[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248149

 
 

909

 
 

194803

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 14840 Download | Alert*

The host is installed with Apple Safari and is prone to information disclosure vulnerability. A flaw is present in Webkit, which fails to handle HTML5 drag and drop operations leading to cross-origin issue. Successful exploitation could allow remote attackers to obtain sensitive information.

The host is installed with Apple Safari and is prone to arbitrary file upload vulnerability. A flaw is present in Webkit, which fails to correctly implement windows functionality leading to cross-origin issue. Successful exploitation could allow remote attackers to upload arbitrary files on the affected host.

The host is installed with Apple Safari and is prone to cross site scripting vulnerability. A flaw is present in window.console._inspectorCommandLineAPI property in Web Inspector, which fails to sanitize user supplied data. Successful exploitation could allow remote attackers to execute arbitrary code on the affected system.

The host is installed with Winamp 5.6 or earlier version and is prone to denial of service vulnerability. A flaw is present in in_mp4 plugin, which fails to properly handle a metadata or albumart in an MP4 file. Successful exploitation allows remote attackers to crash the application using an invalid MP4 file.

The host is installed with PHP and is prone to integer overflow vulnerability. A flaw in present in ext/shmop/shmop.c, which fails to handle overly long arguments passed to shmop_read() function. Successful exploitation could allow remote attackers to execute arbitrary code or cause a denial of service.

The host is installed with PHP and is prone to integer overflow vulnerability. A flaw in present in ext/shmop/shmop.c, which fails to handle overly long arguments passed to shmop_read() function. Successful exploitation could allow remote attackers to execute arbitrary code or cause a denial of service.

The host is installed with Google Chrome and is prone to same origin policy vulnerability. A flaw is present in the application which fails to restrict the access to each other's methods and properties. Successful exploitation allow remote attackers to bypass the same origin policy via unspecified vectors.

The host is installed with Google Chrome and is prone to unspecified vulnerability. A flaw is present in the application which does not prevent navigation and close operations on the top location of a sandboxed frame. Successful exploitation allow remote attackers to make unspecified impact and remote attack vectors.

The host is installed with Google Chrome before 10.0.648.127, Apple Safari before 5.0.6 or Apple iTunes before 10.5 and is prone to memory corruption vulnerability. A flaw is present in the applications which do not properly handle counter nodes. Successful exploitation allow remote attackers to cause a denial of service (memory corruption).

The host is installed with Winamp 5.6 or earlier version and is prone to denial of service vulnerability. A flaw is present in in_mkv plugin, which fails to properly read a string that is exactly SIZE_MAX bytes. Successful exploitation allows remote attackers to crash the application using a Matroska Video (MKV) file containing a string with a crafted length.


Pages:      Start    1047    1048    1049    1050    1051    1052    1053    1054    1055    1056    1057    1058    1059    1060    ..   1483

© SecPod Technologies