The host is installed with Apple Safari before 4.0 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to properly handle an applet or object element. Successful exploitation could allow attackers to disclose sensitive information.
The host is installed with Apple Safari before 3.2.3 and is prone to a cross-site scripting vulnerability. A flaw is present in the application, which fails to properly handle a a crafted feed: URL. Successful exploitation could allow attackers to inject arbitrary web script or HTML.
The host is installed with Apple Safari before 3.2.3 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle SVGList objects. Successful exploitation could allow attackers to execute arbitrary code.
The host is installed with Apple Safari before 4.0.3 and is prone to an integer overflow vulnerability. A flaw is present in the application, which fails to properly handle a long text run that triggers a heap-based buffer overflow during font glyph rendering. Successful exploitation could allow attackers to execute arbitrary code or crash the service.
The host is installed with Apple Safari before 4.0.3 and is prone to a buffer overflow vulnerability. A flaw is present in the application, which fails to properly handle an image with crafted EXIF metadata. Successful exploitation could allow attackers to execute arbitrary code or crash the service.
The host is installed with Apple Safari 4.x before 4.0.3 and is prone to a phishing attack vulnerability. A flaw is present in the application, which fails to properly handle unknown vectors. Successful exploitation could allow remote web servers to place an arbitrary web site in the Top Sites view.
The host is installed with Apple Safari before 4.0.3 and is prone to a buffer overflow vulnerability. A flaw is present in the application, which fails to handle crafted floating-point numbers. Successful exploitation could allow attackers execute arbitrary code or cause a denial of service.
The host is installed with Apple Safari before 4.0.3 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to properly restrict the URL scheme of the pluginspage attribute of an EMBED element. Successful exploitation could allow attackers to launch arbitrary file: URLs and obtain sensitive information via a crafted HTML document.
The host is installed with Oracle VirtualBox 4.2.x through 4.2.20 or 4.3.x before 4.3.8 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to handle a crafted chromium network pointer. Successful exploitation could allow attackers to corrupt memory.
The host is installed with Oracle VirtualBox 4.2.x through 4.2.20 or 4.3.x before 4.3.8 and is prone to a multiple array index error vulnerabilities. The flaws are present in the application, which fails to properly handle certain CR_MESSAGE_OPCODES. Successful exploitation could allow attackers to execute arbitrary code on the Chromium server.