[Forgot Password]
Login  Register Subscribe

24437

 
 

132035

 
 

118594

 
 

909

 
 

92444

 
 

143

 
 
Paid content will be excluded from the download.

Filter
Matches : 14562 Download | Alert*

The host is installed with Apple Safari 4.x before 4.0.3 and is prone to a phishing attack vulnerability. A flaw is present in the application, which fails to properly handle unknown vectors. Successful exploitation could allow remote web servers to place an arbitrary web site in the Top Sites view.

The host is installed with Apple Safari before 4.0.3 and is prone to a buffer overflow vulnerability. A flaw is present in the application, which fails to properly handle an image with crafted EXIF metadata. Successful exploitation could allow attackers to execute arbitrary code or crash the service.

The host is installed with Apple Safari before 3.2.2 and is prone to a man-in-the-middle attack vulnerability. A flaw is present in the application, which fails to properly handle a 3xx HTTP CONNECT response before a successful SSL handshake. Successful exploitation could allow attackers to execute arbitrary web script.

The host is installed with Apple Safari before 4.0 and is prone to a privilege escalation vulnerability. A flaw is present in the application, which fails to properly handle vectors related to an unspecified compression method. Successful exploitation could allow local users to gain privileges.

The host is installed with Apple Safari before 3.2.3 and is prone to a cross-site scripting vulnerability. A flaw is present in the application, which fails to properly handle a a crafted feed: URL. Successful exploitation could allow attackers to inject arbitrary web script or HTML.

The host is installed with Apple Safari before 3.2.2 and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to properly handle Safari RSS feeds. Successful exploitation could allow attackers to obtain passwords, cookies or other sensitive information.

The host is installed with Apple Safari before 4.0 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which misinterprets downloaded image files as local HTML documents in unspecified circumstances. Successful exploitation could allow attackers to execute arbitrary JavaScript code by placing it in an image file.

The host is installed with Apple Safari before 4.0 and is prone to an information disclosure vulnerability. A flaw is present in the application, which insecurely downloads temporary files. Successful exploitation could allow attackers to read the contents of files being downloaded by other users.

The host is installed with Apple Safari before 4.0 and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to properly process arguments. Successful exploitation could allow attackers to execute arbitrary code or crash the service.

The host is installed with Apple Safari before 4.0 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly use arithmetic during automatic hinting of TrueType fonts. Successful exploitation could allow attackers to execute arbitrary code or crash the service.


Pages:      Start    1220    1221    1222    1223    1224    1225    1226    1227    1228    1229    1230    1231    1232    1233    ..   1456

© SecPod Technologies