[Forgot Password]
Login  Register Subscribe

24003

 
 

131425

 
 

103942

 
 

909

 
 

84057

 
 

133

 
 
Paid content will be excluded from the download.

Filter
Matches : 11306 Download | Alert*

The host is installed with Apple Safari before 3.1 and is prone to a buffer overflow vulnerability. A flaw is present in the application, which fails to properly handle crafted regular expressions in JavaScript. Successful exploitation allows remote attackers to execute arbitrary code.

The host is installed with Apple Safari before 3.1 and is prone to a cross site scripting vulnerability. A flaw is present in the application, which fails to properly handle a frame that calls a method instance in another frame. Successful exploitation allows remote attackers to inject arbitrary web script or HTML.

The host is installed with Apple Safari before 3.1 and is prone to a cross-site scripting vulnerability. A flaw is present in the application, which fails to handle a crafted URL. Successful exploitation could allow attackers to inject arbitrary web script.

The host is installed with Apple Safari before 3.1 and is prone to a cross-site scripting vulnerability. A flaw is present in the application, which fails to handle a crafted web page. Successful exploitation could allow attackers to execute javascript in the context of another site.

The host is installed with Apple Safari before 3.1 and is prone to a cross-site scripting vulnerability. A flaw is present in the application, which fails to handle unknown vectors related to sites that set the document.domain property or have the same document.domain. Successful exploitation could allow attackers to inject arbitrary web script or HTML.

The host is installed with Apple Safari before 3.1 and is prone to a cross-site scripting vulnerability. A flaw is present in the application, which fails to handle unknown vectors related to the Web Inspector. Successful exploitation could allow attackers to inject arbitrary web script or HTML.

The host is installed with Apple Safari before 3.1 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to properly mask the password field when reverse conversion is used with the Kotoeri input method. Successful exploitation allows physically proximate attackers to read the password.

The host is installed with VMware Workstation 5.5.4, 6.0.2, VMware Player 1.0.4 or 2.0.2 and is prone to a directory traversal vulnerability. A flaw is present in the application, which fails to handle a crafted VMCI calls that trigger memory. Successful exploitation allows attackers to allows guest OS users to read and write arbitrary files on the host OS string that produces a wide character str ...

The host is installed with OpenSSL 0.9.8f or 0.9.8g and is prone to double free vulnerability. A flaw is present in the application, which fails to properly handle a malformed Client Hello packet. Successful exploitation could allow remote attackers to cause a denial of service (crash).

The host is installed with Apache Tomcat 5.5.0 through 5.5.20 or 6.0.0 through 6.0.8 and is prone to information disclosure vulnerability. A flaw is present in the application, which fails handle the cookie in an https session. Successful exploitation allows remote attackers to obtain sensitive information.


Pages:      Start    1051    1052    1053    1054    1055    1056    1057    1058    1059    1060    1061    1062    1063    1064    ..   1130

© 2013 SecPod Technologies