[Forgot Password]
Login  Register Subscribe

23631

 
 

115038

 
 

95906

 
 

909

 
 

77986

 
 

109

 
 
Paid content will be excluded from the download.

Filter
Matches : 7969 Download | Alert*

The host is installed with Apple Safari version less than or equal to 5.0.5 and is prone to security bypass vulnerability. A flaw is present in CFNetwork in the application which fails to handle a crafted text/plain file. Successful exploitation allows remote attackers to inject arbitrary web script or HTML.

The host is installed with Apple Safari version less than or equal to 5.0.5 and is prone to cross-site scripting (XSS) vulnerability. A flaw is present in the application which fails to handle vectors involving a URL that contains a username. Successful exploitation allows remote attackers to inject arbitrary web script or HTML.

The host is installed with Apple Safari before 4.1 or 5.0 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to handle vectors related to a crafted HTML document. Successful exploitation could allow attackers to read arbitrary files.

The host is installed with Apple Safari before 5.0.6 and is prone to a use-after-free vulnerability. A flaw is present in the application, which fails to handle vectors related to improper list management for Cascading Style Sheets (CSS). Successful exploitation could allow attackers to crash the service.

The host is installed with Apple Safari 5.0.5 and is prone to an URL spoofing vulnerability. A flaw is present in an application, which fails to handle a crafted web page. Successful exploitation could allow attackers to spoof the address bar.

The host is installed with Apple Safari 5.1.2 and is prone to a use-after-free vulnerability. A flaw is present in an application, which fails to handle improper coordination between an API call and the plug-in unloading functionality. Successful exploitation could allow attackers to crash the service.

The host is installed with Apple Safari before 5.1.4 and is prone to cookie setting vulnerability. A flaw is present in the application, which fails to properly block cookies from third parties and advertisers. Successful exploitation allows remote web servers to track users via a cookie.

The host is installed with Apple Safari before 5.1.4 and is prone to information disclosure vulnerability. A flaw is present in the application, which fails to properly handle redirects in conjunction with HTTP authentication. Successful exploitation allows remote web servers to capture credentials by logging the Authorization HTTP header.

The host is installed with Apple Safari before 5.1.4 and is prone to security bypass vulnerability. A flaw is present in the application, which fails to handle the Private Browsing mode. Successful exploitation allows remote attackers to bypass intended privacy settings and insert history entries via JavaScript code that calls the pushState or replaceState method.

The host is installed with Apple Safari before 5.1.4 and is prone to cross-site scripting (XSS) vulnerability. A flaw is present in the application, which fails to properly handle a malicious website. Successful exploitation allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.


Pages:      Start    772    773    774    775    776    777    778    779    780    781    782    783    784    785    ..   796

© 2013 SecPod Technologies