[Forgot Password]
Login  Register Subscribe

23631

 
 

126998

 
 

102010

 
 

909

 
 

80911

 
 

121

 
 
Paid content will be excluded from the download.

Filter
Matches : 12181 Download | Alert*

The host is installed with Apple Safari before 4.0 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle a "high-bit character" in a URL fragment for an unspecified protocol. Successful exploitation could allow attackers to execute arbitrary code or crash the service.

The host is installed with Apple Safari before 4.0 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle a file://' Protocol Handler. Successful exploitation could allow attackers to crash the service.

The host is installed with Apple Safari before 3.2.2 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to handle a crafted feed: URL. Successful exploitation could allow attackers to execute arbitrary code.

The host is installed with Apple Safari before 4.0 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to properly handle vectors involving a CANVAS element and redirection. Successful exploitation could allow attackers to read images from arbitrary web sites.

The host is installed with Apple Safari before 4.0.3 and is prone to a buffer overflow vulnerability. A flaw is present in the application, which fails to handle crafted floating-point numbers. Successful exploitation could allow attackers execute arbitrary code or cause a denial of service.

The host is installed with Apple Safari before 4.0.3 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to properly restrict the URL scheme of the pluginspage attribute of an EMBED element. Successful exploitation could allow attackers to launch arbitrary file: URLs and obtain sensitive information via a crafted HTML document.

The host is installed with Microsoft ASP.NET MVC 2, 3 or 4 and it is prone a cross-site scripting (XSS) vulnerability. A flaw is present in the application, which fails to handle a crafted web page. Successful exploitation allows remote attackers to inject arbitrary web script or HTML.

The host is installed with Microsoft Windows Vista, Windows Server 2008, Windows Server 2008 R2, Windows 7, Windows 8 or Windows Server 2012 and is prone to an denial of service vulnerability. The flaw is present in the Active Directory Lightweight Directory Service (AD LDS), which fails to properly handle specially crafted query to the Lightweight Directory Access Protocol (LDAP) service. Succes ...

The host is installed with Microsoft Windows Vista SP2, Server 2008 SP2, Server 2008 R2 SP2, Windows 7 SP1, Windows Server 2012 or Windows 8 and is prone to elevation of privilege vulnerability. A flaw is present in the application, which fails to properly handle objects in memory. Successful exploitation allows local users to gain privileges via a crafted application.

The host is installed with Microsoft Internet Explorer 9 or 10 and is prone to use-after-free vulnerability. The flaw is present in Microsoft Internet Explorer 9 and 10, which fails to handle a crafted CSpliceTreeEngine::InsertSplice object in an HTML document. Successful exploitation allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption).


Pages:      Start    1144    1145    1146    1147    1148    1149    1150    1151    1152    1153    1154    1155    1156    1157    ..   1218

© 2013 SecPod Technologies