Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
apple apple tv vulnerabilities and exploits
(subscribe to this query)
187
VMScore
CVE-2014-1279
Apple TV prior to 6.1 does not properly restrict logging, which allows local users to obtain sensitive information by reading log data.
Apple Tvos
Apple Tvos 6.0.1
Apple Tvos 6.0
705
VMScore
CVE-2017-14315
In Apple iOS 7 through 9, due to a BlueBorne flaw in the implementation of LEAP (Low Energy Audio Protocol), a large audio command can be sent to a targeted device and lead to a heap overflow with attacker-controlled data. Since the audio commands sent via LEAP are not properly v...
Apple Iphone Os 7.0
Apple Iphone Os 7.0.1
Apple Iphone Os 7.0.2
Apple Iphone Os 7.1.2
Apple Iphone Os 8.0
Apple Iphone Os 8.4.1
Apple Iphone Os 9.0
Apple Iphone Os 9.3.2
Apple Iphone Os 9.3.3
Apple Iphone Os 7.0.3
Apple Iphone Os 7.0.4
Apple Iphone Os 8.0.1
Apple Iphone Os 8.0.2
Apple Iphone Os 9.0.1
Apple Iphone Os 9.0.2
Apple Iphone Os 9.3.4
Apple Iphone Os 9.3.5
Apple Iphone Os 7.0.5
Apple Iphone Os 7.0.6
Apple Iphone Os 8.1
Apple Iphone Os 8.1.2
Apple Iphone Os 9.1
445
VMScore
CVE-2011-1418
The stateless address autoconfiguration (aka SLAAC) functionality in the IPv6 networking implementation in Apple iOS prior to 4.3 and Apple TV prior to 4.2 places the MAC address into the IPv6 address, which makes it easier for remote IPv6 servers to track users by logging source...
Apple Iphone Os 3.1.3
Apple Iphone Os 3.0
Apple Iphone Os 2.0.2
Apple Iphone Os 1.1.4
Apple Iphone Os 1.0.2
Apple Iphone Os 1.0.1
Apple Iphone Os 4.0
Apple Iphone Os 2.0
Apple Iphone Os 2.2.1
Apple Iphone Os 3.1.2
Apple Iphone Os 2.1
Apple Iphone Os 2.0.1
Apple Iphone Os 4.1
Apple Iphone Os 1.0.0
Apple Iphone Os
Apple Iphone Os 3.2.2
Apple Iphone Os 1.1.5
Apple Iphone Os 2.2
Apple Iphone Os 1.1.1
Apple Iphone Os 1.1.0
Apple Iphone Os 1.1.3
Apple Iphone Os 1.1.2
694
VMScore
CVE-2011-0162
Wi-Fi in Apple iOS prior to 4.3 and Apple TV prior to 4.2 does not properly perform bounds checking for Wi-Fi frames, which allows remote malicious users to cause a denial of service (device reset) via unspecified traffic on the local wireless network.
Apple Iphone Os 3.0
Apple Iphone Os 2.2.1
Apple Iphone Os 2.1.1
Apple Iphone Os 2.2
Apple Iphone Os 1.0.1
Apple Iphone Os 3.0.1
Apple Iphone Os 2.0
Apple Iphone Os 3.2
Apple Iphone Os 3.1.3
Apple Iphone Os 3.1
Apple Iphone Os 2.0.0
Apple Iphone Os 1.1.4
Apple Iphone Os 1.0.2
Apple Iphone Os 3.2.1
Apple Iphone Os 4.0.1
Apple Iphone Os 4.0
Apple Iphone Os 4.0.2
Apple Iphone Os 3.1.2
Apple Iphone Os 2.1
Apple Iphone Os 1.1.1
Apple Iphone Os 1.1.0
Apple Iphone Os 4.1
668
VMScore
CVE-2015-5776
Libinfo in Apple iOS prior to 8.4.1 and OS X prior to 10.10.5 allows remote malicious users to execute arbitrary code or cause a denial of service (memory corruption and application crash) by leveraging use of an AF_INET6 socket.
Apple Iphone Os
Apple Mac Os X
1 Article
320
VMScore
CVE-2013-0964
The kernel in Apple iOS prior to 6.1 and Apple TV prior to 5.2 does not properly validate copyin and copyout arguments, which allows local users to bypass intended pointer restrictions and access locations in the first kernel-memory page by specifying a length of less than one pa...
