Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
apple iphone os 8.0.1 vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2014-4463
Apple iOS prior to 8.1.1 allows physically proximate malicious users to bypass the lock-screen protection mechanism, and view or transmit a Photo Library photo, via the FaceTime "Leave a Message" feature.
Apple Iphone Os 8.0.1
Apple Iphone Os 8.0
Apple Iphone Os
Apple Iphone Os 8.0.2
NA
CVE-2014-4451
Apple iOS prior to 8.1.1 does not properly enforce the failed-passcode limit, which makes it easier for physically proximate malicious users to bypass the lock-screen protection mechanism via a series of guesses.
Apple Iphone Os 8.0.2
Apple Iphone Os 8.0.1
Apple Iphone Os 8.0
Apple Iphone Os
NA
CVE-2014-4457
The Sandbox Profiles subsystem in Apple iOS prior to 8.1.1 does not properly implement the debugserver sandbox, which allows malicious users to bypass intended binary-execution restrictions via a crafted application that is run during a time period when debugging is not enabled.
Apple Iphone Os
Apple Iphone Os 8.0.2
Apple Iphone Os 8.0.1
Apple Iphone Os 8.0
NA
CVE-2015-1157
CoreText in Apple iOS 8.x up to and including 8.3 allows remote malicious users to cause a denial of service (reboot and messaging disruption) via crafted Unicode text that is not properly handled during display truncation in the Notifications feature, as demonstrated by Arabic c...
Apple Iphone Os 8.3
Apple Iphone Os 8.0
Apple Iphone Os 8.1.2
Apple Iphone Os 8.1
Apple Iphone Os 8.0.2
Apple Iphone Os 8.0.1
Apple Iphone Os 8.2
Apple Iphone Os 8.1.3
Apple Mac Os X
Apple Itunes
7.5
CVSSv3
CVE-2017-14315
In Apple iOS 7 through 9, due to a BlueBorne flaw in the implementation of LEAP (Low Energy Audio Protocol), a large audio command can be sent to a targeted device and lead to a heap overflow with attacker-controlled data. Since the audio commands sent via LEAP are not properly v...
Apple Iphone Os 7.0
Apple Iphone Os 7.0.1
Apple Iphone Os 7.0.2
Apple Iphone Os 7.1.2
Apple Iphone Os 8.0
Apple Iphone Os 8.4.1
Apple Iphone Os 9.0
Apple Iphone Os 9.3.2
Apple Iphone Os 9.3.3
Apple Iphone Os 7.0.3
Apple Iphone Os 7.0.4
Apple Iphone Os 8.0.1
Apple Iphone Os 8.0.2
Apple Iphone Os 9.0.1
Apple Iphone Os 9.0.2
Apple Iphone Os 9.3.4
Apple Iphone Os 9.3.5
Apple Iphone Os 7.0.5
Apple Iphone Os 7.0.6
Apple Iphone Os 8.1
Apple Iphone Os 8.1.2
Apple Iphone Os 9.1
NA
CVE-2014-4462
WebKit, as used in Apple iOS prior to 8.1.1 and Apple TV prior to 7.0.2, allows remote malicious users to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than CVE-2014-4452.
Apple Iphone Os
Apple Iphone Os 8.0.2
Apple Iphone Os 8.0.1
Apple Iphone Os 8.0
Apple Tvos 6.2
Apple Tvos 6.1.2
Apple Tvos 7.0
Apple Tvos 6.2.1
Apple Tvos
Apple Tvos 6.0.2
Apple Tvos 6.0.1
Apple Tvos 6.0
Apple Tvos 6.1.1
Apple Tvos 6.1
NA
CVE-2014-4461
The kernel in Apple iOS prior to 8.1.1 and Apple TV prior to 7.0.2 does not properly validate IOSharedDataQueue object metadata, which allows malicious users to execute arbitrary code in a privileged context via a crafted application.
