Secunia Security Advisory – Apple has acknowledge a security issue and multiple vulnerabilities in Apple TV, which can be exploited by malicious people to disclose sensitive information, cause a Dos (Denial of Service), and potentially compromise a vulnerable system.
Tags:
Apple,
exploit,
security-issue
Secunia Security Advisory – Apple has acknowledge a security issue and multiple vulnerabilities in Apple TV, which can be exploited by malicious people to disclose sensitive information, cause a Dos (Denial of Service), and potentially compromise a vulnerable system.
Tags:
Apple,
exploit,
Security,
security-issue
Zero Day Initiative Advisory 11-074 – This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Adobe Reader on Mac OS X. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The flaw exists within the U3D component distributed with the Reader.
Tags:
Application,
exploit,
Reader,
Vulnerability
Zero Day Initiative Advisory 11-038 – This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Apple Quicktime.
Tags:
exploit,
sprite,
Vulnerability
NetSupport Manager Agent suffers from a stack-based buffer overflow vulnerability.
Tags:
buffer-overflow,
exploit,
linux,
manager,
support-manager
Secunia Security Advisory – A vulnerability has been reported in Mac OS X, which can be exploited by malicious people to potentially compromise a vulnerable system.
Tags:
exploit,
potentially-compromise,
secunia-security,
Security
Secunia Security Advisory – Multiple vulnerabilities have been reported in Apple Airport Extreme and Time Capsule, which can be exploited by malicious users to bypass certain security restrictions and by malicious people to cause a DoS (Denial of Service).
Tags:
apple-airport,
exploit,
multiple,
Security
Zero Day Initiative Advisory 10-262 – This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Apple Quicktime. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within how the application parses directBitsRect records within a .pict file. When decompressing data within this structure, the application will allocate space for the target buffer using fields described within the file and then use a different length to decompress the total data from the file. This can lead to code execution under the context of the application.
Tags:
Application,
exploit,
file,
Vulnerability