Vulmon
Recent Vulnerabilities
Product List
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
apple iphone os 6.0.2 vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2014-4462
WebKit, as used in Apple iOS prior to 8.1.1 and Apple TV prior to 7.0.2, allows remote malicious users to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than CVE-2014-4452.
Apple Iphone Os 8.0
Apple Iphone Os 8.0.1
Apple Iphone Os 8.0.2
Apple Iphone Os
Apple Tvos 6.0
Apple Tvos 6.0.1
Apple Tvos 6.0.2
Apple Tvos 6.1
Apple Tvos 6.1.1
Apple Tvos 6.1.2
Apple Tvos 6.2
Apple Tvos 6.2.1
Apple Tvos 7.0
Apple Tvos
NA
CVE-2014-4369
The IOAcceleratorFamily API implementation in Apple iOS prior to 8 and Apple TV prior to 7 allows malicious users to cause a denial of service (NULL pointer dereference and device crash) via an application that uses crafted arguments.
Apple Tvos 6.0
Apple Tvos 6.0.1
Apple Tvos 6.0.2
Apple Tvos 6.1
Apple Tvos 6.1.1
Apple Tvos 6.1.2
Apple Tvos
Apple Iphone Os 7.0.4
Apple Iphone Os 7.1.1
Apple Iphone Os
Apple Iphone Os 7.0.5
Apple Iphone Os 7.1
Apple Iphone Os 7.0.6
Apple Iphone Os 7.0.1
Apple Iphone Os 7.0.2
Apple Iphone Os 7.0
Apple Iphone Os 7.0.3
NA
CVE-2014-4372
syslogd in the syslog subsystem in Apple iOS prior to 8 and Apple TV prior to 7 allows local users to change the permissions of arbitrary files via a symlink attack on an unspecified file.
Apple Tvos 6.0
Apple Tvos 6.0.1
Apple Tvos 6.0.2
Apple Tvos 6.1
Apple Tvos 6.1.1
Apple Tvos 6.1.2
Apple Tvos
Apple Iphone Os 7.0.4
Apple Iphone Os 7.1.1
Apple Iphone Os
Apple Iphone Os 7.0.5
Apple Iphone Os 7.1
Apple Iphone Os 7.0.6
Apple Iphone Os 7.0.1
Apple Iphone Os 7.0.2
Apple Iphone Os 7.0
Apple Iphone Os 7.0.3
NA
CVE-2014-4380
The IOHIDFamily kernel extension in Apple iOS prior to 8 and Apple TV prior to 7 lacks proper bounds checking on write operations, which allows malicious users to execute arbitrary code in the kernel's context via a crafted application.
Apple Tvos 6.0
Apple Tvos 6.0.1
Apple Tvos 6.0.2
Apple Tvos 6.1
Apple Tvos 6.1.1
Apple Tvos 6.1.2
Apple Tvos
Apple Iphone Os 7.0.4
Apple Iphone Os 7.1.1
Apple Iphone Os
Apple Iphone Os 7.0.5
Apple Iphone Os 7.1
Apple Iphone Os 7.0.6
Apple Iphone Os 7.0.1
Apple Iphone Os 7.0.2
Apple Iphone Os 7.0
Apple Iphone Os 7.0.3
Apple Mac Os X
NA
CVE-2014-4383
The Assets subsystem in Apple iOS prior to 8 and Apple TV prior to 7 allows man-in-the-middle malicious users to spoof a device's update status via a crafted Last-Modified HTTP response header.
Apple Iphone Os 7.0.4
Apple Iphone Os 7.1.1
Apple Iphone Os
Apple Iphone Os 7.0.5
Apple Iphone Os 7.1
Apple Iphone Os 7.0.6
Apple Iphone Os 7.0.1
Apple Iphone Os 7.0.2
Apple Iphone Os 7.0
Apple Iphone Os 7.0.3
Apple Tvos 6.0
Apple Tvos 6.0.1
Apple Tvos 6.0.2
Apple Tvos 6.1
Apple Tvos 6.1.1
Apple Tvos 6.1.2
Apple Tvos
NA
CVE-2014-4389
Integer overflow in IOKit in Apple iOS prior to 8 and Apple TV prior to 7 allows malicious users to execute arbitrary code in a privileged context via an application that provides crafted API arguments.
