[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248585

 
 

909

 
 

195621

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 14857 Download | Alert*

The host is installed with Google Chrome before 22.0.1229.92 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to handle unknown vectors. Successful exploitation could allow attackers to crash the service.

The host is installed with Google Chrome before 22.0.1229.94 or Apple iTunes 11.0.3 and is prone to use-after-free vulnerability. A flaw is present in the application, which fails to properly handle SVG implementation in WebKit. Successful exploitation allows attackers to execute arbitrary code via unspecified vectors.

The host is installed with Google Chrome before 22.0.1229.94 and is prone to security bypass vulnerability. A flaw is present in the application, which fails to properly handle the Inter-process Communication (IPC) implementation. Successful exploitation allows remote attackers to bypass intended sandbox restrictions and write to arbitrary files by leveraging access to a renderer process.

The host is installed with Google Chrome before 4.0.249.89 and is prone to information disclosure vulnerability. A flaw is present in the application which sends DNS queries directly when a SOCKS 5 proxy server is configured. Successful exploitation allow remote DNS servers to obtain potentially sensitive information about the identity of a client user.

The host is installed with Google Chrome before 4.0.249.89 and is prone to integer overflow vulnerability. A flaw is present in the application which does not properly implement JavaScript arrays. Successful exploitation allow remote attackers to execute arbitrary code in the Chrome sandbox.

The host is installed with PHP and is prone to security bypass vulnerability. A flaw is present is in the extract function in PHP before 5.2.15, which overwrites $GLOBALS and $this when using EXTR_OVERWRITE. Successful exploitation allows context-dependent attackers to bypass intended access restrictions by modifying data structures that are not intended to depend on external input.

The host is installed with Google Chrome before 4.0.249.89 and is prone to arbitrary code vulnerability. A flaw is present in the application which does not properly process ruby tags. Successful exploitation allow remote attackers to execute arbitrary code on the system.

The host is installed with Google Chrome before 4.0.249.89 and is prone to integer overflow vulnerability. A flaw is present in the CrossCallParamsEx::CreateFromBuffer function in the application which does not properly handle deserializing of sandbox messages. Successful exploitation allow remote attackers to leverage renderer access to cause a denial of service (heap memory corruption) or possib ...

The host is installed with MySQL 5.1.0 through 5.1.64 or 5.5.0 through 5.5.26 and is prone to unspecified vulnerability. A flaw is present in the application, which fails to handle vectors related to Server Replication. Successful exploitation allows remote authenticated users to affect availability.

The host is installed with MySQL 5.1.0 through 5.1.65 or 5.5.0 through 5.5.27 and is prone to unspecified vulnerability. A flaw is present in the application, which fails to handle vectors related to Server Optimizer. Successful exploitation allows remote authenticated users to affect availability.


Pages:      Start    1257    1258    1259    1260    1261    1262    1263    1264    1265    1266    1267    1268    1269    1270    ..   1485

© SecPod Technologies