[Forgot Password]
Login  Register Subscribe

23631

 
 

126951

 
 

99602

 
 

909

 
 

80170

 
 

109

 
 
Paid content will be excluded from the download.

Filter
Matches : 10664 Download | Alert*

The host is installed with Apache Tomcat before 5.5.35 or 6.x before 6.0.35 or 7.x before 7.0.23 and is prone to denial-of-service vulnerability. A flaw is present in the application, which computes hash values for form parameters without restricting the ability to trigger hash collisions. Successful exploitation allows remote attackers to cause a denial of service (CPU consumption) by specially c ...

The host is installed with Apache HTTP Server 1.3.x through 1.3.42 or 2.0.x through 2.0.64 or 2.2.x through 2.2.21 and is prone to information disclosure vulnerability. A flaw is present in the application, which fails to interact with use of RewriteRule and ProxyPassMatch pattern matches for configuration of a reverse proxy. Successful exploitation allows remote attackers to gain unauthorized acc ...

The host is installed with Google Chrome before 16.0.912.63 or Apple iTunes before 10.6 or Apple Safari before 5.1.4 and is prone to a memory corruption vulnerability. A flaw is present in the applications, which fail to handle property arrays. Successful exploitation could allow attackers to crash the service.

The host is installed with PHP 5.3.8 and is prone to a denial of service vulnerability. A flaw is present in the application, which performs strndup operations on untrusted string data. Successful exploitation could allow remote attackers to crash the service.

The host is installed with Google Chrome before 16.0.912.77 or Apple Safari before 5.1.4 and is prone to use-after-free vulnerability. A flaw is present in the applications, which fail to handle vectors related to DOM. Successful exploitation could allow remote attackers to execute arbitrary code or crash the service.

The host is installed with Google Chrome before 16.0.912.63 or Apple iTunes before 10.6 or Apple Safari before 5.1.4 and is prone to an out-of-bounds read vulnerability. A flaw is present in the applications, which fail to handle SVG parsing. Successful exploitation could allow attackers to crash the service.

The host is installed with Google Chrome before 15.0.874.102 or Apple iTunes before 10.6 or Apple Safari before 5.1.4 and is prone to a use-after-free vulnerability. A flaw is present in the applications, which fail to properly handle editing operations in conjunction with an unknown plug-in. Successful exploitation could allow attackers to crash the service or cause other unknown impacts

The host is installed with Google Chrome before 15.0.874.120 or Apple iTunes before 10.6 or Apple Safari before 5.1.4 and is prone to an use after free vulnerability. A flaw is present in the applications, which fail to sanitize user supplied input. Successful exploitation could allow attackers to crash the service.

The host is installed with Google Chrome before 15.0.874.102 or Apple Safari before 5.1.4 and is prone to a security bypass vulnerability. A flaw is present in the applications, which fail to properly handle javascript URLs. Successful exploitation could allow attackers to read cookies and bypass security.

The host is installed with Google Chrome before 15.0.874.102 or Apple iTunes before 10.6 or Apple Safari before 5.1.4 and is prone to a use-after-free vulnerability. A flaw is present in the applications, which fail to handle stale style bugs. Successful exploitation could allow attackers to crash the service or cause other unknown impacts


Pages:      Start    8    9    10    11    12    13    14    15    16    17    18    19    20    21    ..   1066

© 2013 SecPod Technologies