Vulmon
Recent Vulnerabilities
Product List
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
apple iphone os 8.0.1 vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2014-4465
WebKit in Apple Safari prior to 6.2.1, 7.x prior to 7.1.1, and 8.x prior to 8.0.1 allows remote malicious users to bypass the Same Origin Policy via crafted Cascading Style Sheets (CSS) token sequences within an SVG file in the SRC attribute of an IMG element.
Apple Tvos
Apple Iphone Os
Apple Safari
Apple Safari 7.1.0
Apple Safari 8.0.0
NA
CVE-2014-4470
WebKit, as used in Apple Safari prior to 6.2.1, 7.x prior to 7.1.1, and 8.x prior to 8.0.1, allows remote malicious users to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other ...
Apple Safari 7.0.1
Apple Safari
Apple Safari 7.0.3
Apple Safari 7.0.4
Apple Safari 7.1.0
Apple Safari 8.0.0
Apple Safari 7.0.5
Apple Safari 7.0.6
Apple Safari 7.0
Apple Safari 7.0.2
Apple Itunes
Apple Iphone Os
Apple Tvos
NA
CVE-2014-4471
WebKit, as used in Apple Safari prior to 6.2.1, 7.x prior to 7.1.1, and 8.x prior to 8.0.1, allows remote malicious users to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other ...
Apple Itunes
Apple Tvos
Apple Safari 7.0.1
Apple Safari
Apple Safari 7.0.3
Apple Safari 7.0.4
Apple Safari 7.1.0
Apple Safari 8.0.0
Apple Safari 7.0.5
Apple Safari 7.0.6
Apple Safari 7.0
Apple Safari 7.0.2
Apple Iphone Os
NA
CVE-2014-4472
WebKit, as used in Apple Safari prior to 6.2.1, 7.x prior to 7.1.1, and 8.x prior to 8.0.1, allows remote malicious users to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other ...
Apple Safari 7.0.1
Apple Safari
Apple Safari 7.0.3
Apple Safari 7.0.4
Apple Safari 7.1.0
Apple Safari 8.0.0
Apple Safari 7.0.5
Apple Safari 7.0.6
Apple Safari 7.0
Apple Safari 7.0.2
Apple Tvos
Apple Iphone Os
Apple Itunes
NA
CVE-2014-4475
WebKit, as used in Apple Safari prior to 6.2.1, 7.x prior to 7.1.1, and 8.x prior to 8.0.1, allows remote malicious users to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other ...
Apple Safari 7.0.1
Apple Safari
Apple Safari 7.0.3
Apple Safari 7.0.4
Apple Safari 7.1.0
Apple Safari 8.0.0
Apple Safari 7.0.5
Apple Safari 7.0.6
Apple Safari 7.0
Apple Safari 7.0.2
Apple Iphone Os
Apple Itunes
Apple Tvos
NA
CVE-2014-4468
WebKit, as used in Apple Safari prior to 6.2.1, 7.x prior to 7.1.1, and 8.x prior to 8.0.1, allows remote malicious users to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other ...
Apple Iphone Os
Apple Tvos
Apple Itunes
Apple Safari 7.0.1
Apple Safari
Apple Safari 7.0.3
Apple Safari 7.0.4
Apple Safari 7.1.0
Apple Safari 8.0.0
Apple Safari 7.0.5
Apple Safari 7.0.6
Apple Safari 7.0
Apple Safari 7.0.2
NA
CVE-2014-4460
CFNetwork in Apple iOS prior to 8.1.1 and OS X prior to 10.10.1 does not properly clear the browsing cache upon a transition out of private-browsing mode, which makes it easier for physically proximate malicious users to obtain sensitive information by reading cache files.
Apple Iphone Os 8.0
Apple Iphone Os 8.0.1
Apple Iphone Os 8.0.2
Apple Iphone Os
Apple Mac Os X 10.5.8
Apple Mac Os X 10.4.3
Apple Mac Os X 10.8.3
Apple Mac Os X 10.6.8
Apple Mac Os X 10.10.0
Apple Mac Os X 10.2.5
Apple Mac Os X 10.6.7
Apple Mac Os X 10.2.7
Apple Mac Os X 10.0.2
Apple Mac Os X 10.2.8
Apple Mac Os X 10.2.1
Apple Mac Os X 10.5.6
Apple Mac Os X
Apple Mac Os X 10.8.5
Apple Mac Os X 10.3.1
Apple Mac Os X 10.9.2
Apple Mac Os X 10.3.5
Apple Mac Os X 10.3.0
NA
CVE-2014-4451
Apple iOS prior to 8.1.1 does not properly enforce the failed-passcode limit, which makes it easier for physically proximate malicious users to bypass the lock-screen protection mechanism via a series of guesses.
Apple Iphone Os 8.0
Apple Iphone Os 8.0.1
Apple Iphone Os 8.0.2
Apple Iphone Os
NA
CVE-2014-4453
Apple iOS prior to 8.1.1 and OS X prior to 10.10.1 include location data during establishment of a Spotlight Suggestions server connection by Spotlight or Safari, which might allow remote malicious users to obtain sensitive information via unspecified vectors.
Apple Iphone Os 8.0
Apple Iphone Os 8.0.1
Apple Iphone Os 8.0.2
Apple Iphone Os
Apple Mac Os X 10.5.8
Apple Mac Os X 10.4.3
Apple Mac Os X 10.8.3
Apple Mac Os X 10.6.8
Apple Mac Os X 10.2.5
Apple Mac Os X 10.6.7
Apple Mac Os X 10.2.7
Apple Mac Os X 10.0.2
Apple Mac Os X 10.2.8
Apple Mac Os X 10.2.1
Apple Mac Os X 10.5.6
Apple Mac Os X 10.8.5
Apple Mac Os X 10.3.1
Apple Mac Os X 10.9.2
Apple Mac Os X 10.3.5
Apple Mac Os X 10.3.0
Apple Mac Os X 10.4.1
Apple Mac Os X 10.1
NA
CVE-2014-4457
The Sandbox Profiles subsystem in Apple iOS prior to 8.1.1 does not properly implement the debugserver sandbox, which allows malicious users to bypass intended binary-execution restrictions via a crafted application that is run during a time period when debugging is not enabled.
Apple Iphone Os 8.0
Apple Iphone Os 8.0.1
Apple Iphone Os 8.0.2
Apple Iphone Os
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-37316
firmware
CVE-2024-30078
CVE-2024-5995
remote code execution
logic flaw
CVE-2024-20693
CVE-2024-37315
CVE-2024-5464
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
8
NEXT »