Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
apple tv vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2014-1292
WebKit, as used in Apple iOS prior to 7.1 and Apple TV prior to 6.1, allows remote malicious users to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than CVE-2014-1289, CVE-2014-1290,...
Apple Iphone Os 7.0
Apple Iphone Os 7.0.1
Apple Iphone Os 7.0.4
Apple Iphone Os 7.0.5
Apple Iphone Os
Apple Iphone Os 7.0.2
Apple Iphone Os 7.0.3
Apple Tvos 6.0.1
Apple Tvos 6.0
Apple Tvos
NA
CVE-2014-1278
The ptmx_get_ioctl function in the ARM kernel in Apple iOS prior to 7.1 and Apple TV prior to 6.1 allows local users to gain privileges or cause a denial of service (out-of-bounds memory access and device crash) via a crafted call.
Apple Iphone Os 7.0
Apple Iphone Os 7.0.2
Apple Iphone Os 7.0.1
Apple Iphone Os 7.0.3
Apple Iphone Os 7.0.4
Apple Iphone Os 7.0.5
Apple Iphone Os
Apple Tvos 6.0.1
Apple Tvos
Apple Tvos 6.0
NA
CVE-2014-4477
WebKit, as used in Apple iOS prior to 8.1.3; Apple Safari prior to 6.2.3, 7.x prior to 7.1.3, and 8.x prior to 8.0.3; and Apple TV prior to 7.0.3, allows remote malicious users to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a ...
Apple Iphone Os
Apple Tvos
Apple Itunes
Apple Safari 7.0
Apple Safari 7.0.1
Apple Safari 7.0.2
Apple Safari 7.1.2
Apple Safari
Apple Safari 8.0.1
Apple Safari 8.0.2
Apple Safari 7.1.0
Apple Safari 7.1.1
Apple Safari 8.0.0
Apple Safari 7.0.5
Apple Safari 7.0.6
Apple Safari 7.0.3
Apple Safari 7.0.4
NA
CVE-2014-4476
WebKit, as used in Apple iOS prior to 8.1.3; Apple Safari prior to 6.2.3, 7.x prior to 7.1.3, and 8.x prior to 8.0.3; and Apple TV prior to 7.0.3, allows remote malicious users to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a ...
Apple Safari 7.0.2
Apple Safari 7.0.3
Apple Safari 8.0.1
Apple Safari 8.0.2
Apple Safari 7.0
Apple Safari 7.0.1
Apple Safari 7.1.2
Apple Safari 8.0.0
Apple Safari
Apple Safari 7.1.0
Apple Safari 7.1.1
Apple Safari 7.0.4
Apple Safari 7.0.5
Apple Safari 7.0.6
Apple Itunes
Apple Tvos
Apple Iphone Os
NA
CVE-2014-4479
WebKit, as used in Apple iOS prior to 8.1.3; Apple Safari prior to 6.2.3, 7.x prior to 7.1.3, and 8.x prior to 8.0.3; and Apple TV prior to 7.0.3, allows remote malicious users to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a ...
Apple Safari 7.0.4
Apple Safari 7.0.5
Apple Safari 7.0.2
Apple Safari 7.0.3
Apple Safari 8.0.0
Apple Safari 8.0.1
Apple Safari 8.0.2
Apple Safari 7.0
Apple Safari 7.0.1
Apple Safari 7.1.1
Apple Safari 7.1.2
Apple Safari
Apple Safari 7.0.6
Apple Safari 7.1.0
Apple Iphone Os
Apple Tvos
Apple Itunes
NA
CVE-2014-4371
The network-statistics interface in the kernel in Apple iOS prior to 8 and Apple TV prior to 7 does not properly initialize memory, which allows malicious users to obtain sensitive memory-content and memory-layout information via a crafted application, a different vulnerability t...
