[Forgot Password]
Login  Register Subscribe

24128

 
 

131573

 
 

111017

 
 

909

 
 

86402

 
 

136

 
 
Paid content will be excluded from the download.

Filter
Matches : 1059 Download | Alert*

Security researcher Masato Kinugawa discovered that if a web page is missing character set encoding information it can inherit character encoding across navigation into another domain from an earlier site. Only same-origin inheritance is allowed according to the HTML5 specification. This issue allows an attacker to add content that will be interpreted one way on the victim site, but which may the ...

Mozilla security developer Daniel Veditz discovered that <iframe sandbox> restrictions are not applied to an <object> element contained within a sand boxed iframe. This could allow content hosted within a sand boxed iframe to use <object> element to bypass the sandbox restrictions that should be applied.

Compiler Engineer Dan Gohman of Google reported that binary search algorithms in the SpiderMonkey JavaScript engine were prone to overflow in several places, leading to potential out-of-bounds array access. While none of these are known to be directly exploitable, they are unsafe in theory and have been changed as part of general security improvements.

Security researcher Cody Crews discovered a method to append an iframe into an embedded PDF object rendered with the chrome privileged PDF.js . This can used to bypass security restrictions to load local or chrome privileged files and objects within the embedded PDF object. This can lead to information disclosure of local system files.

The host is missing a security update according to Apple advisory, APPLE-SA-2015-08-13-2. The update is required to fix multiple vulnerabilities. The flaws are present in the application, which fails to handle a crafted vectors. Successful exploitation may lead to an unexpected application termination, security bypass, information disclosure or arbitrary code execution.

The host is missing security update for KB4019460. This security update resolves vulnerabilities in Mono Framework. A successfully exploitation of this vulnerability could allow attackers to disclose sensitive information

The host is missing a security update according to Apple advisory, APPLE-SA-2013-10-15-1. The update is required to fix multiple vulnerabilities. The flaws are present in the application, which fails to handle a maliciously crafted untrusted Java applet. Successful exploitation could allow attackers to execute arbitrary code.

The host is missing a security update according to Apple advisory, APPLE-SA-2015-12-08-3. The update is required to fix multiple vulnerabilities. The flaws are present in the application, which fails to handle crafted data. Successful exploitation could allow attackers to execute arbitrary code, disclose sensitive information or crash the service.

The host is missing a security update according to Apple advisory, APPLE-SA-2016-09-13-2. The update is required to fix multiple memory corruption vulnerabilities. The flaws are present in the application, which fails to handle unknown vectors. Successful exploitation allows attackers to execute arbitrary code.

The host is missing a security update according to Apple advisory, APPLE-SA-2016-03-21-6. The update is required to fix multiple memory corruption vulnerabilities. The flaws are present in the application, which fails to properly handle a crafted website. Successful exploitation could allow attackers to execute arbitrary code.


Pages:      Start    83    84    85    86    87    88    89    90    91    92    93    94    95    96    ..   105

© SecPod Technologies