Subscribe via feed.

Apple Safari Text Nodes Remote Use-After-Free

Posted by deepcore under Apple, exploit, OSX security tools (No Respond)

The VUPEN Vulnerability Research Team discovered a critical vulnerability in Apple Safari. The vulnerability is caused by a use-after-free error in the WebKit library when processing certain text nodes, which could be exploited by remote attackers to execute arbitrary code by tricking a user into visiting a specially crafted web page.

Tags: , ,

Apple Safari WebKit Scroll Event Handling Remote Use-After-Free

Posted by deepcore under Apple, exploit, OSX security tools (No Respond)

The VUPEN Vulnerability Research Team discovered a critical vulnerability in Apple Safari. The vulnerability is caused by a use-after-free error in the WebKit library when handling certain scroll events, which could be exploited by remote attackers to compromise a vulnerable system by tricking a user into visiting a specially crafted web page. Versions 5.0.3 and below are affected.

Tags: , ,

Apple Safari WebKit Iframe Event Handling Remote Use-After-Free

Posted by deepcore under Apple, exploit, OSX security tools (No Respond)

The VUPEN Vulnerability Research Team discovered a critical vulnerability in Apple Safari. The vulnerability is caused by a use-after-free error in the WebKit library when handling certain iframe events, which could be exploited by remote attackers to compromise a vulnerable system by tricking a user into visiting a specially crafted web page.

Tags: , , ,

Apple Safari WebKit Iframe Event Handling Remote Use-After-Free

Posted by deepcore under Apple, exploit, OSX security tools (No Respond)

The VUPEN Vulnerability Research Team discovered a critical vulnerability in Apple Safari.

Tags: , , ,

Apple Safari Selections Handling Use-after-free Vulnerability

Posted by deepcore under Apple, exploit, OSX security tools (No Respond)

VUPEN Vulnerability Research Team discovered a critical vulnerability in Apple Safari. The vulnerability is caused by a use-after-free in WebKit when handling selections, which could be exploited by remote attackers to execute arbitrary code by tricking a user into visiting a specially crafted web page.

Tags: , , ,