Vulnerabilites related to apple - ipad2
Vulnerability from fkie_nvd
Published
2014-01-05 20:55
Modified
2025-04-11 00:51
Severity ?
Summary
Google Chrome before 21.0.1180.82 on iOS makes certain incorrect calls to WebView methods that trigger use of an applewebdata: URL, which allows remote attackers to bypass the Same Origin Policy and conduct Universal XSS (UXSS) attacks via vectors involving the document.write method.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
chrome | * | ||
chrome | 21.0.1180.0 | ||
chrome | 21.0.1180.1 | ||
chrome | 21.0.1180.2 | ||
chrome | 21.0.1180.31 | ||
chrome | 21.0.1180.32 | ||
chrome | 21.0.1180.33 | ||
chrome | 21.0.1180.34 | ||
chrome | 21.0.1180.35 | ||
chrome | 21.0.1180.36 | ||
chrome | 21.0.1180.37 | ||
chrome | 21.0.1180.38 | ||
chrome | 21.0.1180.39 | ||
chrome | 21.0.1180.41 | ||
chrome | 21.0.1180.46 | ||
chrome | 21.0.1180.47 | ||
chrome | 21.0.1180.48 | ||
chrome | 21.0.1180.49 | ||
chrome | 21.0.1180.50 | ||
chrome | 21.0.1180.51 | ||
chrome | 21.0.1180.52 | ||
chrome | 21.0.1180.53 | ||
chrome | 21.0.1180.54 | ||
chrome | 21.0.1180.55 | ||
chrome | 21.0.1180.56 | ||
chrome | 21.0.1180.57 | ||
chrome | 21.0.1180.59 | ||
chrome | 21.0.1180.60 | ||
chrome | 21.0.1180.61 | ||
chrome | 21.0.1180.62 | ||
chrome | 21.0.1180.63 | ||
chrome | 21.0.1180.64 | ||
chrome | 21.0.1180.68 | ||
chrome | 21.0.1180.69 | ||
chrome | 21.0.1180.70 | ||
chrome | 21.0.1180.71 | ||
chrome | 21.0.1180.72 | ||
chrome | 21.0.1180.73 | ||
chrome | 21.0.1180.74 | ||
chrome | 21.0.1180.75 | ||
chrome | 21.0.1180.76 | ||
chrome | 21.0.1180.77 | ||
chrome | 21.0.1180.78 | ||
chrome | 21.0.1180.79 | ||
chrome | 21.0.1180.80 | ||
apple | ipad2 | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*", "matchCriteriaId": "B9717017-30FA-4B12-BAE7-14A61831F2AB", "versionEndIncluding": "21.0.1180.81", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:21.0.1180.0:*:*:*:*:*:*:*", "matchCriteriaId": "767C0C1A-EAC4-4F98-9E80-CFDA5069F118", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:21.0.1180.1:*:*:*:*:*:*:*", "matchCriteriaId": "0E2554F0-0DEB-41A0-A595-6A524F9EC001", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:21.0.1180.2:*:*:*:*:*:*:*", "matchCriteriaId": "4F542051-CEED-45A4-BB83-937069D07CB2", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:21.0.1180.31:*:*:*:*:*:*:*", "matchCriteriaId": "AC926FFC-EF03-46F0-B5B5-02B34571D6C4", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:21.0.1180.32:*:*:*:*:*:*:*", "matchCriteriaId": "24849FF0-F873-4365-9B82-F16AD7F4A291", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:21.0.1180.33:*:*:*:*:*:*:*", "matchCriteriaId": "8E784307-0538-4524-94EA-A88B1ABD0E2E", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:21.0.1180.34:*:*:*:*:*:*:*", "matchCriteriaId": "5655EFE7-69CB-469F-A00A-D6F3F7F492E4", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:21.0.1180.35:*:*:*:*:*:*:*", "matchCriteriaId": "D3B22D68-9E32-4566-8ED1-F1CE87903F98", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:21.0.1180.36:*:*:*:*:*:*:*", "matchCriteriaId": "40DB1183-DFF5-4251-BCDF-2F7696ABBFA0", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:21.0.1180.37:*:*:*:*:*:*:*", "matchCriteriaId": "8BD5341A-E508-4E5B-B03F-677D97E5A464", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:21.0.1180.38:*:*:*:*:*:*:*", "matchCriteriaId": "E096479F-4C69-445A-8C2B-7201896F401B", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:21.0.1180.39:*:*:*:*:*:*:*", "matchCriteriaId": "25756B8C-FBEB-4D7F-99E6-EA7D27B07B39", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:21.0.1180.41:*:*:*:*:*:*:*", "matchCriteriaId": "41371794-2083-4188-90BE-506419DC0B82", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:21.0.1180.46:*:*:*:*:*:*:*", "matchCriteriaId": "51FF3E52-3E8E-4D2F-ABA3-B7D83219D723", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:21.0.1180.47:*:*:*:*:*:*:*", "matchCriteriaId": "981570FA-6B44-49A8-9C9B-7D5127E90F6C", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:21.0.1180.48:*:*:*:*:*:*:*", "matchCriteriaId": "36D2B7FE-2B20-47CA-9B3C-B726E21659E8", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:21.0.1180.49:*:*:*:*:*:*:*", "matchCriteriaId": "858BDFA4-E9CB-4537-ABA7-4283318CA501", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:21.0.1180.50:*:*:*:*:*:*:*", "matchCriteriaId": "76D0CD04-8EF4-4B6A-BD4F-1DFCDDDD4DED", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:21.0.1180.51:*:*:*:*:*:*:*", "matchCriteriaId": "9E912B5D-81F3-4A93-A0E6-B1CFDE2B46EE", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:21.0.1180.52:*:*:*:*:*:*:*", "matchCriteriaId": "B578A2BC-9360-428C-9AFE-DC9DB9E0A621", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:21.0.1180.53:*:*:*:*:*:*:*", "matchCriteriaId": "9DCB6048-5A18-4FD6-A21B-95B595CF943C", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:21.0.1180.54:*