Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
ipod touch vulnerabilities and exploits
(subscribe to this query)
5.8
CVSSv2
CVE-2010-1756
The Settings application in Apple iOS prior to 4 on the iPhone and iPod touch does not properly report the wireless network that is in use, which might make it easier for remote malicious users to trick users into communicating over an unintended network.
Apple Iphone Os
1.9
CVSSv2
CVE-2010-1775
Race condition in Passcode Lock in Apple iOS prior to 4 on the iPhone and iPod touch allows physically proximate malicious users to bypass intended passcode requirements, and pair a locked device with a computer and access arbitrary data, via vectors involving the initial boot.
Apple Iphone Os 3.0
Apple Iphone Os 3.1.3
Apple Iphone Os 1.0.2
Apple Iphone Os 1.1.1
Apple Iphone Os
Apple Iphone Os 2.0.0
Apple Iphone Os 3.1.2
Apple Iphone Os 3.0.1
Apple Iphone Os 1.1.2
Apple Iphone Os 1.1.3
Apple Iphone Os 1.1.4
Apple Iphone Os 2.2.1
Apple Iphone Os 1.1.0
Apple Iphone Os 2.0.1
Apple Iphone Os 2.0.2
Apple Iphone Os 1.1
Apple Iphone Os 1.0.0
Apple Iphone Os 1.0.1
Apple Iphone Os 1.1.5
Apple Iphone Os 2.1.1
3.6
CVSSv2
CVE-2008-4228
The Passcode Lock feature in Apple iPhone OS 1.0 up to and including 2.1 and iPhone OS for iPod touch 1.1 up to and including 2.1 allows physically proximate malicious users to leverage the emergency-call ability of locked devices to make a phone call to an arbitrary number.
Apple Iphone Os 1.0.2
Apple Iphone Os 1.0
Apple Iphone Os 1.1.1
Apple Iphone Os 1.1.2
Apple Iphone Os 1.1.3
Apple Iphone Os 1.1
Apple Iphone Os 1.0.1
Apple Iphone Os 2.1
Apple Iphone Os 1.1.5
Apple Iphone Os 2.0
Apple Iphone Os 2.0.2
Apple Iphone Os 2.0.1
Apple Iphone Os 1.1.4
5.8
CVSSv2
CVE-2009-2199
Incomplete blacklist vulnerability in WebKit in Apple Safari prior to 4.0.3, as used on iPhone OS prior to 3.1, iPhone OS prior to 3.1.1 for iPod touch, and other platforms, allows remote malicious users to spoof domain names in URLs, and possibly conduct phishing attacks, via un...
Apple Safari 3.0.4b
Apple Safari 2.0.3
Apple Safari 4.0.1
Apple Safari
Apple Safari 3.0.4
Apple Safari 3.0.1
Apple Safari 2.0.1
Apple Safari 2.0.2
Apple Safari 3.1.1
Apple Safari 3.1.0
Apple Safari 4.0
Apple Safari 3.2.2
Apple Safari 3.0.0b
Apple Safari 3.0.0
Apple Safari 2.0.4
Apple Safari 3.0.3b
Apple Safari 3.0.3
Apple Safari 4.0.0b
Apple Safari 3.1.2
Apple Safari 3.1.0b
Apple Safari 3.0.2
Apple Safari 2.0
4.3
CVSSv2
CVE-2008-1589
Safari on Apple iPhone prior to 2.0 and iPod touch prior to 2.0 misinterprets a menu button press as user confirmation for visiting a web site with a (1) self-signed or (2) invalid certificate, which makes it easier for remote malicious users to spoof web sites.
Apple Safari
4.9
CVSSv2
CVE-2010-1776
Find My iPhone on iOS 2.0 up to and including 3.1.3 for iPhone 3G and later and iOS 2.1 up to and including 3.1.3 for iPod touch (2nd generation) and later, when Find My iPhone is disabled, allows remote authenticated users with an associated MobileMe account to wipe the device.
