[Forgot Password]
Login  Register Subscribe

23631

 
 

126998

 
 

101924

 
 

909

 
 

80911

 
 

121

 
 
Paid content will be excluded from the download.

Filter
Matches : 8257 Download | Alert*

The host is installed with VideoLAN VLC media player before 2.0.5 and is prone to buffer overflow vulnerability. The flaw is present in the ASF Demuxer (modules/demux/asf/asf.c), which fails to handle a crafted ASF movie that triggers an out-of-bounds read. Successful exploitation could allow attackers to execute arbitrary code or cause a denial of service.

The host is installed with Google Chrome before 30.0.1599.66 and is prone to memory corruption vulnerability. A flaw is present in the application, which fails to handle Google V8. Successful exploitation allows attackers to cause a denial of service.

The host is installed with Google Chrome before 31.0.1650.48 and is prone to a security bypass vulnerability. The flaw is present in net/socket/ssl_client_socket_nss.cc, which fails to properly handle the renegotiating a session. Successful exploitation allows remote attackers to interfere with trust relationships by renegotiating a session.

The host is installed with Google Chrome before 28.0.1500.95 and is prone to use-after-free vulnerability. The flaw is present in the DOM implementation in Google Chrome, which does not properly handle vectors related to improper tracking of which document owns an Attr object. Successful exploitation allows remote attackers to cause a denial of service or possibly have unspecified other impact.

The host is installed with Google Chrome before 33.0.1750.117 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to properly restrict the information in WebDropData data structures. Successful exploitation could allow attackers to discover full pathnames via a crafted web site.

The host is installed with Google Chrome before 33.0.1750.117 and is prone to multiple unspecified vulnerabilities. The flaws are present in the application, which fails to properly handle crafted data. Successful exploitation could allow attackers to bypass the sandbox protection mechanism after obtaining renderer access, or have other impact.

The host is installed with Google Chrome before 34.0.1847.116 and is prone to multiple unspecified vulnerabilities. The flaws are present in the application, which fails to properly handle unknown vectors. Successful exploitation could allow attackers to crash the service.

The host is installed with Google Chrome before 35.0.1916.114 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to handle an INPUT element with a -x-webkit-speech attribute. Successful exploitation could allow attackers to enable microphone access and obtain speech-recognition text.

The host is installed with Google Chrome before 37.0.2062.94 and is prone to denial of service vulnerability. A flaw is present in the application, which does not properly consider concurrent threads during attempts to update biquad filter coefficients. Successful exploitation allow attackers to cause a denial of service (read of uninitialized memory).

The host is installed with Google Chrome before 38.0.2125.101 and is prone to multiple unspecified vulnerabilities. The flaws are present in the application, which fail to handle unknown vectors. Successful exploitation allows attackers to cause a denial of service or possibly have other impact.


Pages:      Start    774    775    776    777    778    779    780    781    782    783    784    785    786    787    ..   825

© 2013 SecPod Technologies