:*:*:*:*:*:*", "matchCriteriaId": "28882288-859D-425C-8BA3-F46D058B61D6", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:21.0.1180.55:*:*:*:*:*:*:*", "matchCriteriaId": "444AD7BB-FE0B-4A51-BA89-EE2647F4E8AE", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:21.0.1180.56:*:*:*:*:*:*:*", "matchCriteriaId": "A0692DD3-562D-4BE7-BB61-1549EFFF9CD5", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:21.0.1180.57:*:*:*:*:*:*:*", "matchCriteriaId": "5FF70696-70A8-4DFA-A0C3-172A103F3F24", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:21.0.1180.59:*:*:*:*:*:*:*", "matchCriteriaId": "25241621-CBB0-4E39-B901-2F70EE476722", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:21.0.1180.60:*:*:*:*:*:*:*", "matchCriteriaId": "1355883C-C184-46C1-9CF7-AA59B0FC61B7", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:21.0.1180.61:*:*:*:*:*:*:*", "matchCriteriaId": "DB090D01-9F7E-49CF-8356-80CC03999121", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:21.0.1180.62:*:*:*:*:*:*:*", "matchCriteriaId": "A37AB354-581C-42CA-B8E9-9AEAC0B326AF", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:21.0.1180.63:*:*:*:*:*:*:*", "matchCriteriaId": "885EFC87-061C-4EEF-880A-68D7D53BACDA", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:21.0.1180.64:*:*:*:*:*:*:*", "matchCriteriaId": "D58B0932-1DF3-4308-8D82-B20564E974F8", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:21.0.1180.68:*:*:*:*:*:*:*", "matchCriteriaId": "A8FAD1E6-788F-4295-BFD2-F3CE99B14934", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:21.0.1180.69:*:*:*:*:*:*:*", "matchCriteriaId": "DF8AB897-7A45-4360-AFA7-EB7C8690ADD9", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:21.0.1180.70:*:*:*:*:*:*:*", "matchCriteriaId": "9EF0FA83-C464-4270-A4E8-1441DF4ECFAD", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:21.0.1180.71:*:*:*:*:*:*:*", "matchCriteriaId": "86B70015-F651-467C-A846-5C97772D91EA", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:21.0.1180.72:*:*:*:*:*:*:*", "matchCriteriaId": "C07A549D-48EF-434C-ABBA-0FF7078060D7", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:21.0.1180.73:*:*:*:*:*:*:*", "matchCriteriaId": "B573E86E-3512-4DB9-911E-1B27A3BB69DC", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:21.0.1180.74:*:*:*:*:*:*:*", "matchCriteriaId": "D2BDB997-D125-4B5D-9680-9AED7D89FD0A", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:21.0.1180.75:*:*:*:*:*:*:*", "matchCriteriaId": "0BAF7E49-6795-4848-AADD-40D8B2D5F5BA", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:21.0.1180.76:*:*:*:*:*:*:*", "matchCriteriaId": "B7B244B3-86E0-4E1D-96A5-E0B9B50F2ADB", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:21.0.1180.77:*:*:*:*:*:*:*", "matchCriteriaId": "A0FF1C67-9CB7-4C78-9F3C-C88AB5A6284D", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:21.0.1180.78:*:*:*:*:*:*:*", "matchCriteriaId": "3371BBF5-0B82-4005-96AE-9B604A2FA70B", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:21.0.1180.79:*:*:*:*:*:*:*", "matchCriteriaId": "5916EA0D-D763-4650-9AC4-A38C6E8EB052", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:21.0.1180.80:*:*:*:*:*:*:*", "matchCriteriaId": "443C5B0F-8FC6-40E3-AA95-BB8884176002", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:apple:ipad2:-:*:*:*:*:*:*:*", "matchCriteriaId": "E7BFD4E0-321E-4ECB-82A5-80E9CB6E4EED", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Google Chrome before 21.0.1180.82 on iOS makes certain incorrect calls to WebView methods that trigger use of an applewebdata: URL, which allows remote attackers to bypass the Same Origin Policy and conduct Universal XSS (UXSS) attacks via vectors involving the document.write method." }, { "lang": "es", "value": "Google Chrome anteriores a 21.0.1180.82 en iOS hacen determinadas llamadas incorrectas a m\u00e9todos WebView que invocan el uso de una URL applewebdata:, lo cual permite a atacantes remotos sortear el la Same Origin Policy y efectuar ataques Universal XSS (UXSS) a trav\u00e9s de vectores que incluyen el m\u00e9todo document.write." } ], "id": "CVE-2012-2899", "lastModified": "2025-04-11T00:51:21.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2014-01-05T20:55:03.990", "references": [ { "source": "chrome-cve-admin@google.com", "url": "http://googlechromereleases.blogspot.com/2012/09/chrome-for-ios-update_24.html" }, { "source": "chrome-cve-admin@google.com", "url": "https://code.google.com/p/chromium/issues/detail?id=147625" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://googlechromereleases.blogspot.com/2012/09/chrome-for-ios-update_24.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://code.google.com/p/chromium/issues/detail?id=147625" } ], "sourceIdentifier": "chrome-cve-admin@google.com", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-79" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2011-11-11 18:55
Modified
2025-04-11 00:51
Severity ?
