4 results (0.002 seconds)

CVSS: 4.3EPSS: 0%CPEs: 46EXPL: 0

Google Chrome before 21.0.1180.82 on iOS makes certain incorrect calls to WebView methods that trigger use of an applewebdata: URL, which allows remote attackers to bypass the Same Origin Policy and conduct Universal XSS (UXSS) attacks via vectors involving the document.write method. Google Chrome anteriores a 21.0.1180.82 en iOS hacen determinadas llamadas incorrectas a métodos WebView que invocan el uso de una URL applewebdata:, lo cual permite a atacantes remotos sortear el la Same Origin Policy y efectuar ataques Universal XSS (UXSS) a través de vectores que incluyen el método document.write. • http://googlechromereleases.blogspot.com/2012/09/chrome-for-ios-update_24.html https://code.google.com/p/chromium/issues/detail?id=147625 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 5.0EPSS: 0%CPEs: 46EXPL: 0

Google Chrome before 21.0.1180.82 on iOS on iPad devices allows remote attackers to spoof the Omnibox URL via vectors involving SSL error messages, a related issue to CVE-2012-0674. Google Chrome anteriores a 21.0.1180.82 en iOS para iPad permite a atacantes remotos falsear la URL Omnibox a través de vectores que involucran mensajes de error SSL, un problema relacionado con CVE-2012-0674. • http://googlechromereleases.blogspot.com/2012/09/chrome-for-ios-update_24.html https://code.google.com/p/chromium/issues/detail?id=146760 • CWE-310: Cryptographic Issues •

CVSS: 6.2EPSS: 0%CPEs: 13EXPL: 1

The get_xattrinfo function in the XNU kernel in Apple iOS 5.x and 6.x through 6.1.3 on iPad devices does not properly validate the header of an AppleDouble file, which might allow local users to cause a denial of service (memory corruption) or have unspecified other impact via an invalid file on an msdosfs filesystem. La función get_xattrinfo en el XNU kernel en Apple iOS v5.x y v6.x hasta 6.1.3 en dispositivos iPad no valida correctamente el encabezado de un fichero AppleDouble, lo que podría permitir a usuarios locales provocar una denegación de servicio (corrupción de memoria) o tienen un impacto no especificado a través de un archivo no válido en un sistema de ficheros msdosfs. • http://antid0te.com/syscan_2013/SyScan2013_Mountain_Lion_iOS_Vulnerabilities_Garage_Sale_Whitepaper.pdf http://lists.apple.com/archives/security-announce/2013/Sep/msg00006.html http://support.apple.com/kb/HT5934 http://www.securitytracker.com/id/1029054 http://www.syscan.org/index.php/sg/program/day/2 • CWE-20: Improper Input Validation •

CVSS: 1.2EPSS: 0%CPEs: 43EXPL: 0

The Passcode Lock feature in Apple iOS before 5.0.1 on the iPad 2 does not properly implement the locked state, which allows physically proximate attackers to access data by opening a Smart Cover during power-off confirmation. La función Passcode Lock en Apple iOS anterior a v5.0.1 en el iPad 2 no aplica correctamente el estado de bloqueo, lo que permite a atacantes físicamente próximos a acceder a los datos mediante la apertura de un Smart Cover durante el apagado de confirmación. • http://lists.apple.com/archives/Security-announce/2011/Nov/msg00001.html http://support.apple.com/kb/HT5052 • CWE-264: Permissions, Privileges, and Access Controls •