[Forgot Password]
Login  Register Subscribe

30480

 
 

423868

 
 

253562

 
 

909

 
 

197267

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 17488 Download | Alert*

The host is installed with Google Chrome before before 9.0.597.107 or Apple Safari before 5.0.6 and is prone to an integer overflow vulnerability. A flaw is present in the applications, which is caused by an integer overflow related to textarea handling. Successful exploitation allows attacker to execute arbitrary code on the system.

The host is installed with Google Chrome before 10.0.648.204 or Apple Safari less than or equal to 5.0.5 and is prone to an use-after-free vulnerability. A flaw is present in the HTMLCollection implementation in the application, which do not properly implement HTMLCollection. Successful exploitation allow remote attackers to cause a denial of service or possibly have unspecified other impact via u ...

The host is installed with Apple Safari before 5.1.1 and is prone to a directory traversal vulnerability. A flaw is present in the application, which fails to handle a crafted safari extension. Successful exploitation could allow to execute arbitrary JavaScript code.

The host is installed with Apple Safari before 5.1.1 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle uninitialized memory during the processing of X.509 certificates. Successful exploitation could allow to execute arbitrary code.

The host is installed with Apple Safari before 5.1.1 and is prone to a security bypass vulnerability. A flaw is present in the application, a logic error when handling cookies while in Private Browsing mode. Successful exploitation could allow attackers to set cookies although the "Block cookies" option is enabled

The host is installed with Apple Safari before 5.1.1 and is prone to a cross site scripting vulnerability. A flaw is present in the application, which fails to handle vectors involving inactive DOM windows. Successful exploitation could allow to execute arbitrary JavaScript code.

The host is installed with Google Chrome before 10.0.648.127 or Apple Safari less than or equal to 5.0.5 and is prone to same origin bypass vulnerability. A flaw is present in the applications, which fails to handle an error message leak. Successful exploitation allow remote attackers to bypass the same origin policy via unspecified vectors, related to an "error message leak".

The host is installed with Apple Safari version less than or equal to 5.0.5 and is prone to cross-site scripting (XSS) vulnerability. A flaw is present in the application which fails to handle vectors involving a URL that contains a username. Successful exploitation allows remote attackers to inject arbitrary web script or HTML.

The host is installed with Google Chrome before 10.0.648.204 or Apple Safari less than or equal to 5.0.5 and is prone to a denial of service vulnerability. A flaw is present in the applications, which do not properly handle parentage. Successful exploitation allow remote attackers to cause a denial of service or possibly have unspecified other impact via unknown vectors.

The host is installed with Google Chrome before 9.0.597.107 or Apple Safari less than or equal to 5.0.5 and is prone to an unspecified vulnerability.A flaw is present in the applications, which is caused by an error related to the URL. Successful exploitation allow attackers to spoof the URL.


Pages:      Start    1197    1198    1199    1200    1201    1202    1203    1204    1205    1206    1207    1208    1209    1210    ..   1748

© SecPod Technologies