Summary
The Passcode Lock feature in Apple iOS before 5.0.1 on the iPad 2 does not properly implement the locked state, which allows physically proximate attackers to access data by opening a Smart Cover during power-off confirmation.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
apple | iphone_os | * | |
apple | iphone_os | 1.0 | |
apple | iphone_os | 1.0.0 | |
apple | iphone_os | 1.0.1 | |
apple | iphone_os | 1.0.2 | |
apple | iphone_os | 1.1 | |
apple | iphone_os | 1.1.0 | |
apple | iphone_os | 1.1.1 | |
apple | iphone_os | 1.1.2 | |
apple | iphone_os | 1.1.3 | |
apple | iphone_os | 1.1.4 | |
apple | iphone_os | 1.1.5 | |
apple | iphone_os | 2.0 | |
apple | iphone_os | 2.0.1 | |
apple | iphone_os | 2.0.2 | |
apple | iphone_os | 2.1 | |
apple | iphone_os | 2.1.1 | |
apple | iphone_os | 2.2 | |
apple | iphone_os | 2.2.1 | |
apple | iphone_os | 3.0 | |
apple | iphone_os | 3.0.1 | |
apple | iphone_os | 3.1 | |
apple | iphone_os | 3.1.2 | |
apple | iphone_os | 3.1.3 | |
apple | iphone_os | 3.2 | |
apple | iphone_os | 3.2.1 | |
apple | iphone_os | 3.2.2 | |
apple | iphone_os | 4.0 | |
apple | iphone_os | 4.0.1 | |
apple | iphone_os | 4.0.2 | |
apple | iphone_os | 4.1 | |
apple | iphone_os | 4.2 | |
apple | iphone_os | 4.2.1 | |
apple | iphone_os | 4.2.5 | |
apple | iphone_os | 4.2.8 | |
apple | iphone_os | 4.2.9 | |
apple | iphone_os | 4.3.0 | |
apple | iphone_os | 4.3.1 | |
apple | iphone_os | 4.3.2 | |
apple | iphone_os | 4.3.3 | |
apple | iphone_os | 4.3.4 | |
apple | iphone_os | 4.3.5 | |
apple | ipad2 | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", "matchCriteriaId": "E2673371-53B8-4E06-9B22-C2408156127F", "versionEndIncluding": "5.0", "vulnerable": true }, { "criteria": "cpe:2.3:o:apple:iphone_os:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "41DB23F0-7226-4D0B-A3FA-A801F02EBA6B", "vulnerable": true }, { "criteria": "cpe:2.3:o:apple:iphone_os:1.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "A7B6D035-38A9-4C0B-9A9D-CAE3BF1CA56D", "vulnerable": true }, { "criteria": "cpe:2.3:o:apple:iphone_os:1.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "0C5B94E7-2C24-4913-B65E-8D8A0DE2B80B", "vulnerable": true }, { "criteria": "cpe:2.3:o:apple:iphone_os:1.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "E28FB0CB-D636-4F85-B5F7-70EC30053925", "vulnerable": true }, { "criteria": "cpe:2.3:o:apple:iphone_os:1.1:*:*:*:*:*:*:*", "matchCriteriaId": "B4AEDE82-E317-4066-A34F-BB3BCD3F53E2", "vulnerable": true }, { "criteria": "cpe:2.3:o:apple:iphone_os:1.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "9EC16D1C-065A-4D1A-BA6E-528A71DF65CC", "vulnerable": true }, { "criteria": "cpe:2.3:o:apple:iphone_os:1.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "27319629-171F-42AA-A95F-2D71F78097D0", "vulnerable": true }, { "criteria": "cpe:2.3:o:apple:iphone_os:1.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "4F7AEFAB-7BB0-40D8-8BA5-71B374EB69DB", "vulnerable": true }, { "criteria": "cpe:2.3:o:apple:iphone_os:1.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "297F9438-0F04-4128-94A8-A504B600929E", "vulnerable": true }, { "criteria": "cpe:2.3:o:apple:iphone_os:1.1.4:*:*:*:*:*:*:*", "matchCriteriaId": "F8618621-F871-4531-9F6C-7D60F2BF8B75", "vulnerable": true }, { "criteria": "cpe:2.3:o:apple:iphone_os:1.1.5:*:*:*:*:*:*:*", "matchCriteriaId": "824DED2D-FA1D-46FC-8252-6E25546DAE29", "vulnerable": true }, { "criteria": "cpe:2.3:o:apple:iphone_os:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "1641DDFA-3BF1-467F-8EC3-98114FF9F07B", "vulnerable": true }, { "criteria": "cpe:2.3:o:apple:iphone_os:2.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "D61644E2-7AF5-48EF-B3D5-59C7B2AD1A58", "vulnerable": true }, { "criteria": "cpe:2.3:o:apple:iphone_os:2.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "3D06D54D-97FD-49FD-B251-CC86FBA68CA6", "vulnerable": true }, { "criteria": "cpe:2.3:o:apple:iphone_os:2.1:*:*:*:*:*:*:*", "matchCriteriaId": "25A5D868-0016-44AB-80E6-E5DF91F15455", "vulnerable": true }, { "criteria": "cpe:2.3:o:apple:iphone_os:2.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "4C14EEA4-6E35-4EBE-9A43-8F6D69318BA0", "vulnerable": true }, { "criteria": "cpe:2.3:o:apple:iphone_os:2.2:*:*:*:*:*:*:*", "matchCriteriaId": "B15E90AE-2E15-4BC2-B0B8-AFA2B1297B03", "vulnerable": true }, { "criteria": "cpe:2.3:o:apple:iphone_os:2.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "4E0C0A8D-3DDD-437A-BB3D-50FAEAF6C440", "vulnerable": true }, { "criteria": "cpe:2.3:o:apple:iphone_os:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "863383DA-0BC6-4A96-835A-A96128EC0202", "vulnerable": true }, { "criteria": "cpe:2.3:o:apple:iphone_os:3.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "2CFF5BE7-2BF6-48CE-B74B-B1A05383C10F", "vulnerable": true }, { "criteria": "cpe:2.3:o:apple:iphone_os:3.1:*:*:*:*:*:*:*", "matchCriteriaId": "51D3BE2B-5A01-4AD4-A436-0056B50A535D", "vulnerable": true }, { "criteria": "cpe:2.3:o:apple:iphone_os:3.