple Iphone Os 1.0.0
Apple Iphone Os 2.1
Apple Iphone Os 2.1.1
Apple Iphone Os 2.2
Apple Iphone Os 2.2.1
Apple Iphone Os 4.2.5
Apple Iphone Os 4.2.8
Apple Iphone Os 4.3.0
4.3
CVSSv2
CVE-2013-5151
Mobile Safari in Apple iOS prior to 7 does not prevent HTML interpretation of a document served with a text/plain content type, which allows remote malicious users to conduct cross-site scripting (XSS) attacks by uploading a file.
Apple Iphone Os 1.0.2
Apple Iphone Os 1.1.0
Apple Iphone Os 1.1.1
Apple Iphone Os 1.1.2
Apple Iphone Os 1.1.3
Apple Iphone Os 3.1
Apple Iphone Os 3.1.2
Apple Iphone Os 3.1.3
Apple Iphone Os 3.2
Apple Iphone Os 4.3.5
Apple Iphone Os 5.0
Apple Iphone Os 5.0.1
Apple Iphone Os 5.1
Apple Iphone Os 2.0.1
Apple Iphone Os 2.0.2
Apple Iphone Os 2.1
Apple Iphone Os 2.1.1
Apple Iphone Os 4.0.2
Apple Iphone Os 4.1
Apple Iphone Os 4.2.1
Apple Iphone Os 4.2.5
Apple Iphone Os 4.2.8
4.3
CVSSv2
CVE-2013-5152
Mobile Safari in Apple iOS prior to 7 allows remote malicious users to spoof the URL bar via a crafted web site.
Apple Iphone Os 1.1.0
Apple Iphone Os 1.1.1
Apple Iphone Os 1.1.2
Apple Iphone Os 1.1.3
Apple Iphone Os 3.1.2
Apple Iphone Os 3.1.3
Apple Iphone Os 3.2
Apple Iphone Os 3.2.1
Apple Iphone Os 4.3.5
Apple Iphone Os 5.0
Apple Iphone Os 5.0.1
Apple Iphone Os 5.1
Apple Iphone Os 2.0.1
Apple Iphone Os 2.0.2
Apple Iphone Os 2.1
Apple Iphone Os 2.1.1
Apple Iphone Os 4.1
Apple Iphone Os 4.2.1
Apple Iphone Os 4.2.5
Apple Iphone Os 4.2.8
Apple Iphone Os 6.1.2
Apple Iphone Os 6.1.3
5
CVSSv2
CVE-2013-5157
The Twitter subsystem in Apple iOS prior to 7 does not require API conformity for access to Twitter daemon interfaces, which allows malicious users to post Tweets via a crafted app that sends direct requests to the daemon.
Apple Iphone Os 1.1.4
Apple Iphone Os 1.1.5
Apple Iphone Os
Apple Iphone Os 1.0.0
Apple Iphone Os 1.0.1
Apple Iphone Os 1.0.2
Apple Iphone Os 2.2.1
Apple Iphone Os 3.0
Apple Iphone Os 3.0.1
Apple Iphone Os 3.1
Apple Iphone Os 4.3.0
Apple Iphone Os 4.3.1
Apple Iphone Os 4.3.2
Apple Iphone Os 4.3.3
Apple Iphone Os 4.3.5
Apple Iphone Os 2.0
Apple Iphone Os 2.0.0
Apple Iphone Os 3.2.2
Apple Iphone Os 4.0
Apple Iphone Os 4.0.1
Apple Iphone Os 4.0.2
Apple Iphone Os 6.0
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2023-52710
arbitrary
CVE-2024-5272
CVE-2024-2961
brute force
remote
CVE-2024-32944
CVE-2024-36241
CVE-2024-5274
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
3
4
5
6
NEXT »