[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248392

 
 

909

 
 

195452

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 15162 Download | Alert*

The host is installed with Apple Safari before 3.1.2 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly interpret the URLACTION_SHELL_EXECUTE_HIGHRISK Internet Explorer zone setting. Successful exploitation could allow attackers to bypass intended access restrictions, and force a client system to download and execute arbitrary f ...

The host is installed with Apple Safari before 3.1.2 and is prone to a unspecified vulnerability. A flaw is present in the application, which fails to properly handle vectors involving JavaScript arrays. Successful exploitation could allow attackers to crash the service.

The host is installed with Apple Safari before 4.0 and is prone to a privilege escalation vulnerability. A flaw is present in the application, which fails to properly handle vectors related to an unspecified compression method. Successful exploitation could allow local users to gain privileges.

The host is installed with Windows Server 2003, Server 2008, Vista, Windows 7, Server 2008 R2, Server 2012, Windows 8.1 or Server 2012 R2 and is prone to an elevation of privilege vulnerability. A flaw is present in the application, which fails to properly handle file association. Successful exploitation could allow attackers to execute arbitrary code.

The host is installed with Microsoft Windows Vista, Server 2008, Windows 7, Server 2008 R2, Windows 8, Server 2012, Windows 8.1 or Server 2012 R2 and is prone to an elevation of privilege vulnerability. A flaw is present in the application, which fails to properly handle passwords being distributed by Active Directory. Successful exploitation could allow attackers to decrypt the passwords and use ...

The host is installed with JRE or JDK 6 Update 4 or earlier, 5.0 Update 14 or earlier or 1.4.2_16 or earlier and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to handle an untrusted application or applet. Successful exploitation could allow attackers to gain privileges.

The host is installed with JRE or JDK 5.0 Update 13 or earlier or 1.4.2_16 or earlier and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to handle an untrusted application or applet. Successful exploitation could allow attackers to gain privileges.

The host is installed with JRE or JDK 6 Update 4 or earlier, 5.0 Update 14 or earlier or 1.4.2_16 or earlier and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to handle unknown vectors related to XSLT transforms. Successful exploitation could allow attackers to cause a denial of service (JRE crash).

The host is installed with JRE or JDK 6 Update 4 or earlier, 5.0 Update 14 or earlier and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to handle an untrusted application. Successful exploitation could allow attackers to gain privileges.

The host is installed with Sun JDK or JRE 6 Update 1 or earlier or 5.0 Update 13 or earlier and is prone to an unspecified vulnerability. A flaw is present in the applications, which fail to handle an untrusted (1) application or (2) applet,. Successful exploitation could allow attackers to gain privileges .


Pages:      Start    1427    1428    1429    1430    1431    1432    1433    1434    1435    1436    1437    1438    1439    1440    ..   1516

© SecPod Technologies