[Forgot Password]
Login  Register Subscribe

23631

 
 

115038

 
 

96125

 
 

909

 
 

78020

 
 

109

 
 
Paid content will be excluded from the download.

Filter
Matches : 8000 Download | Alert*

The host is installed with Apple Safari before 5.1.4 and is prone to cross-site scripting (XSS) vulnerability. A flaw is present in the application, which fails to properly handle a malicious website. Successful exploitation allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.

The host is installed with Apple Safari before 5.1.4 and is prone to cross-site scripting (XSS) vulnerability. A flaw is present in the application, which fails to properly handle a malicious website. Successful exploitation allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.

The host is installed with Apple Safari before 5.1.4 and is prone to cross-site scripting (XSS) vulnerability. A flaw is present in the application, which fails to properly handle a malicious website. Successful exploitation allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.

The host is installed with Apple Safari before 5.1.4 and is prone to cross-site scripting (XSS) vulnerability. A flaw is present in the application, which fails to properly handle a malicious website. Successful exploitation allows remote attackers to inject arbitrary web script or HTML via vectors involving a drag-and-drop operation.

The host is installed with Apple Safari before 5.1.4 and is prone to cross-site scripting (XSS) vulnerability. A flaw is present in the application, which fails to properly handle a malicious website. Successful exploitation allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.

The host is installed with Apple Safari before 5.1.7 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to handle malicious data. Successful exploitation could allow attackers to execute arbitrary code or crash the service.

The host is installed with Apple Safari before 5.1.7 and is prone to a security bypass vulnerability. A flaw is present in the application, which fails to properly track state information during the processing of form input. Successful exploitation could allow attackers to fill in form fields on the pages of arbitrary web sites.

The host is installed with Apple Safari before 6.0 and is prone to a cross site scripting vulnerability. A flaw is present in the application, which fails to handle a crafted feed URL. Successful exploitation could allow attackers to inject arbitrary web script.

The host is installed with Apple Safari before 6.0 and is prone to an arbitrary file read vulnerability. A flaw is present in the application, which fails to handle a crafted feed URL. Successful exploitation could allow attackers to disclose sensitive information.

The host is installed with Apple Safari before 6.0 and is prone to security bypass vulnerability. A flaw is present in the application, which fails to properly handle the autocomplete attribute of a password input element. Successful exploitation could allow attackers to bypass authentication by leveraging an unattended workstation.


Pages:      Start    776    777    778    779    780    781    782    783    784    785    786    787    788    789    ..   799

© 2013 SecPod Technologies