Vulnerability Database

With exploit

apple / iphone_os

Title Severity Exploit Date Affected Version
CVE-2012-3732 Medium Sep 20, 2012 == 3.0
== 3.2
== 3.1.3
== 1.0.2
== 4.3.2
== 4.0.2
== 2.2
== 1.1.1
== 4.2.8
<= 5.1.1
== 4.1
== 2.0.0
== 3.1.2
== 3.0.1
== 4.3.1
== 4.2.5
== 1.1.2
== 3.1
== 1.1.3
== 1.1.0
== 1.0.1
== 2.1
== 4.3.5
== 4.2.1
== 1.1.5
== 4.0.1
== 4.3.3
== 5.0.1
== 2.1.1
== 1.1.4
== 5.0
== 1.0.0
== 2.0.2
== 2.0
== 2.0.1
== 4.0
== 4.3.0
== 2.2.1
== 3.2.1
== 3.2.2
CVE-2012-3733 Low Sep 20, 2012 == 3.0
== 3.2
== 3.1.3
== 1.0.2
== 4.3.2
== 4.0.2
== 2.2
== 1.1.1
== 4.2.8
<= 5.1.1
== 4.1
== 2.0.0
== 3.1.2
== 3.0.1
== 4.3.1
== 4.2.5
== 1.1.2
== 3.1
== 1.1.3
== 1.1.0
== 1.0.1
== 2.1
== 4.3.5
== 4.2.1
== 1.1.5
== 4.0.1
== 4.3.3
== 5.0.1
== 2.1.1
== 1.1.4
== 5.0
== 1.0.0
== 2.0.2
== 2.0
== 2.0.1
== 4.0
== 4.3.0
== 2.2.1
== 3.2.1
== 3.2.2
CVE-2012-3734 Low Sep 20, 2012 == 3.0
== 3.2
== 3.1.3
== 1.0.2
== 4.3.2
== 4.0.2
== 2.2
== 1.1.1
== 5.1
== 4.2.8
<= 5.1.1
== 4.1
== 3.1.2
== 3.0.1
== 4.3.1
== 4.2.5
== 1.1.2
== 3.1
== 1.1.3
== 1.1.0
== 1.0.1
== 2.1
== 4.3.5
== 4.2.1
== 1.1.5
== 4.0.1
== 4.3.3
== 5.0.1
== 2.1.1
== 1.1.4
== 5.0
== 1.0.0
== 2.0.2
== 2.0
== 2.0.1
== 4.0
== 4.3.0
== 2.2.1
== 3.2.1
== 3.2.2
CVE-2012-3735 Low Sep 20, 2012 == 3.0
== 3.2
== 3.1.3
== 1.0.2
== 4.3.2
== 4.0.2
== 2.2
== 1.1.1
== 4.2.8
<= 5.1.1
== 4.1
== 2.0.0
== 3.1.2
== 3.0.1
== 4.3.1
== 4.2.5
== 1.1.2
== 3.1
== 1.1.3
== 1.1.0
== 1.0.1
== 2.1
== 4.3.5
== 4.2.1
== 1.1.5
== 4.0.1
== 4.3.3
== 5.0.1
== 2.1.1
== 1.1.4
== 5.0
== 1.0.0
== 2.0.2
== 2.0
== 2.0.1
== 4.0
== 4.3.0
== 2.2.1
== 3.2.1
== 3.2.2
CVE-2012-3736 Low Sep 20, 2012 == 3.0
== 3.2
== 3.1.3
== 1.0.2
== 4.3.2
== 4.0.2
== 2.2
== 1.1.1
== 4.2.8
<= 5.1.1
== 4.1
== 2.0.0
== 3.1.2
== 3.0.1
== 4.3.1
== 4.2.5
== 1.1.2
== 3.1
== 1.1.3
== 1.1.0
== 1.0.1
== 2.1
== 4.3.5
== 4.2.1
== 1.1.5
== 4.0.1
== 4.3.3
== 5.0.1
== 2.1.1
== 1.1.4
== 5.0
== 1.0.0
== 2.0.2
== 2.0
