[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

250770

 
 

909

 
 

196157

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 195419 Download | Alert*

The host is installed with Google Chrome before 17.0.963.65 or Apple Safari before 6.0 and is prone to an denial of service vulnerability. A flaw is present in the applications, which fail to handle a crafted document. Successful exploitation could allow attackers to crash the service.

The host is installed with Google Chrome before 17.0.963.65 or Apple Safari before 6.0 and is prone to a use-after-free vulnerability. A flaw is present in the applications, which fail to handle vectors related to quote handling. Successful exploitation could allow attackers to crash the service.

The host is installed with Google Chrome before 17.0.963.65 or Apple Safari before 6.0 and is prone to a use-after-free vulnerability. A flaw is present in the applications, which fail to handle vectors related to multi-column handling. Successful exploitation could allow attackers to crash the service.

The host is installed with Google Chrome before 17.0.963.65 or Apple Safari before 6.0 and is prone to a denial of service vulnerability. A flaw is present in the applications, which fail to properly perform casts of unspecified variables during the splitting of anonymous blocks. Successful exploitation could allow attackers to crash the service.

The host is missing a security update according to Apple advisory, APPLE-SA-2018-04-24-3. The update is required to fix multiple vulnerabilities. The flaws are present in the application, which fails to properly perform input validation. Successful exploitation could allow attackers to disclose sensitive information or crash the service.

The host is installed with Apple Safari before 11.1 and is prone to an arbitrary code execution vulnerability. A flaw is present in the applications, which fails to properly handle a memory corruption issue. Successful exploitation may lead to arbitrary code execution.

The host is installed with Apple Safari 5.0.5 and is prone to an URL spoofing vulnerability. A flaw is present in an application, which fails to handle a crafted web page. Successful exploitation could allow attackers to spoof the address bar.

The host is installed with Apple Safari 5.1.2 and is prone to a use-after-free vulnerability. A flaw is present in an application, which fails to handle improper coordination between an API call and the plug-in unloading functionality. Successful exploitation could allow attackers to crash the service.

The host is installed with Apple Safari 5.0.5 and is prone to an URL spoofing vulnerability. A flaw is present in an application, which fails to handle a crafted web page. Successful exploitation could allow attackers to spoof the address bar.

The host is installed with Apple Safari 5.1.2 and is prone to a use-after-free vulnerability. A flaw is present in an application, which fails to handle improper coordination between an API call and the plug-in unloading functionality. Successful exploitation could allow attackers to crash the service.


Pages:      Start    8952    8953    8954    8955    8956    8957    8958    8959    8960    8961    8962    8963    8964    8965    ..   19541

© SecPod Technologies