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "9A20F171-79FE-43B9-8309-B18341639FA1", "vulnerable": true }, { "criteria": "cpe:2.3:o:apple:iphone_os:3.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "126EF22D-29BC-4366-97BC-B261311E6251", "vulnerable": true }, { "criteria": "cpe:2.3:o:apple:iphone_os:3.2:*:*:*:*:*:*:*", "matchCriteriaId": "3B3DD7B3-DA4C-4B0A-A94E-6BF66B358B7D", "vulnerable": true }, { "criteria": "cpe:2.3:o:apple:iphone_os:3.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "3A939B80-0AD0-48AF-81A7-370716F56639", "vulnerable": true }, { "criteria": "cpe:2.3:o:apple:iphone_os:3.2.2:-:ipad:*:*:*:*:*", "matchCriteriaId": "242DE934-9F2C-4F57-84D3-CAFDB2B245D5", "vulnerable": true }, { "criteria": "cpe:2.3:o:apple:iphone_os:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "12E22AF0-2B66-425A-A1EE-4F0E3B0433E7", "vulnerable": true }, { "criteria": "cpe:2.3:o:apple:iphone_os:4.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "BB34ECBE-33E8-40E1-936B-7800D2525AE6", "vulnerable": true }, { "criteria": "cpe:2.3:o:apple:iphone_os:4.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "107C59BE-D8CF-4A17-8DFB-BED2AB12388D", "vulnerable": true }, { "criteria": "cpe:2.3:o:apple:iphone_os:4.1:*:*:*:*:*:*:*", "matchCriteriaId": "36C86BB9-0328-4E34-BC2B-47B3471EC262", "vulnerable": true }, { "criteria": "cpe:2.3:o:apple:iphone_os:4.2:*:*:*:*:*:*:*", "matchCriteriaId": "1878949F-8E15-4751-8D8A-BFB2B9B9254A", "vulnerable": true }, { "criteria": "cpe:2.3:o:apple:iphone_os:4.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "A54A8681-2D8A-4B0B-A947-82F3CE1FB03C", "vulnerable": true }, { "criteria": "cpe:2.3:o:apple:iphone_os:4.2.5:*:*:*:*:*:*:*", "matchCriteriaId": "E0070D83-2E27-4DA8-8D10-A6A697216F36", "vulnerable": true }, { "criteria": "cpe:2.3:o:apple:iphone_os:4.2.8:*:*:*:*:*:*:*", "matchCriteriaId": "8C9ACA63-4528-4090-B1EA-1FE57A6B0555", "vulnerable": true }, { "criteria": "cpe:2.3:o:apple:iphone_os:4.2.9:*:*:*:*:*:*:*", "matchCriteriaId": "D78F7B3E-397F-480D-8B07-A9B0C4A789E4", "vulnerable": true }, { "criteria": "cpe:2.3:o:apple:iphone_os:4.3.0:*:*:*:*:*:*:*", "matchCriteriaId": "7252935C-E421-4339-B61F-0299E28888DA", "vulnerable": true }, { "criteria": "cpe:2.3:o:apple:iphone_os:4.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "9DD342BF-096A-4082-B700-19629F2BDE87", "vulnerable": true }, { "criteria": "cpe:2.3:o:apple:iphone_os:4.3.2:*:*:*:*:*:*:*", "matchCriteriaId": "93141AB6-26F2-4C6D-95B3-D383EABB4034", "vulnerable": true }, { "criteria": "cpe:2.3:o:apple:iphone_os:4.3.3:*:*:*:*:*:*:*", "matchCriteriaId": "4D5C61FF-7CD3-410A-94F2-5DE701466B1F", "vulnerable": true }, { "criteria": "cpe:2.3:o:apple:iphone_os:4.3.4:*:*:*:*:*:*:*", "matchCriteriaId": "EF21ABCB-7CAC-467F-A6B6-06AC2E5CB5EE", "vulnerable": true }, { "criteria": "cpe:2.3:o:apple:iphone_os:4.3.5:*:*:*:*:*:*:*", "matchCriteriaId": "28A01C87-B02A-4239-8340-B396D0E6B21C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:apple:ipad2:*:*:*:*:*:*:*:*", "matchCriteriaId": "439509C5-AD7A-49F5-B380-7966D24695B8", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Passcode Lock feature in Apple iOS before 5.0.1 on the iPad 2 does not properly implement the locked state, which allows physically proximate attackers to access data by opening a Smart Cover during power-off confirmation." }, { "lang": "es", "value": "La funci\u00f3n Passcode Lock en Apple iOS anterior a v5.0.1 en el iPad 2 no aplica correctamente el estado de bloqueo, lo que permite a atacantes f\u00edsicamente pr\u00f3ximos a acceder a los datos mediante la apertura de un Smart Cover durante el apagado de confirmaci\u00f3n." } ], "id": "CVE-2011-3440", "lastModified": "2025-04-11T00:51:21.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "HIGH", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 1.2, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:L/AC:H/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 1.9, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2011-11-11T18:55:01.240", "references": [ { "source": "product-security@apple.com", "tags": [ "Vendor Advisory" ], "url": "http://lists.apple.com/archives/Security-announce/2011/Nov/msg00001.html" }, { "source": "product-security@apple.com", "tags": [ "Vendor Advisory" ], "url": "http://support.apple.com/kb/HT5052" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://lists.apple.com/archives/Security-announce/2011/Nov/msg00001.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://support.apple.com/kb/HT5052" } ], "sourceIdentifier": "product-security@apple.com", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-264" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2014-01-05 20:55
Modified
2025-04-11 00:51
Severity ?
