[Forgot Password]
Login  Register Subscribe

30480

 
 

423868

 
 

253164

 
 

909

 
 

197077

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 15028 Download | Alert*

The host is installed with Apple Safari before 4.0 and is prone to an address bar spoofing vulnerability. A flaw is present in the application, which fails to properly handle unicode ideographic spaces. Successful exploitation could allow attackers to direct the user to a spoofed site that visually appears to be a legitimate domain.

The host is installed with Apple Safari before 4.0 and is prone to an use-after-free vulnerability. A flaw is present in the application, which fails to properly handle a web page with crafted CSS import statements. Successful exploitation could allow attackers execute arbitrary code or crash the service.

The host is installed with Apple Safari before 4.0 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle a crafted HTML document. Successful exploitation could allow attackers to execute arbitrary code or cause a denial of service.

The host is installed with Apple Safari before 4.0 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to properly handle redirects. Successful exploitation could allow attackers to read XML content from arbitrary web pages via a crafted document.

The host is installed with Apple Safari before 4.0 and is prone to an use-after-free vulnerability. A flaw is present in the application, which fails to properly handle document elements. Successful exploitation could allow attackers to execute arbitrary code or crash the service.

The host is installed with Apple Safari before 4.0 and is prone to a cross-site scripting vulnerability. A flaw is present in the application, which fails to properly handle Location and History objects. Successful exploitation could allow attackers to inject arbitrary web script or HTML.

The host is installed with Apple Safari before 4.0.3 and is prone to an incomplete blacklist vulnerability. A flaw is present in the application, which fails to properly properly handle unspecified homoglyphs. Successful exploitation could allow attackers to spoof domain names in URLs.

The host is installed with Apple Safari before 5.0.5 and is prone to an use-after-free vulnerability. A flaw is present in the application, which fails to properly handle textnodes. Successful exploitation could allow attackers to execute arbitrary code or crash the service.

The host is installed with Oracle MySQL 5.5.29 or earlier or 5.6.10 or earlier and is prone to unspecified vulnerability. A flaw is present in the application, which fails to handle vectors related to Server Optimizer. Successful exploitation allows attackers to affect confidentiality, integrity and availability.

The host is installed with OpenSSL before 0.9.8j and is prone to security bypass vulnerability. A flaw is present in the application, which does not prevent modification of the ciphersuite in the session cache. Successful exploitation could allow remote attackers to force the use of a disabled cipher via vectors involving sniffing network traffic.


Pages:      Start    1283    1284    1285    1286    1287    1288    1289    1290    1291    1292    1293    1294    1295    1296    ..   1502

© SecPod Technologies