Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
apple iphone os 2.2 vulnerabilities and exploits
(subscribe to this query)
4.8
CVSSv3
CVE-2010-1776
Find My iPhone on iOS 2.0 up to and including 3.1.3 for iPhone 3G and later and iOS 2.1 up to and including 3.1.3 for iPod touch (2nd generation) and later, when Find My iPhone is disabled, allows remote authenticated users with an associated MobileMe account to wipe the device.
Apple Iphone Os 2.1.1
Apple Iphone Os 3.1.3
Apple Iphone Os 2.2.1
Apple Iphone Os 3.0
Apple Iphone Os 3.0.1
Apple Iphone Os 3.1
Apple Iphone Os 3.1.2
Apple Iphone Os 2.1
Apple Iphone Os 2.2
3.7
CVSSv3
CVE-2015-4000
The TLS protocol 1.2 and previous versions, when a DHE_EXPORT ciphersuite is enabled on a server but not on a client, does not properly convey a DHE_EXPORT choice, which allows man-in-the-middle malicious users to conduct cipher-downgrade attacks by rewriting a ClientHello with D...
Openssl Openssl
Canonical Ubuntu Linux 12.04
Canonical Ubuntu Linux 14.10
Canonical Ubuntu Linux 14.04
Canonical Ubuntu Linux 15.04
Hp Hp-ux B.11.31
Ibm Content Manager 8.5
Oracle Jrockit R28.3.6
Debian Debian Linux 8.0
Debian Debian Linux 7.0
Oracle Jdk 1.8.0
Oracle Jre 1.7.0
Oracle Jre 1.6.0
Oracle Jre 1.8.0
Oracle Jdk 1.7.0
Oracle Jdk 1.6.0
Suse Linux Enterprise Server 11.0
Suse Linux Enterprise Software Development Kit 12
Suse Linux Enterprise Desktop 12
Suse Suse Linux Enterprise Server 12
Apple Mac Os X
Apple Iphone Os
1 Nmap script
4 Github repositories
1 Article
3.3
CVSSv3
CVE-2016-1748
IOHIDFamily in Apple iOS prior to 9.3, OS X prior to 10.11.4, tvOS prior to 9.2, and watchOS prior to 2.2 allows malicious users to obtain sensitive kernel memory-layout information via a crafted app.
Apple Mac Os X
Apple Tvos
Apple Watchos
Apple Iphone Os
NA
CVE-2013-5137
IOKit in Apple iOS prior to 7 allows malicious users to send user-interface events to the foreground app by leveraging control over a background app and using the (1) task-completion API or (2) VoIP API.
Apple Iphone Os 1.1.2
Apple Iphone Os 1.1.3
Apple Iphone Os 1.1.4
Apple Iphone Os 1.1.5
Apple Iphone Os 2.0
Apple Iphone Os
Apple Iphone Os 1.0.0
Apple Iphone Os 2.1.1
Apple Iphone Os 2.2
Apple Iphone Os 2.2.1
Apple Iphone Os 3.0
Apple Iphone Os 4.2.5
Apple Iphone Os 4.2.8
Apple Iphone Os 4.3.0
Apple Iphone Os 4.3.1
Apple Iphone Os 4.3.2
Apple Iphone Os 1.0.1
Apple Iphone Os 1.1.0
Apple Iphone Os 2.0.0
Apple Iphone Os 2.0.2
Apple Iphone Os 3.1
Apple Iphone Os 3.1.3
NA
CVE-2013-5142
The kernel in Apple iOS prior to 7 does not initialize unspecified kernel data structures, which allows local users to obtain sensitive information from kernel stack memory via the (1) msgctl API or (2) segctl API.
Apple Iphone Os 1.0.0
Apple Iphone Os 1.0.1
Apple Iphone Os 1.1.5
Apple Iphone Os 2.0
Apple Iphone Os 2.0.0
Apple Iphone Os 3.0
Apple Iphone Os 3.0.1
Apple Iphone Os 4.0
Apple Iphone Os 4.0.1
Apple Iphone Os 4.3.2
Apple Iphone Os 4.3.3
Apple Iphone Os 6.0.1
Apple Iphone Os 6.0.2
Apple Iphone Os 1.1.1
Apple Iphone Os 1.1.2
Apple Iphone Os 2.1
Apple Iphone Os 2.1.1
Apple Iphone Os 3.1.3
Apple Iphone Os 3.2
Apple Iphone Os 4.2.1
Apple Iphone Os 4.2.5
Apple Iphone Os 5.0.1
NA
CVE-2013-5154
The Sandbox subsystem in Apple iOS prior to 7 determines the sandboxing requirement for a #! application on the basis of the script interpreter instead of the script, which allows malicious users to bypass intended access restrictions via a crafted application.
