[Forgot Password]
Login  Register Subscribe

23631

 
 

126941

 
 

98250

 
 

909

 
 

79281

 
 

109

 
 
Paid content will be excluded from the download.

Filter
Matches : 8408 Download | Alert*

The host is installed with Google Chrome before 47.0.2526.73 and is prone to access restrictions bypass vulnerability. The flaw is present in the application, which fails to handle the opportunistic circumstances by leveraging a policy on subdomains. Successful exploitation allows remote attackers to bypass intended scheme restrictions.

The host is installed with Mozilla Firefox before 43.0 or Firefox ESR 38.x before 38.5 and is prone to an arbitrary code execution vulnerability. A flaw is present in the applications, which fail to handle MP4 video file with crafted covr metadata that triggers a buffer overflow. Successful exploitation allows remote attackers to execute arbitrary code or cause a denial of service (incorrect memor ...

The host is installed with Adobe Reader or Acrobat before 11.0.14, Acrobat or Acrobat Reader DC Classic before 15.006.30119 or Acrobat or Acrobat Reader DC Continuous before 15.010.20056 and is prone to an use-after-free vulnerability. A flaw is present in the applications, which fail to handle unspecified vectors. Successful exploitation allows attackers to execute arbitrary code.

The host is installed with Adobe Flash Player before 18.0.0.329, 19.x, 20.x before 20.0.0.306 or Adobe AIR before 20.0.0.260 and is prone to an use-after-free vulnerability. A flaw is present in the application, which fails to properly handle unknown vectors. Successful exploitation could allow attackers to execute arbitrary code.

The host is installed with Google Chrome before 48.0.2564.116 and is prone to a security bypass vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation allows remote attackers to bypass the blink same origin policy and a sandbox protection mechanism.

The host is installed with Adobe Flash Player before 18.0.0.333, 19.x, 20.x before 21.0.0.182 or Adobe AIR before 21.0.0.176 and is prone to an use-after-free vulnerability. A flaw is present in the application, which fails to properly handle unknown vectors. Successful exploitation could allow attackers to execute arbitrary code via unspecified vectors.

The host is installed with Google Chrome before 49.0.2623.108 and is prone to an use-after-free vulnerability. A flaw is present in the application, which fails to handle a specially crafted web page. Successful exploitation allow an attacker to execute arbitrary code in the context of the browser, obtain sensitive information, bypass security restrictions or cause denial-of-service conditions.

The host is installed with Google Chrome before 50.0.2661.75 and is prone to multiple unspecified vulnerabilities. The flaws are present in the application, which fails to handle unknown vectors. Successful exploitation allow attackers to cause a denial service or possibly have other impact.

The host is installed with Adobe Flash Player before 18.0.0.343 or 19.x through 21.x before 21.0.0.213 or Adobe AIR before 21.0.0.198 and is prone to an use-after-free vulnerability. A flaw is present in the application, which fails to properly handle a flash.geom.Matrix callback. Successful exploitation allows remote attackers to execute arbitrary code.

The host is installed with Mozilla Firefox before 46.0 and is prone to a cross-site scripting (XSS) vulnerability. A flaw is present in the Firefox Health Report (about:healthreport), which does not properly restrict the origin of events. Successful exploitation allows remote attackers to modify sharing preferences.


Pages:      Start    797    798    799    800    801    802    803    804    805    806    807    808    809    810    ..   840

© 2013 SecPod Technologies