Loading...
Loading...
The Twitter subsystem in Apple iOS before 7 does not require API conformity for access to Twitter daemon interfaces, which allows attackers to post Tweets via a crafted app that sends direct requests to the daemon.
September 19, 2013
April 29, 2026
See which npm, PyPI, Go, and Maven packages are affected by CVE-2013-5157
EchelonGraph automatically scans your cloud infrastructure and maps CVE exposure using blast radius analysis.