Apple Iphone Os

CVSS Base Metrics

Access Vector (AV)

The access vector (AV) shows how a vulnerability may be exploited.

Access Complexity (AC)

The access complexity (AC) metric describes how easy or difficult it is to exploit the discovered vulnerability.

Authentication (Au)

The authentication (Au) metric describes the number of times that an attacker must authenticate to a target to exploit it. It does not include (for example) authentication to a network in order to gain access. For locally exploitable vulnerabilities, this value should only be set to Single or Multiple if further authentication is required after initial access.

Attack Vector (AV)

This metric reflects the context by which vulnerability exploitation is possible.

Attack Complexity (AC)

This metric depicts the situations that are not under the attackers control and are required to exploit vulnerability.

Privileges Required (PR)

This metric describes the level of privileges an attacker must possess before successfully exploiting the vulnerability.

User Interaction (UI)

This metric captures the requirement for a user, other than the attacker, to participate in the successful compromise the vulnerable component.

Scope (S)

This metric is a determination on whether a vulnerability in one system or component can have carry over impact on another system or component.

CVSS Impact Metrics

Confidentiality (C)

The confidentiality (C) metric describes the impact on the confidentiality of data processed by the system.

Integrity (I)

The Integrity (I) metric describes the impact on the integrity of the exploited system.

Availability (A)

The availability (A) metric describes the impact on the availability of the target system. Attacks that consume network bandwidth, processor cycles, memory or any other resources affect the availability of a system.

Confidentiality (C)

This metric measures the impact to the confidentiality of the information resources managed by a software component due to a successfully exploited vulnerability. Confidentiality refers to limiting information access and disclosure to only authorized users, as well as preventing access by, or disclosure to, unauthorized ones.

Integrity (I)

This metric measures the impact to integrity of a successfully exploited vulnerability. Integrity refers to the trustworthiness and veracity of information.

Availability (A)

This metric measures the impact to the availability of the impacted component resulting from a successfully exploited vulnerability. It refers to the loss of availability of the impacted component itself, such as a networked service (e.g., web, database, email). Since availability refers to the accessibility of information resources, attacks that consume network bandwidth, processor cycles, or disk space all impact the availability of an impacted component.

Title CPE22 CPE23 Type Vendor Product Version Update Edition Language SW Edition Target SW Target HW Other
Title CPE22 CPE23 Type Vendor Product Version Update Edition Language SW Edition Target SW Target HW Other
URL Type
http://lists.apple.com/archives/security-announce/2013/Oct/msg00002.html
http://lists.apple.com/archives/security-announce/2013/Sep/msg00006.html
http://support.apple.com/en-us/HT1222
http://support.apple.com/en-us/HT201394
http://support.apple.com/en-us/HT6541
http://support.apple.com/en-us/HT6598
http://support.apple.com/kb/DL1736
http://support.apple.com/kb/HT5957
http://support.apple.com/kb/HT6058
http://support.apple.com/kb/HT6146
http://support.apple.com/kb/HT6147
http://www.apple.com/ Vendor
http://www.apple.com/ios/ Vendor
http://www.apple.com/ios/ios-10/ Product
http://www.apple.com/iphone Product
https://apple.fandom.com/wiki/IOS_1 Version
https://developer.apple.com/documentation/ios-ipados-release-notes Change Log
https://developer.apple.com/documentation/ios-ipados-release-notes/ios-ipados-18-release-notes Version
https://developer.apple.com/documentation/ios_ipados_release_notes/ios_ipados_13_3_1_release_notes Version
https://developer.apple.com/documentation/ios_release_notes/ios_12_release_notes Version
https://github.com/CVEProject/cvelistV5/blob/main/cves/2024/27xxx/CVE-2024-27884.json Version
https://github.com/CVEProject/cvelistV5/blob/main/cves/2024/40xxx/CVE-2024-40786.json Version
https://lists.apple.com/archives/security-announce/2015/Apr/msg00002.html Advisory
https://support.apple.com/en-us/101566 Version
https://support.apple.com/en-us/102790 Advisory
https://support.apple.com/en-us/102795 Advisory
https://support.apple.com/en-us/102803 Advisory
https://support.apple.com/en-us/103005 Advisory
https://support.apple.com/en-us/103162 Advisory
https://support.apple.com/en-us/106369 Advisory
https://support.apple.com/en-us/120308 Advisory
https://support.apple.com/en-us/120893 Advisory
https://support.apple.com/en-us/120898 Advisory
https://support.apple.com/en-us/HT201222 Advisory
https://support.apple.com/en-us/HT201222 Change Log
https://support.apple.com/en-us/HT202154 Advisory
https://support.apple.com/en-us/HT204418 Version
https://support.apple.com/en-us/HT204611 Version
https://support.apple.com/en-us/HT206902 Version
https://support.apple.com/en-us/HT207026 Product
https://support.apple.com/en-us/HT207617 Advisory
https://support.apple.com/en-us/HT207798 Version
https://support.apple.com/en-us/HT207923 Version
https://support.apple.com/en-us/HT208067 Change Log
https://support.apple.com/en-us/HT208112 Advisory
https://support.apple.com/en-us/HT209084 Change Log
https://support.apple.com/en-us/HT209441 Version
https://support.apple.com/en-us/HT210624 Version
https://support.apple.com/en-us/HT210787 Version
https://support.apple.com/en-us/HT211134 Version
https://support.apple.com/en-us/HT211169 Advisory
https://support.apple.com/en-us/HT211214 Change Log
https://support.apple.com/en-us/HT211288 Version
https://support.apple.com/en-us/HT211929 Advisory
https://support.apple.com/en-us/HT211940 Advisory
https://support.apple.com/en-us/HT212146 Advisory
https://support.apple.com/en-us/HT212221 Advisory
https://support.apple.com/en-us/HT212256 Advisory
https://support.apple.com/en-us/HT212257 Advisory
https://support.apple.com/en-us/HT212317 Advisory
https://support.apple.com/en-us/HT212336 Change Log
https://support.apple.com/en-us/HT212341 Change Log
https://support.apple.com/en-us/HT212528 Advisory
https://support.apple.com/en-us/HT212548 Advisory
https://support.apple.com/en-us/HT212601 Advisory
https://support.apple.com/en-us/HT212788 Change Log
https://support.apple.com/en-us/HT212824 Version
https://support.apple.com/en-us/HT212976 Advisory
https://support.apple.com/en-us/HT213182 Advisory
https://support.apple.com/en-us/HT213258 Advisory
https://support.apple.com/en-us/HT213346 Change Log
https://support.apple.com/en-us/HT213445 Advisory
https://support.apple.com/en-us/HT213530 Version
https://support.apple.com/en-us/HT213531 Version
https://support.apple.com/en-us/HT213598 Advisory
https://support.apple.com/en-us/HT213606 Version
https://support.apple.com/en-us/HT213673 Advisory
https://support.apple.com/en-us/HT213676 Advisory
https://support.apple.com/en-us/HT213757 Advisory
https://support.apple.com/en-us/HT213765 Advisory
https://support.apple.com/en-us/HT213842 Advisory
https://support.apple.com/en-us/HT213843 Advisory
https://support.apple.com/en-us/HT213961 Change Log
https://support.apple.com/en-us/HT214034 Advisory
https://support.apple.com/en-us/HT214035 Advisory
https://support.apple.com/en-us/HT214059 Advisory
https://support.apple.com/en-us/HT214063 Advisory
https://support.apple.com/en-us/HT3860 Advisory
https://support.apple.com/HT211102 Product
https://support.apple.com/HT211168 Advisory
https://support.apple.com/kb/dl1758?locale=en_US
https://support.apple.com/kb/DL1842?locale=en_US Version
https://support.apple.com/kb/HT212003 Version
https://support.apple.com/kb/HT212005 Version
https://support.apple.com/kb/HT212007 Version
https://support.apple.com/kb/HT212009 Version
https://support.apple.com/kb/HT212011 Version
https://www.apple.com/ Vendor
https://www.apple.com/ios/ Product
https://www.apple.com/ios/ios-12/ Product
https://www.apple.com/ios/ios-14/ Version
https://www.apple.com/ios/ios7-update/
https://www.apple.com/iphone/ Product
https://www.apple.com/lb/support/ios9/ Product
# CVE Description CVSS EPSS EPSS Trend (30 days) Affected Products Weaknesses Security Advisories Exploits PoC Pubblication Date Modification Date
# CVE Description CVSS EPSS EPSS Trend (30 days) Affected Products Weaknesses Security Advisories PoC Pubblication Date Modification Date
Loading...