Summary
Google Chrome before 21.0.1180.82 on iOS on iPad devices allows remote attackers to spoof the Omnibox URL via vectors involving SSL error messages, a related issue to CVE-2012-0674.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
chrome | * | ||
chrome | 21.0.1180.0 | ||
chrome | 21.0.1180.1 | ||
chrome | 21.0.1180.2 | ||
chrome | 21.0.1180.31 | ||
chrome | 21.0.1180.32 | ||
chrome | 21.0.1180.33 | ||
chrome | 21.0.1180.34 | ||
chrome | 21.0.1180.35 | ||
chrome | 21.0.1180.36 | ||
chrome | 21.0.1180.37 | ||
chrome | 21.0.1180.38 | ||
chrome | 21.0.1180.39 | ||
chrome | 21.0.1180.41 | ||
chrome | 21.0.1180.46 | ||
chrome | 21.0.1180.47 | ||
chrome | 21.0.1180.48 | ||
chrome | 21.0.1180.49 | ||
chrome | 21.0.1180.50 | ||
chrome | 21.0.1180.51 | ||
chrome | 21.0.1180.52 | ||
chrome | 21.0.1180.53 | ||
chrome | 21.0.1180.54 | ||
chrome | 21.0.1180.55 | ||
chrome | 21.0.1180.56 | ||
chrome | 21.0.1180.57 | ||
chrome | 21.0.1180.59 | ||
chrome | 21.0.1180.60 | ||
chrome | 21.0.1180.61 | ||
chrome | 21.0.1180.62 | ||
chrome | 21.0.1180.63 | ||
chrome | 21.0.1180.64 | ||
chrome | 21.0.1180.68 | ||
chrome | 21.0.1180.69 | ||
chrome | 21.0.1180.70 | ||
chrome | 21.0.1180.71 | ||
chrome | 21.0.1180.72 | ||
chrome | 21.0.1180.73 | ||
chrome | 21.0.1180.74 | ||
chrome | 21.0.1180.75 | ||
chrome | 21.0.1180.76 | ||
chrome | 21.0.1180.77 | ||
chrome | 21.0.1180.78 | ||
chrome | 21.0.1180.79 | ||
chrome | 21.0.1180.80 | ||
apple | ipad2 | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*", "matchCriteriaId": "B9717017-30FA-4B12-BAE7-14A61831F2AB", "versionEndIncluding": "21.0.1180.81", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:21.0.1180.0:*:*:*:*:*:*:*", "matchCriteriaId": "767C0C1A-EAC4-4F98-9E80-CFDA5069F118", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:21.0.1180.1:*:*:*:*:*:*:*", "matchCriteriaId": "0E2554F0-0DEB-41A0-A595-6A524F9EC001", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:21.0.1180.2:*:*:*:*:*:*:*", "matchCriteriaId": "4F542051-CEED-45A4-BB83-937069D07CB2", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:21.0.1180.31:*:*:*:*:*:*:*", "matchCriteriaId": "AC926FFC-EF03-46F0-B5B5-02B34571D6C4", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:21.0.1180.32:*:*:*:*:*:*:*", "matchCriteriaId": "24849FF0-F873-4365-9B82-F16AD7F4A291", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:21.0.1180.33:*:*:*:*:*:*:*", "matchCriteriaId": "8E784307-0538-4524-94EA-A88B1ABD0E2E", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:21.0.1180.34:*:*:*:*:*:*:*", "matchCriteriaId": "5655EFE7-69CB-469F-A00A-D6F3F7F492E4", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:21.0.1180.35:*:*:*:*:*:*:*", "matchCriteriaId": "D3B22D68-9E32-4566-8ED1-F1CE87903F98", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:21.0.1180.36:*:*:*:*:*:*:*", "matchCriteriaId": "40DB1183-DFF5-4251-BCDF-2F7696ABBFA0", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:21.0.1180.37:*:*:*:*:*:*:*", "matchCriteriaId": "8BD5341A-E508-4E5B-B03F-677D97E5A464", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:21.0.1180.38:*:*:*:*:*:*:*", "matchCriteriaId": "E096479F-4C69-445A-8C2B-7201896F401B", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:21.0.1180.39:*:*:*:*:*:*:*", "matchCriteriaId": "25756B8C-FBEB-4D7F-99E6-EA7D27B07B39", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:21.0.1180.41:*:*:*:*:*:*:*", "matchCriteriaId": "41371794-2083-4188-90BE-506419DC0B82", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:21.0.1180.46:*:*:*:*:*:*:*", "matchCriteriaId": "51FF3E52-3E8E-4D2F-ABA3-B7D83219D723", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:21.0.1180.47:*:*:*:*:*:*:*", "matchCriteriaId": "981570FA-6B44-49A8-9C9B-7D5127E90F6C", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:21.0.1180.48:*:*:*:*:*:*:*", "matchCriteriaId": "36D2B7FE-2B20-47CA-9B3C-B726E21659E8", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:21.0.1180.49:*:*:*:*:*:*:*", "matchCriteriaId": "858BDFA4-E9CB-4537-ABA7-4283318CA501", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:21.0.1180.50:*:*:*:*:*:*:*", "matchCriteriaId": "76D0CD04-8EF4-4B6A-BD4F-1DFCDDDD4DED", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:21.0.1180.51:*:*:*:*:*:*:*", "matchCriteriaId": "9E912B5D-81F3-4A93-A0E6-B1CFDE2B46EE", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:21.0.1180.52:*:*:*:*:*:*:*", "matchCriteriaId": "B578A2BC-9360-428C-9AFE-DC9DB9E0A621", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:21.0.1180.53:*:*:*:*:*:*:*", "matchCriteriaId": "9DCB6048-5A18-4FD6-A21B-95B595CF943C", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:21.0.1180.54:*:*:*:*:*:*:*", "matchCriteriaId": "28882288-859D-425C-8BA3-F46D058B61D6", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:21.0.1180.55:*:*:*:*:*:*:*", "matchCriteriaId": "444AD7BB-FE0B-4A51-BA89-EE2647F4E8AE", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:21.0.1180.56:*:*:*:*:*:*:*", "matchCriteriaId": "A0692DD3-562D-4BE7-BB61-1549EFFF9CD5", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:21.0.1180.57:*:*:*:*:*:*:*", "matchCriteriaId": "5FF70696-70A8-4DFA-A0C3-172A103F3F24", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:21.0.1180.59:*:*:*:*:*:*:*", "matchCriteriaId": "25241621-CBB0-4E39-B901-2F70EE476722", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:21.0.1180.60:*:*:*:*:*:*:*", "matchCriteriaId": "1355883C-C184-46C1-9CF7-AA59B0FC61B7", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:21.0.1180.61:*:*:*:*:*:*:*", "matchCriteriaId": "DB090D01-9F7E-49CF-8356-80CC03999121", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:21.0.1180.62:*:*:*:*:*:*:*", "matchCriteriaId": "A37AB354-581C-42CA-B8E9-9AEAC0B326AF", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:21.0.1180.63:*:*:*:*:*:*:*", "matchCriteriaId": "885EFC87-061C-4EEF-880A-68D7D53BACDA", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:21.0.1180.64:*:*:*:*:*:*:*", "matchCriteriaId": "D58B0932-1DF3-4308-8D82-B20564E974F8", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