[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248678

 
 

909

 
 

195426

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 194688 Download | Alert*

The host is installed with Apple iTunes before 11.0.3 or Apple Safari before 6.0.5 and is prone to a man in the middle attack vulnerability. A flaw is present in the applications, which fail to properly handle multiple memory corruption issues. Successful exploitation could allow attackers to unexpected application termination or execute arbitrary code

The host is missing an important security update according to Apple advisory, APPLE-SA-2013-09-12-2. The update is required to fix multiple vulnerabilities. The flaws are present in the JavaScriptCore's JSArray::sort() method, which fails in proper bound checking. Successful exploitation could allow attackers to cause an unexpected application termination or execute arbitrary code.

The host is installed with Apple Safari before 5.1.10 and is prone to remote code execution vulnerability. The flaw is present in the JavaScriptCore's JSArray::sort() method, which fails in proper bound checking. Successful exploitation could allow attackers to cause an unexpected application termination or execute arbitrary code.

The host is installed with Apple Safari before 5.1.10 and is prone to remote code execution vulnerability. The flaw is present in the JavaScriptCore's JSArray::sort() method, which fails in proper bound checking. Successful exploitation could allow attackers to cause an unexpected application termination or execute arbitrary code.

The host is installed with Google Chrome before 30.0.1599.66 or Apple Safari before 6.1.1 or 7.0.0 and is prone to use-after-free vulnerability. A flaw is present in the application, which fails to handle inline-block rendering. Successful exploitation allows attackers to cause a denial of service.

The host is installed with Google Chrome before 30.0.1599.101 or Apple Safari before 6.1.3, 7.x before 7.0.3 and is prone to multiple unspecified vulnerabilities. The flaws are present in the application, which fails to handle unknown vectors. Successful exploitation allows attackers to cause a denial of service or possibly have other impact via unknown vectors.

The host is installed with Google Chrome before 30.0.1599.101 or Apple Safari before 6.1.4 or 7.x before 7.0.4 and is prone to use-after-free vulnerability. The flaws are present in the HTMLFormElement::prepareForSubmission function in core/html/HTMLFormElement.cpp in Blink, which fails to handle vectors related to submission for FORM elements. Successful exploitation allows remote attackers to ca ...

The host is installed with Google Chrome before 30.0.1599.101 or Apple Safari before 6.1.3, 7.x before 7.0.3 and is prone to use-after-free vulnerability. The flaws are present in the in the IndentOutdentCommand::tryIndentingAsListItem function in core/editing/IndentOutdentCommand.cpp in Blink, which fails to handle vectors related to list elements. Successful exploitation allows remote attackers ...

The host is installed with Apple Safari before 6.1 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle XML files. Successful exploitation could allow attackers to execute arbitrary code or crash the service.

The host is installed with Apple Safari before 6.1 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle crafted data. Successful exploitation could allow attackers to execute arbitrary code or crash the service.


Pages:      Start    8945    8946    8947    8948    8949    8950    8951    8952    8953    8954    8955    8956    8957    8958    ..   19468

© SecPod Technologies