Apple Iphone Os 1.1.3
Apple Iphone Os 1.1.4
Apple Iphone Os 1.1.5
Apple Iphone Os 2.0
Apple Iphone Os 3.2.1
Apple Iphone Os 3.2.2
Apple Iphone Os 4.0
Apple Iphone Os 4.0.1
Apple Iphone Os 5.1.1
Apple Iphone Os 6.0
Apple Iphone Os 6.0.1
Apple Iphone Os 6.0.2
Apple Iphone Os
Apple Iphone Os 1.0.0
Apple Iphone Os 1.0.1
Apple Iphone Os 2.1.1
Apple Iphone Os 2.2
Apple Iphone Os 2.2.1
Apple Iphone Os 3.0
Apple Iphone Os 3.0.1
Apple Iphone Os 4.2.8
Apple Iphone Os 4.3.0
NA
CVE-2013-5155
The Sandbox subsystem in Apple iOS prior to 7 allows malicious users to cause a denial of service (infinite loop) via an application that writes crafted values to /dev/random.
Apple Iphone Os 1.0.1
Apple Iphone Os 1.0.2
Apple Iphone Os 1.1.0
Apple Iphone Os 1.1.1
Apple Iphone Os 3.0.1
Apple Iphone Os 3.1
Apple Iphone Os 3.1.2
Apple Iphone Os 3.1.3
Apple Iphone Os 4.3.3
Apple Iphone Os 4.3.5
Apple Iphone Os 5.0
Apple Iphone Os 5.0.1
Apple Iphone Os 2.0.0
Apple Iphone Os 2.0.1
Apple Iphone Os 2.0.2
Apple Iphone Os 2.1
Apple Iphone Os 4.0.1
Apple Iphone Os 4.0.2
Apple Iphone Os 4.1
Apple Iphone Os 4.2.1
Apple Iphone Os 6.0.2
Apple Iphone Os 6.1
NA
CVE-2013-5156
The Telephony subsystem in Apple iOS prior to 7 does not require API conformity for access to telephony-daemon interfaces, which allows malicious users to bypass intended restrictions on phone calls via a crafted app that sends direct requests to the daemon.
Apple Iphone Os 1.0.0
Apple Iphone Os 1.0.1
Apple Iphone Os 1.0.2
Apple Iphone Os 1.1.0
Apple Iphone Os 3.0
Apple Iphone Os 3.0.1
Apple Iphone Os 3.1
Apple Iphone Os 3.1.2
Apple Iphone Os 4.3.1
Apple Iphone Os 4.3.2
Apple Iphone Os 4.3.3
Apple Iphone Os 4.3.5
Apple Iphone Os 5.0
Apple Iphone Os 1.1.5
Apple Iphone Os 2.0
Apple Iphone Os 2.0.0
Apple Iphone Os 2.0.1
Apple Iphone Os 2.0.2
Apple Iphone Os 4.0
Apple Iphone Os 4.0.1
Apple Iphone Os 4.0.2
Apple Iphone Os 4.1
NA
CVE-2013-5157
The Twitter subsystem in Apple iOS prior to 7 does not require API conformity for access to Twitter daemon interfaces, which allows malicious users to post Tweets via a crafted app that sends direct requests to the daemon.
Apple Iphone Os 1.1.4
Apple Iphone Os 1.1.5
Apple Iphone Os
Apple Iphone Os 1.0.0
Apple Iphone Os 1.0.1
Apple Iphone Os 1.0.2
Apple Iphone Os 2.2.1
Apple Iphone Os 3.0
Apple Iphone Os 3.0.1
Apple Iphone Os 3.1
Apple Iphone Os 4.3.0
Apple Iphone Os 4.3.1
Apple Iphone Os 4.3.2
Apple Iphone Os 4.3.3
Apple Iphone Os 4.3.5
Apple Iphone Os 2.0
Apple Iphone Os 2.0.0
Apple Iphone Os 3.2.2
Apple Iphone Os 4.0
Apple Iphone Os 4.0.1
Apple Iphone Os 4.0.2
Apple Iphone Os 6.0
NA
CVE-2013-5138
IOCatalogue in IOKitUser in Apple iOS prior to 7 allows malicious users to cause a denial of service (NULL pointer dereference and device crash) via a crafted application.
Apple Iphone Os 1.0.0
Apple Iphone Os 1.0.1
Apple Iphone Os 2.0
Apple Iphone Os 2.0.0
Apple Iphone Os 3.0
Apple Iphone Os 3.0.1
Apple Iphone Os 4.0
Apple Iphone Os 4.0.1
Apple Iphone Os 4.3.2
Apple Iphone Os 4.3.3
Apple Iphone Os 6.0.1
Apple Iphone Os 6.0.2
Apple Iphone Os 1.1.1
Apple Iphone Os 1.1.2
Apple Iphone Os 1.1.3
Apple Iphone Os 2.1
Apple Iphone Os 2.1.1
Apple Iphone Os 3.1.3
Apple Iphone Os 3.2
Apple Iphone Os 4.2.5
Apple Iphone Os 4.2.8
Apple Iphone Os 5.0.1
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
NULL pointer dereference
CVE-2023-52689
CVE-2024-23803
client side
CVE-2023-52696
information disclosure
CVE-2024-35843
CVE-2024-27130
CVE-2023-52697
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
NEXT »