[Forgot Password]
Login  Register Subscribe

30480

 
 

423868

 
 

253390

 
 

909

 
 

197257

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 14865 Download | Alert*

The host is installed with Google Chrome before 22.0.1229.94 or Apple iTunes 11.0.3 and is prone to use-after-free vulnerability. A flaw is present in the application, which fails to properly handle SVG implementation in WebKit. Successful exploitation allows attackers to execute arbitrary code via unspecified vectors.

The host is installed with Google Chrome before 22.0.1229.94 and is prone to security bypass vulnerability. A flaw is present in the application, which fails to properly handle the Inter-process Communication (IPC) implementation. Successful exploitation allows remote attackers to bypass intended sandbox restrictions and write to arbitrary files by leveraging access to a renderer process.

The host is installed with Google Chrome before 4.0.249.89 and is prone to information disclosure vulnerability. A flaw is present in the application which sends DNS queries directly when a SOCKS 5 proxy server is configured. Successful exploitation allow remote DNS servers to obtain potentially sensitive information about the identity of a client user.

The host is installed with Google Chrome before 4.0.249.89 and is prone to integer overflow vulnerability. A flaw is present in the application which does not properly implement JavaScript arrays. Successful exploitation allow remote attackers to execute arbitrary code in the Chrome sandbox.

The host is installed with PHP and is prone to security bypass vulnerability. A flaw is present is in the extract function in PHP before 5.2.15, which overwrites $GLOBALS and $this when using EXTR_OVERWRITE. Successful exploitation allows context-dependent attackers to bypass intended access restrictions by modifying data structures that are not intended to depend on external input.

The host is installed with Google Chrome before 4.0.249.89 and is prone to arbitrary code vulnerability. A flaw is present in the application which does not properly process ruby tags. Successful exploitation allow remote attackers to execute arbitrary code on the system.

The host is installed with Google Chrome before 4.0.249.89 and is prone to integer overflow vulnerability. A flaw is present in the CrossCallParamsEx::CreateFromBuffer function in the application which does not properly handle deserializing of sandbox messages. Successful exploitation allow remote attackers to leverage renderer access to cause a denial of service (heap memory corruption) or possib ...

The host is installed with MySQL 5.5.0 through 5.5.25 and is prone to unspecified vulnerability. A flaw is present in the application, which fails to handle vectors related to Server. Successful exploitation allows remote authenticated users to affect availability.

The host is installed with Google Chrome before 4.0.249.89 and is prone to bypass vulnerability. A flaw is present in the application which does not properly handle mouse click event. Successful exploitation allow remote attackers to bypass intended restrictions on popup windows.

The host is installed with MySQL 5.5.0 through 5.5.26 and is prone to unspecified vulnerability. A flaw is present in the application, which fails to handle vectors related to MySQL Client. Successful exploitation allows remote authenticated users to affect confidentiality.


Pages:      Start    1261    1262    1263    1264    1265    1266    1267    1268    1269    1270    1271    1272    1273    1274    ..   1486

© SecPod Technologies