[Forgot Password]
Login  Register Subscribe

23631

 
 

126951

 
 

99602

 
 

909

 
 

80170

 
 

109

 
 
Paid content will be excluded from the download.

Filter
Matches : 8352 Download | Alert*

The host is installed with Apple Mac OS X 10.6.8 or 10.7.2 and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to handle via unknown vectors related to deployment. Successful exploitation could allow attackers to affect confidentiality and integrity.

The host is installed with Opera before 11.51 or Apple Mac OS X 10.6.8 or 10.7x before 10.7.3 and is prone to unspecified vulnerability. A flaw is present in the application which is caused due to some unspecified error. Successful exploitation allows attackers to cause unknown impacts.

The host is installed with Apple Mac OS X 10.6.8 or 10.7.x before 10.7.3 and is prone to an integer overflow vulnerability. The flaw is present in the application, which fails to properly handle crafted DNS data. Successful exploitation could allow attackers to execute arbitrary code or crash the service.

The host is installed with Apple Mac OS X 10.6.8 or 10.7.x before 10.7.4 and is prone to a man in the middle attack vulnerability. A flaw is present in the application, which fails to properly handle confidentiality of SSL encrypted data. Successful exploitation could allow attackers to decrypt data protected by SSL or TLS.

The host is installed with Mac OS X 10.6.8 or OS X Lion v10.7 to v10.7.4 and is prone to an information disclosure vulnerability. A flaw is present in the application, which is caused by an error in mod_proxy when configured in reverse proxy mode and using the RewriteRule or ProxyPassMatch directives with a pattern match. Successful exploitation allows remote attackers to gain unauthorized access ...

The host is installed with Google Chrome before 17.0.963.83 or Apple Safari before 5.1.7 and is prone to cross-origin violation vulnerability. A flaw is present in the application, which fails to handle the Same Origin Policy. Successful exploitation could allow remote attackers to bypass the Same Origin Policy via vectors involving a "magic iframe".

The host is installed with Google Chrome before 17.0.963.83 and is prone to unspecified vulnerability. A flaw is present in the application, which fails to handle user confirmation operation before an unpacked extension installation. Successful exploitation could allow user-assisted remote attackers to have an unspecified impact on affected system.

The host is installed with Google Chrome before 17.0.963.83 or Apple Safari before 6.0 and is prone to use-after-free vulnerability. A flaw is present in the applications, which fail to handle vectors related to block splitting. Successful exploitation could allow remote attackers to cause denial of service or possibly have unspecified other impact on affected system.

The host is installed with Google Chrome before 17.0.963.83 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to properly handle CANVAS elements. Successful exploitation could allow remote attackers to cause memory corruption or possibly have unspecified other impact on affected system.

The host is installed with Google Chrome before 17.0.963.83 and is prone to use-after-free vulnerability. A flaw is present in the application, which fails to handle vectors related to the cross-fade function. Successful exploitation could allow remote attackers to cause denial of service or possibly have unspecified other impact on affected system.


Pages:      Start    4    5    6    7    8    9    10    11    12    13    14    15    16    17    ..   835

© 2013 SecPod Technologies