Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
apple iphone os 4.3.2 vulnerabilities and exploits
(subscribe to this query)
4.3
CVSSv2
CVE-2018-4271
Multiple memory corruption issues were addressed with improved input validation. This issue affected versions prior to iOS 11.4.1, tvOS 11.4.1, watchOS 4.3.2, Safari 11.1.2, iTunes 12.8 for Windows, iCloud for Windows 7.6.
Apple Safari
Apple Watchos
Apple Iphone Os
Apple Tvos
Apple Icloud
Apple Itunes
4.3
CVSSv2
CVE-2018-4273
Multiple memory corruption issues were addressed with improved input validation. This issue affected versions prior to iOS 11.4.1, tvOS 11.4.1, watchOS 4.3.2, Safari 11.1.2, iTunes 12.8 for Windows, iCloud for Windows 7.6.
Apple Watchos
Apple Iphone Os
Apple Tvos
Apple Safari
Apple Itunes
Apple Icloud
5
CVSSv2
CVE-2018-4293
A cookie management issue was addressed with improved checks. This issue affected versions prior to iOS 11.4.1, macOS High Sierra 10.13.6, tvOS 11.4.1, watchOS 4.3.2, iTunes 12.8 for Windows, iCloud for Windows 7.6.
Apple Mac Os X
Apple Watchos
Apple Iphone Os
Apple Tvos
Apple Icloud
Apple Itunes
5
CVSSv2
CVE-2018-4277
In iOS prior to 11.4.1, watchOS prior to 4.3.2, tvOS prior to 11.4.1, Safari prior to 11.1.1, macOS High Sierra prior to 10.13.6, a spoofing issue existed in the handling of URLs. This issue was addressed with improved input validation.
Apple Mac Os X
Apple Tvos
Apple Safari
Apple Watchos
Apple Iphone Os
7.1
CVSSv2
CVE-2013-5155
The Sandbox subsystem in Apple iOS prior to 7 allows malicious users to cause a denial of service (infinite loop) via an application that writes crafted values to /dev/random.
Apple Iphone Os 1.0.1
Apple Iphone Os 1.0.2
Apple Iphone Os 1.1.0
Apple Iphone Os 1.1.1
Apple Iphone Os 3.0.1
Apple Iphone Os 3.1
Apple Iphone Os 3.1.2
Apple Iphone Os 3.1.3
Apple Iphone Os 4.3.3
Apple Iphone Os 4.3.5
Apple Iphone Os 5.0
Apple Iphone Os 5.0.1
Apple Iphone Os 2.0.0
Apple Iphone Os 2.0.1
Apple Iphone Os 2.0.2
Apple Iphone Os 2.1
Apple Iphone Os 4.0.1
Apple Iphone Os 4.0.2
Apple Iphone Os 4.1
Apple Iphone Os 4.2.1
Apple Iphone Os 6.0.2
Apple Iphone Os 6.1
2.6
CVSSv2
CVE-2013-5137
IOKit in Apple iOS prior to 7 allows malicious users to send user-interface events to the foreground app by leveraging control over a background app and using the (1) task-completion API or (2) VoIP API.
Apple Iphone Os 1.1.2
Apple Iphone Os 1.1.3
Apple Iphone Os 1.1.4
Apple Iphone Os 1.1.5
Apple Iphone Os 2.0
Apple Iphone Os
Apple Iphone Os 1.0.0
Apple Iphone Os 2.1.1
Apple Iphone Os 2.2
Apple Iphone Os 2.2.1
Apple Iphone Os 3.0
Apple Iphone Os 4.2.5
Apple Iphone Os 4.2.8
Apple Iphone Os 4.3.0
Apple Iphone Os 4.3.1
Apple Iphone Os 4.3.2
Apple Iphone Os 1.0.1
Apple Iphone Os 1.1.0
Apple Iphone Os 2.0.0
Apple Iphone Os 2.0.2
Apple Iphone Os 3.1
Apple Iphone Os 3.1.3
9.3
CVSSv2
CVE-2013-5139
The IOSerialFamily driver in Apple iOS prior to 7 allows malicious users to execute arbitrary code or cause a denial of service (out-of-bounds array access) via a crafted application.
