The host is installed with Apple iTunes before 12.2 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to handle a crafted website. Successful exploitation could allow attackers to execute arbitrary code or crash the service.
The host is installed with Apple iTunes before 12.2 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to handle a crafted website. Successful exploitation could allow attackers to execute arbitrary code or crash the service.
Buffer overflow in Apple QuickTime 7.5.5 and iTunes 8.0 allows remote attackers to cause a denial of service (browser crash) or possibly execute arbitrary code via a long type attribute in a quicktime tag (1) on a web page or embedded in a (2) .mp4 or (3) .mov file, possibly related to the Check_stack_cookie function and an off-by-one error that leads to a heap-based buffer overflow.
The host is installed with Adobe Reader or Adobe Acrobat and is prone to untrusted search path vulnerability. A flaw is present in the applications which fails to properly handle specially crafted DLL file. Successful exploitation allows remote attacker to gain privileges.
The host is installed with Adobe Reader and Adobe Acrobat and is prone to unspecified vulnerability. A flaw is present in the applications which does not properly validate the user input. Successful exploitation allows remote attacker to bypass intended access restrictions.
The host is installed with Adobe Reader or Adobe Acrobat and is prone to memory corruption vulnerability. A flaw is present in the applications which fails to properly handle the memory. Successful exploitation allows remote attacker to execute arbitrary code.
The host is installed with Oracle Java SE and is prone to unspecified vulnerability. A flaw is present in Java Runtime Environment (JRE) component in the application, which fails to properly handle vectors related to deployment. Successful exploitation allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality, integrity, and availability.
The host is installed with Oracle Java SE and is prone to unspecified vulnerability. A flaw is present in Java Runtime Environment (JRE) component in the application, which fails to properly handle vectors related to deployment. Successful exploitation allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality, integrity, and availability.
The host is installed with Oracle Java SE and is prone to unspecified vulnerability. A flaw is present in Java Runtime Environment (JRE) component in the application, which fails to properly handle vectors related to deployment. Successful exploitation allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality, integrity, and availability.
The host is installed with Oracle Java SE and is prone to unspecified vulnerability. A flaw is present in Java Runtime Environment (JRE) component in the application, which fails to properly handle vectors related to deployment. Successful exploitation allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality, integrity, and availability.