Vulnerabilities > Apple > Iphone OS > 1.0.2

DATE CVE VULNERABILITY TITLE RISK
2010-06-18 CVE-2010-1387 Resource Management Errors vulnerability in Apple Itunes
Use-after-free vulnerability in JavaScriptCore in WebKit in Apple iTunes before 9.2 on Windows, and Apple iOS before 4 on the iPhone and iPod touch, allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via vectors related to page transitions, a different vulnerability than CVE-2010-1763 and CVE-2010-1769.
network
apple CWE-399
critical
9.3
2010-02-03 CVE-2010-0038 Resource Management Errors vulnerability in Apple Iphone OS
Recovery Mode in Apple iPhone OS 1.0 through 3.1.2, and iPhone OS for iPod touch 1.1 through 3.1.2, allows physically proximate attackers to bypass device locking, and read or modify arbitrary data, via a USB control message that triggers memory corruption.
local
low complexity
apple CWE-399
4.6
2009-11-13 CVE-2009-2816 Cross-Site Request Forgery (CSRF) vulnerability in multiple products
The implementation of Cross-Origin Resource Sharing (CORS) in WebKit, as used in Apple Safari before 4.0.4 and Google Chrome before 3.0.195.33, includes certain custom HTTP headers in the OPTIONS request during cross-origin operations with preflight, which makes it easier for remote attackers to conduct cross-site request forgery (CSRF) attacks via a crafted web page.
6.8
2009-09-21 CVE-2009-3273 Cryptographic Issues vulnerability in Apple Iphone OS
iPhone Mail in Apple iPhone OS, and iPhone OS for iPod touch, does not validate X.509 certificates, which allows man-in-the-middle attackers to spoof arbitrary SSL e-mail servers via a crafted certificate.
network
low complexity
apple CWE-310
7.5
2009-09-10 CVE-2009-2815 Resource Management Errors vulnerability in Apple Iphone OS
The Telephony component in Apple iPhone OS before 3.1 does not properly handle SMS arrival notifications, which allows remote attackers to cause a denial of service (NULL pointer dereference and service interruption) via a crafted SMS message.
network
low complexity
apple CWE-399
7.8
2009-09-10 CVE-2009-2797 Information Exposure vulnerability in multiple products
The WebKit component in Safari in Apple iPhone OS before 3.1, and iPhone OS before 3.1.1 for iPod touch, does not remove usernames and passwords from URLs sent in Referer headers, which allows remote attackers to obtain sensitive information by reading Referer logs on a web server.
network
low complexity
apple canonical CWE-200
5.0
2009-09-10 CVE-2009-2795 Improper Restriction of Operations Within the Bounds of A Memory Buffer vulnerability in Apple Iphone OS
Heap-based buffer overflow in the Recovery Mode component in Apple iPhone OS before 3.1, and iPhone OS before 3.1.1 for iPod touch, allows local users to bypass the passcode requirement and access arbitrary data via vectors related to "command parsing."
local
low complexity
apple CWE-119
7.2
2009-09-10 CVE-2009-2206 Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in Apple Iphone OS
Multiple heap-based buffer overflows in the AudioCodecs library in the CoreAudio component in Apple iPhone OS before 3.1, and iPhone OS before 3.1.1 for iPod touch, allow remote attackers to execute arbitrary code or cause a denial of service (application crash) via a crafted (1) AAC or (2) MP3 file, as demonstrated by a ringtone with malformed entries in the sample size table.
network
apple CWE-119
6.8
2009-08-12 CVE-2009-2199 Unspecified vulnerability in Apple Safari
Incomplete blacklist vulnerability in WebKit in Apple Safari before 4.0.3, as used on iPhone OS before 3.1, iPhone OS before 3.1.1 for iPod touch, and other platforms, allows remote attackers to spoof domain names in URLs, and possibly conduct phishing attacks, via unspecified homoglyphs.
network
apple
5.8
2009-08-03 CVE-2009-2204 Remote Code Execution vulnerability in Apple iPhone SMS Application
Unspecified vulnerability in the CoreTelephony component in Apple iPhone OS before 3.0.1 allows remote attackers to execute arbitrary code, obtain GPS coordinates, or enable the microphone via an SMS message that triggers memory corruption, as demonstrated by Charlie Miller at SyScan '09 Singapore.
network
low complexity
apple
critical
10.0