Apple iPod Touch/iPhone Prior to Version 2.1 Multiple Remote Vulnerabilities
Apple iPod touch and iPhone are prone to multiple remote vulnerabilities:
1. A vulnerability that may allow users to spoof websites.
2. An information-disclosure vulnerability.
3. A remote code-execution vulnerability.
Successfully exploiting these issues may allow attackers to execute arbitrary code, crash the affected application, obtain sensitive information, or direct unsuspecting victims to a spoofed site; other attacks are also possible.
These issues affect versions prior to iPod touch 2.1 and iPhone 2.1.