Apple Iphone Os 8.0.1
Apple Iphone Os 8.0
Apple Iphone Os
Apple Iphone Os 8.0.2
Apple Mac Os X 10.10.0
Apple Mac Os X 10.9.5
Apple Mac Os X 10.8.5
Apple Mac Os X
Apple Tvos 7.0
Apple Tvos 6.2.1
Apple Tvos 6.0
Apple Tvos 6.1.1
Apple Tvos 6.1
Apple Tvos
Apple Tvos 6.0.2
Apple Tvos 6.0.1
Apple Tvos 6.2
Apple Tvos 6.1.2
NA
CVE-2013-0999
WebKit, as used in Apple iTunes prior to 11.0.3, allows man-in-the-middle malicious users to execute arbitrary code or cause a denial of service (memory corruption and application crash) via vectors related to iTunes Store browsing, a different vulnerability than other WebKit CVE...
Apple Itunes 10.3
Apple Itunes 10.2
Apple Itunes 10.4
Apple Itunes 10.1.2
Apple Itunes 10.2.2.12
Apple Itunes 10.5.3
Apple Itunes 10.6
Apple Itunes 9.1.1
Apple Itunes 9.0.1
Apple Itunes 7.0.2
Apple Itunes 7.1.0
Apple Itunes 7.4.0
Apple Itunes 7.4.1
Apple Itunes 7.6.2
Apple Itunes 7.7
Apple Itunes 6.0.4
Apple Itunes 6.0.5
Apple Itunes 4.2.0
Apple Itunes 4.5
Apple Itunes 4.8.0
Apple Itunes 4.9.0
Apple Itunes 10.0
NA
CVE-2013-1000
WebKit, as used in Apple iTunes prior to 11.0.3, allows man-in-the-middle malicious users to execute arbitrary code or cause a denial of service (memory corruption and application crash) via vectors related to iTunes Store browsing, a different vulnerability than other WebKit CVE...
Apple Itunes 10.2
Apple Itunes 10.4
Apple Itunes 10.1.2
Apple Itunes 10.2.2.12
Apple Itunes 10.6
Apple Itunes 10.5.1.42
Apple Itunes 9.1.1
Apple Itunes 9.0.1
Apple Itunes 7.0.2
Apple Itunes 7.1.0
Apple Itunes 7.1.1
Apple Itunes 7.4.1
Apple Itunes 10.0
Apple Itunes 10.0.1
Apple Itunes 10.4.1.10
Apple Itunes 10.5.2
Apple Itunes 9.2.1
Apple Itunes 9.1
Apple Itunes 8.0.0
Apple Itunes 8.0.1
Apple Itunes 7.3.1
Apple Itunes 7.3.2
NA
CVE-2013-1001
WebKit, as used in Apple iTunes prior to 11.0.3, allows man-in-the-middle malicious users to execute arbitrary code or cause a denial of service (memory corruption and application crash) via vectors related to iTunes Store browsing, a different vulnerability than other WebKit CVE...
Apple Iphone Os 1.1.2
Apple Iphone Os 1.1.3
Apple Iphone Os 2.1.1
Apple Iphone Os 2.2
Apple Iphone Os 3.2
Apple Iphone Os 3.2.1
Apple Iphone Os 4.2.5
Apple Iphone Os 4.2.8
Apple Iphone Os 5.1
Apple Iphone Os 5.1.1
Apple Iphone Os
Apple Iphone Os 1.0.0
Apple Iphone Os 1.1.4
Apple Iphone Os 1.1.5
Apple Iphone Os 2.2.1
Apple Iphone Os 3.0
Apple Iphone Os 3.2.2
Apple Iphone Os 4.0
Apple Iphone Os 4.3.0
Apple Iphone Os 4.3.1
Apple Iphone Os 6.0
Apple Iphone Os 6.0.1
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
cross-site request forgery
CVE-2024-34351
CVE-2024-1076
CVE-2024-25522
CVE-2024-34547
CVE-2024-4644
unauthorized
remote
CVE-2024-4671
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
3
4
5
6
NEXT »