Vulnerabilities > Apple

DATE CVE VULNERABILITY TITLE RISK
2012-03-22 CVE-2011-3056 Origin Validation Error vulnerability in Google Chrome
Google Chrome before 17.0.963.83 allows remote attackers to bypass the Same Origin Policy via vectors involving a "magic iframe."
6.8
2012-03-22 CVE-2011-3053 USE After Free vulnerability in Google Chrome
Use-after-free vulnerability in Google Chrome before 17.0.963.83 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to block splitting.
6.8
2012-03-22 CVE-2011-3050 USE After Free vulnerability in Google Chrome
Use-after-free vulnerability in the Cascading Style Sheets (CSS) implementation in Google Chrome before 17.0.963.83 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to the :first-letter pseudo-element.
6.8
2012-03-12 CVE-2012-0647 Information Exposure vulnerability in Apple Safari
WebKit in Apple Safari before 5.1.4 does not properly handle redirects in conjunction with HTTP authentication, which might allow remote web servers to capture credentials by logging the Authorization HTTP header.
network
low complexity
apple CWE-200
5.0
2012-03-12 CVE-2012-0640 Information Exposure vulnerability in Apple Safari
WebKit in Apple Safari before 5.1.4 does not properly implement "From third parties and advertisers" cookie blocking, which makes it easier for remote web servers to track users via a cookie.
network
low complexity
apple CWE-200
5.0
2012-03-12 CVE-2012-0584 Improper Input Validation vulnerability in Apple Safari
The Internationalized Domain Name (IDN) feature in Apple Safari before 5.1.4 on Windows does not properly restrict the characters in URLs, which allows remote attackers to spoof a domain name via unspecified homoglyphs.
network
low complexity
apple microsoft CWE-20
6.4
2012-03-09 CVE-2011-3046 Cross-Site Scripting vulnerability in Google Chrome
The extension subsystem in Google Chrome before 17.0.963.78 does not properly handle history navigation, which allows remote attackers to execute arbitrary code by leveraging a "Universal XSS (UXSS)" issue.
network
low complexity
google opensuse apple CWE-79
critical
10.0
2012-03-08 CVE-2012-0648 Improper Restriction of Operations Within the Bounds of A Memory Buffer vulnerability in Apple Itunes and Webkit
WebKit, as used in Apple iTunes before 10.6, allows man-in-the-middle attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via vectors related to iTunes Store browsing, a different vulnerability than other CVEs listed in APPLE-SA-2012-03-07-1.
network
high complexity
apple CWE-119
7.6
2012-03-08 CVE-2012-0646 USE of Externally-Controlled Format String vulnerability in Apple Iphone OS
Format string vulnerability in VPN in Apple iOS before 5.1 allows remote attackers to execute arbitrary code via a crafted racoon configuration file.
network
apple CWE-134
critical
9.3
2012-03-08 CVE-2012-0645 Permissions, Privileges, and Access Controls vulnerability in Apple Iphone OS
Siri in Apple iOS before 5.1 does not properly restrict the ability of Mail.app to handle voice commands, which allows physically proximate attackers to bypass the locked state via a command that forwards an active e-mail message to an arbitrary recipient.
local
high complexity
apple CWE-264
1.2