The host is installed with Apple iTunes before 10.2 or Apple Safari 5.0.4 and is prone to denial of service vulnerability. A flaw is present in the application which fails to handle vectors related to iTunes Store browsing. Successful exploitation could allow man-in-the-middle attackers to execute arbitrary code or cause a denial of service (memory corruption or application crash).
The host is installed with Apple iTunes before 10.2 or Apple Safari before 5.0.4 and is prone to denial of service vulnerability. A flaw is present in the application which fails to handle vectors related to iTunes Store browsing. Successful exploitation could allow man-in-the-middle attackers to execute arbitrary code or cause a denial of service (memory corruption or application crash).
The host is installed with Apple iTunes before 10.2 or Apple Safari 5.0.4 and is prone to denial of service vulnerability. A flaw is present in the application which fails to handle DOM manipulations associated with event listeners during processing of range objects. Successful exploitation could allow man-in-the-middle attackers to execute arbitrary code or cause a denial of service (memory corru ...
The host is installed with Apple iTunes before 10.2 or Apple Safari 5.0.4 and is prone to denial of service vulnerability. A flaw is present in the application which fails to handle vectors related to iTunes Store browsing. Successful exploitation could allow man-in-the-middle attackers to execute arbitrary code or cause a denial of service (memory corruption or application crash).
The host is installed with Apple iTunes before 10.2 or Apple Safari 5.0.4 and is prone to denial of service vulnerability. A flaw is present in the application which fails to handle vectors related to iTunes Store browsing. Successful exploitation could allow man-in-the-middle attackers to execute arbitrary code or cause a denial of service (memory corruption or application crash).
The host is installed with Apple iTunes before 10.2 or Apple Safari before 5.0.4 and is prone to use-after-free vulnerability. A flaw is present in the application which fails to handle vectors related to DOM manipulations during iTunes Store browsing. Successful exploitation could allow man-in-the-middle attackers to execute arbitrary code or cause a denial of service (memory corruption or applic ...
The host is installed with Apple iTunes before 10.2 or Apple Safari before 5.0.4 and is prone to denial of service vulnerability. A flaw is present in the application which fails to handle vectors related to iTunes Store browsing. Successful exploitation could allow man-in-the-middle attackers to execute arbitrary code or cause a denial of service (memory corruption or application crash).
The host is installed with Apple iTunes before 10.2 or Apple Safari before 5.0.4 and is prone to denial of service vulnerability. A flaw is present in the application which fails to handle vectors related to iTunes Store browsing. Successful exploitation could allow man-in-the-middle attackers to execute arbitrary code or cause a denial of service (memory corruption or application crash).
The host is installed with Apple iTunes before 10.2 or Apple Safari 5.0.4 and is prone to denial of service vulnerability. A flaw is present in the application which fails to handle vectors related to iTunes Store browsing. Successful exploitation could allow man-in-the-middle attackers to execute arbitrary code or cause a denial of service (memory corruption or application crash).
The host is installed with Apple iTunes before 10.2 or Apple Safari 5.0.4 and is prone to denial of service vulnerability. A flaw is present in the application which fails to handle vectors related to iTunes Store browsing. Successful exploitation could allow man-in-the-middle attackers to execute arbitrary code or cause a denial of service (memory corruption or application crash).