[Forgot Password]
Login  Register Subscribe

30481

 
 

423868

 
 

255116

 
 

909

 
 

198683

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 16267 Download | Alert*

The host is installed with Safari before 13.1.1 on Apple Mac OS X 10.13.6, 10.14.6 or 10.15.x before 10.15.5 and is prone to a type confusion vulnerability. A flaw is present in the application, which fails to properly handle a memory issue. Successful exploitation allow an attacker to cause arbitrary code execution.

The host is installed with Safari before 13.1.1 on Apple Mac OS X 10.13.6, 10.14.6 or 10.15.x before 10.15.5 and is prone to a privilege escalation vulnerability. A flaw is present in the application, which fails to properly handle an access issue. Successful exploitation allow an attacker to cause disclosure of process memory.

The host is installed with Safari before 13.1.2 on Apple Mac OS X 10.13.6, 10.14.6 or 10.15.x before 10.15.6 and is prone to a privilege escalation vulnerability. A flaw is present in the application, which fails to properly handle a logic issue. Successful exploitation allows an attacker to change the origin of a frame for a download in Safari Reader mode.

The host is installed with Safari before 13.1.2 on Apple Mac OS X 10.13.6, 10.14.6 or 10.15.x before 10.15.6 and is prone to a privilege escalation vulnerability. A flaw is present in the application, which fails to properly handle a logic issue. Successful exploitation allows an attacker to cause Safari to suggest a password for the wrong domain.

The host is installed with Safari before 13.1.2 on Apple Mac OS X 10.13.6, 10.14.6 or 10.15.x before 10.15.6 and is prone to a security bypass vulnerability. A flaw is present in the application, which fails to properly handle a logic issue. Successful exploitation may allow a remote attacker to bypass the Same Origin Policy.

The host is installed with Safari before 13.1.2 on Apple Mac OS X 10.13.6, 10.14.6 or 10.15.x before 10.15.6 and is prone to a pointer authentication bypass vulnerability. A flaw is present in the application, which fails to properly handle a logic issue. Successful exploitation may allow an attacker with arbitrary read and write capability to bypass Pointer Authentication.

The host is installed with Safari before 13.1.2 on Apple Mac OS X 10.13.6, 10.14.6 or 10.15.x before 10.15.6 and is prone to a URL unicode encoding vulnerability. A flaw is present in the application, which fails to properly handle a state management issue. Successful exploitation may allow an attacker to conceal the destination of a URL.

The host is installed with Apple Safari before 6.0 and is prone to a cross site scripting vulnerability. A flaw is present in the application, which fails to handle a crafted feed URL. Successful exploitation could allow attackers to inject arbitrary web script.

The host is installed with Apple Safari before 6.0 and is prone to an arbitrary file read vulnerability. A flaw is present in the application, which fails to handle a crafted feed URL. Successful exploitation could allow attackers to disclose sensitive information.

The host is installed with Apple Safari before 6.0 and is prone to security bypass vulnerability. A flaw is present in the application, which fails to properly handle the autocomplete attribute of a password input element. Successful exploitation could allow attackers to bypass authentication by leveraging an unattended workstation.


Pages:      Start    1042    1043    1044    1045    1046    1047    1048    1049    1050    1051    1052    1053    1054    1055    ..   1626

© SecPod Technologies