[Forgot Password]
Login  Register Subscribe

24003

 
 

131573

 
 

108530

 
 

909

 
 

85343

 
 

134

 
 
Paid content will be excluded from the download.

Filter
Matches : 12978 Download | Alert*

The host is installed with Apple Safari and is prone to denial of service vulnerability. A flaw is the application due to an error in CFNetwork when processing 'BACKGROUND' attribute of a 'BODY' element via a long string. Successful exploitation allows an attacker to crash the affected browser, resulting in a denial of service condition.

The host is installed with Apple Safari and is prone to denial of service vulnerability. A flaw is present in the application caused by a stack overflow in the WebCore::CSSSelector function within the WebKit library. Successful exploitation allow remote attackers to cause the browsers to crash.

The host is installed with CA ARCserve D2D r15 and is prone to information-disclosure vulnerability. A flaw is present in the application, which fails to properly handle sessions. Successful exploitation allows remote attackers to obtain credentials, and consequently execute arbitrary commands, via unspecified vectors.

The host is installed with Splunk 4.0 through 4.3 and is prone to cross-site scripting (XSS) vulnerability. A flaw is present in the application, which fails to prevent the injection of web script or HTML. Successful exploitation allows remote attackers to inject arbitrary web script or HTML via unknown vectors.

The host is installed with Apple Safari and is prone to spoofing vulnerability. A flaw is present in the application that is caused due to an error in handling of address bar, which does not properly manage the address bar between the request to open a URL and the retrieval of the new document's content. Successful exploitation allow attackers to conduct spoofing attacks via a crafted HTML documen ...

The host is installed with Apple Safari and is prone to integer underflow vulnerability. A flaw is present in the application in WebKit's handling of WebSockets. Successful exploitation allows attacker to cause a denial of service (application crash)

The host is installed with Apple Safari and is prone to use-after-free vulnerability. A flaw is present in the application in WebKit's handling of inline text boxes. Successful exploitation allows attacker to make an unexpected application termination or arbitrary code execution

The host is installed with Google Chrome before 23.0.1271.95 and is prone to incorrect file path handling. A flaw is present in the application, which fails to properly handle file paths. Successful exploitation allows remote attackers to unspecified impact and attack vectors.

The host is installed with Google Chrome before 23.0.1271.95 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to properly handle vectors related to the Media Source API. Successful exploitation allows remote attackers to cause a denial of service or possibly have unspecified other impact.

The host is installed with Microsoft Internet Explorer is prone to insecure library loading vulnerability. A flaw is present in the application, which fails to properly handle loading of dll files. Successful exploitation could allow attackers to execute arbitrary code and gain the same user rights as a local user using a crafted webpage. If attacker gains administrator rights, he/she can take com ...


Pages:      Start    1202    1203    1204    1205    1206    1207    1208    1209    1210    1211    1212    1213    1214    1215    ..   1297

© SecPod Technologies