Secunia Security Advisory 46418
Secunia Security Advisory – A vulnerability has been reported in Apple Pages for iOS, which can be exploited by malicious people to compromise a user’s device.
Tags: Apple, apple-pages, exploit, SecuritySecunia Security Advisory – A vulnerability has been reported in Apple Pages for iOS, which can be exploited by malicious people to compromise a user’s device.
Tags: Apple, apple-pages, exploit, SecuritySecunia Security Advisory – Multiple vulnerabilities have been reported in Apple iOS, which can be exploited by malicious people with physical access to disclose certain information and by malicious people to conduct script insertion, cross-site scripting, and spoofing attacks, disclose sensitive information, bypass certain security restrictions, cause a DoS (Denial of Service), and compromise a user’s device.
Tags: conduct-script, exploit, SecurityProof of concept Mac OS X versions prior to 10.6.7 kernel panic exploit.
Tags: 10-6-7-kernel, exploit, versions-priorTrusteer Rapport key encryption switch off exploit that switches off anti-keylogger protections on OS X allowing your already existing keylogger to function correctly once again.
Tags: exploit, key-encryptionThis Metasploit module exploits a vulnerability in Apple QuickTime Player 7.60.92.0. When opening a .mov file containing a specially crafted PnSize value, an attacker may be able to execute arbitrary code.
Tags: apple-quick, exploit, module-exploitsZero Day Initiative Advisory 11-277 – This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Apple QuickTime. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the way QuickTime handles ‘mp4v’ codec information.
Tags: Apple, data, exploit, VulnerabilityZero Day Initiative Advisory 11-259 – This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Apple QuickTime. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the way QuickTime handles corrupt Sample Size atoms
Tags: atom, exploit, VulnerabilityZero Day Initiative Advisory 11-257 – This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Apple’s QuickTime Player. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within how the application parses a frame within an H.264 encoded movie
Tags: Apple, Application, exploit, the-applicationZero Day Initiative Advisory 11-256 – This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Apple QuickTime. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.
Tags: Apple, Browser, exploit, mediaZero Day Initiative Advisory 11-254 – This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Apple QuickTime. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.
Tags: allocation, Apple, exploit, Vulnerability