[Forgot Password]
Login  Register Subscribe

30480

 
 

423868

 
 

253164

 
 

909

 
 

197077

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 196303 Download | Alert*

The host is installed with Google Chrome before 10.0.648.127 or Apple Safari less than or equal to 5.0.5 and is prone to same origin bypass vulnerability. A flaw is present in the applications, which fails to handle an error message leak. Successful exploitation allow remote attackers to bypass the same origin policy via unspecified vectors, related to an "error message leak".

The host is installed with Apple Safari version less than or equal to 5.0.5 and is prone to cross-site scripting (XSS) vulnerability. A flaw is present in the application which fails to handle vectors involving a URL that contains a username. Successful exploitation allows remote attackers to inject arbitrary web script or HTML.

The host is installed with Google Chrome before 10.0.648.204 or Apple Safari less than or equal to 5.0.5 and is prone to a denial of service vulnerability. A flaw is present in the applications, which do not properly handle parentage. Successful exploitation allow remote attackers to cause a denial of service or possibly have unspecified other impact via unknown vectors.

The host is installed with Google Chrome before 9.0.597.107 or Apple Safari less than or equal to 5.0.5 and is prone to an unspecified vulnerability.A flaw is present in the applications, which is caused by an error related to the URL. Successful exploitation allow attackers to spoof the URL.

The host is installed with Apple Safari before 5.1.1 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to enforce an intended policy for file: URLs. Successful exploitation could allow to execute arbitrary code.

The host is installed with Apple Safari less than or equal to 5.0.5 and is prone to a security bypass vulnerability. A flaw is present in the application, which fails to properly handle HTML content. Successful exploitation could allow attackers to bypass security.

The host is missing a security update according to APPLE-SA-2011-07-20-1. The update is required to fix multiple vulnerabilities. The flaws are present in the application, which fails to sanitize crafted input. Successful exploitation could allow attackers to affect confidentiality, integrity, and availability.

The host is missing a security update according to Apple advisory, APPLE-SA-2013-12-16-1. The update is required to fix multiple memory corruption vulnerabilities. The flaws are present in the application, which fails to handle crafted websites. Successful exploitation allows attackers to execute remote code.

The host is installed with Apple Safari before 6.1.1 or 7.0.0 and is prone to remote code execution vulnerability. A flaw is present in the application, which fails to handle crafted HTML. Successful exploitation allows attackers to cause the browser to autofill user credentials to a subframe from a different domain.

The host is installed with Apple Safari before 6.1.1 or 7.0.0 and is prone to memory corruption vulnerability. A flaw is present in the application, which fails to handle crafted website. Successful exploitation allows attackers to lead to an unexpected application termination or arbitrary code execution.


Pages:      Start    9215    9216    9217    9218    9219    9220    9221    9222    9223    9224    9225    9226    9227    9228    ..   19630

© SecPod Technologies