[Forgot Password]
Login  Register Subscribe

23631

 
 

126998

 
 

101924

 
 

909

 
 

80911

 
 

121

 
 
Paid content will be excluded from the download.

Filter
Matches : 5779 Download | Alert*

The host is installed with Google Chrome before 41.0.2272.76 and is prone to an unspecified vulnerability. A flaw is present in content/renderer/device_sensors/device_orientation_event_pump.cc in Google Chrome, which does not properly restrict access to high-rate gyroscope data. Successful exploitation makes it easier for remote attackers to obtain speech signals from a device's physical environme ...

The host is installed with Google Chrome before 41.0.2272.76 and is prone to an unspecified vulnerability. A flaw is present in content/renderer/device_sensors/device_motion_event_pump.cc in Google Chrome, which does not properly restrict access to high-rate accelerometer data. Successful exploitation makes it easier for remote attackers to capture keystrokes.

The host is installed with Google Chrome before 41.0.2272.76 and is prone to an unspecified vulnerability. A flaw is present in content/renderer/device_sensors/device_motion_event_pump.cc in Google Chrome, which does not properly restrict access to high-rate accelerometer data. Successful exploitation makes it easier for remote attackers to capture keystrokes.

The host is installed with Google Chrome before 44.0.2403.89 and is prone to a heap-based buffer overflow vulnerability. A flaw is present in the application, which fails to properly handle a crafted PDF document that triggers a large memory allocation. Successful exploitation could allow remote attackers to crash the service.

The host is installed with Google Chrome before 44.0.2403.89 and is prone to a heap-based buffer overflow vulnerability. A flaw is present in the application, which fails to properly handle a crafted PDF document that triggers a large memory allocation. Successful exploitation could allow remote attackers to crash the service.

The host is installed with Google Chrome before 40.0.2214.91 and is prone to a privilege escalation vulnerability. The flaw is present in the application, which fails to handle a trojan horse program. Successful exploitation allows local users to gain privileges.

The host is installed with Google Chrome before 40.0.2214.91 and is prone to a privilege escalation vulnerability. The flaw is present in the application, which fails to handle a trojan horse program. Successful exploitation allows local users to gain privileges.

The host is installed with Google Chrome before 40.0.2214.91 and is prone to an use-after-free vulnerability. The flaw is present in the application, which fails to handle a crafted PDF document. Successful exploitation allows remote attackers to cause a denial of service or possibly have unspecified other impact.

The host is installed with Google Chrome before 40.0.2214.91 and is prone to an use-after-free vulnerability. The flaw is present in the application, which fails to handle a crafted PDF document. Successful exploitation allows remote attackers to cause a denial of service or possibly have unspecified other impact.

The host is installed with Google Chrome before 1.0.154.46 and is prone to a same origin policy bypass vulnerability. A flaw is present in the application, which fails to handle a crafted script that accesses another frame and reads its full URL and possibly other sensitive information, or modifies the URL of this frame. Successful exploitation allows remote attackers to bypass same origin policy.


Pages:      Start    549    550    551    552    553    554    555    556    557    558    559    560    561    562    ..   577

© 2013 SecPod Technologies