Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
apple iphone os 8.4.1 vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2015-3736
WebKit, as used in Apple iOS prior to 8.4.1 and Safari prior to 6.2.8, 7.x prior to 7.1.8, and 8.x prior to 8.0.8, allows remote malicious users to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vu...
Apple Itunes
Apple Safari
Apple Iphone Os
NA
CVE-2015-3731
WebKit, as used in Apple iOS prior to 8.4.1 and Safari prior to 6.2.8, 7.x prior to 7.1.8, and 8.x prior to 8.0.8, allows remote malicious users to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vu...
Apple Itunes
Apple Safari
Canonical Ubuntu Linux 14.04
Canonical Ubuntu Linux 15.10
Apple Iphone Os
NA
CVE-2015-3732
WebKit, as used in Apple iOS prior to 8.4.1 and Safari prior to 6.2.8, 7.x prior to 7.1.8, and 8.x prior to 8.0.8, allows remote malicious users to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vu...
Apple Safari
Apple Iphone Os
NA
CVE-2015-3735
WebKit, as used in Apple iOS prior to 8.4.1 and Safari prior to 6.2.8, 7.x prior to 7.1.8, and 8.x prior to 8.0.8, allows remote malicious users to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vu...
Apple Itunes 12.2
Apple Safari
Apple Iphone Os
NA
CVE-2015-3740
WebKit, as used in Apple iOS prior to 8.4.1 and Safari prior to 6.2.8, 7.x prior to 7.1.8, and 8.x prior to 8.0.8, allows remote malicious users to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vu...
Apple Itunes
Apple Safari
Apple Iphone Os
NA
CVE-2015-3743
WebKit, as used in Apple iOS prior to 8.4.1 and Safari prior to 6.2.8, 7.x prior to 7.1.8, and 8.x prior to 8.0.8, allows remote malicious users to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vu...
Apple Itunes
Apple Safari
Apple Iphone Os
Canonical Ubuntu Linux 14.04
Canonical Ubuntu Linux 15.10
NA
CVE-2015-3747
WebKit, as used in Apple iOS prior to 8.4.1 and Safari prior to 6.2.8, 7.x prior to 7.1.8, and 8.x prior to 8.0.8, allows remote malicious users to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vu...
Apple Itunes
Apple Safari
Apple Iphone Os
Canonical Ubuntu Linux 14.04
Canonical Ubuntu Linux 15.10
NA
CVE-2015-3749
WebKit, as used in Apple iOS prior to 8.4.1 and Safari prior to 6.2.8, 7.x prior to 7.1.8, and 8.x prior to 8.0.8, allows remote malicious users to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vu...
Apple Itunes
Apple Safari
Apple Iphone Os
Canonical Ubuntu Linux 14.04
Canonical Ubuntu Linux 15.10
NA
CVE-2015-3751
WebKit in Apple Safari prior to 6.2.8, 7.x prior to 7.1.8, and 8.x prior to 8.0.8, as used in iOS prior to 8.4.1 and other products, allows remote malicious users to bypass a Content Security Policy protection mechanism by using a video control in conjunction with an IMG element ...
Apple Safari
Apple Iphone Os
NA
CVE-2015-3752
The Content Security Policy implementation in WebKit in Apple Safari prior to 6.2.8, 7.x prior to 7.1.8, and 8.x prior to 8.0.8, as used in iOS prior to 8.4.1 and other products, does not properly restrict cookie transmission for report requests, which allows remote malicious use...
Apple Safari
Apple Iphone Os
Canonical Ubuntu Linux 14.04
Canonical Ubuntu Linux 15.10
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
firewall
CVE-2024-35649
stored XSS
CVE-2022-28654
CVE-2020-35153
CVE-2024-27348
CVE-2022-28652
local users
CVE-2017-3506
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
NEXT »