[Forgot Password]
Login  Register Subscribe

23631

 
 

126998

 
 

102010

 
 

909

 
 

80911

 
 

121

 
 
Paid content will be excluded from the download.

Filter
Matches : 8580 Download | Alert*

The host is installed with Google Chrome before 31.0.1650.57 and is prone to a security bypass vulnerability. The flaw is present in application, which fails to properly handle the renderer process. Successful exploitation allows remote attackers to cause bypass intended sandbox restrictions.

The host is installed with Google Chrome before 33.0.1750.146 and is prone to multiple unspecified vulnerabilities. The flaws are present in the application, which fails to handle certain unknown vectors. Successful exploitation has unknown impact.

The host is installed with Google Chrome before 34.0.1847.116 and is prone to multiple unspecified vulnerabilities. The flaws are present in the application, which fails to properly handle unknown vectors. Successful exploitation could allow attackers to crash the service.

The host is installed with Google Chrome before 34.0.1847.131 and is prone to security bypass vulnerability. A flaw is present in the application, which fails to properly store internationalization metadata. Successful exploitation allows attackers to bypass intended access restrictions by leveraging "type confusion" and reading property values.

The host is installed with Apple iTunes before 11.2.1 and is prone to security bypass vulnerability. A flaw is present in the application, which fail to handle standard filesystem operations. Successful exploitation could allow attackers to modify files and consequently obtain access to arbitrary user accounts.

The host is installed with Google Chrome before 38.0.2125.101 and is prone to a use-after-free vulnerability. The flaw is present in the application, which fail to handle vectors that leverage "type confusion" for callback processing. Successful exploitation allows attackers to cause a denial of service or possibly have unspecified other impact.

The host is installed with Google Chrome before 38.0.2125.101 and is prone to an address bar spoofing vulnerability. A flaw is present in the application, which fails to properly handle a blob: substring at the beginning of the URL. Successful exploitation could allow remote attackers to spoof the address.

The host is installed with VideoLAN VLC media player 0.5.0 before 1.0.6 and is prone to an invalid memory access and application crash vulnerability. A flaw is present in the application, which fails to handle a crafted archive. Successful exploitation could allow attackers to crash the service or execute arbitrary code.

The host is installed with Google Chrome before 11.0.696.65 and is prone to denial of service vulnerability. A flaw is present in the rendering/svg/RenderSVGResourceFilter.cpp in WebCore in WebKit, which fails to properly handle a crafted SVG document that leads to a "stale pointer". Successful exploitation allows remote attackers to cause a denial of service (application crash) or possibly have u ...

The host is installed with Google Chrome before 11.0.696.65 and is prone to an use-after-free vulnerability. A flaw is present in the FrameView::calculateScrollbarModesForLayout function in page/FrameView.cpp in WebCore in WebKit, which fails to properly handle a crafted JavaScript code that calls the removeChild method during interaction with a FRAME element. Successful exploitation allows remote ...


Pages:      Start    790    791    792    793    794    795    796    797    798    799    800    801    802    803    ..   857

© 2013 SecPod Technologies