[Forgot Password]
Login  Register Subscribe

30481

 
 

423868

 
 

255116

 
 

909

 
 

198683

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 17560 Download | Alert*

The host is installed with Google Chrome before 11.0.696.57, Apple Safari before 5.0.6 or Apple iTunes before 10.5 and is prone to use-after-free vulnerability. A flaw is present in the browsers, which fail to handle WebSockets implementation. Successful exploitation could allow remote attackers to execute remote code or cause denial of service.

The host is installed with Google Chrome before 11.0.696.57, Apple Safari less than or equal to 5.0.5 or Apple iTunes before 10.5 and is prone to denial of service vulnerability. A flaw is present in the browser, which fails to handle DOM id maps resulting in dangling pointers. Successful exploitation could allow remote attackers to execute remote code or cause denial of service.

The host is installed with Apple iTunes before 11.0.3 and is prone to a man in the middle attack vulnerability. A flaw is present in the application, which fails to properly verify X.509 certificates. Successful exploitation could allow attackers to spoof HTTPS servers via an arbitrary certificate.

The host is installed with Google Chrome before 12.0.742.112 or Apple Safari before 5..1.1 or Apple iTunes before 10.5 and is prone to use-after-free vulnerability. A flaw is present in the application which fails to properly handle SVG use elements. Successful exploitation allows attacker to cause a denial of service.

The host is installed with Apple iTunes before 11.1.4 and is prone to arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle the contents of the iTunes Tutorials window. Successful exploitation allows attackers to gain control and inject arbitrary contents.

The host is installed with Google Chrome before 13.0.782.107 or Apple Safari before 5.1.1 or Apple iTunes before 10.5 and is prone to a security bypass vulnerability. A flaw is present in the application, which fails to handle base URI. Successful exploitation could allow attackers to bypass security and gain sensitive information.

The host is installed with Google Chrome before 13.0.782.107 or Apple Safari before 5.1.1 or Apple iTunes before 10.5 and is prone to a use-after-free vulnerability. A flaw is present in the application, which fails to handle display box function. Successful exploitation allows attacker to crash the service or cause other unknown impacts.

The host is installed with Google Chrome before 13.0.782.107 or Apple Safari before 5.1.1 or Apple iTunes before 10.5 and is prone to a cross site scripting vulnerability. A flaw is present in the application, which fails to enforce proper security restrictions. Successful exploitation allows attackers to bypass same origin policy and conduct script injection attacks.

The host is installed with Google Chrome before 13.0.782.107 or Apple Safari before 5.1.1 or Apple iTunes before 10.5 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to enforce proper security restrictions. Successful exploitation could allow an attacker to disclose potentially sensitive information.

The host is installed with Google Chrome before 13.0.782.107 or Apple Safari before 5.1.1 or Apple iTunes before 10.5 and is prone to a Use-after-free vulnerability. A flaw is present in the application, which fails to handle html range. Successful exploitation could allow attackers to crash the service.


Pages:      Start    1121    1122    1123    1124    1125    1126    1127    1128    1129    1130    1131    1132    1133    1134    ..   1755

© SecPod Technologies