[Forgot Password]
Login  Register Subscribe

30481

 
 

423868

 
 

255116

 
 

909

 
 

198683

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 197798 Download | Alert*

The host is installed with Apple iTunes before 11.0.3 or Apple Safari before 6.0.5 and is prone to a man in the middle attack vulnerability. A flaw is present in the applications, which fail to properly handle multiple memory corruption issues. Successful exploitation could allow attackers to unexpected application termination or execute arbitrary code

The host is installed with Apple iTunes before 11.0.3 or Apple Safari before 6.0.5 and is prone to a man in the middle attack vulnerability. A flaw is present in the applications, which fail to properly handle multiple memory corruption issues. Successful exploitation could allow attackers to unexpected application termination or execute arbitrary code

The host is missing an important security update according to Apple advisory, APPLE-SA-2013-09-12-2. The update is required to fix multiple vulnerabilities. The flaws are present in the JavaScriptCore's JSArray::sort() method, which fails in proper bound checking. Successful exploitation could allow attackers to cause an unexpected application termination or execute arbitrary code.

The host is installed with Apple Safari before 5.1.10 and is prone to remote code execution vulnerability. The flaw is present in the JavaScriptCore's JSArray::sort() method, which fails in proper bound checking. Successful exploitation could allow attackers to cause an unexpected application termination or execute arbitrary code.

The host is installed with Apple Safari before 5.1.10 and is prone to remote code execution vulnerability. The flaw is present in the JavaScriptCore's JSArray::sort() method, which fails in proper bound checking. Successful exploitation could allow attackers to cause an unexpected application termination or execute arbitrary code.

The host is installed with Google Chrome before 30.0.1599.66 or Apple Safari before 6.1.1 or 7.0.0 and is prone to use-after-free vulnerability. A flaw is present in the application, which fails to handle inline-block rendering. Successful exploitation allows attackers to cause a denial of service.

The host is installed with Google Chrome before 30.0.1599.101 or Apple Safari before 6.1.3, 7.x before 7.0.3 and is prone to multiple unspecified vulnerabilities. The flaws are present in the application, which fails to handle unknown vectors. Successful exploitation allows attackers to cause a denial of service or possibly have other impact via unknown vectors.

The host is installed with Google Chrome before 30.0.1599.101 or Apple Safari before 6.1.4 or 7.x before 7.0.4 and is prone to use-after-free vulnerability. The flaws are present in the HTMLFormElement::prepareForSubmission function in core/html/HTMLFormElement.cpp in Blink, which fails to handle vectors related to submission for FORM elements. Successful exploitation allows remote attackers to ca ...

The host is installed with Google Chrome before 30.0.1599.101 or Apple Safari before 6.1.3, 7.x before 7.0.3 and is prone to use-after-free vulnerability. The flaws are present in the in the IndentOutdentCommand::tryIndentingAsListItem function in core/editing/IndentOutdentCommand.cpp in Blink, which fails to handle vectors related to list elements. Successful exploitation allows remote attackers ...

The host is installed with Apple Safari before 6.1 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle XML files. Successful exploitation could allow attackers to execute arbitrary code or crash the service.


Pages:      Start    9495    9496    9497    9498    9499    9500    9501    9502    9503    9504    9505    9506    9507    9508    ..   19779

© SecPod Technologies