[Forgot Password]
Login  Register Subscribe

30481

 
 

423868

 
 

255116

 
 

909

 
 

198683

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 17560 Download | Alert*

The host is installed with Mozilla Firefox or SeaMonkey and is prone to escalation of privilege vulnerability. A flaw is present in the application, which fails to handle Java Embedding Plugin (JEP) shipped with the Mac OS X. Successful exploitation could allow remote attackers to obtain elevated access to resources on a user's system.

The host is installed with Mozilla Firefox or SeaMonkey and is prone to use-after-free vulnerability. A flaw is present in the application, which fails to handle OBJECT and qts mObserverList. Successful exploitation could allow remote attackers to execute arbitrary code.

The host is installed with Mozilla Firefox or SeaMonkey and is prone to an use-after-free vulnerability. A flaw is present in the application, which fails to handle OBJECT's mChannel. Successful exploitation could allow remote attackers to execute arbitrary code.

The host is installed with Oracle Java SE through 11.0.6 or 14 and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to handle vectors related to JSSE. Successful exploitation allows attackers to affect integrity.

The host is installed with Google Chrome before 25.0.1364.160, Apple iTunes before 11.0.3 and Safari before 6.0.4 and is prone to a remote code execution vulnerability. A flaw is present in the applications, which fail to handle vectors that leverage type confusion. Successful exploitation could allow attackers to execute arbitrary code.

The host is installed with Apple Safari before 6.0.3 or Apple iTunes before 11.0.3 and is prone to multiple memory corruption vulnerabilities. The flaws are present in the applications, which fail to handle malicious data. Successful exploitation could allow attackers to execute arbitrary code or crash the service.

The host is installed with Apple Safari before 6.0.3 or Apple iTunes before 11.0.3 and is prone to multiple memory corruption vulnerabilities. The flaws are present in the applications, which fail to handle malicious data. Successful exploitation could allow attackers to execute arbitrary code or crash the service.

The host is installed with Apple Safari before 6.0.3 or Apple iTunes before 11.0.3 and is prone to multiple memory corruption vulnerabilities. The flaws are present in the applications, which fail to handle malicious data. Successful exploitation could allow attackers to execute arbitrary code or crash the service.

The host is installed with Apple Safari before 6.0.3 or Apple iTunes before 11.0.3 and is prone to multiple memory corruption vulnerabilities. The flaws are present in the applications, which fail to handle malicious data. Successful exploitation could allow attackers to execute arbitrary code or crash the service.

The host is installed with Apple Safari before 6.0.3 or Apple iTunes before 11.0.3 and is prone to multiple memory corruption vulnerabilities. The flaws are present in the applications, which fail to handle malicious data. Successful exploitation could allow attackers to execute arbitrary code or crash the service.


Pages:      Start    1119    1120    1121    1122    1123    1124    1125    1126    1127    1128    1129    1130    1131    1132    ..   1755

© SecPod Technologies