Total vulnerabilities in the database
The Data Security component in Apple iOS before 5 and Apple TV before 4.4 does not properly restrict use of the MD5 hash algorithm within X.509 certificates, which makes it easier for man-in-the-middle attackers to spoof servers or obtain sensitive information via a crafted certificate.
Software | From | Fixed in |
---|---|---|
apple / apple_tv | 4.2 | 4.2.x |
apple / apple_tv | 4.1 | 4.1.x |
apple / apple_tv | 4.0 | 4.0.x |
apple / apple_tv | 4.3 | 4.3.x |
apple / iphone_os | 4.0 | 4.0.x |
apple / iphone_os | 4.3.2 | 4.3.2.x |
apple / iphone_os | 4.0.2 | 4.0.2.x |
apple / iphone_os | 4.0.1 | 4.0.1.x |
apple / iphone_os | 3.2 | 3.2.x |
apple / iphone_os | 4.2.8 | 4.2.8.x |
apple / iphone_os | 4.1 | 4.1.x |
apple / iphone_os | 3.1.2 | 3.1.2.x |
apple / iphone_os | 4.3.5 | 4.3.5.x |
apple / iphone_os | 3.1.3 | 3.1.3.x |
apple / iphone_os | 4.3.1 | 4.3.1.x |
apple / iphone_os | 4.2.5 | 4.2.5.x |
apple / iphone_os | 3.2.1 | 3.2.1.x |
apple / iphone_os | 3.1 | 3.1.x |
apple / iphone_os | 4.2.1 | 4.2.1.x |
apple / iphone_os | 3.0 | 3.0.x |
apple / iphone_os | 4.3.3 | 4.3.3.x |
apple / iphone_os | 4.3.0 | 4.3.0.x |
apple / iphone_os | 3.2.2 | 3.2.2.x |