U.S. flag   An official website of the United States government
Dot gov

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Https

Secure .gov websites use HTTPS
A lock (Dot gov) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.

Search Results (Refine Search)

Search Parameters:
  • Results Type: Overview
  • Keyword (text search): cpe:2.3:a:apple:itunes:10.6.3:*:*:*:*:*:*:*
  • CPE Name Search: true
There are 485 matching records.
Displaying matches 481 through 485.
Vuln ID Summary CVSS Severity
CVE-2011-3958

Google Chrome before 17.0.963.46 does not properly perform casts of variables during handling of a column span, which allows remote attackers to cause a denial of service or possibly have unspecified other impact via a crafted document.

Published: February 08, 2012; 11:10:28 PM -0500
V3.x:(not available)
V2.0: 6.8 MEDIUM
CVE-2011-3926

Heap-based buffer overflow in the tree builder in Google Chrome before 16.0.912.77 allows remote attackers to cause a denial of service or possibly have unspecified other impact via unknown vectors.

Published: January 23, 2012; 11:03:36 PM -0500
V3.x:(not available)
V2.0: 7.5 HIGH
CVE-2011-3924

Use-after-free vulnerability in Google Chrome before 16.0.912.77 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to DOM selections.

Published: January 23, 2012; 11:03:36 PM -0500
V3.x:(not available)
V2.0: 7.5 HIGH
CVE-2011-3913

Use-after-free vulnerability in Google Chrome before 16.0.912.63 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to Range handling.

Published: December 13, 2011; 4:55:01 PM -0500
V3.x:(not available)
V2.0: 7.5 HIGH
CVE-2008-3634

Apple iTunes before 8.0 on Mac OS X 10.4.11, when iTunes Music Sharing is enabled but blocked by the host-based firewall, presents misleading information about firewall security, which might allow remote attackers to leverage an exposure that would be absent if the administrator were given better information.

Published: September 10, 2008; 9:13:09 PM -0400
V3.x:(not available)
V2.0: 2.6 LOW