Vulmon
Recent Vulnerabilities
Product List
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
apple iphone os 2.2.1 vulnerabilities and exploits
(subscribe to this query)
8.8
CVSSv3
CVE-2016-1847
OpenGL, as used in Apple iOS prior to 9.3.2, OS X prior to 10.11.5, tvOS prior to 9.2.1, and watchOS prior to 2.2.1, allows remote malicious users to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site.
Apple Iphone Os
Apple Mac Os X
Apple Tvos
Apple Watchos
7.8
CVSSv3
CVE-2016-1813
The IOAccelSharedUserClient2::page_off_resource method in Apple iOS prior to 9.3.2, OS X prior to 10.11.5, tvOS prior to 9.2.1, and watchOS prior to 2.2.1 allows malicious users to execute arbitrary code in a privileged context or cause a denial of service (NULL pointer dereferen...
Apple Watchos
Apple Iphone Os
Apple Mac Os X
Apple Tvos
1 EDB exploit
7.8
CVSSv3
CVE-2016-1817
IOAcceleratorFamily in Apple iOS prior to 9.3.2, OS X prior to 10.11.5, tvOS prior to 9.2.1, and watchOS prior to 2.2.1 allows malicious users to execute arbitrary code in a privileged context or cause a denial of service (memory corruption) via a crafted app, a different vulnera...
Apple Tvos
Apple Iphone Os
Apple Mac Os X
Apple Watchos
7.8
CVSSv3
CVE-2016-1818
IOAcceleratorFamily in Apple iOS prior to 9.3.2, OS X prior to 10.11.5, tvOS prior to 9.2.1, and watchOS prior to 2.2.1 allows malicious users to execute arbitrary code in a privileged context or cause a denial of service (memory corruption) via a crafted app, a different vulnera...
Apple Mac Os X
Apple Iphone Os
Apple Watchos
Apple Tvos
7.8
CVSSv3
CVE-2016-1819
Use-after-free vulnerability in the IOAccelContext2::clientMemoryForType method in Apple iOS prior to 9.3.2, OS X prior to 10.11.5, tvOS prior to 9.2.1, and watchOS prior to 2.2.1 allows malicious users to execute arbitrary code in a privileged context or cause a denial of servic...
Apple Tvos
Apple Iphone Os
Apple Mac Os X
Apple Watchos
1 EDB exploit
7.8
CVSSv3
CVE-2016-1824
IOHIDFamily in Apple iOS prior to 9.3.2, OS X prior to 10.11.5, tvOS prior to 9.2.1, and watchOS prior to 2.2.1 allows malicious users to execute arbitrary code in a privileged context or cause a denial of service (memory corruption) via a crafted app, a different vulnerability t...
Apple Tvos
Apple Watchos
Apple Iphone Os
Apple Mac Os X
3 Github repositories
7.8
CVSSv3
CVE-2016-1827
The kernel in Apple iOS prior to 9.3.2, OS X prior to 10.11.5, tvOS prior to 9.2.1, and watchOS prior to 2.2.1 allows malicious users to execute arbitrary code in a privileged context or cause a denial of service (memory corruption) via a crafted app, a different vulnerability th...
Apple Iphone Os
Apple Mac Os X
Apple Tvos
Apple Watchos
1 EDB exploit
1 Github repository
7.8
CVSSv3
CVE-2016-1828
The kernel in Apple iOS prior to 9.3.2, OS X prior to 10.11.5, tvOS prior to 9.2.1, and watchOS prior to 2.2.1 allows malicious users to execute arbitrary code in a privileged context or cause a denial of service (memory corruption) via a crafted app, a different vulnerability th...
Apple Iphone Os
Apple Mac Os X
Apple Tvos
Apple Watchos
1 EDB exploit
5 Github repositories
7.8
CVSSv3
CVE-2016-1830
The kernel in Apple iOS prior to 9.3.2, OS X prior to 10.11.5, tvOS prior to 9.2.1, and watchOS prior to 2.2.1 allows malicious users to execute arbitrary code in a privileged context or cause a denial of service (memory corruption) via a crafted app, a different vulnerability th...
Apple Iphone Os
Apple Mac Os X
Apple Tvos
Apple Watchos
7.8
CVSSv3
CVE-2016-1832
libc in Apple iOS prior to 9.3.2, OS X prior to 10.11.5, tvOS prior to 9.2.1, and watchOS prior to 2.2.1 allows local users to gain privileges or cause a denial of service (memory corruption) via unspecified vectors.
Apple Iphone Os
Apple Mac Os X
Apple Tvos
Apple Watchos
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-3080
log injection
CVE-2024-6041
CVE-2024-37661
XML external entity
CVE-2024-0845
privilege escalation
CVE-2023-37057
CVE-2024-27801
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
3
4
5
6
NEXT »