Vulnerabilities > Apple > Iphone OS > 2.0

DATE CVE VULNERABILITY TITLE RISK
2015-09-18 CVE-2015-5858 Information Exposure vulnerability in Apple Iphone OS and Watchos
The CFNetwork HTTPProtocol component in Apple iOS before 9 allows remote attackers to bypass the HSTS protection mechanism, and consequently obtain sensitive information, via a crafted URL.
network
low complexity
apple CWE-200
5.0
2015-09-18 CVE-2015-5857 7PK - Security Features vulnerability in Apple Iphone OS
Mail in Apple iOS before 9 allows remote attackers to use an address-book contact as a spoofed e-mail sender address via unspecified vectors.
network
low complexity
apple CWE-254
5.0
2015-09-18 CVE-2015-5856 7PK - Security Features vulnerability in Apple Iphone OS
The Application Store component in Apple iOS before 9 allows remote attackers to cause a denial of service to an enterprise-signed app via a crafted ITMS URL.
network
apple CWE-254
4.3
2015-09-18 CVE-2015-5855 Information Exposure vulnerability in Apple Iphone OS and Watchos
Apple iOS before 9 allows attackers to discover the e-mail address of a player via a crafted Game Center app.
network
apple CWE-200
4.3
2015-09-18 CVE-2015-5851 Information Exposure vulnerability in Apple Iphone OS and mac OS X
The convenience initializer in the Multipeer Connectivity component in Apple iOS before 9 does not require an encrypted session, which allows local users to obtain cleartext multipeer data via an encrypted-to-unencrypted downgrade attack.
local
low complexity
apple CWE-200
2.1
2015-09-18 CVE-2015-5850 7PK - Security Features vulnerability in Apple Iphone OS
AppleKeyStore in Apple iOS before 9 allows physically proximate attackers to reset the count of incorrect passcode attempts via a device backup.
local
low complexity
apple CWE-254
2.1
2015-09-18 CVE-2015-5848 Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in Apple Iphone OS and Watchos
IOAcceleratorFamily in Apple iOS before 9 allows local users to gain privileges or cause a denial of service (memory corruption) via unspecified vectors.
local
low complexity
apple CWE-119
7.2
2015-09-18 CVE-2015-5847 Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in Apple Iphone OS, mac OS X and Watchos
The Disk Images component in Apple iOS before 9 allows local users to gain privileges or cause a denial of service (memory corruption) via unspecified vectors.
local
low complexity
apple CWE-119
7.2
2015-09-18 CVE-2015-5846 Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in Apple Iphone OS and Watchos
IOKit in the kernel in Apple iOS before 9 allows attackers to execute arbitrary code in a privileged context or cause a denial of service (memory corruption) via a crafted app, a different vulnerability than CVE-2015-5844 and CVE-2015-5845.
network
apple CWE-119
critical
9.3
2015-09-18 CVE-2015-5845 Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in Apple Iphone OS and Watchos
IOKit in the kernel in Apple iOS before 9 allows attackers to execute arbitrary code in a privileged context or cause a denial of service (memory corruption) via a crafted app, a different vulnerability than CVE-2015-5844 and CVE-2015-5846.
network
apple CWE-119
critical
9.3