The host is installed with Apple Safari before 6.1.1 or 7.0.0 and is prone to memory corruption vulnerability. A flaw is present in the application, which fails to handle crafted website. Successful exploitation allows attackers to lead to an unexpected application termination or arbitrary code execution.
The host is installed with Apple Safari before 6.1.1 or 7.0.0 and is prone to remote code execution vulnerability. A flaw is present in the application, which fails to handle crafted HTML. Successful exploitation allows attackers to cause the browser to autofill user credentials to a subframe from a different domain.
The host is installed with Apple Safari before 6.1.1 or 7.0.0 and is prone to memory corruption vulnerability. A flaw is present in the application, which fails to handle crafted website. Successful exploitation allows attackers to lead to an unexpected application termination or arbitrary code execution.
The host is installed with Apple Safari before 6.1.1 or 7.0.0 and is prone to memory corruption vulnerability. A flaw is present in the application, which fails to handle crafted website. Successful exploitation allows attackers to lead to an unexpected application termination or arbitrary code execution.
The host is installed with Apple Safari before 6.1.1 or 7.0.0 and is prone to memory corruption vulnerability. A flaw is present in the application, which fails to handle crafted website. Successful exploitation allows attackers to lead to an unexpected application termination or arbitrary code execution.
The host is installed with Apple Safari before 6.1.2 or 7.x before 7.0.2 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to handle a crafted web site. Successful exploitation could allow attackers to execute arbitrary code or crash the service.
The host is installed with Apple Safari before 6.1.2 or 7.x before 7.0.2 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to handle a crafted web site. Successful exploitation could allow attackers to execute arbitrary code or crash the service.
The host is installed with Apple Safari before 6.1.2 or 7.x before 7.0.2 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to handle a crafted web site. Successful exploitation could allow attackers to execute arbitrary code or crash the service.
The host is installed with Google Chrome before 33.0.1750.146 or Apple Safari 6.2 or 7.x before 7.1 and is prone to use-after-free vulnerability. A flaw is present in the applications, which fails to handle certain vectors related to svg images. Successful exploitation allows attackers to cause a denial of service or possibly have unspecified other impact.
The host is installed with Google Chrome before 33.0.1750.152 or Apple Safari before 6.1.3, 7.x before 7.0.3 and is prone to use-after-free vulnerability. A flaw is present in the application, which fails to handle vectors involving the document.location value. Successful exploitation could allow attackers to cause a denial of service or possibly have unspecified other impact.