Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
apple iphone os 8.0.2 vulnerabilities and exploits
(subscribe to this query)
2.1
CVSSv2
CVE-2014-4463
Apple iOS prior to 8.1.1 allows physically proximate malicious users to bypass the lock-screen protection mechanism, and view or transmit a Photo Library photo, via the FaceTime "Leave a Message" feature.
Apple Iphone Os 8.0.1
Apple Iphone Os 8.0
Apple Iphone Os
Apple Iphone Os 8.0.2
5.8
CVSSv2
CVE-2014-4462
WebKit, as used in Apple iOS prior to 8.1.1 and Apple TV prior to 7.0.2, allows remote malicious users to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than CVE-2014-4452.
Apple Iphone Os
Apple Iphone Os 8.0.2
Apple Iphone Os 8.0.1
Apple Iphone Os 8.0
Apple Tvos 6.2
Apple Tvos 6.1.2
Apple Tvos 7.0
Apple Tvos 6.2.1
Apple Tvos
Apple Tvos 6.0.2
Apple Tvos 6.0.1
Apple Tvos 6.0
Apple Tvos 6.1.1
Apple Tvos 6.1
2.1
CVSSv2
CVE-2014-4460
CFNetwork in Apple iOS prior to 8.1.1 and OS X prior to 10.10.1 does not properly clear the browsing cache upon a transition out of private-browsing mode, which makes it easier for physically proximate malicious users to obtain sensitive information by reading cache files.
Apple Iphone Os 8.0
Apple Iphone Os
Apple Iphone Os 8.0.2
Apple Iphone Os 8.0.1
Apple Mac Os X 10.9
Apple Mac Os X 10.8.5
Apple Mac Os X 10.7.5
Apple Mac Os X 10.7.4
Apple Mac Os X 10.6.6
Apple Mac Os X 10.6.5
Apple Mac Os X 10.6.4
Apple Mac Os X 10.5.6
Apple Mac Os X 10.5.5
Apple Mac Os X 10.4.9
Apple Mac Os X 10.4.8
Apple Mac Os X 10.4.11
Apple Mac Os X 10.4.10
Apple Mac Os X 10.4.1
Apple Mac Os X 10.3.5
Apple Mac Os X 10.3.4
Apple Mac Os X 10.2.7
Apple Mac Os X 10.2.6
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
man-in-the-middle
CVE-2024-34558
CVE-2024-32674
CVE-2024-34351
XPath injection
CVE-2023-45866
CVE-2024-25528
CVE-2024-25517
path traversal
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5