Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
apple itunes 8.0.1 vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2014-4468
WebKit, as used in Apple Safari prior to 6.2.1, 7.x prior to 7.1.1, and 8.x prior to 8.0.1, allows remote malicious users to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other ...
Apple Iphone Os
Apple Tvos
Apple Itunes
Apple Safari
Apple Safari 7.0.6
Apple Safari 7.1.0
Apple Safari 8.0.0
Apple Safari 7.0.3
Apple Safari 7.0.2
Apple Safari 7.0.1
Apple Safari 7.0
Apple Safari 7.0.5
Apple Safari 7.0.4
NA
CVE-2014-4469
WebKit, as used in Apple Safari prior to 6.2.1, 7.x prior to 7.1.1, and 8.x prior to 8.0.1, allows remote malicious users to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other ...
Apple Itunes
Apple Safari 7.0.4
Apple Safari 7.0.3
Apple Safari
Apple Safari 7.1.0
Apple Safari 8.0.0
Apple Safari 7.0.6
Apple Safari 7.0.5
Apple Safari 7.0.2
Apple Safari 7.0.1
Apple Safari 7.0
Apple Tvos
Apple Iphone Os
NA
CVE-2014-4470
WebKit, as used in Apple Safari prior to 6.2.1, 7.x prior to 7.1.1, and 8.x prior to 8.0.1, allows remote malicious users to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other ...
Apple Safari 7.0.2
Apple Safari 7.0.1
Apple Safari 7.0.6
Apple Safari 7.0.5
Apple Safari 8.0.0
Apple Safari 7.0.4
Apple Safari 7.0.3
Apple Safari
Apple Safari 7.0
Apple Safari 7.1.0
Apple Itunes
Apple Iphone Os
Apple Tvos
NA
CVE-2014-4471
WebKit, as used in Apple Safari prior to 6.2.1, 7.x prior to 7.1.1, and 8.x prior to 8.0.1, allows remote malicious users to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other ...
Apple Itunes
Apple Tvos
Apple Safari 7.0.6
Apple Safari 7.0.5
Apple Safari 8.0.0
Apple Safari 7.0.2
Apple Safari 7.0.1
Apple Safari
Apple Safari 7.0
Apple Safari 7.1.0
Apple Safari 7.0.4
Apple Safari 7.0.3
Apple Iphone Os
NA
CVE-2014-4473
WebKit, as used in Apple Safari prior to 6.2.1, 7.x prior to 7.1.1, and 8.x prior to 8.0.1, allows remote malicious users to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other ...
Apple Itunes
Apple Iphone Os
Apple Tvos
Apple Safari
Apple Safari 7.0
Apple Safari 7.1.0
Apple Safari 7.0.4
Apple Safari 7.0.3
Apple Safari 7.0.2
Apple Safari 7.0.1
Apple Safari 7.0.6
Apple Safari 7.0.5
Apple Safari 8.0.0
NA
CVE-2014-4474
WebKit, as used in Apple Safari prior to 6.2.1, 7.x prior to 7.1.1, and 8.x prior to 8.0.1, allows remote malicious users to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other ...
Apple Itunes
Apple Safari 7.0.5
Apple Safari 7.0.4
Apple Safari
Apple Safari 7.0.6
Apple Safari 7.1.0
Apple Safari 8.0.0
Apple Safari 7.0.1
Apple Safari 7.0
Apple Safari 7.0.3
Apple Safari 7.0.2
Apple Iphone Os
Apple Tvos
NA
CVE-2014-4466
WebKit, as used in Apple Safari prior to 6.2.1, 7.x prior to 7.1.1, and 8.x prior to 8.0.1, allows remote malicious users to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other ...
Apple Iphone Os
Apple Tvos
Apple Safari 7.0.5
Apple Safari 7.0.4
Apple Safari 7.0.1
Apple Safari 7.0
Apple Safari
Apple Safari 7.0.6
Apple Safari 7.1.0
Apple Safari 8.0.0
Apple Safari 7.0.3
Apple Safari 7.0.2
Apple Itunes
NA
CVE-2013-0996
WebKit, as used in Apple iTunes prior to 11.0.3, allows man-in-the-middle malicious users to execute arbitrary code or cause a denial of service (memory corruption and application crash) via vectors related to iTunes Store browsing, a different vulnerability than other WebKit CVE...
Apple Itunes 10.3.1
Apple Itunes 10.0
Apple Itunes 10.5.1
Apple Itunes 10.4.1.10
Apple Itunes 10.6.1
Apple Itunes 9.2.1
Apple Itunes 9.0.0
Apple Itunes 8.0.0
Apple Itunes 8.0.1
Apple Itunes 7.3.0
Apple Itunes 7.3.1
Apple Itunes 7.5
Apple Itunes 7.5.0
Apple Itunes 6.0.0
Apple Itunes 6.0.1
Apple Itunes 5.0.1
Apple Itunes 4.0.0
Apple Itunes 4.6.0
Apple Itunes 4.7
Apple Itunes 10.0.1
Apple Itunes 10.1
Apple Itunes 10.1.1
NA
CVE-2013-1011
WebKit, as used in Apple iTunes prior to 11.0.3, allows man-in-the-middle malicious users to execute arbitrary code or cause a denial of service (memory corruption and application crash) via vectors related to iTunes Store browsing, a different vulnerability than other WebKit CVE...
Apple Itunes 10.4
Apple Itunes 10.4.1
Apple Itunes 10.5
Apple Itunes 10.1.1.4
Apple Itunes 10.5.1.42
Apple Itunes 10.6.3
Apple Itunes 9.0.1
Apple Itunes 9.0.2
Apple Itunes 7.1.1
Apple Itunes 7.2.0
Apple Itunes 7.4.2
Apple Itunes 7.4.3
Apple Itunes 7.7
Apple Itunes 7.7.0
Apple Itunes 5.0
Apple Itunes 5.0.0
Apple Itunes 4.5.0
Apple Itunes 4.6
Apple Itunes 4.9.0
Apple Itunes
Apple Itunes 10.3
Apple Itunes 10.2
NA
CVE-2013-1014
Apple iTunes prior to 11.0.3 does not properly verify X.509 certificates, which allows man-in-the-middle malicious users to spoof HTTPS servers via an arbitrary valid certificate.
Apple Itunes 10.2
Apple Itunes 10.4
Apple Itunes 10.1.2
Apple Itunes 10.2.2.12
Apple Itunes 10.5.3
Apple Itunes 10.6
Apple Itunes 10.5.1.42
Apple Itunes 9.1.1
Apple Itunes 9.0.1
Apple Itunes 7.0.2
Apple Itunes 7.1.0
Apple Itunes 7.4.0
Apple Itunes 7.4.1
Apple Itunes 7.4.2
Apple Itunes 7.6.2
Apple Itunes 7.7
Apple Itunes 6.0.4
Apple Itunes 6.0.5
Apple Itunes 4.5
Apple Itunes 4.5.0
Apple Itunes 4.8.0
Apple Itunes 4.9.0
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
denial of service
CVE-2024-27371
CVE-2024-20405
CVE-2024-31627
CVE-2024-31625
race condition
CVE-2024-4358
cross-site scripting
CVE-2023-20938
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
8
9
NEXT »