The host is installed with Apple iTunes before 10.2 and is prone to denial of service vulnerability. A flaw is present in the application which fails to handle vectors related to iTunes Store browsing. Successful exploitation could allow man-in-the-middle attackers to execute arbitrary code or cause a denial of service (memory corruption or application crash).
The host is installed with Apple iTunes before 10.2 or Apple Safari before 5.0.4 and is prone to denial of service vulnerability. A flaw is present in the application which fails to handle vectors related to iTunes Store browsing. Successful exploitation could allow man-in-the-middle attackers to execute arbitrary code or cause a denial of service (memory corruption or application crash).
The host is installed with Apple iTunes before 10.2 or Apple Safari before 5.0.4 and is prone to denial of service vulnerability. A flaw is present in the application which fails to handle vectors related to iTunes Store browsing. Successful exploitation could allow man-in-the-middle attackers to execute arbitrary code or cause a denial of service (memory corruption or application crash).
The host is installed with Apple iTunes before 10.2 or Apple Safari before 5.0.4 and is prone to denial of service vulnerability. A flaw is present in the application which fails to handle vectors related to iTunes Store browsing. Successful exploitation could allow man-in-the-middle attackers to execute arbitrary code or cause a denial of service (memory corruption or application crash).
The host is installed with Apple iTunes before 10.2 or Apple Safari before 5.0.4 and is prone to denial of service vulnerability. A flaw is present in the application which fails to handle vectors related to iTunes Store browsing. Successful exploitation could allow man-in-the-middle attackers to execute arbitrary code or cause a denial of service (memory corruption or application crash).
The host is installed with Apple iTunes before 10.2 or Apple Safari 5.0.4 or Apple Mac OS X 10.6.0 through 10.6.6 and is prone to memory leak vulnerability. A flaw is present in the application which fails to handle a crafted International Color Consortium (ICC) profile in a JPEG image. Successful exploitation could allow remote attackers to execute arbitrary code or cause a denial of service (app ...
The host is installed with Apple Safari version less than or equal to 5.0.5 or Apple iTunes before 10.5 and is prone to denial of service vulnerability. A flaw is present in the application which fails to handle crafted web site. Successful exploitation allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash).
The host is installed with Apple Safari version less than or equal to 5.0.5 or Apple iTunes before 10.5 and is prone to denial of service vulnerability. A flaw is present in the application which fails to handle crafted web site. Successful exploitation allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash).
The host is installed with Apple Safari version less than or equal to 5.0.5 or Apple iTunes before 10.5 and is prone to denial of service vulnerability. A flaw is present in the application which fails to handle crafted web site. Successful exploitation allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash).
The host is installed with Apple Safari version less than or equal to 5.0.5 or Apple iTunes before 10.5 and is prone to denial of service vulnerability. A flaw is present in the application which fails to handle crafted web site. Successful exploitation allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash).