The host is installed with Apple iTunes before 10.7 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle a crafted website. Successful exploitation could allow attackers to execute arbitrary code or crash the service.
The host is installed with Apple iTunes before 10.7 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle a crafted website. Successful exploitation could allow attackers to execute arbitrary code or crash the service.
The host is installed with Apple iTunes before 10.7 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle a crafted website. Successful exploitation could allow attackers to execute arbitrary code or crash the service.
The host is installed with Apple iTunes before 10.7 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle a crafted website. Successful exploitation could allow attackers to execute arbitrary code or crash the service.
The host is installed with Apple iTunes before 10.7 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle a crafted website. Successful exploitation could allow attackers to execute arbitrary code or crash the service.
The host is installed with Apple iTunes before 10.7 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle a crafted website. Successful exploitation could allow attackers to execute arbitrary code or crash the service.
The host is installed with Apple iTunes before 10.7 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle a crafted website. Successful exploitation could allow attackers to execute arbitrary code or crash the service.
The host is installed with Apple iTunes before 10.7 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle a crafted website. Successful exploitation could allow attackers to execute arbitrary code or crash the service.
The host is installed with Google Chrome before 4.0.249.89 and is prone to information disclosure vulnerability. A flaw is present in the application which fails to properly handle site's URL in the HREF attribute of a stylesheet LINK element. Successful exploitation allow remote attackers to obtain a redirected target URL for another user's session.
The host is installed with Apple iTunes before 10.7 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle a crafted website. Successful exploitation could allow attackers to execute arbitrary code or crash the service.