[Forgot Password]
Login  Register Subscribe

23631

 
 

126951

 
 

99602

 
 

909

 
 

80167

 
 

109

 
 
Paid content will be excluded from the download.

Filter
Matches : 10935 Download | Alert*

The host is installed with Google Chrome before 16.0.912.77 or Apple Safari before 5.1.4 and is prone to use-after-free vulnerability. A flaw is present in the applications, which fail to handle vectors related to DOM. Successful exploitation could allow remote attackers to execute arbitrary code or crash the service.

The host is installed with Google Chrome before 16.0.912.63 or Apple iTunes before 10.6 or Apple Safari before 5.1.4 and is prone to an out-of-bounds read vulnerability. A flaw is present in the applications, which fail to handle SVG parsing. Successful exploitation could allow attackers to crash the service.

The host is installed with Google Chrome before 15.0.874.102 or Apple iTunes before 10.6 or Apple Safari before 5.1.4 and is prone to a use-after-free vulnerability. A flaw is present in the applications, which fail to properly handle editing operations in conjunction with an unknown plug-in. Successful exploitation could allow attackers to crash the service or cause other unknown impacts

The host is installed with Google Chrome before 15.0.874.120 or Apple iTunes before 10.6 or Apple Safari before 5.1.4 and is prone to an use after free vulnerability. A flaw is present in the applications, which fail to sanitize user supplied input. Successful exploitation could allow attackers to crash the service.

The host is installed with Google Chrome before 15.0.874.102 or Apple Safari before 5.1.4 and is prone to a security bypass vulnerability. A flaw is present in the applications, which fail to properly handle javascript URLs. Successful exploitation could allow attackers to read cookies and bypass security.

The host is installed with Google Chrome before 15.0.874.102 or Apple iTunes before 10.6 or Apple Safari before 5.1.4 and is prone to a use-after-free vulnerability. A flaw is present in the applications, which fail to handle stale style bugs. Successful exploitation could allow attackers to crash the service or cause other unknown impacts

The host is installed with Google Chrome before 15.0.874.102 or Apple Safari before 5.1.4 and is prone to a same origin policy bypass vulnerability. A flaw is present in the applications, which fail to handle cross-origin policy violations. Successful exploitation could allow attackers to bypass security restrictions.

The host is installed with Apple Safari 5.0.5 and is prone to an URL spoofing vulnerability. A flaw is present in an application, which fails to handle a crafted web page. Successful exploitation could allow attackers to spoof the address bar.

The host is installed with JRE component in Oracle Java SE JDK, JRE 7, 6 Update 27 or earlier or JavaFX 2.0, and is prone to an unspecified vulnerability. A flaw is present in the applications, which fail to sanitize user supplied input. Successful exploitation could allow attackers to produce unknown impacts.

The host is installed with Oracle Java SE JDK and JRE 7, 6 Update 27 and earlier, 5.0 Update 31 and earlier, and 1.4.2_33 and earlier and is prone to an unspecified vulnerability. A flaw is present in the applications, which fail to handle remote untrusted Java Web Start applications and untrusted Java applets. Successful exploitation could allow attackers to affect confidentiality and integrity.


Pages:      Start    7    8    9    10    11    12    13    14    15    16    17    18    19    20    ..   1093

© 2013 SecPod Technologies