:21.0.1180.68:*:*:*:*:*:*:*", "matchCriteriaId": "A8FAD1E6-788F-4295-BFD2-F3CE99B14934", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:21.0.1180.69:*:*:*:*:*:*:*", "matchCriteriaId": "DF8AB897-7A45-4360-AFA7-EB7C8690ADD9", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:21.0.1180.70:*:*:*:*:*:*:*", "matchCriteriaId": "9EF0FA83-C464-4270-A4E8-1441DF4ECFAD", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:21.0.1180.71:*:*:*:*:*:*:*", "matchCriteriaId": "86B70015-F651-467C-A846-5C97772D91EA", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:21.0.1180.72:*:*:*:*:*:*:*", "matchCriteriaId": "C07A549D-48EF-434C-ABBA-0FF7078060D7", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:21.0.1180.73:*:*:*:*:*:*:*", "matchCriteriaId": "B573E86E-3512-4DB9-911E-1B27A3BB69DC", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:21.0.1180.74:*:*:*:*:*:*:*", "matchCriteriaId": "D2BDB997-D125-4B5D-9680-9AED7D89FD0A", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:21.0.1180.75:*:*:*:*:*:*:*", "matchCriteriaId": "0BAF7E49-6795-4848-AADD-40D8B2D5F5BA", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:21.0.1180.76:*:*:*:*:*:*:*", "matchCriteriaId": "B7B244B3-86E0-4E1D-96A5-E0B9B50F2ADB", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:21.0.1180.77:*:*:*:*:*:*:*", "matchCriteriaId": "A0FF1C67-9CB7-4C78-9F3C-C88AB5A6284D", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:21.0.1180.78:*:*:*:*:*:*:*", "matchCriteriaId": "3371BBF5-0B82-4005-96AE-9B604A2FA70B", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:21.0.1180.79:*:*:*:*:*:*:*", "matchCriteriaId": "5916EA0D-D763-4650-9AC4-A38C6E8EB052", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:chrome:21.0.1180.80:*:*:*:*:*:*:*", "matchCriteriaId": "443C5B0F-8FC6-40E3-AA95-BB8884176002", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:apple:ipad2:-:*:*:*:*:*:*:*", "matchCriteriaId": "E7BFD4E0-321E-4ECB-82A5-80E9CB6E4EED", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Google Chrome before 21.0.1180.82 on iOS on iPad devices allows remote attackers to spoof the Omnibox URL via vectors involving SSL error messages, a related issue to CVE-2012-0674." }, { "lang": "es", "value": "Google Chrome anteriores a 21.0.1180.82 en iOS para iPad permite a atacantes remotos falsear la URL Omnibox a trav\u00e9s de vectores que involucran mensajes de error SSL, un problema relacionado con CVE-2012-0674." } ], "id": "CVE-2012-2898", "lastModified": "2025-04-11T00:51:21.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2014-01-05T20:55:03.897", "references": [ { "source": "chrome-cve-admin@google.com", "url": "http://googlechromereleases.blogspot.com/2012/09/chrome-for-ios-update_24.html" }, { "source": "chrome-cve-admin@google.com", "url": "https://code.google.com/p/chromium/issues/detail?id=146760" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://googlechromereleases.blogspot.com/2012/09/chrome-for-ios-update_24.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://code.google.com/p/chromium/issues/detail?id=146760" } ], "sourceIdentifier": "chrome-cve-admin@google.com", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-310" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2013-06-05 14:39
Modified
2025-04-11 00:51
Severity ?
Summary
The get_xattrinfo function in the XNU kernel in Apple iOS 5.x and 6.x through 6.1.3 on iPad devices does not properly validate the header of an AppleDouble file, which might allow local users to cause a denial of service (memory corruption) or have unspecified other impact via an invalid file on an msdosfs filesystem.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:apple:iphone_os:5.0:*:*:*:*:*:*:*", "matchCriteriaId": "06980521-B0EA-434D-89AD-A951EAF1D23F", "vulnerable": true }, { "criteria": "cpe:2.3:o:apple:iphone_os:5.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "A3AE6A93-3977-4B32-B2F6-55C94387DDE3", "vulnerable": true }, { "criteria": "cpe:2.3:o:apple:iphone_os:5.1:*:*:*:*:*:*:*", "matchCriteriaId": "E78F1F2C-2BFF-4D55-A754-102D6C42081B", "vulnerable": true }, { "criteria": "cpe:2.3:o:apple:iphone_os:5.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "A0A4AF71-8E71-432A-B908-361DAF99F4B9", "vulnerable": true }, { "criteria": "cpe:2.3:o:apple:iphone_os:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "DEE0068D-C699-4646-9658-610409925A79", "vulnerable": true }, { "criteria": "cpe:2.3:o:apple:iphone_os:6.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "87C215DD-BC98-4283-BF13-69556EF7CB78", "vulnerable": true }, { "criteria": "cpe:2.3:o:apple:iphone_os:6.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "C1C3966E-C136-47A9-B5B4-70613756ED27", "vulnerable": true }, { "criteria": "cpe:2.3:o:apple:iphone_os:6.1:*:*:*:*:*:*:*", "matchCriteriaId": "22AD2A1F-A637-47DE-A69F-DAE4ABDFA4BD", "vulnerable": true }, { "criteria": "cpe:2.3:o:apple:iphone_os:6.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "F6D398B8-821B-4DE9-ADF1-4983051F964C", "vulnerable": true }, { "criteria": "cpe:2.3:o:apple:iphone_os:6.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "E0CCE5F2-4D32-404B-BAAC-E64F11BD41FB", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:apple:ipad:*:*:*:*:*:*:*:*", "matchCriteriaId": "BAADE29A-712B-4AD5-A78B-6AD537BA9196", "vulnerable": true }, { "criteria": "cpe:2.3:h:apple:ipad_mini:-:*:*:*:*:*:*:*", "matchCriteriaId": "9BB7BAFA-DEB1-48EA-B11C-1FF0E9019A51", "vulnerable": true }, { "criteria": "cpe:2.3:h:apple:ipad2:-:*:*:*:*:*:*:*", "matchCriteriaId": "E7BFD4E0-321E-4ECB-82A5-80E9CB6E4EED", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The get_xattrinfo function in the XNU kernel in Apple iOS 5.x and 6.x through 6.1.3 on iPad devices does not properly validate the header of an AppleDouble file, which might allow local users to cause a denial of service (memory corruption) or have unspecified other impact via an invalid file on an msdosfs filesystem." }, { "lang": "es", "value": "La funci\u00f3n get_xattrinfo en el XNU kernel en Apple iOS v5.x y v6.x hasta 6.1.3 en dispositivos iPad no valida correctamente el encabezado de un fichero AppleDouble, lo que podr\u00eda permitir a usuarios locales provocar una denegaci\u00f3n de servicio (corrupci\u00f3n de memoria) o tienen un impacto no especificado a trav\u00e9s de un archivo no v\u00e1lido en un sistema de ficheros msdosfs." } ], "id": "CVE-2013-3955", "lastModified": "2025-04-11T00:51:21.