[Forgot Password]
Login  Register Subscribe

23631

 
 

115083

 
 

97147

 
 

909

 
 

78764

 
 

109

 
 
Paid content will be excluded from the download.

Filter
Matches : 8059 Download | Alert*

The host is installed with Apple Mac OS X 10.6.8 or iTunes before 10.5 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly perform string tokenization. Successful exploitation could allow attackers to crash the service or execute arbitrary code.

The host is installed with Apple Mac OS X 10.6.8 or 10.7.0 before 10.7.2 and is prone to a buffer overflow vulnerability. The flaw is present in the application, which fails to handle API in Apple Type Services (ATS). Successful exploitation could allow attackers to crash the service.

he host is installed with Google Chrome before 16.0.912.77 or Apple Safari before 6.0 and is prone to use-after-free vulnerability. A flaw is present in the applications, which fail to handle vectors related to DOM selections. Successful exploitation could allow remote attackers to execute arbitrary code or crash the service.

The host is installed with Google Chrome before 17.0.963.46 and is prone to same origin policy bypass vulnerability. A flaw is present in the application, which does not properly handle sandboxed origins. Successful exploitation allows remote attackers to bypass the Same Origin Policy via a crafted extension.

The host is installed with Google Chrome before 17.0.963.46 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to properly handle vectors that trigger the aborting of an IndexedDB transaction. Successful exploitation allows remote attackers to cause an application crash.

The host is installed with Apple Mac OS X 10.5.8 or 10.6 before 10.6.4 and is prone to a cross-site scripting (XSS) vulnerability. A flaw is present in the application, which fails to handle vectors involving symbolic links. Successful exploitation could allows remote authenticated users to access arbitrary files.

The host is installed with Apple Safari 4.0 before 4.1 and is prone to an use-after-free vulnerability. A flaw is present in the application, which fails to handle vectors related to HTML buttons and the first-letter CSS style. Successful exploitation could allow attackers to inject arbitrary code or crash the service.

The host is installed with Apple Safari before 4.1 or 5.0 and is prone to a remote code execution vulnerability. A flaw is present in the application, which fails to properly restrict remote execution of clipboard commands. Successful exploitation could allow remote attackers to modify the clipboard via a crafted HTML document.

The host is installed with Mozilla Firefox before 3.6.26 or 4.x before 7.0, Thunderbird before 3.1.18 or 5.0 before 7.0, or SeaMonkey before 2.4 and is prone to an information disclosure vulnerability. A flaw is present in the applications, which fail to handle XMLHttpRequest calls through a proxy. Successful exploitation could allow attackers to obtain sensitive information by reading the error m ...

The host is installed with Mozilla Firefox before 3.6.26 or 4.x before 10.0, Thunderbird before 3.1.18, 5.0 before 10.0, or SeaMonkey before 2.7 and is prone to an use-after-free vulnerability. A flaw is present in the applications, which fail to handle vectors related to incorrect AttributeChildRemoved notifications. Successful exploitation could allow attackers to execute arbitrary code.


Pages:      Start    4    5    6    7    8    9    10    11    12    13    14    15    16    17    ..   805

© 2013 SecPod Technologies