[Forgot Password]
Login  Register Subscribe

23631

 
 

126951

 
 

99602

 
 

909

 
 

80170

 
 

109

 
 
Paid content will be excluded from the download.

Filter
Matches : 8189 Download | Alert*

The host is installed with Google Chrome before 15.0.874.102 or Apple Safari before 5.1.4 and is prone to a same origin policy bypass vulnerability. A flaw is present in the applications, which fail to handle cross-origin policy violations. Successful exploitation could allow attackers to bypass security restrictions.

The host is installed with Apple Safari 5.0.5 and is prone to an URL spoofing vulnerability. A flaw is present in an application, which fails to handle a crafted web page. Successful exploitation could allow attackers to spoof the address bar.

The host is installed with Mac OS X 10.6.8 or OS X Lion v10.7 to v10.7.4 and is prone to an integer overflow vulnerability. A flaw is present in the application, which fails to handle a .htaccess file with a crafted SetEnvIf directive, in conjunction with a crafted HTTP request header. Successful exploitation allows remote attackers to overflow the buffer.

The host is installed with Apple Mac OS X 10.6.8 or 10.7.2 and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to handle unknown vectors related to RMI. Successful exploitation could allow attackers to affect confidentiality, integrity, and availability.

The host is installed with Apple Mac OS X 10.6.8 or 10.7.2 and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to handle unknown vectors related to RMI. Successful exploitation could allow attackers to affect confidentiality, integrity, and availability.

The host is installed with Apple Mac OS X 10.6.8 or 10.7.2 and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to handle unknown vectors related to hotspot. Successful exploitation could allow attackers to affect confidentiality.

The host is installed with Apple Mac OS X 10.6.8 or 10.7.2 and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to handle unknown vectors related to JSSE. Successful exploitation could allow attackers to affect confidentiality and integrity.

The host is installed with Apple Mac OS X 10.6.8 or 10.7.2 and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to handle unknown vectors related to deployment. Successful exploitation could allow attackers to affect confidentiality and integrity.

The host is installed with Java 1.6.0_29 before 1.6.0_31 and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to handle vectors related to sound. Successful exploitation could allow remote attackers to affect confidentiality and availability.

The host is installed with Apple Mac OS X 10.6.8 or 10.7.2 and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to handle unknown vectors related to networking. Successful exploitation could allow attackers to affect confidentiality.


Pages:      Start    2    3    4    5    6    7    8    9    10    11    12    13    14    15    ..   818

© 2013 SecPod Technologies