[Forgot Password]
Login  Register Subscribe

23631

 
 

115083

 
 

97147

 
 

909

 
 

78764

 
 

109

 
 
Paid content will be excluded from the download.

Filter
Matches : 8232 Download | Alert*

The host is installed with Wireshark 1.6.x before 1.6.13 or 1.8.x before 1.8.5 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle an incorrect data type for a counter variable. Successful exploitation could allow attackers to crash the service.

The host is installed with Oracle Java SE 1.6.0_37 before 1.6.0_39 and is prone to arbitrary code execution vulnerability. A flaw is present in the application, which fails to handle vectors related to Deployment. Successful exploitation allows attackers to affect confidentiality, integrity, and availability.

The host is installed with Opera before 12.13 and is prone to arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle DOM events manipulation. Successful exploitation allows attackers to cause an application crash.

The host is installed with Mac OS X Lion v10.7 to v10.7.4 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to handle reachable assertion issue existed in the handling of DNS records. Successful exploitation could allow attackers to crash the service.

The host is installed with Mac OS X 10.6.8 or 10.7 before 10.7.5 or 10.8.x before 10.8.2 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to properly process the complete cleartext password if this password contains a 0x80 character. Successful exploitation could allow context-dependent attackers to obtain access via an authentication attem ...

The host is installed with Mac OS X 10.6.8 or 10.7 before 10.7.5 or 10.8.x before 10.8.2 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle query strings that contain a %3D sequence but no = (equals sign) character. Successful exploitation could allow attackers to execute arbitrary code.

The host is installed with Apple Mac OS X 10.8 before 10.8.3 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle a crafted graphics image. Successful exploitation could allow attackers to execute arbitrary code.

Mozilla Firefox before 22.0, Firefox ESR 17.x before 17.0.7, Thunderbird before 17.0.7, and Thunderbird ESR 17.x before 17.0.7 do not properly handle onreadystatechange events in conjunction with page reloading, which allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted web site that triggers an attempt to execute data at an unma ...

The getUserMedia permission implementation in Mozilla Firefox before 22.0 references the URL of a top-level document instead of the URL of a specific page, which makes it easier for remote attackers to trick users into permitting camera or microphone access via a crafted web site that uses IFRAME elements.

Integer overflow in the drawLineLoop function in the libGLESv2 library in Almost Native Graphics Layer Engine (ANGLE), as used in Mozilla Firefox before 24.0 and SeaMonkey before 2.21, allows remote attackers to execute arbitrary code via a crafted web site.


Pages:      Start    1    2    3    4    5    6    7    8    9    10    11    12    13    14    ..   823

© 2013 SecPod Technologies