[Forgot Password]
Login  Register Subscribe

23631

 
 

126998

 
 

101924

 
 

909

 
 

80911

 
 

121

 
 
Paid content will be excluded from the download.

Filter
Matches : 8580 Download | Alert*

The host is installed with Google Chrome 14.0.794.0 and is prone to denial of service vulnerability. A flaw is present in the application which fails to reload a page generated in response to a POST via a crafted web site, related to GetWidget methods. Successful exploitation could allow user-assisted remote attackers to cause a denial of service (application crash).

The host is installed with Adobe Reader 10.x before 10.0.1 or 9.x before 9.4.2 or 8.x before 8.2.6 and is prone to memory corruption vulnerability. A flaw is present in the applications, which fails to parse images. Successful exploitation allows remote attackers to execute arbitrary code or cause a denial of service condition using a crafted image.

The host is installed with Google Chrome before 15.0.874.102 and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to prevent use of an unspecified special character as a delimiter in HTTP headers. Successful exploitation could allow attackers to have unspecified impacts.

The host is installed with Google Chrome before 15.0.874.120 and is prone to a buffer overflow vulnerability. A flaw is present in the application, which fails to handle vectors related to shader variable mapping. Successful exploitation could allow attackers to crash the service.

The host is installed with Google Chrome before 16.0.912.63 and is prone to an url bar spoofing vulnerability. A flaw is present in the application, which fails to properly handle PDF parser. Successful exploitation could allow attackers to crash the service.

The host is installed with Adobe Reader 9.x before 9.3.1 or 8.x before 8.2.1 and is prone to unspecified vulnerability. A flaw is present in the application, which fails to properly handle memory. Successful exploitation allows remote attackers to cause a denial of service or possibly execute arbitrary code via unknown vectors.

The host is installed with Adobe Reader 8.x before 8.2.2 or 9.x before 9.3.2 and is prone to unspecified vulnerability. A flaw is present in the application, which fails to properly handle memory. Successful exploitation allows remote attackers to execute arbitrary code or cause a denial of service.

The host is installed with Puppet 2.6.x before 2.6.15 or 2.7.x before 2.7.13 and is prone to arbitrary code execution vulnerability. A flaw is present in the applications, which fail to properly handle file bucket requests. Successful exploitation allows attackers with agent SSL keys and file-creation permissions on the puppet master to execute arbitrary commands by creating a file whose full path ...

The host is installed with Google Chrome before 23.0.1271.91 and is prone to use-after-free vulnerability. A flaw is present in the application, which fails to properly handle vectors related to SVG filters. Successful exploitation allows remote attackers to cause a denial of service or possibly have unspecified other impact.

The host is installed with Google Chrome before 24.0.1312.52 and is prone to security bypass vulnerability. A flaw is present in the application, which fails to properly maintain database metadata. Successful exploitation allows remote attackers to bypass intended file-access restrictions via unspecified vectors.


Pages:      Start    793    794    795    796    797    798    799    800    801    802    803    804    805    806    ..   857

© 2013 SecPod Technologies