The host is installed with Apple iTunes before 11.0.3 or Apple Safari before 6.0.5 and is prone to a man in the middle attack vulnerability. A flaw is present in the applications, which fail to properly handle multiple memory corruption issues. Successful exploitation could allow attackers to unexpected application termination or execute arbitrary code
The host is installed with Apple iTunes before 11.0.3 or Apple Safari before 6.0.5 and is prone to a man in the middle attack vulnerability. A flaw is present in the applications, which fail to properly handle multiple memory corruption issues. Successful exploitation could allow attackers to unexpected application termination or execute arbitrary code
The host is installed with Apple iTunes before 11.0.3 or Apple Safari before 6.0.5 and is prone to a man in the middle attack vulnerability. A flaw is present in the applications, which fail to properly handle multiple memory corruption issues. Successful exploitation could allow attackers to unexpected application termination or execute arbitrary code
The host is installed with Apple iTunes before 11.0.3 or Apple Safari before 6.0.5 and is prone to a man in the middle attack vulnerability. A flaw is present in the applications, which fail to properly handle multiple memory corruption issues. Successful exploitation could allow attackers to unexpected application termination or execute arbitrary code
The host is installed with Apple iTunes before 11.0.3 or Apple Safari before 6.0.5 and is prone to a man in the middle attack vulnerability. A flaw is present in the applications, which fail to properly handle multiple memory corruption issues. Successful exploitation could allow attackers to unexpected application termination or execute arbitrary code
The host is installed with Apple iTunes before 11.0.3 or Apple Safari before 6.0.5 and is prone to a man in the middle attack vulnerability. A flaw is present in the applications, which fail to properly handle multiple memory corruption issues. Successful exploitation could allow attackers to unexpected application termination or execute arbitrary code
The host is installed with Apple iTunes through 12.0 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle issues in memory handling. Successful exploitation allows attackers to cause arbitrary code execution or denial of service via a crafted web site.
The host is installed with Apple iTunes through 12.0 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle issues in memory handling. Successful exploitation allows attackers to cause arbitrary code execution or denial of service via a crafted web site.
The host is installed with Apple iTunes through 12.0 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle issues in memory handling. Successful exploitation allows attackers to cause arbitrary code execution or denial of service via a crafted web site.
The host is installed with Apple iTunes through 12.0 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle issues in memory handling. Successful exploitation allows attackers to cause arbitrary code execution or denial of service via a crafted web site.