[Forgot Password]
Login  Register Subscribe

23631

 
 

115038

 
 

95906

 
 

909

 
 

77986

 
 

109

 
 
Paid content will be excluded from the download.

Filter
Matches : 8141 Download | Alert*

The host is installed with Apple Safari before 5.1.4 and is prone to security bypass vulnerability. A flaw is present in the application, which fails to handle the Private Browsing mode. Successful exploitation allows remote attackers to bypass intended privacy settings and insert history entries via JavaScript code that calls the pushState or replaceState method.

The host is installed with Apple Safari before 5.1.4 and is prone to cross-site scripting (XSS) vulnerability. A flaw is present in the application, which fails to properly handle a malicious website. Successful exploitation allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.

The host is installed with Apple Safari before 5.1.4 and is prone to cross-site scripting (XSS) vulnerability. A flaw is present in the application, which fails to properly handle a malicious website. Successful exploitation allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.

The host is installed with Apple Safari before 5.1.4 and is prone to cross-site scripting (XSS) vulnerability. A flaw is present in the application, which fails to properly handle a malicious website. Successful exploitation allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.

The host is installed with Apple Safari before 5.1.4 and is prone to cross-site scripting (XSS) vulnerability. A flaw is present in the application, which fails to properly handle a malicious website. Successful exploitation allows remote attackers to inject arbitrary web script or HTML via vectors involving a drag-and-drop operation.

The host is installed with Apple Safari before 5.1.4 and is prone to cross-site scripting (XSS) vulnerability. A flaw is present in the application, which fails to properly handle a malicious website. Successful exploitation allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.

The host is installed with Apple Safari before 5.1.7 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to handle malicious data. Successful exploitation could allow attackers to execute arbitrary code or crash the service.

The host is installed with Apple Safari before 5.1.7 and is prone to a security bypass vulnerability. A flaw is present in the application, which fails to properly track state information during the processing of form input. Successful exploitation could allow attackers to fill in form fields on the pages of arbitrary web sites.

The host is installed with Apple Safari before 6.0 and is prone to a cross site scripting vulnerability. A flaw is present in the application, which fails to handle a crafted feed URL. Successful exploitation could allow attackers to inject arbitrary web script.

The host is installed with Apple Safari before 6.0 and is prone to an arbitrary file read vulnerability. A flaw is present in the application, which fails to handle a crafted feed URL. Successful exploitation could allow attackers to disclose sensitive information.


Pages:      Start    790    791    792    793    794    795    796    797    798    799    800    801    802    803    ..   814

© 2013 SecPod Technologies