Apple Iphone Os
Apple Iphone Os 1.0.0
Apple Iphone Os 1.1.5
Apple Iphone Os 2.0
Apple Iphone Os 2.2.1
Apple Iphone Os 3.0
Apple Iphone Os 3.2.2
Apple Iphone Os 4.0
Apple Iphone Os 4.3.1
Apple Iphone Os 4.3.2
Apple Iphone Os 6.0
Apple Iphone Os 6.0.1
Apple Iphone Os 1.1.0
Apple Iphone Os 1.1.1
Apple Iphone Os 2.0.2
Apple Iphone Os 2.1
Apple Iphone Os 3.1.2
Apple Iphone Os 3.1.3
Apple Iphone Os 4.1
Apple Iphone Os 4.2.1
Apple Iphone Os 5.0
Apple Iphone Os 5.0.1
7.1
CVSSv2
CVE-2013-5141
The kernel in Apple iOS prior to 7 uses an incorrect data size for a certain integer variable, which allows malicious users to cause a denial of service (infinite loop and device hang) via a crafted application, related to an "integer truncation vulnerability."
Apple Iphone Os 1.0.2
Apple Iphone Os 1.1.0
Apple Iphone Os 2.0.0
Apple Iphone Os 2.0.1
Apple Iphone Os 3.0.1
Apple Iphone Os 3.1
Apple Iphone Os 4.0.2
Apple Iphone Os 4.1
Apple Iphone Os 4.3.3
Apple Iphone Os 4.3.5
Apple Iphone Os 6.0.2
Apple Iphone Os 6.1
Apple Iphone Os
Apple Iphone Os 1.1.3
Apple Iphone Os 1.1.4
Apple Iphone Os 2.1.1
Apple Iphone Os 2.2
Apple Iphone Os 3.2.1
Apple Iphone Os 3.2.2
Apple Iphone Os 4.2.8
Apple Iphone Os 4.3.0
Apple Iphone Os 5.1
4.3
CVSSv2
CVE-2013-5156
The Telephony subsystem in Apple iOS prior to 7 does not require API conformity for access to telephony-daemon interfaces, which allows malicious users to bypass intended restrictions on phone calls via a crafted app that sends direct requests to the daemon.
Apple Iphone Os 1.0.0
Apple Iphone Os 1.0.1
Apple Iphone Os 1.0.2
Apple Iphone Os 1.1.0
Apple Iphone Os 3.0
Apple Iphone Os 3.0.1
Apple Iphone Os 3.1
Apple Iphone Os 3.1.2
Apple Iphone Os 4.3.1
Apple Iphone Os 4.3.2
Apple Iphone Os 4.3.3
Apple Iphone Os 4.3.5
Apple Iphone Os 5.0
Apple Iphone Os 1.1.5
Apple Iphone Os 2.0
Apple Iphone Os 2.0.0
Apple Iphone Os 2.0.1
Apple Iphone Os 2.0.2
Apple Iphone Os 4.0
Apple Iphone Os 4.0.1
Apple Iphone Os 4.0.2
Apple Iphone Os 4.1
2.1
CVSSv2
CVE-2013-5158
The Social subsystem in Apple iOS prior to 7 does not properly restrict access to the cache of Twitter icons, which allows physically proximate malicious users to obtain sensitive information about recent Twitter interaction via unspecified vectors.
Apple Iphone Os 1.1.3
Apple Iphone Os 1.1.4
Apple Iphone Os 1.1.5
Apple Iphone Os 2.0
Apple Iphone Os 3.2.1
Apple Iphone Os 3.2.2
Apple Iphone Os 4.0
Apple Iphone Os 4.0.1
Apple Iphone Os 5.1.1
Apple Iphone Os 6.0
Apple Iphone Os 6.0.1
Apple Iphone Os 6.0.2
Apple Iphone Os
Apple Iphone Os 1.0.0
Apple Iphone Os 1.0.1
Apple Iphone Os 2.2
Apple Iphone Os 2.2.1
Apple Iphone Os 3.0
Apple Iphone Os 3.0.1
Apple Iphone Os 4.2.8
Apple Iphone Os 4.3.0
Apple Iphone Os 4.3.1
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-4367
CVE-2024-35977
CVE-2023-49335
man-in-the-middle
CVE-2024-4947
CVE-2024-31714
memory leak
SQL
CVE-2024-35994
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
NEXT »