[Forgot Password]
Login  Register Subscribe

24128

 
 

131615

 
 

111666

 
 

909

 
 

87321

 
 

136

 
 
Paid content will be excluded from the download.

Filter
Matches : 9238 Download | Alert*

The host is installed with Mac OS X Lion v10.7 to v10.7.4 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to handle a crafted text glyph. Successful exploitation could allow attackers to execute arbitrary code or crash the service.

The host is installed with Mac OS X Lion v10.7 to v10.7.4 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to handle reachable assertion issue existed in the handling of DNS records. Successful exploitation could allow attackers to crash the service.

The host is installed with Mac OS X 10.6.8 or OS X Lion v10.7 to v10.7.4 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to handle a crafted web script. Successful exploitation could allow attackers to obtain the values of HTTPOnly cookies.

The host is installed with Mozilla Firefox or Mozilla Thunderbird or SeaMonkey and is prone to memory corruption vulnerability. A flaw is present in the application, which fails to handle memory safety issues. Successful exploitation could allow remote attackers to cause a denial of service (memory corruption and application crash).

The host is installed with Mozilla Firefox or Mozilla Thunderbird or SeaMonkey and is prone to memory corruption vulnerability. A flaw is present in the application, which fails to handle memory safety issues. Successful exploitation could allow remote attackers to cause a denial of service (memory corruption and application crash).

The host is installed with Mozilla Firefox or Mozilla Thunderbird or SeaMonkey and is prone to execution of arbitrary code vulnerability. A flaw is present in the application, which fails to properly handle nsTreeRange data structures. Successful exploitation could allow remote attackers to execute arbitrary code via unspecified vectors that lead to a "dangling pointer".

The host is installed with Mozilla Firefox or Mozilla Thunderbird or SeaMonkey and is prone to unspecified vulnerability. A flaw is present in the application, which fails to handle nsDirIndexParser. Successful exploitation could allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code.

The host is installed with Mozilla Firefox or Mozilla Thunderbird or SeaMonkey and is prone to memory corruption vulnerability. A flaw is present in the application, which fails to handle browser engine. Successful exploitation could allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code.

The host is installed with Mozilla Firefox or Mozilla Thunderbird or SeaMonkey and is prone to directory traversal vulnerability. A flaw is present in the application, which fails to handle vectors involving a resource: URL. Successful exploitation could allow remote attackers to determine the existence of arbitrary files, and possibly load resources.

The host is installed with Mozilla Firefox or SeaMonkey and is prone to security vulnerability. A flaw is present in the application, which fails to properly implement autocompletion for forms. Successful exploitation could allow remote attackers to read form history entries via a Java applet that spoofs interaction with the autocomplete controls.


Pages:      Start    1    2    3    4    5    6    7    8    9    10    11    12    13    14    ..   923

© SecPod Technologies