Vulnerabilities > Apple
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2016-09-25 | CVE-2016-4769 | Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in Apple Itunes and Safari WebKit in Apple iTunes before 12.5.1 on Windows and Safari before 10 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site. | 6.8 |
2016-09-25 | CVE-2016-4768 | Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in Apple products WebKit in Apple iOS before 10, tvOS before 10, iTunes before 12.5.1 on Windows, and Safari before 10 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, a different vulnerability than CVE-2016-4759, CVE-2016-4765, CVE-2016-4766, and CVE-2016-4767. | 6.8 |
2016-09-25 | CVE-2016-4767 | Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in Apple products WebKit in Apple iOS before 10, tvOS before 10, iTunes before 12.5.1 on Windows, and Safari before 10 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, a different vulnerability than CVE-2016-4759, CVE-2016-4765, CVE-2016-4766, and CVE-2016-4768. | 6.8 |
2016-09-25 | CVE-2016-4766 | Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in Apple products WebKit in Apple iOS before 10, tvOS before 10, iTunes before 12.5.1 on Windows, and Safari before 10 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, a different vulnerability than CVE-2016-4759, CVE-2016-4765, CVE-2016-4767, and CVE-2016-4768. | 6.8 |
2016-09-25 | CVE-2016-4765 | Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in Apple products WebKit in Apple iOS before 10, tvOS before 10, iTunes before 12.5.1 on Windows, and Safari before 10 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, a different vulnerability than CVE-2016-4759, CVE-2016-4766, CVE-2016-4767, and CVE-2016-4768. | 6.8 |
2016-09-25 | CVE-2016-4763 | Cryptographic Issues vulnerability in Apple Iphone OS, Itunes and Safari WKWebView in WebKit in Apple iOS before 10, iTunes before 12.5.1 on Windows, and Safari before 10 does not properly verify X.509 certificates from HTTPS servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate. | 4.9 |
2016-09-25 | CVE-2016-4762 | Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in Apple products WebKit in Apple iOS before 10, iTunes before 12.5.1 on Windows, iCloud before 6.0 on Windows, and Safari before 10 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site. | 6.8 |
2016-09-25 | CVE-2016-4760 | Improper Access Control vulnerability in Apple Iphone OS, Itunes and Safari WebKit in Apple iOS before 10, iTunes before 12.5.1 on Windows, and Safari before 10 allows remote attackers to conduct DNS rebinding attacks against non-HTTP Safari sessions by leveraging HTTP/0.9 support. | 4.3 |
2016-09-25 | CVE-2016-4759 | Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in Apple products WebKit in Apple iOS before 10, tvOS before 10, iTunes before 12.5.1 on Windows, and Safari before 10 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, a different vulnerability than CVE-2016-4765, CVE-2016-4766, CVE-2016-4767, and CVE-2016-4768. | 6.8 |
2016-09-25 | CVE-2016-4758 | Information Exposure vulnerability in Apple Iphone OS, Itunes and Safari WebKit in Apple iOS before 10, iTunes before 12.5.1 on Windows, and Safari before 10 does not properly restrict access to the location variable, which allows remote attackers to obtain sensitive information via a crafted web site. | 4.3 |