Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
iphone_os vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2010-1781
Double free vulnerability in WebKit in Apple iOS prior to 4.1 on the iPhone and iPod touch allows remote malicious users to execute arbitrary code or cause a denial of service (application crash) via vectors related to the rendering of an inline element.
Apple Iphone Os
Canonical Ubuntu Linux 10.10
Canonical Ubuntu Linux 10.04
Canonical Ubuntu Linux 9.10
NA
CVE-2010-1814
WebKit in Apple iOS prior to 4.1 on the iPhone and iPod touch, and webkitgtk prior to 1.2.6, allows remote malicious users to execute arbitrary code or cause a denial of service (memory corruption and application crash) via vectors involving form menus.
Apple Iphone Os
Webkitgtk Webkitgtk
Canonical Ubuntu Linux 10.10
Canonical Ubuntu Linux 10.04
Canonical Ubuntu Linux 9.10
NA
CVE-2010-1812
Use-after-free vulnerability in WebKit in Apple iOS prior to 4.1 on the iPhone and iPod touch, and webkitgtk prior to 1.2.6, allows remote malicious users to execute arbitrary code or cause a denial of service (application crash) via vectors involving selections.
Apple Iphone Os
Webkitgtk Webkitgtk
Canonical Ubuntu Linux 10.10
Canonical Ubuntu Linux 10.04
Canonical Ubuntu Linux 9.10
NA
CVE-2010-1815
Use-after-free vulnerability in WebKit in Apple iOS prior to 4.1 on the iPhone and iPod touch, and webkitgtk prior to 1.2.6, allows remote malicious users to execute arbitrary code or cause a denial of service (application crash) via vectors involving scrollbars.
Apple Iphone Os
Webkitgtk Webkitgtk
Canonical Ubuntu Linux 10.10
Canonical Ubuntu Linux 10.04
Canonical Ubuntu Linux 9.10
6.3
CVSSv3
CVE-2023-45866
Bluetooth HID Hosts in BlueZ may permit an unauthenticated Peripheral role HID Device to initiate and establish an encrypted connection, and accept HID keyboard reports, potentially permitting injection of HID messages when no user interaction has occurred in the Central role to ...
Google Android 4.2.2
Google Android 6.0.1
Google Android 10.0
Google Android 11.0
Google Android 13.0
Google Android 14.0
Canonical Ubuntu Linux 18.04
Canonical Ubuntu Linux 20.04
Canonical Ubuntu Linux 22.04
Canonical Ubuntu Linux 23.10
Apple Iphone Os 16.6
Apple Macos 12.6.7
Apple Macos 13.3.3
Fedoraproject Fedora 38
Fedoraproject Fedora 39
Apple Macos
Apple Iphone Os
Apple Ipad Os
Debian Debian Linux 10.0
3 Github repositories
1 Article
NA
CVE-2014-3187
Google Chrome prior to 37.0.2062.60 and 38.x prior to 38.0.2125.59 on iOS does not properly restrict processing of (1) facetime:// and (2) facetime-audio:// URLs, which allows remote malicious users to obtain video and audio data from a device via a crafted web site.
Google Chrome
Google Chrome 37.0.2062.0
Google Chrome 37.0.2062.1
Google Chrome 37.0.2062.2
Google Chrome 37.0.2062.3
Google Chrome 37.0.2062.4
Google Chrome 37.0.2062.5
Google Chrome 37.0.2062.6
Google Chrome 37.0.2062.10
Google Chrome 37.0.2062.11
Google Chrome 37.0.2062.12
Google Chrome 37.0.2062.13
Google Chrome 37.0.2062.14
Google Chrome 37.0.2062.15
Google Chrome 37.0.2062.16
Google Chrome 37.0.2062.17
Google Chrome 37.0.2062.18
Google Chrome 37.0.2062.19
Google Chrome 37.0.2062.20
Google Chrome 37.0.2062.21
Google Chrome 37.0.2062.22
Google Chrome 37.0.2062.23
1 Github repository
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-30924
CVE-2024-3400
overflow
CVE-2024-23528
CVE-2024-21338
CVE-2024-3818
CVE-2024-23535
NULL pointer dereference
elevation of privilege
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6