The host is installed with Apple iTunes before 10.2 or Apple Safari before 5.0.4 and is prone to denial of service vulnerability. A flaw is present in WebKit, which fails to parse HTML elements associated with document namespaces. Successful exploitation could allow remote attackers to execute arbitrary code or cause a denial of service condition.
The host is installed with Apple iTunes before 10.2 or Apple Safari before 5.0.4 and is prone to denial of service vulnerability. A flaw is present in WebKit, which fails to prevent man-in-the-middle attack while browsing the iTunes Store via iTunes. Successful exploitation could allow remote attackers to execute arbitrary code or cause a denial of service condition.
The host is installed with Apple iTunes before 10.2 or Apple Safari before 5.0.4 and is prone to denial of service vulnerability. A flaw is present in WebKit, which fails to prevent man-in-the-middle attack while browsing the iTunes Store via iTunes. Successful exploitation could allow remote attackers to execute arbitrary code or cause a denial of service condition.
The host is installed with Apple iTunes before 10.2 or Apple Safari before 5.0.4 and is prone to denial of service vulnerability. A flaw is present in WebKit, which fails to prevent man-in-the-middle attack while browsing the iTunes Store via iTunes. Successful exploitation could allow remote attackers to execute arbitrary code or cause a denial of service condition.
The host is installed with Apple iTunes before 10.2 or Apple Safari before 5.0.4 and is prone to denial of service vulnerability. A flaw is present in WebKit, which fails to prevent man-in-the-middle attack while browsing the iTunes Store via iTunes. Successful exploitation could allow remote attackers to execute arbitrary code or cause a denial of service condition.
The host is installed with Apple iTunes before 10.2 or Apple Safari before 5.0.4 and is prone to denial of service vulnerability. A flaw is present in WebKit, which fails to implement the .sort function for JavaScript arrays. Successful exploitation could allow remote attackers to execute arbitrary code or cause a denial of service condition.
The host is installed with Apple iTunes before 10.2 or Apple Safari before 5.0.4 and is prone to denial of service vulnerability. A flaw is present in WebKit, which fails to prevent man-in-the-middle attack while browsing the iTunes Store via iTunes. Successful exploitation could allow remote attackers to execute arbitrary code or cause a denial of service condition.
The host is installed with Apple iTunes before 10.2 or Apple Safari before 5.0.4 and is prone to denial of service vulnerability. A flaw is present in WebKit, which fails to prevent man-in-the-middle attack while browsing the iTunes Store via iTunes. Successful exploitation could allow remote attackers to execute arbitrary code or cause a denial of service condition.
The host is installed with Adobe ColdFusion 2016 before update 17, 2018 before update 11 or 2021 before update 1 and is prone to an improper input validation vulnerability. A flaw is present in the application, which fails to handle the unspecified vectors. Successful exploitation could lead to arbitrary code execution.
The host is installed with HPE System Management Homepage before 7.6.1 and is prone to a buffer overflow vulnerability vulnerability. A flaw is present in the application, which fails to properly handle the restriction of operations within the bounds of a memory buffer. Successful exploitation could allow attackers to cause buffer overflow in memory.