== 2.0.1
== 4.0
== 4.3.0
== 2.2.1
== 3.2.1
== 3.2.2
CVE-2012-3737 Low Sep 20, 2012 == 3.0
== 3.2
== 3.1.3
== 1.0.2
== 4.3.2
== 4.0.2
== 2.2
== 1.1.1
== 4.2.8
<= 5.1.1
== 4.1
== 2.0.0
== 3.1.2
== 3.0.1
== 4.3.1
== 4.2.5
== 1.1.2
== 3.1
== 1.1.3
== 1.1.0
== 1.0.1
== 2.1
== 4.3.5
== 4.2.1
== 1.1.5
== 4.0.1
== 4.3.3
== 5.0.1
== 2.1.1
== 1.1.4
== 5.0
== 1.0.0
== 2.0.2
== 2.0
== 2.0.1
== 4.0
== 4.3.0
== 2.2.1
== 3.2.1
== 3.2.2
CVE-2012-3738 Low Sep 20, 2012 == 3.0
== 3.2
== 3.1.3
== 1.0.2
== 4.3.2
== 4.0.2
== 2.2
== 1.1.1
== 5.1
== 4.2.8
<= 5.1.1
== 4.1
== 3.1.2
== 3.0.1
== 4.3.1
== 4.2.5
== 1.1.2
== 3.1
== 1.1.3
== 1.1.0
== 1.0.1
== 2.1
== 4.3.5
== 4.2.1
== 1.1.5
== 4.0.1
== 4.3.3
== 5.0.1
== 2.1.1
== 1.1.4
== 5.0
== 1.0.0
== 2.0.2
== 2.0
== 2.0.1
== 4.0
== 4.3.0
== 2.2.1
== 3.2.1
== 3.2.2
CVE-2012-3739 Low Sep 20, 2012 == 3.0
== 3.2
== 3.1.3
== 1.0.2
== 4.3.2
== 4.0.2
== 2.2
== 1.1.1
== 4.2.8
<= 5.1.1
== 4.1
== 2.0.0
== 3.1.2
== 3.0.1
== 4.3.1
== 4.2.5
== 1.1.2
== 3.1
== 1.1.3
== 1.1.0
== 1.0.1
== 2.1
== 4.3.5
== 4.2.1
== 1.1.5
== 4.0.1
== 4.3.3
== 5.0.1
== 2.1.1
== 1.1.4
== 5.0
== 1.0.0
== 2.0.2
== 2.0
== 2.0.1
== 4.0
== 4.3.0
== 2.2.1
== 3.2.1
== 3.2.2
CVE-2012-3740 Low Sep 20, 2012 == 3.0
== 3.2
== 3.1.3
== 1.0.2
== 4.3.2
== 4.0.2
== 2.2
== 1.1.1
== 4.2.8
<= 5.1.1
== 4.1
== 2.0.0
== 3.1.2
== 3.0.1
== 4.3.1
== 4.2.5
== 1.1.2
== 3.1
== 1.1.3
== 1.1.0
== 1.0.1
== 2.1
== 4.3.5
== 4.2.1
== 1.1.5
== 4.0.1
== 4.3.3
== 5.0.1
== 2.1.1
== 1.1.4
== 5.0
== 1.0.0
== 2.0.2
== 2.0
== 2.0.1
== 4.0
== 4.3.0
== 2.2.1
== 3.2.1
== 3.2.2
CVE-2012-3741 Low Sep 20, 2012 == 3.0
== 3.2
== 3.1.3
== 1.0.2
== 4.3.2
== 4.0.2
== 2.2
== 1.1.1
== 4.2.8
<= 5.1.1
== 4.1
== 2.0.0
== 3.1.2
== 3.0.1
== 4.3.1
== 4.2.5
== 1.1.2
== 3.1
== 1.1.3
== 1.1.0
== 1.0.1
== 2.1
== 4.3.5
== 4.2.1
== 1.1.5
== 4.0.1
== 4.3.3
== 5.0.1
== 2.1.1
== 1.1.4
== 5.0
== 1.0.0
== 2.0.2
== 2.0
== 2.0.1
== 4.0
== 4.3.0
== 2.2.1
== 3.2.1
== 3.2.2