Vulnerabilities > Apple > Iphone OS > 8.3
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2015-09-18 | CVE-2015-5858 | Information Exposure vulnerability in Apple Iphone OS and Watchos The CFNetwork HTTPProtocol component in Apple iOS before 9 allows remote attackers to bypass the HSTS protection mechanism, and consequently obtain sensitive information, via a crafted URL. | 5.0 |
2015-09-18 | CVE-2015-5857 | 7PK - Security Features vulnerability in Apple Iphone OS Mail in Apple iOS before 9 allows remote attackers to use an address-book contact as a spoofed e-mail sender address via unspecified vectors. | 5.0 |
2015-09-18 | CVE-2015-5856 | 7PK - Security Features vulnerability in Apple Iphone OS The Application Store component in Apple iOS before 9 allows remote attackers to cause a denial of service to an enterprise-signed app via a crafted ITMS URL. | 4.3 |
2015-09-18 | CVE-2015-5855 | Information Exposure vulnerability in Apple Iphone OS and Watchos Apple iOS before 9 allows attackers to discover the e-mail address of a player via a crafted Game Center app. | 4.3 |
2015-09-18 | CVE-2015-5851 | Information Exposure vulnerability in Apple Iphone OS and mac OS X The convenience initializer in the Multipeer Connectivity component in Apple iOS before 9 does not require an encrypted session, which allows local users to obtain cleartext multipeer data via an encrypted-to-unencrypted downgrade attack. | 2.1 |
2015-09-18 | CVE-2015-5850 | 7PK - Security Features vulnerability in Apple Iphone OS AppleKeyStore in Apple iOS before 9 allows physically proximate attackers to reset the count of incorrect passcode attempts via a device backup. | 2.1 |
2015-09-18 | CVE-2015-5848 | Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in Apple Iphone OS and Watchos IOAcceleratorFamily in Apple iOS before 9 allows local users to gain privileges or cause a denial of service (memory corruption) via unspecified vectors. | 7.2 |
2015-09-18 | CVE-2015-5847 | Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in Apple Iphone OS, mac OS X and Watchos The Disk Images component in Apple iOS before 9 allows local users to gain privileges or cause a denial of service (memory corruption) via unspecified vectors. | 7.2 |
2015-09-18 | CVE-2015-5846 | Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in Apple Iphone OS and Watchos IOKit in the kernel in Apple iOS before 9 allows attackers to execute arbitrary code in a privileged context or cause a denial of service (memory corruption) via a crafted app, a different vulnerability than CVE-2015-5844 and CVE-2015-5845. | 9.3 |
2015-09-18 | CVE-2015-5845 | Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in Apple Iphone OS and Watchos IOKit in the kernel in Apple iOS before 9 allows attackers to execute arbitrary code in a privileged context or cause a denial of service (memory corruption) via a crafted app, a different vulnerability than CVE-2015-5844 and CVE-2015-5846. | 9.3 |