Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
ipod touch vulnerabilities and exploits
(subscribe to this query)
9.3
CVSSv2
CVE-2007-5450
Unspecified vulnerability in Safari on the Apple iPod touch (aka iTouch) and iPhone 1.1.1 allows user-assisted remote malicious users to cause a denial of service (application crash), and enable filesystem browsing by the local user, via a certain TIFF file.
Apple Safari
1 EDB exploit
7.2
CVSSv2
CVE-2009-2795
Heap-based buffer overflow in the Recovery Mode component in Apple iPhone OS prior to 3.1, and iPhone OS prior to 3.1.1 for iPod touch, allows local users to bypass the passcode requirement and access arbitrary data via vectors related to "command parsing."
Apple Iphone Os
6.8
CVSSv2
CVE-2010-1812
Use-after-free vulnerability in WebKit in Apple iOS prior to 4.1 on the iPhone and iPod touch, and webkitgtk prior to 1.2.6, allows remote malicious users to execute arbitrary code or cause a denial of service (application crash) via vectors involving selections.
Apple Iphone Os
Webkitgtk Webkitgtk
Canonical Ubuntu Linux 10.10
Canonical Ubuntu Linux 10.04
Canonical Ubuntu Linux 9.10
6.4
CVSSv2
CVE-2010-1757
WebKit in Apple iOS prior to 4 on the iPhone and iPod touch does not enforce the expected boundary restrictions on content display by an IFRAME element, which allows remote malicious users to spoof the user interface via a crafted HTML document.
Apple Iphone Os
6.8
CVSSv2
CVE-2010-1781
Double free vulnerability in WebKit in Apple iOS prior to 4.1 on the iPhone and iPod touch allows remote malicious users to execute arbitrary code or cause a denial of service (application crash) via vectors related to the rendering of an inline element.
Apple Iphone Os
Canonical Ubuntu Linux 10.10
Canonical Ubuntu Linux 10.04
Canonical Ubuntu Linux 9.10
6.8
CVSSv2
CVE-2010-1815
Use-after-free vulnerability in WebKit in Apple iOS prior to 4.1 on the iPhone and iPod touch, and webkitgtk prior to 1.2.6, allows remote malicious users to execute arbitrary code or cause a denial of service (application crash) via vectors involving scrollbars.
Apple Iphone Os
Webkitgtk Webkitgtk
Canonical Ubuntu Linux 10.10
Canonical Ubuntu Linux 10.04
Canonical Ubuntu Linux 9.10
4.6
CVSSv2
CVE-2010-0038
Recovery Mode in Apple iPhone OS 1.0 up to and including 3.1.2, and iPhone OS for iPod touch 1.1 up to and including 3.1.2, allows physically proximate malicious users to bypass device locking, and read or modify arbitrary data, via a USB control message that triggers memory corr...
Apple Iphone Os 3.1.2
Apple Iphone Os 2.0.0
Apple Iphone Os 2.0.1
Apple Iphone Os 1.1.3
Apple Iphone Os 1.1.2
Apple Iphone Os 2.0
Apple Iphone Os 1.0.1
Apple Iphone Os 2.2
Apple Iphone Os 1.1.1
Apple Iphone Os 1.1.0
Apple Iphone Os 3.0.1
Apple Iphone Os 1.1.4
Apple Iphone Os 2.1
Apple Iphone Os 2.0.2
Apple Iphone Os 1.1.5
Apple Iphone Os 1.0.2
Apple Iphone Os 1.0.0
Apple Iphone Os 2.1.1
Apple Iphone Os 3.0
Apple Iphone Os 1.1
Apple Iphone Os 2.2.1
Apple Iphone Os 1.0
3.7
CVSSv2
CVE-2008-4229
Race condition in the Passcode Lock feature in Apple iPhone OS 2.0 up to and including 2.1 and iPhone OS for iPod touch 2.0 up to and including 2.1 allows physically proximate malicious users to remove the lock and launch arbitrary applications by restoring the device from a back...
Apple Iphone Os 1.0.2
Apple Iphone Os 1.0
Apple Iphone Os 1.1.1
Apple Iphone Os 1.1.2
Apple Iphone Os 1.1.3
Apple Iphone Os 1.1
Apple Iphone Os 1.0.1
Apple Iphone Os 2.1
Apple Iphone Os 1.1.5
Apple Iphone Os 1.1.4
Apple Iphone Os 2.0.2
Apple Iphone Os 2.0.1
Apple Iphone Os 2.0
6.9
CVSSv2
CVE-2010-1754
Passcode Lock in Apple iOS prior to 4 on the iPhone and iPod touch does not properly handle alert-based unlocks in conjunction with subsequent Remote Lock operations through MobileMe, which allows physically proximate malicious users to bypass intended passcode requirements via u...
Apple Iphone Os
5.8
CVSSv2
CVE-2010-1756
The Settings application in Apple iOS prior to 4 on the iPhone and iPod touch does not properly report the wireless network that is in use, which might make it easier for remote malicious users to trick users into communicating over an unintended network.
Apple Iphone Os
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-27322
cross-site request forgery
unauthorized
CVE-2024-33925
reflected XSS
CVE-2023-51580
CVE-2023-51579
CVE-2015-2051
CVE-2023-51609
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
8
9
NEXT »