Apple Iphone Os 2.1.1
Apple Iphone Os 3.1.3
Apple Iphone Os 2.2.1
Apple Iphone Os 3.0
Apple Iphone Os 3.0.1
Apple Iphone Os 3.1
Apple Iphone Os 3.1.2
Apple Iphone Os 2.1
Apple Iphone Os 2.2
5
CVSSv2
CVE-2008-4232
Safari in Apple iPhone OS 2.0 up to and including 2.1 and iPhone OS for iPod touch 2.1 up to and including 2.1 does not restrict an IFRAME's content display to the boundaries of the IFRAME, which allows remote malicious users to spoof a user interface via a crafted HTML docu...
Apple Iphone Os 1.0.2
Apple Iphone Os 1.0
Apple Safari
Apple Iphone Os 1.1.1
Apple Iphone Os 1.1.2
Apple Iphone Os 1.1.3
Apple Iphone Os 1.1
Apple Iphone Os 1.0.1
Apple Iphone Os 2.1
Apple Iphone Os 2.0
Apple Iphone Os 1.1.5
Apple Iphone Os 1.1.4
Apple Iphone Os 2.0.2
Apple Iphone Os 2.0.1
4.3
CVSSv2
CVE-2009-1700
The XSLT implementation in WebKit in Apple Safari prior to 4.0, iPhone OS 1.0 up to and including 2.2.1, and iPhone OS for iPod touch 1.1 up to and including 2.2.1 does not properly handle redirects, which allows remote malicious users to read XML content from arbitrary web pages...
Apple Safari 3.0.4b
Apple Safari 2.0.3
Apple Safari 3.0.4
Apple Safari 3.0.1
Apple Safari 2.0.1
Apple Safari 2.0.2
Apple Safari 3.0.0
Apple Safari 3.0.0b
Apple Safari 3.1.0
Apple Safari 3.0.3b
Apple Safari 3.1.2
Apple Safari 3.1.0b
Apple Safari 3.0.3
Apple Safari 3.0.2
Apple Safari 2.0.4
Apple Safari 2.0
Apple Safari 3.2.0
Apple Safari 3.1.1
Apple Safari 3.0.2b
Apple Safari 3.0.1b
Apple Safari 2.0.0
Apple Safari
2.6
CVSSv2
CVE-2008-4233
Safari in Apple iPhone OS 1.0 up to and including 2.1 and iPhone OS for iPod touch 1.1 up to and including 2.1 does not isolate the call-approval dialog from the process of launching new applications, which allows remote malicious users to make arbitrary phone calls via a crafted...
Apple Iphone Os 1.0.2
Apple Iphone Os 1.0
Apple Safari
Apple Iphone Os 1.1.1
Apple Iphone Os 1.1.2
Apple Iphone Os 1.1.3
Apple Iphone Os 1.1
Apple Iphone Os 1.0.1
Apple Iphone Os 2.1
Apple Iphone Os 1.1.4
Apple Iphone Os 2.0
Apple Iphone Os 1.1.5
Apple Iphone Os 2.0.2
Apple Iphone Os 2.0.1
7.1
CVSSv2
CVE-2009-0959
The MPEG-4 video codec in Apple iPhone OS 1.0 up to and including 2.2.1 and iPhone OS for iPod touch 1.1 up to and including 2.2.1 allows remote malicious users to cause a denial of service (device reset) via a crafted MPEG-4 video file that triggers an "input validation iss...
Apple Iphone Os 1.0.2
Apple Iphone Os 2.2
Apple Iphone Os 1.1.1
Apple Iphone Os 2.0.0
Apple Iphone Os 1.1.2
Apple Iphone Os 1.1.3
Apple Iphone Os 1.1.0
Apple Iphone Os 1.0.1
Apple Iphone Os 2.1
Apple Iphone Os 2.1.1
Apple Iphone Os 2.0.2
Apple Iphone Os 2.0.1
Apple Iphone Os 2.2.1
Apple Iphone Os 1.1.5
Apple Iphone Os 1.1.4
Apple Iphone Os 1.0.0
Apple Iphone Os 2.0
Apple Iphone Os
Apple Ipod Touch
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-26925
CVE-2023-41826
LFI
CVE-2022-22364
CVE-2024-2887
command injection
remote code execution
CVE-2024-34446
CVE-2022-48699
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
8
9
10
NEXT »