[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248392

 
 

909

 
 

195452

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 15795 Download | Alert*

The host is installed with Apple Safari before 6.0.1 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle a crafted url. Successful exploitation could allow attackers to execute arbitrary code or crash the service.

The host is installed with Apple Safari before 6.0.2 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to handle SVG images. Successful exploitation could allow attackers to crash the service.

The host is installed with Apple Mac OS 12 before 12.3 or Apple Safari before 15.4 on Apple Mac OS 10.15.7 or Apple Mac OS 11 and is prone to a memory corruption vulnerability. The flaws are present in the application, which fails to properly handle issues in state management. On successful exploitation, processing maliciously crafted web content may lead to code execution.

The host is installed with Apple Mac OS 12 before 12.3 or Apple Safari before 15.4 on Apple Mac OS 10.15.7 or Apple Mac OS 11 and is prone to a use after free vulnerability. The flaws are present in the application, which fails to properly handle issues in memory management. On successful exploitation, processing maliciously crafted web content may lead to arbitrary code execution.

The host is installed with Apple Mac OS 12 before 12.3 or Apple Safari before 15.4 on Apple Mac OS 10.15.7 or Apple Mac OS 11 and is prone to a use after free vulnerability. The flaws are present in the application, which fails to properly handle issues in memory management. On successful exploitation, processing maliciously crafted web content may lead to arbitrary code execution.

The host is installed with Apple Mac OS 12 before 12.3 or Apple Safari before 15.4 on Apple Mac OS 10.15.7 or Apple Mac OS 11 and is prone to a logic vulnerability. The flaws are present in the application, which fails to properly handle issues in state management. On successful exploitation, a malicious website may cause unexpected cross-origin behavior.

The host is installed with Apple Safari before 15.4 on Apple Mac OS 10.15.7 or Apple Mac OS 11 and is prone to an address bar spoofing vulnerability. A flaw is present in the application, which fails to properly handle a user interface issue. On successful exploitation, visiting a malicious website may lead to address bar spoofing.

The host is installed with Apple Safari before 15.1 on MacOS X Catalina, MacOS 11 or Apple Mac OS 12 before 12.0.1 and is prone to a type confusion vulnerability. A flaw is present in the application, which fails to handle a memory related issue. On successful exploitation, processing maliciously crafted web content may lead to code execution.

The host is installed with Google Chrome through 22 or Apple Safari 5.1.7 and is prone to cross-site scripting (XSS) vulnerability. A flaw is present in the application, which fails to properly handle the html/parser/XSSAuditor.cpp in WebCore in WebKit. Successful exploitation allows remote attackers to bypass a cross-site scripting (XSS) protection mechanism via a crafted string.

The host is installed with Google Chrome before 11.0.696.57 or Apple Safari before 5.5.1 and is prone to denial of service vulnerability. A flaw is present in the browser, which fails to handle ruby element and Cascading Style Sheets (CSS) token sequences. Successful exploitation could allow remote attackers to execute remote code or cause denial of service.


Pages:      Start    887    888    889    890    891    892    893    894    895    896    897    898    899    900    ..   1579

© SecPod Technologies