[Forgot Password]
Login  Register Subscribe

24128

 
 

131573

 
 

111017

 
 

909

 
 

86402

 
 

136

 
 
Paid content will be excluded from the download.

Filter
Matches : 5993 Download | Alert*

The host is installed with Google Chrome before 18.0.1025.142 and is prone to cross-site scripting vulnerability. A flaw is present in the application, which fails to handle the EUC-JP encoding system. Successful exploitation could allow remote attackers to conduct cross-site scripting attacks on the affected system.

The host is installed with Google Chrome and is prone to denial of service vulnerability. A flaw is present in OGG container implementation in the application which fails to restrict in triggering an out-of-bounds write. Successful exploitation allow remote attackers to cause a denial of service.

The host is installed with Google Chrome and is prone to use-after-free vulnerability. A flaw is present in the application which fails to handle the pop-up blocker. Successful exploitation allow remote attackers to bypass the pop-up blocker via unknown vectors.

The host is installed with Adobe Flash Player 11.x before 11.2.202.228 or before 10.3.183.18 or Adobe AIR before 3.2.0.2070 and is prone to memory corruption vulnerability. A flaw is present in the applications, which fail to properly handle the NetStream class. Successful exploitation allows remote attackers to execute arbitrary code or cause a denial of service.

The host is installed with Adobe Flash Player 11.x before 11.2.202.228 or before 10.3.183.18 or Adobe AIR before 3.2.0.2070 and is prone to memory corruption vulnerability. A flaw is present in the applications, which fail to properly handle the NetStream class. Successful exploitation allows remote attackers to execute arbitrary code or cause a denial of service.

The host is installed with Google Chrome and is prone to unspecified vulnerability. A flaw is present in the application which fails to handle the pop-up blocker. Successful exploitation allow remote attackers to bypass the pop-up blocker via unknown vectors.

The host is installed with Google Chrome and is prone to same origin policy vulnerability. A flaw is present in Google V8 in the application which fails to restrict the access to each other's methods and properties. Successful exploitation allow remote attackers to bypass the same origin policy via unspecified vectors.

The host is installed with Opera Browser before 11.62 and is prone to arbitrary code execution vulnerability. A flaw is present in the application, which fails to ensure small windows. Successful exploitation allows user-assisted remote attackers to trick users into downloading and executing arbitrary files via a small window for the download dialog.

The host is installed with Opera Browser before 11.62 and is prone to arbitrary code execution vulnerability. A flaw is present in the application, which fails to ensure that a dialog window is placed on top of content windows. Successful exploitation allows remote attackers to trick users into downloading and executing arbitrary files via a download dialog located under other windows.

The host is installed with Opera Browser before 11.62 and is prone to Same Origin Policy bypass vulnerability. A flaw is present in the application, which fails to handle history.pushState and history.replaceState functions in conjunction with cross-domain frames. Successful exploitation allows emote attackers to gain unintended read access to history.state information.


Pages:      Start    1    2    3    4    5    6    7    8    9    10    11    12    13    14    ..   599

© SecPod Technologies