[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

250038

 
 

909

 
 

195843

 
 

282

Paid content will be excluded from the download.


Download | Alert*


oval:org.secpod.oval:def:20951
The host is installed with Google Chrome before 37.0.2062.94 and is prone to security bypass vulnerability. A flaw is present in the application, which does not validate a tab's URL before an attach operation. Successful exploitation allow attackers to bypass intended access limitations.

oval:org.secpod.oval:def:20950
The host is installed with Google Chrome before 37.0.2062.94 and is prone to security bypass vulnerability. A flaw is present in the application, which does not validate a tab's URL before an attach operation. Successful exploitation allow attackers to bypass intended access limitations.

oval:org.secpod.oval:def:20919
The host is installed with Google Chrome before 37.0.2062.94 and is prone to security bypass vulnerability. A flaw is present in the application, which does not validate a tab's URL before an attach operation. Successful exploitation allow attackers to bypass intended access limitations.

oval:org.secpod.oval:def:20941
The host is missing a critical severity security update according to Google advisory. The update is required to fix multiple vulnerabilities. The flaws are present in the application, which fails to properly handle certain vectors. Successful exploitation allows remote attackers to cause arbitrary c ...

oval:org.secpod.oval:def:601791
Several vulnerabilities were discovered in the chromium web browser. CVE-2014-3160 Christian Schneider discovered a same origin bypass issue in SVG file resource fetching. CVE-2014-3162 The Google Chrome development team addressed multiple issues with potential security impact for chromium 36.0.1985 ...

oval:org.secpod.oval:def:20935
The host is installed with Google Chrome before 37.0.2062.94 and is prone to security bypass vulnerability. A flaw is present in the application, which does not validate a tab's URL before an attach operation. Successful exploitation allow attackers to bypass intended access limitations.

oval:org.secpod.oval:def:20962
The host is missing a critical severity security update according to Google advisory. The update is required to fix multiple vulnerabilities. The flaws are present in the application, which fails to properly handle certain vectors. Successful exploitation allows remote attackers to cause arbitrary c ...

oval:org.secpod.oval:def:20963
The host is missing a critical severity security update according to Google advisory. The update is required to fix multiple vulnerabilities. The flaws are present in the application, which fails to properly handle certain vectors. Successful exploitation allows remote attackers to cause arbitrary c ...

oval:org.secpod.oval:def:20925
The host is missing a critical severity security update according to Google advisory. The update is required to fix multiple vulnerabilities. The flaws are present in the application, which fails to properly handle certain vectors. Successful exploitation allows remote attackers to cause arbitrary c ...

CPE    82
cpe:/a:google:chrome:37.0.2062.4
cpe:/a:google:chrome:37.0.2062.3
cpe:/a:google:chrome:37.0.2062.2
cpe:/a:google:chrome:37.0.2062.71
...
CWE    1
CWE-264
*CVE
CVE-2014-3172

© SecPod Technologies