Secunia Security Advisory 47292
Secunia Security Advisory - Multiple vulnerabilities have been reported in Apple Safari, which can be exploited by malicious people to conduct cross-site scripting attacks, bypass certain security restrictions, and compromise a user's system.
Apple Security Advisory 2012-05-07-1
Apple Security Advisory 2012-05-07-1 - A URL spoofing issue existed in Safari. This could be used in a malicious web site to direct the user to a spoofed site that visually appeared to be a legitimate domain. Multiple cross site scripting issues existed in WebKit along with a memory corruption issue.
[webapps / 0day] – Opial CMS v2.0 Multiple Vulnerabilities
View article: [webapps / 0day] –...
[webapps / 0day] – DIY CMS v1.0 Poll Multiple Vulnerabilities
Link: [webapps / 0day] – DIY...
[webapps / 0day] – Car Portal CMS v3.0 – Multiple Vulnerabilities
Continue Reading: [webapps / 0day] –...
Zero Day Initiative Advisory 12-004
Zero Day Initiative Advisory 12-04 - This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Apple QuickTime.
Zero Day Initiative Advisory 11-316
Zero Day Initiative Advisory 11-316 - This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Apple Quicktime. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file
Zero Day Initiative Advisory 11-314
Zero Day Initiative Advisory 11-314 - This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Apple's QuickTime Player.
Zero Day Initiative Advisory 11-311
Zero Day Initiative Advisory 11-311 - This vulnerability allows remote attackers to potentially disclose memory addresses on vulnerable installations of Apple QuickTime Player.
Zero Day Initiative Advisory 11-304
Zero Day Initiative Advisory 11-304 - This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Apple QuickTime Player. Authentication is not required to exploit this vulnerability