[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248364

 
 

909

 
 

195388

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 15162 Download | Alert*

The host is installed with Apple Safari version less than or equal to 5.0.5 or Apple iTunes version less than 10.5 and is prone to denial of service vulnerability. A flaw is present in the application which fails to handle crafted web site. Successful exploitation allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash).

The host is installed with Apple Safari version less than or equal to 5.0.5 and is prone to information disclosure vulnerability. A flaw is present in the application which fails to execute AutoFill information to scripts after HTML form submission. Successful exploitation allows remote attackers to obtain Address Book information.

The host is installed with Apple Safari version less than or equal to 5.0.5 or Apple iTunes less than 10.5 and is prone to denial of service vulnerability. A flaw is present in ImageIO in the application which fails to handle a crafted TIFF image. Successful exploitation allows remote attackers to execute arbitrary code or cause a denial of service.

The host is installed with Apple Safari version less than or equal to 5.0.5 and is prone to security bypass vulnerability. A flaw is present in CFNetwork in the application which fails to handle an untrusted attribute of a system root certificate. Successful exploitation allows remote web servers to bypass intended SSL restrictions via a certificate signed by a blacklisted certification authority.

The host is installed with Apple Safari version less than or equal to 5.0.5 and is prone to security bypass vulnerability. A flaw is present in CFNetwork in the application which fails to handle a crafted text/plain file. Successful exploitation allows remote attackers to inject arbitrary web script or HTML.

The host is installed with Apple Safari version less than or equal to 5.0.5 and is prone to arbitrary code execution vulnerability. A flaw is present in CFNetwork in the application which fails to handle credential reflection issue. Successful exploitation allows remote web servers to execute arbitrary code by replaying the NTLM credentials of a client user.

Buffer overflow in Apple QuickTime 7.5.5 and iTunes 8.0 allows remote attackers to cause a denial of service (browser crash) or possibly execute arbitrary code via a long type attribute in a quicktime tag (1) on a web page or embedded in a (2) .mp4 or (3) .mov file, possibly related to the Check_stack_cookie function and an off-by-one error that leads to a heap-based buffer overflow.

The host is installed with Adobe Reader or Adobe Acrobat and is prone to untrusted search path vulnerability. A flaw is present in the applications which fails to properly handle specially crafted DLL file. Successful exploitation allows remote attacker to gain privileges.

The host is installed with Adobe Reader and Adobe Acrobat and is prone to unspecified vulnerability. A flaw is present in the applications which does not properly validate the user input. Successful exploitation allows remote attacker to bypass intended access restrictions.

The host is installed with Adobe Reader or Adobe Acrobat and is prone to memory corruption vulnerability. A flaw is present in the applications which fails to properly handle the memory. Successful exploitation allows remote attacker to execute arbitrary code.


Pages:      Start    1356    1357    1358    1359    1360    1361    1362    1363    1364    1365    1366    1367    1368    1369    ..   1516

© SecPod Technologies