While it may be difficult to exploit many of these vulnerabilities successfully, there were two vulnerabilities that affected Apple’s iPhone iOS operating platform that allowed users to “jailbreak” their devices. The process of jailbreaking a device through exploits is not very different from using exploits to install malicious code.