Vulnerabilities > Apple > Medium

DATE CVE VULNERABILITY TITLE RISK
2010-11-26 CVE-2010-3832 Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in Apple Iphone OS
Heap-based buffer overflow in the GSM mobility management implementation in Telephony in Apple iOS before 4.2 on the iPhone and iPad allows remote attackers to execute arbitrary code on the baseband processor via a crafted Temporary Mobile Subscriber Identity (TMSI) field.
network
apple CWE-119
6.8
2010-11-26 CVE-2010-3831 Information Exposure vulnerability in Apple Iphone OS
Photos in Apple iOS before 4.2 enables support for HTTP Basic Authentication over an unencrypted connection, which allows man-in-the-middle attackers to read MobileMe account passwords by spoofing a MobileMe Gallery server during a "Send to MobileMe" action.
network
apple CWE-200
4.3
2010-11-26 CVE-2010-3829 Permissions, Privileges, and Access Controls vulnerability in Apple Iphone OS
WebKit in Apple iOS before 4.2 allows remote attackers to bypass the remote image loading setting in Mail via an HTML LINK element with a DNS prefetching property, as demonstrated by an HTML e-mail message that uses a LINK element for X-Confirm-Reading-To functionality, a related issue to CVE-2010-3813.
network
apple CWE-264
5.8
2010-11-26 CVE-2010-3828 Unspecified vulnerability in Apple Iphone OS
iAd Content Display in Apple iOS before 4.2 allows man-in-the-middle attackers to make calls via a crafted URL in an ad.
network
apple
4.3
2010-11-26 CVE-2010-3827 Improper Input Validation vulnerability in Apple Iphone OS
Apple iOS before 4.2 does not properly validate signatures before displaying a configuration profile in the configuration installation utility, which allows remote attackers to spoof profiles via unspecified vectors.
network
apple CWE-20
4.3
2010-11-22 CVE-2010-3813 Permissions, Privileges, and Access Controls vulnerability in Apple Safari and Webkit
The WebCore::HTMLLinkElement::process function in WebCore/html/HTMLLinkElement.cpp in WebKit, as used in Apple Safari before 5.0.3 on Mac OS X 10.5 through 10.6 and Windows, and before 4.1.3 on Mac OS X 10.4; webkitgtk before 1.2.6; and possibly other products does not verify whether DNS prefetching is enabled when processing an HTML LINK element, which allows remote attackers to bypass intended access restrictions, as demonstrated by an HTML e-mail message that uses a LINK element for X-Confirm-Reading-To functionality.
5.8
2010-11-22 CVE-2010-3810 Unspecified vulnerability in Apple Safari and Webkit
WebKit in Apple Safari before 5.0.3 on Mac OS X 10.5 through 10.6 and Windows, and before 4.1.3 on Mac OS X 10.4, does not properly handle the History object, which allows remote attackers to spoof the location bar's URL or add URLs to the history via a cross-origin attack.
network
apple microsoft
4.3
2010-11-22 CVE-2010-3804 Cryptographic Issues vulnerability in Apple Safari and Webkit
The JavaScript implementation in WebKit in Apple Safari before 5.0.3 on Mac OS X 10.5 through 10.6 and Windows, and before 4.1.3 on Mac OS X 10.4, uses a weak algorithm for generating values of random numbers, which makes it easier for remote attackers to track a user by predicting a value, a related issue to CVE-2008-5913 and CVE-2010-3171.
network
low complexity
apple microsoft CWE-310
5.0
2010-11-17 CVE-2010-4011 Information Exposure vulnerability in Apple mac OS X Server 10.6.5
Dovecot in Apple Mac OS X 10.6.5 10H574 does not properly manage memory for user names, which allows remote authenticated users to read the private e-mail of other persons in opportunistic circumstances via standard e-mail clients accessing a user's own mailbox, related to a "memory aliasing issue." Per: http://lists.apple.com/archives/security-announce/2010//Nov/msg00001.html 'Dovecot is only provided with Mac OS X Server systems.
network
low complexity
apple CWE-200
4.0
2010-11-17 CVE-2010-4008 Buffer Errors vulnerability in Google Chrome
libxml2 before 2.7.8, as used in Google Chrome before 7.0.517.44, Apple Safari 5.0.2 and earlier, and other products, reads from invalid memory locations during processing of malformed XPath expressions, which allows context-dependent attackers to cause a denial of service (application crash) via a crafted XML document.
4.3