[Forgot Password]
Login  Register Subscribe

30481

 
 

423868

 
 

255861

 
 

909

 
 

199025

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 16276 Download | Alert*

The host is installed with Apple Safari before 11.1.2 and is prone to a multiple memory corruption vulnerabilities.The flaws are present in the application, which fails to properly handle a maliciously crafted web content. Successful exploitation allows attackers to cause an unexpected Safari crash.

The host is installed with Apple Safari before 11.1.2 and is prone to an address bar spoofing vulnerability. A flaw is present in the application, which fails to properly handle a malicious website. Successful exploitation allows attackers to spoof address bars.

The host is installed with Apple Safari before 11.1.2 and is prone to an address bar spoofing vulnerability. A flaw is present in the application, which fails to properly handle a malicious website. Successful exploitation allows attackers to spoof address bars.

The host is installed with Apple Safari before 12.0 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to properly handle a malicious website, when loaded by the target user. Successful exploitation allows attackers to obtain potentially sensitive auto-filled information from the target user's system.

The host is installed with Apple Safari before 12.0 and is prone to a user interface spoofing vulnerability. A flaw is present in the application, which fails to properly handle a data deletion issue in browsing history. Successful exploitation allows attackers to prevent users from deleting browsing history items.

The host is installed with Apple Safari before 12.0 and is prone to a user interface spoofing vulnerability. A flaw is present in the application, which fails to properly handle an inconsistent user interface issue. Successful exploitation allows attackers to spoof user interface content.

The host is installed with Apple Safari before 12.0 and is prone to a CORS vulnerability. A flaw is present in the application, which fails to properly handle an issue in iFrame elements. Successful exploitation allows attackers to cause unexpected cross-origin behavior through a malicious website.

The host is installed with Apple Safari before 12.0 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle validation issues. Successful exploitation allows attackers to cause an assert failure through unexpected interaction.

The host is installed with Apple Safari before 12.0 and is prone to a cross-site-scripting vulnerability. A flaw is present in the application, which fails to properly handle an issue in URL validation. Successful exploitation allows attackers to execute scripts in the context of another website.

The host is installed with Apple Safari before 12.0 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle maliciously crafted web content. Successful exploitation allows attackers to execute arbitrary code.


Pages:      Start    1053    1054    1055    1056    1057    1058    1059    1060    1061    1062    1063    1064    1065    1066    ..   1627

© SecPod Technologies