296,224
Total vulnerabilities in the database
Apple iOS before 8 enables Bluetooth during all upgrade actions, which makes it easier for remote attackers to bypass intended access restrictions via a Bluetooth session.
Software | From | Fixed in |
---|---|---|
apple / iphone_os | 7.0.4 | 7.0.4.x |
apple / iphone_os | 7.1.1 | 7.1.1.x |
apple / iphone_os | - | 7.1.2.x |
apple / iphone_os | 7.0.5 | 7.0.5.x |
apple / iphone_os | 7.1 | 7.1.x |
apple / iphone_os | 7.0.6 | 7.0.6.x |
apple / iphone_os | 7.0.1 | 7.0.1.x |
apple / iphone_os | 7.0.2 | 7.0.2.x |
apple / iphone_os | 7.0 | 7.0.x |
apple / iphone_os | 7.0.3 | 7.0.3.x |