Air Contacts Lite Denial Of Service
The Air Contacts Lite iPhone / iPod application suffers from a denial of service vulnerability.
Secunia Security Advisory 43574
Secunia Security Advisory - Apple has issued an update for Java for Mac OS X. This fixes some vulnerabilities, which can be exploited by malicious people to disclose potentially sensitive information, manipulate certain data, cause a DoS (Denial of Service), and compromise a vulnerable system.
Mac OS X FTPd Disclosure
Mac OS X suffers from a ftpd related information disclosure vulnerability.
Zero Day Initiative Advisory 11-074
Zero Day Initiative Advisory 11-074 - This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Adobe Reader on Mac OS X. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The flaw exists within the U3D component distributed with the Reader.
Zero Day Initiative Advisory 11-038
Zero Day Initiative Advisory 11-038 - This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Apple Quicktime.
Zero Day Initiative Advisory 11-038
Zero Day Initiative Advisory 11-038 - This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Apple Quicktime. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.
The Apple Sandbox
Whitepaper called The Apple Sandbox. It discuss the access control system in OS X and iOS operating systems.
SplashID 5.5 / SplashID Lite 4.6 For iPhone Password Caching Issue
SplashID version 5.5 for iPhone and SplashID Lite version 4.6 for iPhone suffer from a password caching issue that allows for the unlock of a database.
Kismet Wireless Network Sniffer 2011-01-R1
Kismet is an 802.11 layer 2 wireless network sniffer. It can sniff 802.11b, 802.11a, and 802.11g traffic.
Zorg 1.0 + PJSIP 1.8.5 + libtomcrypt Back-End
ZORG is an open source implementation of the ZRTP protocol implementation. ZRTP provides end-to-end key exchange with Elliptic Curve Diffie-Hellmann 384bit and AES-256 SRTP encryption.