[Forgot Password]
Login  Register Subscribe

24436

 
 

131815

 
 

115228

 
 

909

 
 

90132

 
 

140

 
 
Paid content will be excluded from the download.

Filter
Matches : 13043 Download | Alert*

The host is installed with Oracle Java SE 6 Update 18 or earlier, 5.0 Update 23 or earlier, 1.4.2_25 or earlier, or 1.3.1_27 or earlier and is prone to unspecified vulnerability. A flaw is present in the application, which fails to handle the Sound component. Successful exploitation could allow attackers to affect confidentiality, integrity, and availability via unknown vectors.

The host is installed with Oracle Java SE 1.3.1_27 or earlier and is prone to unspecified vulnerability. A flaw is present in the application, which fails to handle the Java 2D component. Successful exploitation could allow attackers to affect confidentiality, integrity, and availability via unknown vectors.

Cross-site scripting (XSS) vulnerability in WebKit in Apple Safari before 5.0 on Mac OS X 10.5 through 10.6 and Windows, and before 4.1 on Mac OS X 10.4, allows remote attackers to inject arbitrary web script or HTML via vectors related to a malformed URL.

Race condition in the installation package in Apple iTunes before 9.1 on Windows allows local users to gain privileges by replacing an unspecified file with a Trojan horse.

Apple iTunes before 9.1 allows remote attackers to cause a denial of service (infinite loop) via a crafted MP4 podcast file.

The host is installed with Google Chrome before 4.0.249.89 and is prone to information disclosure vulnerability. A flaw is present in the application which fails to properly handle password manager. Successful exploitation allow user-assisted remote HTTP servers to obtain sensitive information via a URL that requires authentication.

The host is installed with Google Chrome before 4.0.249.89 and is prone to information disclosure vulnerability. A flaw is present in the application which make direct connections to web sites when all configured proxy servers are unavailable. Successful exploitation allow remote HTTP servers to obtain potentially sensitive information about the identity of a client user via standard HTTP logging.

The host is installed with IBM DB2 9.1 before FP9 or 9.5 before FP6a or 9.7 before FP2 and is prone to Heap-based buffer overflow vulnerability. A flaw is present in the application which does not properly handle bounds check. Successful exploitation allow remote attacker could overflow a buffer and execute arbitrary code on the system with elevated privileges or cause the database server to crash ...

The host is installed with Google Chrome before 4.0.249.89 and is prone to information disclosure vulnerability. A flaw is present in the application which fails to properly handle site's URL in the HREF attribute of a stylesheet LINK element. Successful exploitation allow remote attackers to obtain a redirected target URL for another user's session.

Microsoft Office Outlook 2002 SP3, 2003 SP3, and 2007 SP1 and SP2 does not properly verify e-mail attachments with a PR_ATTACH_METHOD property value of ATTACH_BY_REFERENCE, which allows user-assisted remote attackers to execute arbitrary code via a crafted message, aka "Microsoft Outlook SMB Attachment Vulnerability."


Pages:      Start    1255    1256    1257    1258    1259    1260    1261    1262    1263    1264    1265    1266    1267    1268    ..   1304

© SecPod Technologies