Zero Day Initiative Advisory 11-252 – This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Apple Quicktime. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the way Quicktime handles the PnSize PICT opcode
Tags:
Apple,
exploit
Secunia Security Advisory – Multiple vulnerabilities have been reported in Apple QuickTime, which can be exploited by malicious people to compromise a user’s system.
Tags:
Apple,
exploit,
multiple,
secunia-security,
Security
Zero Day Initiative Advisory 11-243 – This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Webkit as utilized by either Apple Safari, or Google’s Chrome browser. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within how the library handles implicitly defined styles
Tags:
Apple,
Application,
exploit,
Vulnerability
Zero Day Initiative Advisory 11-242 – This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Apple Safari’s Webkit.
Tags:
Apple,
Application,
exploit,
reference,
Vulnerability
Zero Day Initiative Advisory 11-240 – This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Apple Safari’s Webkit. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the library’s support of SVG markers
Tags:
Apple,
Application,
exploit
Zero Day Initiative Advisory 11-239 – This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Apple Safari Webkit.
Tags:
Apple,
exploit,
tree
WebKit as used in Apple Safari versions prior to 5.0.6 memory corruption exploit with DEP bypass.
Tags:
Apple,
corruption-exploit,
exploit,
versions-prior,
webkit-as-used
Secunia Security Advisory – A vulnerability has been reported in Apple iOS, which can be exploited by malicious people to conduct spoofing attacks.
Tags:
Apple,
exploit,
Security
iDefense Security Advisory 07.20.11 – Remote exploitation of a memory corruption vulnerability in Apple Inc.’s Safari browser could allow an attacker to execute arbitrary code with the privileges of the current user. Safari is Apple’s Web browser and is based on the open source WebKit browser engine. This vulnerability occurs when Safari incorrectly handles an error state when encountering a broken XHTML tag.
Tags:
exploit,
privileges,
Security,
then-referenced
iDefense Security Advisory 07.20.11 – Remote exploitation of a use-after-free vulnerability in WebKit, as included with Apple Inc.’s Safari Web browser, could allow an attacker to execute arbitrary code with the privileges of the current user.
Tags:
Apple,
exploit,
privileges,
the-privileges