Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
apple numbers vulnerabilities and exploits
(subscribe to this query)
5
CVSSv2
CVE-2017-2391
An issue exists in certain Apple products. Pages prior to 6.1, Numbers prior to 4.1, and Keynote prior to 7.1 on macOS and Pages prior to 3.1, Numbers prior to 3.1, and Keynote prior to 3.1 on iOS are affected. The issue involves the "Export" component. It allows users ...
Apple Keynote
Apple Numbers
Apple Pages
4.3
CVSSv2
CVE-2015-7032
The Apple iWork application prior to 2.6 for iOS, Apple Keynote prior to 6.6, Apple Pages prior to 5.6, and Apple Numbers prior to 3.6 allow remote malicious users to obtain sensitive information via a crafted document.
Apple Numbers
Apple Iwork
Apple Pages
Apple Keynote
6.8
CVSSv2
CVE-2015-7033
The Apple iWork application prior to 2.6 for iOS, Apple Keynote prior to 6.6, Apple Pages prior to 5.6, and Apple Numbers prior to 3.6 allow remote malicious users to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted docum...
Apple Numbers
Apple Pages
Apple Keynote
Apple Iwork
5
CVSSv2
CVE-2015-3784
Office Viewer in Apple iOS prior to 8.4.1 and OS X prior to 10.10.5 allows remote malicious users to read arbitrary files via an XML document containing an external entity declaration in conjunction with an entity reference, related to an XML External Entity (XXE) issue.
Apple Mac Os X
Apple Iphone Os
Apple Numbers
Apple Keynote
Apple Pages
Apple Iwork
9.3
CVSSv2
CVE-2009-2195
Buffer overflow in WebKit in Apple Safari prior to 4.0.3 allows remote malicious users to execute arbitrary code or cause a denial of service (application crash) via crafted floating-point numbers.
Apple Safari 1.0.0
Apple Safari 1.0.0b1
Apple Safari 1.0.3
Apple Safari 1.1
Apple Safari 1.2.3
Apple Safari 1.2.4
Apple Safari 1.3.2
Apple Safari 2.0
Apple Safari 2.0.3
Apple Safari 2.0.3 417.9.3
Apple Safari 3.0.0b
Apple Safari 3.0.1
Apple Safari 3.0.3b
Apple Safari 3.0.4
Apple Safari 4beta
Apple Safari 3.2
Apple Safari 3.1.2
Apple Safari
Apple Safari 0.9
Apple Safari 1.0
Apple Safari 1.2.1
Apple Safari 1.2.2
1 EDB exploit
5
CVSSv2
CVE-2009-1696
WebKit in Apple Safari prior to 4.0, iPhone OS 1.0 up to and including 2.2.1, and iPhone OS for iPod touch 1.1 up to and including 2.2.1 uses predictable random numbers in JavaScript applications, which makes it easier for remote web servers to track the behavior of a Safari user...
Apple Safari 1.0
Apple Safari 1.1
Apple Safari 3.2.1
Apple Safari 3.2.3
Apple Safari 1.0.3
Apple Safari 1.2
Apple Safari 1.3
Apple Safari
Apple Safari 3.0.2
Apple Safari 3.1.1
Apple Safari 3.1
Apple Safari 1.3.1
Apple Safari 1.3.2
Apple Safari 0.9
Apple Safari 3.0.3
Apple Safari 3.1.2
Apple Safari 0.8
Apple Safari 2.0
Apple Safari 2.0.2
Apple Safari 2.0.4
Apple Safari 3.0
Apple Safari 3.0.4
5
CVSSv2
CVE-2010-3804
The JavaScript implementation in WebKit in Apple Safari prior to 5.0.3 on Mac OS X 10.5 up to and including 10.6 and Windows, and prior to 4.1.3 on Mac OS X 10.4, uses a weak algorithm for generating values of random numbers, which makes it easier for remote malicious users to tr...
Apple Safari
Apple Safari 5.0.1
Apple Safari 5.0
Apple Safari 3.1.0b
Apple Safari 3.1.0
Apple Safari 3.0.1b
Apple Safari 3.0.1
Apple Safari 2.0.3
Apple Safari 1.3.2
Apple Safari 1.2.3
Apple Safari 1.2.2
Apple Safari 1.0
Apple Safari 1.0.0
Apple Safari 3.2.2
Apple Safari 3.2.1
Apple Safari 3.0.3b
Apple Safari 3.0.3
Apple Safari 3.0
Apple Safari 3
Apple Safari 2.0.2
Apple Safari 2.0.1
Apple Safari 1.3.0
2 EDB exploits
5
CVSSv2
CVE-2018-4398
An issue existed in the method for determining prime numbers. This issue was addressed by using pseudorandom bases for testing of primes. This issue affected versions prior to iOS 12.1, macOS Mojave 10.14.1, tvOS 12.1, watchOS 5.1, iTunes 12.9.1, iCloud for Windows 7.8.
Apple Mac Os X
Apple Tvos
Apple Watchos
Apple Iphone Os
Apple Icloud
Apple Itunes
6.8
CVSSv2
CVE-2014-4422
The kernel in Apple iOS prior to 8 and Apple TV prior to 7 uses a predictable random number generator during the early portion of the boot process, which allows malicious users to bypass certain kernel-hardening protection mechanisms by using a user-space process to observe data ...
Apple Tvos
Apple Tvos 6.1.2
Apple Tvos 6.1.1
Apple Tvos 6.0.1
Apple Tvos 6.0
Apple Tvos 6.1
Apple Tvos 6.0.2
Apple Iphone Os 7.0.6
Apple Iphone Os 7.1.1
Apple Iphone Os 7.1
Apple Iphone Os 7.0.5
Apple Iphone Os 7.0.4
Apple Iphone Os
Apple Iphone Os 7.0.1
Apple Iphone Os 7.0
Apple Iphone Os 7.0.3
Apple Iphone Os 7.0.2
2.1
CVSSv2
CVE-2013-5173
The random-number generator in the kernel in Apple Mac OS X prior to 10.9 provides lengthy exclusive access for processing of large requests, which allows local users to cause a denial of service (temporary generator outage) via an application that requires many random numbers.
Apple Mac Os X 10.8.0
Apple Mac Os X 10.8.2
Apple Mac Os X 10.8.4
Apple Mac Os X 10.8.5
Apple Mac Os X
Apple Mac Os X 10.8.1
Apple Mac Os X 10.8.3
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
authentication bypass
CVE-2024-30043
camera
CVE-2023-40404
CVE-2024-2793
client side
CVE-2024-4469
CVE-2024-3565
CVE-2024-29825
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
3
4
NEXT »