Zero Day Initiative Advisory 11-242
Zero Day Initiative Advisory 11-242 - This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Apple Safari's Webkit.
Zero Day Initiative Advisory 11-240
Zero Day Initiative Advisory 11-240 - This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Apple Safari's Webkit. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the library's support of SVG markers
Zero Day Initiative Advisory 11-239
Zero Day Initiative Advisory 11-239 - This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Apple Safari Webkit.
Safari 5.0.5 SVG Remote Code Execution
WebKit as used in Apple Safari versions prior to 5.0.6 memory corruption exploit with DEP bypass.
Secunia Security Advisory 45369
Secunia Security Advisory - A vulnerability has been reported in Apple iOS, which can be exploited by malicious people to conduct spoofing attacks.
Secunia Security Advisory 45395
Secunia Security Advisory - Multiple vulnerabilities have been reported in Apple iWork, which can be exploited by malicious people to compromise a user's system.
Apple Security Advisory 2011-07-25-2
Apple Security Advisory 2011-07-25-2 - The iOS 4.2.10 software update addresses a certificate chain validation issue. The issue existed in the handling of X.509 certificates where an attacker with a privileged network position may capture or modify data in sessions protected by SSL/TLS. Other attacks involving X.509 certificate validation may also be possible
iDefense Security Advisory 07.20.11 – WebKit Heap Overflow
iDefense Security Advisory 07.20.11 - Remote exploitation of a heap based buffer overflow vulnerability in WebKit, as included with Apple Inc.'s Safari Web browser, could allow an attacker to execute arbitrary code with the privileges of the current user. Safari versions prior to 5.1 and 5.0.6 are vulnerable.
iDefense Security Advisory 07.20.11 – WebKit Use-After-Free
iDefense Security Advisory 07.20.11 - Remote exploitation of a use-after-free vulnerability in WebKit, as included with Apple Inc.'s Safari Web browser, could allow an attacker to execute arbitrary code with the privileges of the current user.
Safari 5.1 / 5.0.6 XSS / Code Execution / SSL Trust Issue
Apple Security Advisory 2011-07-20-1 - A large amount of security issues have been addressed in Safari versions 5.1 and 5.0.6. These range from cross site scripting, possible arbitrary code execution, accidental trust in a disable root certificate, buffer and integer overflows, and more.