- EPSS 4.6%
- Veröffentlicht 11.10.2012 10:51:57
- Zuletzt bearbeitet 11.04.2025 00:51:21
Use-after-free vulnerability in the SVG implementation in WebKit, as used in Google Chrome before 22.0.1229.94, allows remote attackers to execute arbitrary code via unspecified vectors.
CVE-2012-2889
- EPSS 0.39%
- Veröffentlicht 26.09.2012 10:56:04
- Zuletzt bearbeitet 11.04.2025 00:51:21
Cross-site scripting (XSS) vulnerability in Google Chrome before 22.0.1229.79 allows remote attackers to inject arbitrary web script or HTML via vectors involving frames, aka "Universal XSS (UXSS)."
CVE-2012-3737
- EPSS 0.07%
- Veröffentlicht 20.09.2012 21:55:04
- Zuletzt bearbeitet 11.04.2025 00:51:21
The Passcode Lock implementation in Apple iOS before 6 does not properly restrict photo viewing, which allows physically proximate attackers to view arbitrary stored photos by spoofing a time value.
CVE-2012-3738
- EPSS 0.07%
- Veröffentlicht 20.09.2012 21:55:04
- Zuletzt bearbeitet 11.04.2025 00:51:21
The Emergency Dialer screen in the Passcode Lock implementation in Apple iOS before 6 does not properly limit the dialing methods, which allows physically proximate attackers to bypass intended access restrictions and make FaceTime calls through Voic...
CVE-2012-3739
- EPSS 0.05%
- Veröffentlicht 20.09.2012 21:55:04
- Zuletzt bearbeitet 11.04.2025 00:51:21
The Passcode Lock implementation in Apple iOS before 6 allows physically proximate attackers to bypass an intended passcode requirement via vectors involving use of the camera.
CVE-2012-3740
- EPSS 0.05%
- Veröffentlicht 20.09.2012 21:55:04
- Zuletzt bearbeitet 11.04.2025 00:51:21
The Passcode Lock implementation in Apple iOS before 6 does not properly manage the lock state, which allows physically proximate attackers to bypass an intended passcode requirement via unspecified vectors.
CVE-2012-3741
- EPSS 0.05%
- Veröffentlicht 20.09.2012 21:55:04
- Zuletzt bearbeitet 11.04.2025 00:51:21
The Restrictions (aka Parental Controls) implementation in Apple iOS before 6 does not properly handle purchase attempts after a Disable Restrictions action, which allows local users to bypass an intended Apple ID authentication step via an app that ...
- EPSS 0.38%
- Veröffentlicht 20.09.2012 21:55:04
- Zuletzt bearbeitet 11.04.2025 00:51:21
Safari in Apple iOS before 6 does not properly restrict use of an unspecified Unicode character that looks similar to the https lock indicator, which allows remote attackers to spoof https connections by placing this character in the TITLE element of...
- EPSS 0.42%
- Veröffentlicht 20.09.2012 21:55:04
- Zuletzt bearbeitet 11.04.2025 00:51:21
The System Logs implementation in Apple iOS before 6 does not restrict /var/log access by sandboxed apps, which allows remote attackers to obtain sensitive information via a crafted app that reads log files.
- EPSS 0.41%
- Veröffentlicht 20.09.2012 21:55:04
- Zuletzt bearbeitet 11.04.2025 00:51:21
Telephony in Apple iOS before 6 uses an SMS message's return address as the displayed sender address, which allows remote attackers to spoof text communication via a message in which the return address does not match the originating address.