Apple Iphone Os 7.0.4
Apple Iphone Os 7.1.1
Apple Iphone Os
Apple Iphone Os 7.0.5
Apple Iphone Os 7.1
Apple Iphone Os 7.0.6
Apple Iphone Os 7.0.1
Apple Iphone Os 7.0.2
Apple Iphone Os 7.0
Apple Iphone Os 7.0.3
Apple Tvos 6.0
Apple Tvos 6.0.1
Apple Tvos 6.0.2
Apple Tvos 6.1
Apple Tvos 6.1.1
Apple Tvos 6.1.2
Apple Tvos
Apple Mac Os X
NA
CVE-2014-4408
The rt_setgate function in the kernel in Apple iOS prior to 8 and Apple TV prior to 7 allows local users to gain privileges or cause a denial of service (out-of-bounds read and device crash) via a crafted call.
Apple Tvos 6.0
Apple Tvos 6.0.1
Apple Tvos 6.0.2
Apple Tvos 6.1
Apple Tvos 6.1.1
Apple Tvos 6.1.2
Apple Tvos
Apple Iphone Os 7.0.4
Apple Iphone Os 7.1.1
Apple Iphone Os
Apple Iphone Os 7.0.5
Apple Iphone Os 7.1
Apple Iphone Os 7.0.6
Apple Iphone Os 7.0.1
Apple Iphone Os 7.0.2
Apple Iphone Os 7.0
Apple Iphone Os 7.0.3
Apple Mac Os X
NA
CVE-2014-4412
WebKit, as used in Apple iOS prior to 8 and Apple TV prior to 7, allows remote malicious users to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE...
Apple Tvos 6.0
Apple Tvos 6.0.1
Apple Tvos 6.0.2
Apple Tvos 6.1
Apple Tvos 6.1.1
Apple Tvos 6.1.2
Apple Tvos
Apple Mac Os X
Apple Iphone Os 7.0.4
Apple Iphone Os 7.1.1
Apple Iphone Os
Apple Iphone Os 7.0.5
Apple Iphone Os 7.1
Apple Iphone Os 7.0.6
Apple Iphone Os 7.0.1
Apple Iphone Os 7.0.2
Apple Iphone Os 7.0
Apple Iphone Os 7.0.3
NA
CVE-2014-4371
The network-statistics interface in the kernel in Apple iOS prior to 8 and Apple TV prior to 7 does not properly initialize memory, which allows malicious users to obtain sensitive memory-content and memory-layout information via a crafted application, a different vulnerability t...
Apple Tvos 6.0
Apple Tvos 6.0.1
Apple Tvos 6.0.2
Apple Tvos 6.1
Apple Tvos 6.1.1
Apple Tvos 6.1.2
Apple Tvos
Apple Mac Os X
Apple Iphone Os 7.0.4
Apple Iphone Os 7.1.1
Apple Iphone Os
Apple Iphone Os 7.0.5
Apple Iphone Os 7.1
Apple Iphone Os 7.0.6
Apple Iphone Os 7.0.1
Apple Iphone Os 7.0.2
Apple Iphone Os 7.0
Apple Iphone Os 7.0.3
NA
CVE-2014-4377
Integer overflow in CoreGraphics in Apple iOS prior to 8 and Apple TV prior to 7 allows remote malicious users to execute arbitrary code or cause a denial of service (application crash) via a crafted PDF document.
Apple Tvos 6.0
Apple Tvos 6.0.1
Apple Tvos 6.0.2
Apple Tvos 6.1
Apple Tvos 6.1.1
Apple Tvos 6.1.2
Apple Tvos
Apple Iphone Os 7.0.4
Apple Iphone Os 7.1.1
Apple Iphone Os
Apple Iphone Os 7.0.5
Apple Iphone Os 7.1
Apple Iphone Os 7.0.6
Apple Iphone Os 7.0.1
Apple Iphone Os 7.0.2
Apple Iphone Os 7.0
Apple Iphone Os 7.0.3
Apple Mac Os X
2 Github repositories
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-37316
firmware
CVE-2024-30078
CVE-2024-5995
remote code execution
logic flaw
CVE-2024-20693
CVE-2024-37315
CVE-2024-5464
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
NEXT »