When Apple updates iOS, macOS and the rest of its operating systems, it usually includes new features and improvements in performance and security, thus covering any vulnerabilities that have been discovered. It’s the eternal race between malicious code authors and developers: any holes that could allow the system to be misused to harm users must be covered.
We know that there is a whole history of updates from Apple, we just need to review all the version numbers that have appeared over the years. But Who counts all the vulnerabilities that have been appearing? Well, there is a website that does just this.
The Wikipedia of vulnerabilities
The web in question is called CVE Details, and consists of an extensive database of all security holes and vulnerabilities that have affected the devices and systems most used by the general public. Apple has its own section, on the cover of which you can see a summary of all vulnerabilities organized by year.
From that same cover, we see curious data such as that 2015 was the year in which there were more security problems in Apple systems, and that the main type of problem was the possibility of someone taking advantage of a vulnerability to be able to execute malicious code within the system.
If, for example, we go to the iOS vulnerabilities section, we see a list in which fortunately they are all corrected and with a danger score of 0.0 (if the score is 10, the danger is maximum). Each vulnerability has its tab: here is an example of the most recent as of the date of this article, in which a programming error of the type out of bounds allowed you to run code in the system kernel with administrator privileges. As indicated, Apple has already covered the vulnerability.
This website can be useful for developers and security experts who want to be aware of any bugs that are discovered, and see if Apple has been able to fix it. And for curious or interested people like us, it can be a perfect reference website.
In Applesphere | I’ve been writing about all iPhones for 16 years. These are the three tricks I recommend to make them more secure