Apple Tvos 2.0.0
Apple Tvos 2.0.1
Apple Tvos 1.0.0
Apple Tvos 1.1.0
Apple Tvos 4.4.0
Apple Tvos 5.1.0
Apple Tvos 2.1.0
Apple Tvos 2.2.0
Apple Tvos 4.1.1
Apple Tvos 4.4.3
Apple Tvos 4.2.2
Apple Tvos 4.1.0
Apple Tvos 4.3.0
Apple Tvos 2.3.0
Apple Tvos 2.4.0
Apple Tvos 4.4.4
Apple Tvos 5.0.1
Apple Tvos 5.0.2
Apple Tvos 4.2.1
Apple Tvos 3.0.1
Apple Tvos 3.0.2
Apple Tvos
828
VMScore
CVE-2014-4381
Libnotify in Apple iOS prior to 8 and Apple TV prior to 7 lacks proper bounds checking on write operations, which allows malicious users to execute arbitrary code as root via a crafted application.
Apple Mac Os X
Apple Iphone Os 7.0
Apple Iphone Os 7.1.1
Apple Iphone Os 7.0.4
Apple Iphone Os 7.0.3
Apple Iphone Os 7.0.6
Apple Iphone Os 7.0.5
Apple Iphone Os 7.1
Apple Iphone Os
Apple Iphone Os 7.0.2
Apple Iphone Os 7.0.1
Apple Tvos 6.0.2
Apple Tvos 6.0.1
Apple Tvos
Apple Tvos 6.0
Apple Tvos 6.1.2
Apple Tvos 6.1.1
Apple Tvos 6.1
641
VMScore
CVE-2013-0981
The IOUSBDeviceFamily driver in the USB implementation in the kernel in Apple iOS prior to 6.1.3 and Apple TV prior to 5.2.1 accesses pipe object pointers that originated in userspace, which allows local users to gain privileges via crafted code.
Apple Iphone Os
Apple Iphone Os 6.0.1
Apple Iphone Os 4.2.5
Apple Iphone Os 4.2.8
Apple Iphone Os 4.3.0
Apple Iphone Os 4.3.1
Apple Iphone Os 2.0.1
Apple Iphone Os 2.0.2
Apple Iphone Os 2.1
Apple Iphone Os 2.1.1
Apple Iphone Os 1.1.3
Apple Iphone Os 1.1.4
Apple Iphone Os 2.2
Apple Iphone Os 2.2.1
Apple Iphone Os 4.3.5
Apple Iphone Os 5.0.1
Apple Iphone Os 5.1
Apple Iphone Os 5.1.1
Apple Iphone Os 4.0
Apple Iphone Os 3.0.1
Apple Iphone Os 3.1
Apple Iphone Os 3.1.2
187
VMScore
CVE-2014-4455
dyld in Apple iOS prior to 8.1.1 and Apple TV prior to 7.0.2 does not properly handle overlapping segments in Mach-O executable files, which allows local users to bypass intended code-signing restrictions via a crafted file.
Apple Iphone Os
Apple Tvos 6.1
Apple Tvos 6.0.2
Apple Tvos 7.0
Apple Tvos 6.2.1
Apple Tvos
Apple Tvos 7.0.1
Apple Tvos 6.0.1
Apple Tvos 6.0
Apple Tvos 6.2
Apple Tvos 6.1.2
Apple Tvos 6.1.1
187
VMScore
CVE-2014-4357
Accounts Framework in Apple iOS prior to 8 and Apple TV prior to 7 allows malicious users to obtain sensitive information by reading log data that was not intended to be present in a log.
Apple Tvos 6.0
Apple Tvos 6.1.1
Apple Tvos 6.1
Apple Tvos 6.0.2
Apple Tvos 6.0.1
Apple Tvos
Apple Tvos 6.1.2
Apple Iphone Os 7.0.4
Apple Iphone Os 7.0.3
Apple Iphone Os 7.0.2
Apple Iphone Os 7.0.1
Apple Iphone Os 7.0
Apple Iphone Os 7.1.1
Apple Iphone Os 7.1
Apple Iphone Os 7.0.6
Apple Iphone Os 7.0.5
Apple Iphone Os
VMScore
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2023-49223
CVE-2024-0044
information disclosure
CVE-2024-35753
HTML injection
CVE-2024-21306
CVE-2024-35733
SQL injection
CVE-2024-35732
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
8
9
10
NEXT »