[Forgot Password]
Login  Register Subscribe

30480

 
 

423868

 
 

251782

 
 

909

 
 

196543

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 195805 Download | Alert*

The host is installed with Google Chrome before 20.0.1132.57 or Apple Safari before 6.0.1 and is prone to use-after-free vulnerability. A flaw is present in the application, which fails to handle vectors related to layout height tracking. Successful exploitation allows attackers to cause a denial of service or possibly have unspecified other impact.

The host is installed with Google Chrome before 20.0.1132.57 or Apple Safari before 6.0.1 and is prone to use-after-free vulnerability. A flaw is present in the application, which fails to properly handle vectors related to counter handling. Successful exploitation allows attackers to cause a denial of service or possibly have unspecified other impact.

The host is missing a high severity security update according to Google advisory. The update is required to fix multiple vulnerabilities. The flaws are present in the application, which fails to handle certain vectors. Successful exploitation allows attackers to cause a denial of service.

The host is installed with Google Chrome before 21.0.1180.60 or Apple iTunes 11.0.3 and is prone to a use-after-free vulnerability. A flaw is present in the application, which fails to properly handle a crafted document. Successful exploitation could allow remote attackers to crash the service.

The host is installed with Google Chrome before 21.0.1180.57, Apple iTunes before 11.0.3 or Apple Safari before 6.0.3 and is prone to a use-after-free vulnerability. A flaw is present in the applications, which fail to properly handle a crafted document. Successful exploitation could allow remote attackers to crash the service.

The host is installed with Apple Mac OS 11.4 or Apple Safari before 14.1.1 on MacOS Mojave or MacOS Catalina and is prone to a use after free vulnerability. A flaw is present in the application, which fails to properly handle a memory management issue. Successful exploitation allows an attacker to cause arbitrary code execution.

The host is installed with Apple Mac OS 11.4 or Apple Safari before 14.1.1 on MacOS Mojave or MacOS Catalina and is prone to a null pointer dereference vulnerability. A flaw is present in the application, which fails to properly handle an input validation issue. Successful exploitation allows an attacker to cause a denial of service.

The host is installed with Apple Mac OS 11.4 or Apple Safari before 14.1.1 on MacOS Mojave or MacOS Catalina and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to properly handle a logic issue. Successful exploitation allows an attacker to leak sensitive user information.

The host is installed with Apple Mac OS 11.4 or Apple Safari before 14.1.1 on MacOS Mojave or MacOS Catalina and is prone to a universal cross site scripting vulnerability. A flaw is present in the application, which fails to properly handle a logic issue. Successful exploitation allows an attacker to cause universal cross site scripting while processing maliciously crafted web content.

The host is installed with Apple Mac OS before 11.4 and Apple Safari before 14.1.1 on MacOS Mojave or MacOS Catalina and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to handle a memory management issue. On successful exploitation, processing maliciously crafted web content may lead to arbitrary code execution.


Pages:      Start    9005    9006    9007    9008    9009    9010    9011    9012    9013    9014    9015    9016    9017    9018    ..   19580

© SecPod Technologies