Apple Tvos 6.1.2
Apple Tvos 6.1
Apple Tvos 6.0.1
Apple Tvos
Apple Tvos 6.0
Apple Tvos 6.1.1
Apple Tvos 6.0.2
Apple Mac Os X
Apple Iphone Os 7.0.6
Apple Iphone Os 7.0.4
Apple Iphone Os
Apple Iphone Os 7.0.2
Apple Iphone Os 7.0.1
Apple Iphone Os 7.0
Apple Iphone Os 7.1.1
Apple Iphone Os 7.0.5
Apple Iphone Os 7.0.3
Apple Iphone Os 7.1
NA
CVE-2014-4419
The network-statistics interface in the kernel in Apple iOS prior to 8 and Apple TV prior to 7 does not properly initialize memory, which allows malicious users to obtain sensitive memory-content and memory-layout information via a crafted application, a different vulnerability t...
Apple Tvos 6.1.2
Apple Tvos 6.1.1
Apple Tvos 6.0.1
Apple Tvos 6.0
Apple Tvos 6.1
Apple Tvos 6.0.2
Apple Tvos
Apple Iphone Os 7.0.5
Apple Iphone Os 7.0.4
Apple Iphone Os
Apple Iphone Os 7.0.1
Apple Iphone Os 7.0
Apple Iphone Os 7.0.3
Apple Iphone Os 7.0.2
Apple Iphone Os 7.0.6
Apple Iphone Os 7.1.1
Apple Iphone Os 7.1
Apple Mac Os X
NA
CVE-2014-4421
The network-statistics interface in the kernel in Apple iOS prior to 8 and Apple TV prior to 7 does not properly initialize memory, which allows malicious users to obtain sensitive memory-content and memory-layout information via a crafted application, a different vulnerability t...
Apple Mac Os X
Apple Iphone Os 7.1.1
Apple Iphone Os 7.1
Apple Iphone Os 7.0.3
Apple Iphone Os 7.0.2
Apple Iphone Os 7.0.6
Apple Iphone Os 7.0.5
Apple Iphone Os 7.0.4
Apple Iphone Os
Apple Iphone Os 7.0.1
Apple Iphone Os 7.0
Apple Tvos 6.0.2
Apple Tvos 6.0.1
Apple Tvos
Apple Tvos 6.1.2
Apple Tvos 6.0
Apple Tvos 6.1.1
Apple Tvos 6.1
NA
CVE-2014-4420
The network-statistics interface in the kernel in Apple iOS prior to 8 and Apple TV prior to 7 does not properly initialize memory, which allows malicious users to obtain sensitive memory-content and memory-layout information via a crafted application, a different vulnerability t...
Apple Tvos 6.0.1
Apple Tvos 6.0
Apple Tvos
Apple Tvos 6.1.2
Apple Tvos 6.1.1
Apple Tvos 6.1
Apple Tvos 6.0.2
Apple Iphone Os 7.0.1
Apple Iphone Os 7.0
Apple Iphone Os 7.0.5
Apple Iphone Os 7.0.4
Apple Iphone Os
Apple Iphone Os 7.0.6
Apple Iphone Os 7.1.1
Apple Iphone Os 7.1
Apple Iphone Os 7.0.3
Apple Iphone Os 7.0.2
Apple Mac Os X
NA
CVE-2014-1267
The Configuration Profiles component in Apple iOS prior to 7.1 and Apple TV prior to 6.1 does not properly evaluate the expiration date of a mobile configuration profile, which allows malicious users to bypass intended access restrictions by using a profile after the date has pas...
Apple Tvos 6.0.1
Apple Tvos
Apple Tvos 6.0
Apple Iphone Os
Apple Iphone Os 7.0.1
Apple Iphone Os 7.0.2
Apple Iphone Os 7.0.3
Apple Iphone Os 7.0.4
Apple Iphone Os 7.0
Apple Iphone Os 7.0.5
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
authentication bypass
CVE-2024-30043
camera
CVE-2023-40404
CVE-2024-2793
client side
CVE-2024-4469
CVE-2024-3565
CVE-2024-29825
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
7
8
9
10
NEXT »