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "HIGH", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 6.2, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:L/AC:H/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 1.9, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2013-06-05T14:39:57.877", "references": [ { "source": "cve@mitre.org", "tags": [ "Exploit" ], "url": "http://antid0te.com/syscan_2013/SyScan2013_Mountain_Lion_iOS_Vulnerabilities_Garage_Sale_Whitepaper.pdf" }, { "source": "cve@mitre.org", "url": "http://lists.apple.com/archives/security-announce/2013/Sep/msg00006.html" }, { "source": "cve@mitre.org", "url": "http://support.apple.com/kb/HT5934" }, { "source": "cve@mitre.org", "url": "http://www.securitytracker.com/id/1029054" }, { "source": "cve@mitre.org", "url": "http://www.syscan.org/index.php/sg/program/day/2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ], "url": "http://antid0te.com/syscan_2013/SyScan2013_Mountain_Lion_iOS_Vulnerabilities_Garage_Sale_Whitepaper.pdf" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.apple.com/archives/security-announce/2013/Sep/msg00006.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://support.apple.com/kb/HT5934" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id/1029054" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.syscan.org/index.php/sg/program/day/2" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-20" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
CVE-2013-3955 (GCVE-0-2013-3955)
Vulnerability from cvelistv5
Published
2013-06-05 10:00
Modified
2024-08-06 16:30
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
The get_xattrinfo function in the XNU kernel in Apple iOS 5.x and 6.x through 6.1.3 on iPad devices does not properly validate the header of an AppleDouble file, which might allow local users to cause a denial of service (memory corruption) or have unspecified other impact via an invalid file on an msdosfs filesystem.
References
► | URL | Tags | |||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T16:30:48.225Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.syscan.org/index.php/sg/program/day/2" }, { "name": "1029054", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1029054" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://antid0te.com/syscan_2013/SyScan2013_Mountain_Lion_iOS_Vulnerabilities_Garage_Sale_Whitepaper.pdf" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://support.apple.com/kb/HT5934" }, { "name": "APPLE-SA-2013-09-18-2", "tags": [ "vendor-advisory", "x_refsource_APPLE", "x_transferred" ], "url": "http://lists.apple.com/archives/security-announce/2013/Sep/msg00006.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2013-04-26T00:00:00", "descriptions": [ { "lang": "en", "value": "The get_xattrinfo function in the XNU kernel in Apple iOS 5.x and 6.x through 6.1.3 on iPad devices does not properly validate the header of an AppleDouble file, which might allow local users to cause a denial of service (memory corruption) or have unspecified other impact via an invalid file on an msdosfs filesystem." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2013-09-20T09:00:00", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "http://www.syscan.org/index.php/sg/program/day/2" }, { "name": "1029054", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1029054" }, { "tags": [ "x_refsource_MISC" ], "url": "http://antid0te.com/syscan_2013/SyScan2013_Mountain_Lion_iOS_Vulnerabilities_Garage_Sale_Whitepaper.pdf" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://support.apple.com/kb/HT5934" }, { "name": "APPLE-SA-2013-09-18-2", "tags": [ "vendor-advisory", "x_refsource_APPLE" ], "url": "http://lists.apple.com/archives/security-announce/2013/Sep/msg00006.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2013-3955", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The get_xattrinfo function in the XNU kernel in Apple iOS 5.x and 6.x through 6.1.3 on iPad devices does not properly validate the header of an AppleDouble file, which might allow local users to cause a denial of service (memory corruption) or have unspecified other impact via an invalid file on an msdosfs filesystem." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://www.syscan.org/index.php/sg/program/day/2", "refsource": "MISC", "url": "http://www.syscan.org/index.php/sg/program/day/2" }, { "name": "1029054", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1029054" }, { "name": "http://antid0te.com/syscan_2013/SyScan2013_Mountain_Lion_iOS_Vulnerabilities_Garage_Sale_Whitepaper.pdf", "refsource": "MISC", "url": "http://antid0te.com/syscan_2013/SyScan2013_Mountain_Lion_iOS_Vulnerabilities_Garage_Sale_Whitepaper.pdf" }, { "name": "http://support.apple.com/kb/HT5934", "refsource": "CONFIRM", "url": "http://support.apple.com/kb/HT5934" }, { "name": "APPLE-SA-2013-09-18-2", "refsource": "APPLE", "url": "http://lists.apple.com/archives/security-announce/2013/Sep/msg00006.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2013-3955", "datePublished": "2013-06-05T10:00:00", "dateReserved": "2013-06-05T00:00:00", "dateUpdated": "2024-08-06T16:30:48.225Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2011-3440 (GCVE-0-2011-3440)
Vulnerability from cvelistv5
Published
2011-11-11 18:00
Modified
2024-09-16 19:09
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
The Passcode Lock feature in Apple iOS before 5.0.1 on the iPad 2 does not properly implement the locked state, which allows physically proximate attackers to access data by opening a Smart Cover during power-off confirmation.
