4.3

CVE-2010-1407

WebKit in Apple iOS before 4 on the iPhone and iPod touch does not properly implement the history.replaceState method in certain situations involving IFRAME elements, which allows remote attackers to obtain sensitive information via a crafted HTML document.
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
AppleiPhone OS Version <= 3.2
   AppleIpod Touch
   AppleiPhone OS
AppleiPhone OS Version1.0.0
   AppleIpod Touch
   AppleiPhone OS
AppleiPhone OS Version1.0.1
   AppleIpod Touch
   AppleiPhone OS
AppleiPhone OS Version1.0.2
   AppleIpod Touch
   AppleiPhone OS
AppleiPhone OS Version1.1
   AppleIpod Touch
   AppleiPhone OS
AppleiPhone OS Version1.1.0
   AppleIpod Touch
   AppleiPhone OS
AppleiPhone OS Version1.1.1
   AppleIpod Touch
   AppleiPhone OS
AppleiPhone OS Version1.1.2
   AppleIpod Touch
   AppleiPhone OS
AppleiPhone OS Version1.1.3
   AppleIpod Touch
   AppleiPhone OS
AppleiPhone OS Version1.1.4
   AppleIpod Touch
   AppleiPhone OS
AppleiPhone OS Version1.1.5
   AppleIpod Touch
   AppleiPhone OS
AppleiPhone OS Version2.0.0
   AppleIpod Touch
   AppleiPhone OS
AppleiPhone OS Version2.0.1
   AppleIpod Touch
   AppleiPhone OS
AppleiPhone OS Version2.0.2
   AppleIpod Touch
   AppleiPhone OS
AppleiPhone OS Version2.1.1
   AppleIpod Touch
   AppleiPhone OS
AppleiPhone OS Version2.2.1
   AppleIpod Touch
   AppleiPhone OS
AppleiPhone OS Version3.0
   AppleIpod Touch
   AppleiPhone OS
AppleiPhone OS Version3.0.1
   AppleIpod Touch
   AppleiPhone OS
AppleiPhone OS Version3.1.2
   AppleIpod Touch
   AppleiPhone OS
AppleiPhone OS Version3.1.3
   AppleIpod Touch
   AppleiPhone OS
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 0.73% 0.717
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
nvd@nist.gov 4.3 8.6 2.9
AV:N/AC:M/Au:N/C:P/I:N/A:N
CWE-200 Exposure of Sensitive Information to an Unauthorized Actor

The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information.