[Forgot Password]
Login  Register Subscribe

24547

 
 

132805

 
 

131537

 
 

909

 
 

108762

 
 

152

 
 
Paid content will be excluded from the download.

Filter
Matches : 10817 Download | Alert*

The host is installed with Google Chrome, and is prone to a denial of service vulnerability. A flaw is present in the browser, as it attempts to read data from an uninitialized pointer. Successful exploitation could allow an attacker to crash the service or cause other unknown impact.

The host is installed with Google Chrome before 12.0.742.112 or Apple Safari before 5..1.1 or Apple iTunes before 10.5 and is prone to use-after-free vulnerability. A flaw is present in the application which fails to properly handle SVG use elements. Successful exploitation allows attacker to cause a denial of service.

The host is installed with Google Chrome and is prone to unspecified vulnerability. A flaw is present in the application which performs a bad bounds check in V8. Successful exploitation allows remote attacker to cause a denial of service.

The host is installed with Google Chrome and is prone to unspecified vulnerability. A flaw is present in the application where the HTML parser fails to properly address lifetime and re-entrancy issues. Successful exploitation allows remote attacker to cause a denial of service.

The host is installed with Mozilla Firefox and is prone to a SSL certificate validation security weakness vulnerability. A flaw is the present in the browser, as it fails to implement single session security exceptions. Successful exploitation could allow an attacker to conduct spoofing and phishing attacks.

The host is installed with Adobe Reader 8.x before 8.2.5 and 9.x before 9.4 and is prone to multiple vulnerabilities. A flaw is present in the application, which fails to validate user supplied data. Successful exploitation could allow an attacker to execute arbitrary code or crash the service.

The host is installed with Adobe Reader 8.x before 8.2.5 or 9.x before 9.4 and is prone to an unspecified vulnerability. A flaw is present in the application which fails to parse an image properly. Successful exploitation could allow an attacker to execute arbitrary code or lead to unspecified impact.

The host is installed with Adobe Reader 8.x before 8.2.5 and 9.x before 9.4 and is prone to an array-indexing vulnerability. A flaw is present in the application, which fails to handle an array-index error. Successful exploitation could allow an attacker to execute arbitrary code.

The host is installed with Opera before 11.10 and is prone to search hijack vulnerability. A flaw is present in the application which fails to prevent third party applications from hijacking searches and other customizations. Successful exploitation allow remote attackers to hijack searches and customizations.

The host is installed with Opera before 11.11 and is prone to denial of service vulnerability. A flaw is present in the application which fails to handle destruction of a silverlight instance. Successful exploitation allow remote attackers to cause a denial of service (application crash).


Pages:      Start    5    6    7    8    9    10    11    12    13    14    15    16    17    18    ..   1081

© SecPod Technologies