[Forgot Password]
Login  Register Subscribe

23631

 
 

126998

 
 

101924

 
 

909

 
 

80911

 
 

121

 
 
Paid content will be excluded from the download.

Filter
Matches : 8434 Download | Alert*

The host is installed with Google Chrome before 34.0.1847.116 and is prone to an universal cross site scripting vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation could allow attackers to inject arbitrary web script or HTML.

The host is installed with Google Chrome before 34.0.1847.116 and is prone to an out-of-bounds read vulnerability. A flaw is present in the application, which fails to properly handle string data composed exclusively of whitespace characters. Successful exploitation could allow attackers to crash the service.

The host is installed with Google Chrome before 38.0.2125.101 and is prone to a use-after-free vulnerability. The flaw is present in the application, which fail to handle vectors that leverage "type confusion" for callback processing. Successful exploitation allows attackers to cause a denial of service (use-after-free) or possibly have unspecified other impact.

The host is installed with Google Chrome before 40.0.2214.91 and is prone to an use-after-free vulnerability. A flaw is present in the application, which fails to handle a crafted document that triggers improper maintenance of a zoom bubble. Successful exploitation could allow attackers to cause a denial of service or possibly have unspecified other impact.

The host is installed with Google Chrome before 41.0.2272.76 and is prone to an address bar spoofing vulnerability. A flaw is present in the application when Instant Extended mode is used, which does not properly consider the interaction between the "1993 search" features and restore-from-disk RELOAD transitions. Successful exploitation makes it easier for remote attackers to spoof the address bar ...

The host is installed with Google Chrome before 41.0.2272.76 and is prone to an array index error vulnerability. A flaw is present in the MidiManagerUsb::DispatchSendMidiData function in media/midi/midi_manager_usb.cc in Google Chrome, which does not properly handle unknown vectors. Successful exploitation allows remote attackers to cause a denial of service or possibly have other impact.

The host is installed with Adobe Reader or Acrobat 10.x before 10.1.14 or 11.x before 11.0.11 and is prone to an use-after-free vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation allows attackers to execute arbitrary code.

The host is installed with Google Chrome before 44.0.2403.89 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to properly choose a truncation function. Successful exploitation could allow attackers to disclose sensitive information.

The host is installed with VideoLAN VLC Media Player 2.1.5 or earlier and is prone to a buffer overflow vulnerability. A flaw is present in the application, which fails to handle unknown vectors. Successful exploitation allows attackers to cause unknown impact.

The host is installed with VideoLAN VLC Media Player 2.1.5 or earlier and is prone to a buffer overflow vulnerability. A flaw is present in the application, which fails to handle unknown vectors. Successful exploitation allows attackers to cause unknown impact.


Pages:      Start    775    776    777    778    779    780    781    782    783    784    785    786    787    788    ..   843

© 2013 SecPod Technologies