Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
apple tv vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2014-4476
WebKit, as used in Apple iOS prior to 8.1.3; Apple Safari prior to 6.2.3, 7.x prior to 7.1.3, and 8.x prior to 8.0.3; and Apple TV prior to 7.0.3, allows remote malicious users to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a ...
Apple Safari 7.0.2
Apple Safari 7.0.3
Apple Safari 8.0.1
Apple Safari 8.0.2
Apple Safari 7.0
Apple Safari 7.0.1
Apple Safari 7.1.2
Apple Safari 8.0.0
Apple Safari
Apple Safari 7.1.0
Apple Safari 7.1.1
Apple Safari 7.0.4
Apple Safari 7.0.5
Apple Safari 7.0.6
Apple Itunes
Apple Tvos
Apple Iphone Os
NA
CVE-2014-4477
WebKit, as used in Apple iOS prior to 8.1.3; Apple Safari prior to 6.2.3, 7.x prior to 7.1.3, and 8.x prior to 8.0.3; and Apple TV prior to 7.0.3, allows remote malicious users to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a ...
Apple Iphone Os
Apple Tvos
Apple Itunes
Apple Safari 7.0
Apple Safari 7.0.1
Apple Safari 7.0.2
Apple Safari 7.1.2
Apple Safari
Apple Safari 8.0.1
Apple Safari 8.0.2
Apple Safari 7.1.0
Apple Safari 7.1.1
Apple Safari 8.0.0
Apple Safari 7.0.5
Apple Safari 7.0.6
Apple Safari 7.0.3
Apple Safari 7.0.4
NA
CVE-2014-4479
WebKit, as used in Apple iOS prior to 8.1.3; Apple Safari prior to 6.2.3, 7.x prior to 7.1.3, and 8.x prior to 8.0.3; and Apple TV prior to 7.0.3, allows remote malicious users to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a ...
Apple Safari 7.0.4
Apple Safari 7.0.5
Apple Safari 7.0.2
Apple Safari 7.0.3
Apple Safari 8.0.0
Apple Safari 8.0.1
Apple Safari 8.0.2
Apple Safari 7.0
Apple Safari 7.0.1
Apple Safari 7.1.1
Apple Safari 7.1.2
Apple Safari
Apple Safari 7.0.6
Apple Safari 7.1.0
Apple Iphone Os
Apple Tvos
Apple Itunes
NA
CVE-2014-4371
The network-statistics interface in the kernel in Apple iOS prior to 8 and Apple TV prior to 7 does not properly initialize memory, which allows malicious users to obtain sensitive memory-content and memory-layout information via a crafted application, a different vulnerability t...
Apple Tvos 6.1.2
Apple Tvos 6.1
Apple Tvos 6.0.1
Apple Tvos
Apple Tvos 6.0
Apple Tvos 6.1.1
Apple Tvos 6.0.2
Apple Mac Os X
Apple Iphone Os 7.0.6
Apple Iphone Os 7.0.4
Apple Iphone Os
Apple Iphone Os 7.0.2
Apple Iphone Os 7.0.1
Apple Iphone Os 7.0
Apple Iphone Os 7.1.1
Apple Iphone Os 7.0.5
Apple Iphone Os 7.0.3
Apple Iphone Os 7.1
NA
CVE-2014-4419
The network-statistics interface in the kernel in Apple iOS prior to 8 and Apple TV prior to 7 does not properly initialize memory, which allows malicious users to obtain sensitive memory-content and memory-layout information via a crafted application, a different vulnerability t...
Apple Tvos 6.1.2
Apple Tvos 6.1.1
Apple Tvos 6.0.1
Apple Tvos 6.0
Apple Tvos 6.1
Apple Tvos 6.0.2
Apple Tvos
Apple Iphone Os 7.0.5
Apple Iphone Os 7.0.4
Apple Iphone Os
Apple Iphone Os 7.0.1
Apple Iphone Os 7.0
Apple Iphone Os 7.0.3
Apple Iphone Os 7.0.2
Apple Iphone Os 7.0.6
Apple Iphone Os 7.1.1
Apple Iphone Os 7.1
Apple Mac Os X
NA
CVE-2014-4420
The network-statistics interface in the kernel in Apple iOS prior to 8 and Apple TV prior to 7 does not properly initialize memory, which allows malicious users to obtain sensitive memory-content and memory-layout information via a crafted application, a different vulnerability t...
Apple Tvos 6.0.1
Apple Tvos 6.0
Apple Tvos
Apple Tvos 6.1.2
Apple Tvos 6.1.1
Apple Tvos 6.1
Apple Tvos 6.0.2
Apple Iphone Os 7.0.1
Apple Iphone Os 7.0
Apple Iphone Os 7.0.5
Apple Iphone Os 7.0.4
Apple Iphone Os
Apple Iphone Os 7.0.6
Apple Iphone Os 7.1.1
Apple Iphone Os 7.1
Apple Iphone Os 7.0.3
Apple Iphone Os 7.0.2
Apple Mac Os X
NA
CVE-2014-4421
The network-statistics interface in the kernel in Apple iOS prior to 8 and Apple TV prior to 7 does not properly initialize memory, which allows malicious users to obtain sensitive memory-content and memory-layout information via a crafted application, a different vulnerability t...
Apple Mac Os X
Apple Iphone Os 7.1.1
Apple Iphone Os 7.1
Apple Iphone Os 7.0.3
Apple Iphone Os 7.0.2
Apple Iphone Os 7.0.6
Apple Iphone Os 7.0.5
Apple Iphone Os 7.0.4
Apple Iphone Os
Apple Iphone Os 7.0.1
Apple Iphone Os 7.0
Apple Tvos 6.0.2
Apple Tvos 6.0.1
Apple Tvos
Apple Tvos 6.1.2
Apple Tvos 6.0
Apple Tvos 6.1.1
Apple Tvos 6.1
NA
CVE-2014-1267
The Configuration Profiles component in Apple iOS prior to 7.1 and Apple TV prior to 6.1 does not properly evaluate the expiration date of a mobile configuration profile, which allows malicious users to bypass intended access restrictions by using a profile after the date has pas...
Apple Tvos 6.0.1
Apple Tvos
Apple Tvos 6.0
Apple Iphone Os
Apple Iphone Os 7.0.1
Apple Iphone Os 7.0.2
Apple Iphone Os 7.0.3
Apple Iphone Os 7.0.4
Apple Iphone Os 7.0
Apple Iphone Os 7.0.5
NA
CVE-2014-1320
IOKit in Apple iOS prior to 7.1.1, Apple OS X up to and including 10.9.2, and Apple TV prior to 6.1.1 places kernel pointers into an object data structure, which makes it easier for local users to bypass the ASLR protection mechanism by reading unspecified attributes of the objec...
Apple Mac Os X 10.9
Apple Mac Os X 10.9.1
Apple Mac Os X
Apple Iphone Os 7.0.3
Apple Iphone Os 7.0.4
Apple Iphone Os 7.0.5
Apple Iphone Os 7.0.6
Apple Iphone Os 7.0
Apple Iphone Os 7.0.2
Apple Iphone Os
Apple Iphone Os 7.0.1
Apple Tvos 6.0.2
Apple Tvos
Apple Tvos 6.0
Apple Tvos 6.0.1
3.3
CVSSv3
CVE-2019-8566
An API issue existed in the handling of microphone data. This issue was addressed with improved validation. This issue is fixed in iOS 12.2. A malicious application may be able to access the microphone without indication to the user.
Apple Iphone Os
1 Article
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2023-30310
CVE-2024-21683
CVE-2024-22187
chrome
deserialization
XPath injection
CVE-2024-27842
denial of service
CVE-2024-24851
google
CVE-2024-35400
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
5
6
7
8
9
10
NEXT »