Vulnerabilities > Apple > Iphone OS > 7.0.5

DATE CVE VULNERABILITY TITLE RISK
2014-11-18 CVE-2014-4463 Permissions, Privileges, and Access Controls vulnerability in Apple Iphone OS
Apple iOS before 8.1.1 allows physically proximate attackers to bypass the lock-screen protection mechanism, and view or transmit a Photo Library photo, via the FaceTime "Leave a Message" feature.
local
low complexity
apple CWE-264
2.1
2014-11-18 CVE-2014-4462 Resource Management Errors vulnerability in Apple Iphone OS and Tvos
WebKit, as used in Apple iOS before 8.1.1 and Apple TV before 7.0.2, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than CVE-2014-4452.
low complexity
apple CWE-399
5.8
2014-11-18 CVE-2014-4461 Improper Input Validation vulnerability in Apple Iphone OS, mac OS X and Tvos
The kernel in Apple iOS before 8.1.1 and Apple TV before 7.0.2 does not properly validate IOSharedDataQueue object metadata, which allows attackers to execute arbitrary code in a privileged context via a crafted application.
network
apple CWE-20
critical
9.3
2014-11-18 CVE-2014-4460 Information Exposure vulnerability in Apple Iphone OS and mac OS X
CFNetwork in Apple iOS before 8.1.1 and OS X before 10.10.1 does not properly clear the browsing cache upon a transition out of private-browsing mode, which makes it easier for physically proximate attackers to obtain sensitive information by reading cache files.
local
low complexity
apple CWE-200
2.1
2014-11-18 CVE-2014-4459 Memory Corruption vulnerability in WebKit
Use-after-free vulnerability in WebKit, as used in Apple OS X before 10.10.1, allows remote attackers to execute arbitrary code via crafted page objects in an HTML document.
network
apple
6.8
2014-11-18 CVE-2014-4457 Permissions, Privileges, and Access Controls vulnerability in Apple Iphone OS
The Sandbox Profiles subsystem in Apple iOS before 8.1.1 does not properly implement the debugserver sandbox, which allows attackers to bypass intended binary-execution restrictions via a crafted application that is run during a time period when debugging is not enabled.
network
low complexity
apple CWE-264
7.5
2014-11-18 CVE-2014-4455 Permissions, Privileges, and Access Controls vulnerability in Apple Iphone OS and Tvos
dyld in Apple iOS before 8.1.1 and Apple TV before 7.0.2 does not properly handle overlapping segments in Mach-O executable files, which allows local users to bypass intended code-signing restrictions via a crafted file.
local
low complexity
apple CWE-264
2.1
2014-11-18 CVE-2014-4453 Information Exposure vulnerability in Apple Iphone OS and mac OS X
Apple iOS before 8.1.1 and OS X before 10.10.1 include location data during establishment of a Spotlight Suggestions server connection by Spotlight or Safari, which might allow remote attackers to obtain sensitive information via unspecified vectors.
network
low complexity
apple CWE-200
5.0
2014-11-18 CVE-2014-4451 Permissions, Privileges, and Access Controls vulnerability in Apple Iphone OS
Apple iOS before 8.1.1 does not properly enforce the failed-passcode limit, which makes it easier for physically proximate attackers to bypass the lock-screen protection mechanism via a series of guesses.
local
low complexity
apple CWE-264
7.2
2014-10-22 CVE-2014-4450 Credentials Management vulnerability in Apple Iphone OS
The QuickType feature in the Keyboards subsystem in Apple iOS before 8.1 collects typing-prediction data from fields with an off autocomplete attribute, which makes it easier for attackers to discover credentials by reading credential values within unintended DOM input elements.
local
apple CWE-255
1.9