Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
apple tv vulnerabilities and exploits
(subscribe to this query)
6.8
CVSSv2
CVE-2014-4477
WebKit, as used in Apple iOS prior to 8.1.3; Apple Safari prior to 6.2.3, 7.x prior to 7.1.3, and 8.x prior to 8.0.3; and Apple TV prior to 7.0.3, allows remote malicious users to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a ...
Apple Iphone Os
Apple Tvos
Apple Itunes
Apple Safari 7.0
Apple Safari 7.0.1
Apple Safari 7.0.2
Apple Safari 7.1.2
Apple Safari
Apple Safari 8.0.1
Apple Safari 8.0.2
Apple Safari 7.1.0
Apple Safari 7.1.1
Apple Safari 8.0.0
Apple Safari 7.0.5
Apple Safari 7.0.6
Apple Safari 7.0.3
Apple Safari 7.0.4
6.8
CVSSv2
CVE-2014-4479
WebKit, as used in Apple iOS prior to 8.1.3; Apple Safari prior to 6.2.3, 7.x prior to 7.1.3, and 8.x prior to 8.0.3; and Apple TV prior to 7.0.3, allows remote malicious users to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a ...
Apple Safari 7.0.4
Apple Safari 7.0.5
Apple Safari 7.0.2
Apple Safari 7.0.3
Apple Safari 8.0.0
Apple Safari 8.0.1
Apple Safari 8.0.2
Apple Safari 7.0
Apple Safari 7.0.1
Apple Safari 7.1.1
Apple Safari 7.1.2
Apple Safari
Apple Safari 7.0.6
Apple Safari 7.1.0
Apple Iphone Os
Apple Tvos
Apple Itunes
6.8
CVSSv2
CVE-2014-4476
WebKit, as used in Apple iOS prior to 8.1.3; Apple Safari prior to 6.2.3, 7.x prior to 7.1.3, and 8.x prior to 8.0.3; and Apple TV prior to 7.0.3, allows remote malicious users to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a ...
Apple Safari 7.0.2
Apple Safari 7.0.3
Apple Safari 8.0.1
Apple Safari 8.0.2
Apple Safari 7.0
Apple Safari 7.0.1
Apple Safari 7.1.2
Apple Safari 8.0.0
Apple Safari
Apple Safari 7.1.0
Apple Safari 7.1.1
Apple Safari 7.0.4
Apple Safari 7.0.5
Apple Safari 7.0.6
Apple Itunes
Apple Tvos
Apple Iphone Os
1.9
CVSSv2
CVE-2014-4371
The network-statistics interface in the kernel in Apple iOS prior to 8 and Apple TV prior to 7 does not properly initialize memory, which allows malicious users to obtain sensitive memory-content and memory-layout information via a crafted application, a different vulnerability t...
Apple Tvos 6.1.2
Apple Tvos 6.1
Apple Tvos 6.0.1
Apple Tvos
Apple Tvos 6.0
Apple Tvos 6.1.1
Apple Tvos 6.0.2
Apple Mac Os X
Apple Iphone Os 7.0.6
Apple Iphone Os 7.0.4
Apple Iphone Os
Apple Iphone Os 7.0.2
Apple Iphone Os 7.0.1
Apple Iphone Os 7.0
Apple Iphone Os 7.1.1
Apple Iphone Os 7.0.5
Apple Iphone Os 7.0.3
Apple Iphone Os 7.1
1.9
CVSSv2
CVE-2014-4419
The network-statistics interface in the kernel in Apple iOS prior to 8 and Apple TV prior to 7 does not properly initialize memory, which allows malicious users to obtain sensitive memory-content and memory-layout information via a crafted application, a different vulnerability t...
