Vulnerability Database

With exploit

apple / iphone_os

Title Severity Exploit Date Affected Version
CVE-2012-2889 Low Sep 26, 2012 <= 6.0.2
== 6.0
== 6.0.1
CVE-2012-3722 Medium Sep 20, 2012 == 3.0
== 3.2
== 3.1.3
== 1.0.2
== 4.3.2
== 4.0.2
== 2.2
== 1.1.1
== 5.1
== 4.2.8
<= 5.1.1
== 4.1
== 3.1.2
== 3.0.1
== 4.3.1
== 4.2.5
== 1.1.2
== 3.1
== 1.1.3
== 1.1.0
== 1.0.1
== 2.1
== 4.3.5
== 4.2.1
== 1.1.5
== 4.0.1
== 4.3.3
== 5.0.1
== 2.1.1
== 1.1.4
== 5.0
== 1.0.0
== 2.0.2
== 2.0
== 2.0.1
== 4.0
== 4.3.0
== 2.2.1
== 3.2.1
== 3.2.2
CVE-2012-3724 Medium Sep 20, 2012 == 3.0
== 3.2
== 3.1.3
== 1.0.2
== 4.3.2
== 4.0.2
== 2.2
== 1.1.1
== 4.2.8
<= 5.1.1
== 4.1
== 2.0.0
== 3.1.2
== 3.0.1
== 4.3.1
== 4.2.5
== 1.1.2
== 3.1
== 1.1.3
== 1.1.0
== 1.0.1
== 2.1
== 4.3.5
== 4.2.1
== 1.1.5
== 4.0.1
== 4.3.3
== 5.0.1
== 2.1.1
== 1.1.4
== 5.0
== 1.0.0
== 2.0.2
== 2.0
== 2.0.1
== 4.0
== 4.3.0
== 2.2.1
== 3.2.1
== 3.2.2
CVE-2012-3725 Low Sep 20, 2012 == 3.0
== 3.2
== 3.1.3
== 1.0.2
== 4.3.2
== 4.0.2
== 2.2
== 1.1.1
== 4.2.8
<= 5.1.1
== 4.1
== 2.0.0
== 3.1.2
== 3.0.1
== 4.3.1
== 4.2.5
== 1.1.2
== 3.1
== 1.1.3
== 1.1.0
== 1.0.1
== 2.1
== 4.3.5
== 4.2.1
== 1.1.5
== 4.0.1
== 4.3.3
== 5.0.1
== 2.1.1
== 1.1.4
== 5.0
== 1.0.0
== 2.0.2
== 2.0
== 2.0.1
== 4.0
== 4.3.0
== 2.2.1
== 3.2.1
== 3.2.2
CVE-2012-3726 Medium Sep 20, 2012 == 3.0
== 3.2
== 3.1.3
== 1.0.2
== 4.3.2
== 4.0.2
== 2.2
== 1.1.1
== 5.1
== 4.2.8
<= 5.1.1
== 4.1
== 3.1.2
== 3.0.1
== 4.3.1
== 4.2.5
== 1.1.2
== 3.1
== 1.1.3
== 1.1.0
== 1.0.1
== 2.1
== 4.3.5
== 4.2.1
== 1.1.5
== 4.0.1
== 4.3.3
== 5.0.1
== 2.1.1
== 1.1.4
== 5.0
== 1.0.0
== 2.0.2
== 2.0
== 2.0.1
== 4.0
== 4.3.0
== 2.2.1
== 3.2.1
== 3.2.2
CVE-2012-3727 Medium Sep 20, 2012 == 3.0
== 3.2
== 3.1.3
== 1.0.2
== 4.3.2
== 4.0.2
== 2.2
== 1.1.1
== 4.2.8
<= 5.1.1
== 4.1
== 2.0.0
== 3.1.2
== 3.0.1
== 4.3.1
== 4.2.5
== 1.1.2
== 3.1
== 1.1.3
== 1.1.0
== 1.0.1
== 2.1
== 4.3.5
== 4.2.1
== 1.1.5
== 4.0.1
== 4.3.3
== 5.0.1
== 2.1.1
== 1.1.4
== 5.0
== 1.0.0
== 2.0.2
== 2.0
== 2.0.1
== 4.0
== 4.3.0
== 2.2.1
== 3.2.1
== 3.2.2
CVE-2012-3728 Medium Sep 20, 2012 == 3.0
== 3.2
== 3.1.3
== 1.0.2
== 4.3.2
== 4.0.2
== 2.2
== 1.1.1
== 4.2.8
<= 5.1.1
== 4.1
== 2.0.0
== 3.1.2
== 3.0.1
== 4.3.1
== 4.2.5
== 1.1.2
== 3.1
== 1.1.3
== 1.1.0
== 1.0.1
== 2.1
== 4.3.5
== 4.2.1
== 1.1.5
== 4.0.1
== 4.3.3
== 5.0.1
== 2.1.1
== 1.1.4
== 5.0
== 1.0.0
== 2.0.2
== 2.0
== 2.0.1
== 4.0
== 4.3.0
== 2.2.1
== 3.2.1
== 3.2.2
CVE-2012-3729 Low Sep 20, 2012 == 3.0
== 3.2
== 3.1.3
== 1.0.2
== 4.3.2
== 4.0.2
== 2.2
== 1.1.1
== 4.2.8
<= 5.1.1
== 4.1
== 2.0.0
== 3.1.2
== 3.0.1
== 4.3.1
== 4.2.5
== 1.1.2
== 3.1
== 1.1.3
== 1.1.0
== 1.0.1
== 2.1
== 4.3.5
== 4.2.1
== 1.1.5
== 4.0.1
== 4.3.3
== 5.0.1
== 2.1.1
== 1.1.4
== 5.0
== 1.0.0
== 2.0.2
== 2.0
== 2.0.1
== 4.0
== 4.3.0
== 2.2.1
== 3.2.1
== 3.2.2
CVE-2012-3730 Low Sep 20, 2012 == 3.0
== 3.2
== 3.1.3
== 1.0.2
== 4.3.2
== 4.0.2
== 2.2
== 1.1.1
== 5.1
== 4.2.8
<= 5.1.1
== 4.1
== 3.1.2
== 3.0.1
== 4.3.1
== 4.2.5
== 1.1.2
== 3.1
== 1.1.3
== 1.1.0
== 1.0.1
== 2.1
== 4.3.5
== 4.2.1
== 1.1.5
== 4.0.1
== 4.3.3
== 5.0.1
== 2.1.1
== 1.1.4
== 5.0
== 1.0.0
== 2.0.2
== 2.0
== 2.0.1
== 4.0
== 4.3.0
== 2.2.1
== 3.2.1
== 3.2.2
CVE-2012-3731 Low Sep 20, 2012 == 3.0
== 3.2
== 3.1.3
== 1.0.2
== 4.3.2
== 4.0.2
== 2.2
== 1.1.1
== 4.2.8
<= 5.1.1
== 4.1
== 2.0.0
== 3.1.2
== 3.0.1
== 4.3.1
== 4.2.5
== 1.1.2
== 3.1
== 1.1.3
== 1.1.0
== 1.0.1
== 2.1
== 4.3.5
== 4.2.1
== 1.1.5
== 4.0.1
== 4.3.3
== 5.0.1
== 2.1.1
== 1.1.4
== 5.0
== 1.0.0
== 2.0.2
== 2.0
== 2.0.1
== 4.0
== 4.3.0
== 2.2.1
== 3.2.1
== 3.2.2