References
► | URL | Tags | ||||||
---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T23:37:47.711Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "APPLE-SA-2011-11-10-1", "tags": [ "vendor-advisory", "x_refsource_APPLE", "x_transferred" ], "url": "http://lists.apple.com/archives/Security-announce/2011/Nov/msg00001.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://support.apple.com/kb/HT5052" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "The Passcode Lock feature in Apple iOS before 5.0.1 on the iPad 2 does not properly implement the locked state, which allows physically proximate attackers to access data by opening a Smart Cover during power-off confirmation." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2011-11-11T18:00:00Z", "orgId": "286789f9-fbc2-4510-9f9a-43facdede74c", "shortName": "apple" }, "references": [ { "name": "APPLE-SA-2011-11-10-1", "tags": [ "vendor-advisory", "x_refsource_APPLE" ], "url": "http://lists.apple.com/archives/Security-announce/2011/Nov/msg00001.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://support.apple.com/kb/HT5052" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "product-security@apple.com", "ID": "CVE-2011-3440", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The Passcode Lock feature in Apple iOS before 5.0.1 on the iPad 2 does not properly implement the locked state, which allows physically proximate attackers to access data by opening a Smart Cover during power-off confirmation." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "APPLE-SA-2011-11-10-1", "refsource": "APPLE", "url": "http://lists.apple.com/archives/Security-announce/2011/Nov/msg00001.html" }, { "name": "http://support.apple.com/kb/HT5052", "refsource": "CONFIRM", "url": "http://support.apple.com/kb/HT5052" } ] } } } }, "cveMetadata": { "assignerOrgId": "286789f9-fbc2-4510-9f9a-43facdede74c", "assignerShortName": "apple", "cveId": "CVE-2011-3440", "datePublished": "2011-11-11T18:00:00Z", "dateReserved": "2011-09-13T00:00:00Z", "dateUpdated": "2024-09-16T19:09:29.634Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2012-2899 (GCVE-0-2012-2899)
Vulnerability from cvelistv5
Published
2014-01-05 20:00
Modified
2024-08-06 19:50
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Google Chrome before 21.0.1180.82 on iOS makes certain incorrect calls to WebView methods that trigger use of an applewebdata: URL, which allows remote attackers to bypass the Same Origin Policy and conduct Universal XSS (UXSS) attacks via vectors involving the document.write method.
References
► | URL | Tags | ||||||
---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T19:50:05.189Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://code.google.com/p/chromium/issues/detail?id=147625" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://googlechromereleases.blogspot.com/2012/09/chrome-for-ios-update_24.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2012-09-24T00:00:00", "descriptions": [ { "lang": "en", "value": "Google Chrome before 21.0.1180.82 on iOS makes certain incorrect calls to WebView methods that trigger use of an applewebdata: URL, which allows remote attackers to bypass the Same Origin Policy and conduct Universal XSS (UXSS) attacks via vectors involving the document.write method." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2014-01-05T20:57:01", "orgId": "ebfee0ef-53dd-4cf3-9e2a-08a5bd7a7e28", "shortName": "Chrome" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://code.google.com/p/chromium/issues/detail?id=147625" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://googlechromereleases.blogspot.com/2012/09/chrome-for-ios-update_24.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@google.com", "ID": "CVE-2012-2899", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Google Chrome before 21.0.1180.82 on iOS makes certain incorrect calls to WebView methods that trigger use of an applewebdata: URL, which allows remote attackers to bypass the Same Origin Policy and conduct Universal XSS (UXSS) attacks via vectors involving the document.write method." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://code.google.com/p/chromium/issues/detail?id=147625", "refsource": "CONFIRM", "url": "https://code.google.com/p/chromium/issues/detail?id=147625" }, { "name": "http://googlechromereleases.blogspot.com/2012/09/chrome-for-ios-update_24.html", "refsource": "CONFIRM", "url": "http://googlechromereleases.blogspot.com/2012/09/chrome-for-ios-update_24.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "ebfee0ef-53dd-4cf3-9e2a-08a5bd7a7e28", "assignerShortName": "Chrome", "cveId": "CVE-2012-2899", "datePublished": "2014-01-05T20:00:00", "dateReserved": "2012-05-19T00:00:00", "dateUpdated": "2024-08-06T19:50:05.189Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2012-2898 (GCVE-0-2012-2898)
Vulnerability from cvelistv5
Published
2014-01-05 20:00
Modified
2024-08-06 19:50
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Google Chrome before 21.0.1180.82 on iOS on iPad devices allows remote attackers to spoof the Omnibox URL via vectors involving SSL error messages, a related issue to CVE-2012-0674.
References
► | URL | Tags | ||||||
---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T19:50:04.663Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://googlechromereleases.blogspot.com/2012/09/chrome-for-ios-update_24.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://code.google.com/p/chromium/issues/detail?id=146760" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2012-09-24T00:00:00", "descriptions": [ { "lang": "en", "value": "Google Chrome before 21.0.1180.82 on iOS on iPad devices allows remote attackers to spoof the Omnibox URL via vectors involving SSL error messages, a related issue to CVE-2012-0674." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2014-01-05T20:57:01", "orgId": "ebfee0ef-53dd-4cf3-9e2a-08a5bd7a7e28", "shortName": "Chrome" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://googlechromereleases.blogspot.com/2012/09/chrome-for-ios-update_24.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://code.google.com/p/chromium/issues/detail?id=146760" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@google.com", "ID": "CVE-2012-2898", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Google Chrome before 21.0.1180.82 on iOS on iPad devices allows remote attackers to spoof the Omnibox URL via vectors involving SSL error messages, a related issue to CVE-2012-0674." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://googlechromereleases.blogspot.com/2012/09/chrome-for-ios-update_24.html", "refsource": "CONFIRM", "url": "http://googlechromereleases.blogspot.com/2012/09/chrome-for-ios-update_24.html" }, { "name": "https://code.google.com/p/chromium/issues/detail?id=146760", "refsource": "CONFIRM", "url": "https://code.google.com/p/chromium/issues/detail?id=146760" } ] } } } }, "cveMetadata": { "assignerOrgId": "ebfee0ef-53dd-4cf3-9e2a-08a5bd7a7e28", "assignerShortName": "Chrome", "cveId": "CVE-2012-2898", "datePublished": "2014-01-05T20:00:00", "dateReserved": "2012-05-19T00:00:00", "dateUpdated": "2024-08-06T19:50:04.663Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }