Loading...
Loading...
Apple iPhone 2.0.2, in some configurations, allows physically proximate attackers to bypass intended access restrictions, and obtain sensitive information or make arbitrary use of the device, via an Emergency Call tap and a Home double-tap, followed by a tap of any contact's blue arrow.
September 2, 2008
April 23, 2026
See which npm, PyPI, Go, and Maven packages are affected by CVE-2008-3876
EchelonGraph automatically scans your cloud infrastructure and maps CVE exposure using blast radius analysis.