Vulnerabilities > Apple > Iphone OS > 3.1.1

DATE CVE VULNERABILITY TITLE RISK
2010-06-22 CVE-2010-1752 Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in Apple Iphone OS
Stack-based buffer overflow in CFNetwork in Apple iOS before 4 on the iPhone and iPod touch allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via vectors related to URL handling.
network
apple CWE-119
6.8
2010-06-22 CVE-2010-1751 Permissions, Privileges, and Access Controls vulnerability in Apple Iphone OS
Application Sandbox in Apple iOS before 4 on the iPhone and iPod touch does not prevent photo-library access, which might allow remote attackers to obtain location information via unspecified vectors.
network
low complexity
apple CWE-264
5.0
2010-06-22 CVE-2010-1407 Information Exposure vulnerability in Apple Iphone OS
WebKit in Apple iOS before 4 on the iPhone and iPod touch does not properly implement the history.replaceState method in certain situations involving IFRAME elements, which allows remote attackers to obtain sensitive information via a crafted HTML document.
network
apple CWE-200
4.3
2010-06-18 CVE-2010-1387 Resource Management Errors vulnerability in Apple Itunes
Use-after-free vulnerability in JavaScriptCore in WebKit in Apple iTunes before 9.2 on Windows, and Apple iOS before 4 on the iPhone and iPod touch, allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via vectors related to page transitions, a different vulnerability than CVE-2010-1763 and CVE-2010-1769.
network
apple CWE-399
critical
9.3
2010-03-15 CVE-2010-0050 Use After Free vulnerability in multiple products
Use-after-free vulnerability in WebKit in Apple Safari before 4.0.5 allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via an HTML document with improperly nested tags.
network
low complexity
apple fedoraproject canonical opensuse CWE-416
8.8
2009-11-13 CVE-2009-2816 Cross-Site Request Forgery (CSRF) vulnerability in multiple products
The implementation of Cross-Origin Resource Sharing (CORS) in WebKit, as used in Apple Safari before 4.0.4 and Google Chrome before 3.0.195.33, includes certain custom HTTP headers in the OPTIONS request during cross-origin operations with preflight, which makes it easier for remote attackers to conduct cross-site request forgery (CSRF) attacks via a crafted web page.
6.8
2009-08-11 CVE-2009-2416 Use After Free vulnerability in multiple products
Multiple use-after-free vulnerabilities in libxml2 2.5.10, 2.6.16, 2.6.26, 2.6.27, and 2.6.32, and libxml 1.8.17, allow context-dependent attackers to cause a denial of service (application crash) via crafted (1) Notation or (2) Enumeration attribute types in an XML file, as demonstrated by the Codenomicon XML fuzzing framework.
6.5