Vulnerabilities > Apple > Iphone OS > 2.0

DATE CVE VULNERABILITY TITLE RISK
2009-06-10 CVE-2009-1698 Code Injection vulnerability in Apple Safari
WebKit in Apple Safari before 4.0, iPhone OS 1.0 through 2.2.1, and iPhone OS for iPod touch 1.1 through 2.2.1 does not initialize a pointer during handling of a Cascading Style Sheets (CSS) attr function call with a large numerical argument, which allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted HTML document.
network
apple CWE-94
critical
9.3
2009-06-10 CVE-2009-1690 Resource Management Errors vulnerability in multiple products
Use-after-free vulnerability in WebKit, as used in Apple Safari before 4.0, iPhone OS 1.0 through 2.2.1, iPhone OS for iPod touch 1.1 through 2.2.1, Google Chrome 1.0.154.53, and possibly other products, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) by setting an unspecified property of an HTML tag that causes child elements to be freed and later accessed when an HTML error occurs, related to "recursion in certain DOM event handlers."
network
apple google CWE-399
critical
9.3
2009-04-17 CVE-2009-0946 Integer Overflow OR Wraparound vulnerability in multiple products
Multiple integer overflows in FreeType 2.3.9 and earlier allow remote attackers to execute arbitrary code via vectors related to large values in certain inputs in (1) smooth/ftsmooth.c, (2) sfnt/ttcmap.c, and (3) cff/cffload.c.
7.5
2008-11-25 CVE-2008-4233 Unspecified vulnerability in Apple Iphone OS and Safari
Safari in Apple iPhone OS 1.0 through 2.1 and iPhone OS for iPod touch 1.1 through 2.1 does not isolate the call-approval dialog from the process of launching new applications, which allows remote attackers to make arbitrary phone calls via a crafted HTML document.
network
high complexity
apple
2.6
2008-11-25 CVE-2008-4232 Unspecified vulnerability in Apple Iphone OS and Safari
Safari in Apple iPhone OS 2.0 through 2.1 and iPhone OS for iPod touch 2.1 through 2.1 does not restrict an IFRAME's content display to the boundaries of the IFRAME, which allows remote attackers to spoof a user interface via a crafted HTML document.
network
low complexity
apple
5.0
2008-11-25 CVE-2008-4231 Resource Management Errors vulnerability in Apple Iphone OS and Safari
Safari in Apple iPhone OS 1.0 through 2.1 and iPhone OS for iPod touch 1.1 through 2.1 does not properly handle HTML TABLE elements, which allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted HTML document.
network
apple CWE-399
critical
9.3
2008-11-25 CVE-2008-4230 Information Exposure vulnerability in Apple Iphone OS
The Passcode Lock feature in Apple iPhone OS 1.0 through 2.1 and iPhone OS for iPod touch 1.1 through 2.1 displays SMS messages when the emergency-call screen is visible, which allows physically proximate attackers to obtain sensitive information by reading these messages.
local
apple CWE-200
1.9
2008-11-25 CVE-2008-4229 Race Condition vulnerability in Apple Iphone OS
Race condition in the Passcode Lock feature in Apple iPhone OS 2.0 through 2.1 and iPhone OS for iPod touch 2.0 through 2.1 allows physically proximate attackers to remove the lock and launch arbitrary applications by restoring the device from a backup.
local
high complexity
apple CWE-362
3.7
2008-11-25 CVE-2008-4228 Permissions, Privileges, and Access Controls vulnerability in Apple Iphone OS
The Passcode Lock feature in Apple iPhone OS 1.0 through 2.1 and iPhone OS for iPod touch 1.1 through 2.1 allows physically proximate attackers to leverage the emergency-call ability of locked devices to make a phone call to an arbitrary number.
local
low complexity
apple CWE-264
3.6
2008-11-25 CVE-2008-4227 Cryptographic Issues vulnerability in Apple Iphone OS
Apple iPhone OS 1.0 through 2.1 and iPhone OS for iPod touch 1.1 through 2.1 changes the encryption level of PPTP VPN connections to a lower level than was previously used, which makes it easier for remote attackers to obtain sensitive information or hijack a connection by decrypting network traffic.
network
low complexity
apple CWE-310
7.5