Apple Security Advisory 2012-07-25-2
Apple Security Advisory 2012-07-25-2 – Xcode 4.4 is now available and addresses SSL and keychain access vulnerabilities.
Tags: Apple, Security, tools, twitter, VulnerabilityApple Security Advisory 2012-07-25-2 – Xcode 4.4 is now available and addresses SSL and keychain access vulnerabilities.
Tags: Apple, Security, tools, twitter, VulnerabilityZero Day Initiative Advisory 12-125 – This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Apple Quicktime. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.
Tags: Apple, exploit, facebook, ubuntustrongSwan is a complete IPsec implementation for the Linux, Android, Maemo, FreeBSD, and Mac OS X operating systems. It interoperates with with most other IPsec-based VPN products via the IKEv2 or IKEv1 key exchange protocols. The focus of the strongSwan project is on strong authentication mechanisms using X.509 public key certificates and optional secure storage of private keys on smartcards through a standardized PKCS#11 interface
Tags: Apple, twitter, ubuntuThis Metasploit module exploits a vulnerability found in Apple QuickTime.
Tags: Security, tools, VulnerabilityZero Day Initiative Advisory 12-108 – This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Apple Quicktime. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.
Tags: Apple, exploit, Security, VulnerabilityZero Day Initiative Advisory 12-109 – This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Apple Quicktime. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file
Tags: Apple, iphone, ubuntu, xssZero Day Initiative Advisory 12-107 – This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Apple Quicktime. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of XML elements within a TeXML file
Tags: exploit, iphone, VulnerabilityZero Day Initiative Advisory 12-107 – This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Apple Quicktime.
Tags: Apple, exploit, ubuntu, Vulnerability