[Forgot Password]
Login  Register Subscribe

23631

 
 

126951

 
 

99602

 
 

909

 
 

80170

 
 

109

 
 
Paid content will be excluded from the download.

Filter
Matches : 11545 Download | Alert*

The host is installed with Windows XP, Windows Vista, Windows Server 2008, Windows Server 2003 or Windows 7 and is prone to privilege escalation vulnerability. A flaw is present in the Windows kernel, which fails to properly handle the objects in memory. Successful exploitation could allow attackers to install programs, view, change, delete data or create new accounts with full administrative righ ...

The host is installed with Mozilla Firefox before 16.0, Firefox ESR 10.x before 10.0.8, Thunderbird before 16.0, Thunderbird ESR 10.x before 10.0.8 or SeaMonkey before 2.13 and is prone to security bypass vulnerability. A flaw is present in the applications, which fail to properly restrict calls to DOMWindowUtils (aka nsDOMWindowUtils) methods. Successful exploitation could allow attackers to bypa ...

The host is installed with Mozilla Firefox before 16.0, Thunderbird before 16.0 or SeaMonkey before 2.13 and is prone to cross-site scripting vulnerability. A flaw is present in the applications, which fail to handle implementation of the HTML5 Same Origin Policy. Successful exploitation could allow attackers to conduct cross-site scripting (XSS) attacks by leveraging initial-origin access after d ...

The host is installed with Mozilla Firefox before 16.0, Firefox ESR 10.x before 10.0.8, Thunderbird before 16.0, Thunderbird ESR 10.x before 10.0.8 or SeaMonkey before 2.13 and is prone to multiple unspecified vulnerabilities. The flaws are present in the applications, which fail to properly handle vectors related to memory. Successful exploitation could allow attackers to cause a denial of servic ...

The host is installed with Mozilla Firefox before 16.0, Thunderbird before 16.0 or SeaMonkey before 2.13 and is prone to multiple unspecified vulnerabilities. The flaws are present in the applications, which fail to properly handle vectors related to memory. Successful exploitation could allow attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbi ...

The host is installed with Mozilla Firefox before 16.0, Thunderbird before 16.0 or SeaMonkey before 2.13 and is prone to spoofing vulnerability. A flaw is present in the applications, which fail to properly handle navigation away from a web page that has a SELECT element's menu active. Successful exploitation could allow attackers to spoof page content.

The host is installed with Mozilla Firefox before 16.0, Thunderbird before 16.0 or SeaMonkey before 2.13 and is prone to click-jacking attack vulnerability. A flaw is present in the applications, which fail to properly handle navigation away from a web page that has multiple menus of SELECT elements active. Successful exploitation could allow attackers to conduct click-jacking attacks.

The host is installed with IrfanView before 4.32 and is prone to heap-based buffer overflow vulnerability. A flaw is present in the application, which fails to properly handle crafted "Rows Per Strip" and "Samples Per Pixel" values in a TIFF image file. Successful exploitation allows attackers to execute arbitrary code.

The host is installed with Oracle Java SE 7 Update 7 or earlier, 6 Update 35 or earlier, 5.0 Update 36 or earlier or 1.4.2_38 or earlier and is prone to unspecified vulnerability. A flaw is present in the application, which fails to handle vectors related to networking. Successful exploitation allows remote attackers to affect confidentiality.

The host is installed with Oracle Java SE 7 Update 7 or earlier and is prone to unspecified vulnerability. A flaw is present in the application, which fails to handle vectors related to JAX-WS. Successful exploitation allows attackers to affect confidentiality.


Pages:      Start    1    2    3    4    5    6    7    8    9    10    11    12    13    14    ..   1154

© 2013 SecPod Technologies