[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248678

 
 

909

 
 

195426

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 15028 Download | Alert*

The host is installed with Apple Safari version less than or equal to 5.0.5 and is prone to security bypass vulnerability. A flaw is present in CFNetwork in the application which fails to handle an untrusted attribute of a system root certificate. Successful exploitation allows remote web servers to bypass intended SSL restrictions via a certificate signed by a blacklisted certification authority.

The host is installed with Apple Safari version less than or equal to 5.0.5 and is prone to security bypass vulnerability. A flaw is present in CFNetwork in the application which fails to handle a crafted text/plain file. Successful exploitation allows remote attackers to inject arbitrary web script or HTML.

The host is installed with Apple Safari version less than or equal to 5.0.5 and is prone to arbitrary code execution vulnerability. A flaw is present in CFNetwork in the application which fails to handle credential reflection issue. Successful exploitation allows remote web servers to execute arbitrary code by replaying the NTLM credentials of a client user.

Buffer overflow in Apple QuickTime 7.5.5 and iTunes 8.0 allows remote attackers to cause a denial of service (browser crash) or possibly execute arbitrary code via a long type attribute in a quicktime tag (1) on a web page or embedded in a (2) .mp4 or (3) .mov file, possibly related to the Check_stack_cookie function and an off-by-one error that leads to a heap-based buffer overflow.

The host is installed with Adobe Reader or Adobe Acrobat and is prone to untrusted search path vulnerability. A flaw is present in the applications which fails to properly handle specially crafted DLL file. Successful exploitation allows remote attacker to gain privileges.

The host is installed with Adobe Reader and Adobe Acrobat and is prone to unspecified vulnerability. A flaw is present in the applications which does not properly validate the user input. Successful exploitation allows remote attacker to bypass intended access restrictions.

The host is installed with Adobe Reader or Adobe Acrobat and is prone to memory corruption vulnerability. A flaw is present in the applications which fails to properly handle the memory. Successful exploitation allows remote attacker to execute arbitrary code.

The host is installed with Oracle Java SE and is prone to unspecified vulnerability. A flaw is present in Java Runtime Environment (JRE) component in the application, which fails to properly handle vectors related to deployment. Successful exploitation allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality, integrity, and availability.

The host is installed with Oracle Java SE and is prone to unspecified vulnerability. A flaw is present in Java Runtime Environment (JRE) component in the application, which fails to properly handle vectors related to deployment. Successful exploitation allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality, integrity, and availability.

The host is installed with Oracle Java SE and is prone to unspecified vulnerability. A flaw is present in Java Runtime Environment (JRE) component in the application, which fails to properly handle vectors related to deployment. Successful exploitation allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality, integrity, and availability.


Pages:      Start    1319    1320    1321    1322    1323    1324    1325    1326    1327    1328    1329    1330    1331    1332    ..   1502

© SecPod Technologies