Apple Tvos 6.1.2
Apple Tvos 6.1.1
Apple Tvos 6.0.1
Apple Tvos 6.0
Apple Tvos 6.1
Apple Tvos 6.0.2
Apple Tvos
Apple Iphone Os 7.0.5
Apple Iphone Os 7.0.4
Apple Iphone Os
Apple Iphone Os 7.0.1
Apple Iphone Os 7.0
Apple Iphone Os 7.0.3
Apple Iphone Os 7.0.2
Apple Iphone Os 7.0.6
Apple Iphone Os 7.1.1
Apple Iphone Os 7.1
Apple Mac Os X
1.9
CVSSv2
CVE-2014-4420
The network-statistics interface in the kernel in Apple iOS prior to 8 and Apple TV prior to 7 does not properly initialize memory, which allows malicious users to obtain sensitive memory-content and memory-layout information via a crafted application, a different vulnerability t...
Apple Tvos 6.0.1
Apple Tvos 6.0
Apple Tvos
Apple Tvos 6.1.2
Apple Tvos 6.1.1
Apple Tvos 6.1
Apple Tvos 6.0.2
Apple Iphone Os 7.0.1
Apple Iphone Os 7.0
Apple Iphone Os 7.0.5
Apple Iphone Os 7.0.4
Apple Iphone Os
Apple Iphone Os 7.0.6
Apple Iphone Os 7.1.1
Apple Iphone Os 7.1
Apple Iphone Os 7.0.3
Apple Iphone Os 7.0.2
Apple Mac Os X
1.9
CVSSv2
CVE-2014-4421
The network-statistics interface in the kernel in Apple iOS prior to 8 and Apple TV prior to 7 does not properly initialize memory, which allows malicious users to obtain sensitive memory-content and memory-layout information via a crafted application, a different vulnerability t...
Apple Mac Os X
Apple Iphone Os 7.1.1
Apple Iphone Os 7.1
Apple Iphone Os 7.0.3
Apple Iphone Os 7.0.2
Apple Iphone Os 7.0.6
Apple Iphone Os 7.0.5
Apple Iphone Os 7.0.4
Apple Iphone Os
Apple Iphone Os 7.0.1
Apple Iphone Os 7.0
Apple Tvos 6.0.2
Apple Tvos 6.0.1
Apple Tvos
Apple Tvos 6.1.2
Apple Tvos 6.0
Apple Tvos 6.1.1
Apple Tvos 6.1
5.8
CVSSv2
CVE-2014-1267
The Configuration Profiles component in Apple iOS prior to 7.1 and Apple TV prior to 6.1 does not properly evaluate the expiration date of a mobile configuration profile, which allows malicious users to bypass intended access restrictions by using a profile after the date has pas...
Apple Tvos 6.0.1
Apple Tvos
Apple Tvos 6.0
Apple Iphone Os
Apple Iphone Os 7.0.1
Apple Iphone Os 7.0.2
Apple Iphone Os 7.0.3
Apple Iphone Os 7.0.4
Apple Iphone Os 7.0
Apple Iphone Os 7.0.5
4.9
CVSSv2
CVE-2014-1320
IOKit in Apple iOS prior to 7.1.1, Apple OS X up to and including 10.9.2, and Apple TV prior to 6.1.1 places kernel pointers into an object data structure, which makes it easier for local users to bypass the ASLR protection mechanism by reading unspecified attributes of the objec...
Apple Mac Os X 10.9
Apple Mac Os X 10.9.1
Apple Mac Os X
Apple Iphone Os 7.0.3
Apple Iphone Os 7.0.4
Apple Iphone Os 7.0.5
Apple Iphone Os 7.0.6
Apple Iphone Os 7.0
Apple Iphone Os 7.0.2
Apple Iphone Os
Apple Iphone Os 7.0.1
Apple Tvos 6.0.2
Apple Tvos
Apple Tvos 6.0
Apple Tvos 6.0.1
4.3
CVSSv2
CVE-2019-8566
An API issue existed in the handling of microphone data. This issue was addressed with improved validation. This issue is fixed in iOS 12.2. A malicious application may be able to access the microphone without indication to the user.
Apple Iphone Os
1 Article
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
spoof
CVE-2024-34928
CVE-2024-5291
deserialization
CVE-2024-4471
CVE-2024-4956
CVE-2024-32002
CVE-2024-5227
unspecified
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
5
6
7
8
9
10
NEXT »