Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
apple iphone os 7.0.4 vulnerabilities and exploits
(subscribe to this query)
6.8
CVSSv2
CVE-2014-4472
WebKit, as used in Apple Safari prior to 6.2.1, 7.x prior to 7.1.1, and 8.x prior to 8.0.1, allows remote malicious users to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other ...
Apple Safari 7.0.3
Apple Safari 7.0.2
Apple Safari
Apple Safari 7.0.6
Apple Safari 7.1.0
Apple Safari 8.0.0
Apple Safari 7.0.5
Apple Safari 7.0.4
Apple Safari 7.0.1
Apple Safari 7.0
Apple Tvos
Apple Iphone Os
Apple Itunes
6.8
CVSSv2
CVE-2014-4473
WebKit, as used in Apple Safari prior to 6.2.1, 7.x prior to 7.1.1, and 8.x prior to 8.0.1, allows remote malicious users to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other ...
Apple Itunes
Apple Iphone Os
Apple Tvos
Apple Safari
Apple Safari 7.0
Apple Safari 7.1.0
Apple Safari 7.0.4
Apple Safari 7.0.3
Apple Safari 7.0.2
Apple Safari 7.0.1
Apple Safari 7.0.6
Apple Safari 7.0.5
Apple Safari 8.0.0
6.8
CVSSv2
CVE-2014-4474
WebKit, as used in Apple Safari prior to 6.2.1, 7.x prior to 7.1.1, and 8.x prior to 8.0.1, allows remote malicious users to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other ...
Apple Itunes
Apple Safari 7.0.5
Apple Safari 7.0.4
Apple Safari
Apple Safari 7.0.6
Apple Safari 7.1.0
Apple Safari 8.0.0
Apple Safari 7.0.1
Apple Safari 7.0
Apple Safari 7.0.3
Apple Safari 7.0.2
Apple Iphone Os
Apple Tvos
6.8
CVSSv2
CVE-2014-4475
WebKit, as used in Apple Safari prior to 6.2.1, 7.x prior to 7.1.1, and 8.x prior to 8.0.1, allows remote malicious users to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other ...
Apple Safari 7.0.3
Apple Safari 7.0.2
Apple Safari 7.0.5
Apple Safari 7.0.4
Apple Safari
Apple Safari 7.0.6
Apple Safari 7.1.0
Apple Safari 8.0.0
Apple Safari 7.0.1
Apple Safari 7.0
Apple Iphone Os
Apple Itunes
Apple Tvos
2.1
CVSSv2
CVE-2014-4352
Address Book in Apple iOS prior to 8 relies on the hardware UID for its encryption key, which makes it easier for physically proximate malicious users to obtain sensitive information by obtaining this UID.
Apple Iphone Os 7.0.6
Apple Iphone Os 7.0.5
Apple Iphone Os
Apple Iphone Os 7.0.2
Apple Iphone Os 7.0.1
Apple Iphone Os 7.0
Apple Iphone Os 7.1.1
Apple Iphone Os 7.1
Apple Iphone Os 7.0.4
Apple Iphone Os 7.0.3
5.8
CVSSv2
CVE-2014-4354
Apple iOS prior to 8 enables Bluetooth during all upgrade actions, which makes it easier for remote malicious users to bypass intended access restrictions via a Bluetooth session.
Apple Iphone Os 7.0
Apple Iphone Os 7.1.1
Apple Iphone Os 7.0.6
Apple Iphone Os 7.1
Apple Iphone Os
Apple Iphone Os 7.0.5
Apple Iphone Os 7.0.4
Apple Iphone Os 7.0.3
Apple Iphone Os 7.0.2
Apple Iphone Os 7.0.1
2.1
CVSSv2
CVE-2014-4367
Apple iOS prior to 8 enables Voice Dial during all upgrade actions, which makes it easier for physically proximate malicious users to launch unintended calls by speaking a telephone number.
Apple Iphone Os 7.0.1
Apple Iphone Os 7.0
Apple Iphone Os 7.1.1
Apple Iphone Os 7.0.5
Apple Iphone Os 7.0.4
Apple Iphone Os 7.0.3
Apple Iphone Os 7.0.2
Apple Iphone Os 7.0.6
Apple Iphone Os 7.1
Apple Iphone Os
1.9
CVSSv2
CVE-2014-4371
The network-statistics interface in the kernel in Apple iOS prior to 8 and Apple TV prior to 7 does not properly initialize memory, which allows malicious users to obtain sensitive memory-content and memory-layout information via a crafted application, a different vulnerability t...
Apple Tvos 6.1.2
Apple Tvos 6.1
Apple Tvos 6.0.1
Apple Tvos
Apple Tvos 6.0
Apple Tvos 6.1.1
Apple Tvos 6.0.2
Apple Mac Os X
Apple Iphone Os 7.0.6
Apple Iphone Os 7.0.4
Apple Iphone Os
Apple Iphone Os 7.0.2
Apple Iphone Os 7.0.1
Apple Iphone Os 7.0
Apple Iphone Os 7.1.1
Apple Iphone Os 7.0.5
Apple Iphone Os 7.0.3
Apple Iphone Os 7.1
3.6
CVSSv2
CVE-2014-4372
syslogd in the syslog subsystem in Apple iOS prior to 8 and Apple TV prior to 7 allows local users to change the permissions of arbitrary files via a symlink attack on an unspecified file.
Apple Tvos 6.0.2
Apple Tvos 6.0.1
Apple Tvos 6.1.1
Apple Tvos 6.1
Apple Tvos 6.0
Apple Tvos
Apple Tvos 6.1.2
Apple Iphone Os 7.0.2
Apple Iphone Os 7.0.1
Apple Iphone Os 7.0
Apple Iphone Os 7.0.4
Apple Iphone Os 7.0.3
Apple Iphone Os 7.1.1
Apple Iphone Os 7.1
Apple Iphone Os 7.0.6
Apple Iphone Os 7.0.5
Apple Iphone Os
7.8
CVSSv2
CVE-2014-4373
The IntelAccelerator driver in the IOAcceleratorFamily subsystem in Apple iOS prior to 8 and Apple TV prior to 7 allows malicious users to cause a denial of service (NULL pointer dereference and device restart) via a crafted application.
Apple Iphone Os 7.0.6
Apple Iphone Os 7.0.5
Apple Iphone Os 7.1
Apple Iphone Os
Apple Iphone Os 7.0.4
Apple Iphone Os 7.0.3
Apple Iphone Os 7.0.2
Apple Iphone Os 7.0.1
Apple Iphone Os 7.0
Apple Iphone Os 7.1.1
Apple Tvos 6.0.1
Apple Tvos 6.0
Apple Tvos
Apple Tvos 6.1.2
Apple Tvos 6.1.1
Apple Tvos 6.1
Apple Tvos 6.0.2
Apple Mac Os X
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
malicious code
camera
CVE-2023-46694
CVE-2023-43847
CVE-2023-30311
CVE-2024-27842
CVE-2024-30165
arbitrary code
CVE-2024-21683
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
8
9
10
NEXT »