[Forgot Password]
Login  Register Subscribe

30430

 
 

423868

 
 

247862

 
 

909

 
 

194603

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 2212 Download | Alert*

The host is missing a high severity security update according to Google advisory. The update is required to fix a same origin policy bypass vulnerability. A flaw is present in the application, which fails to properly handle an unintended embedder or unintended plugin loading, related to pdf.js and out_of_process_instance.cc. Successful exploitation could allow attackers to bypass the Same Origin P ...

The host is missing a critical severity security update according to Google advisory. The update is required to fix a security bypass vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation allows remote attackers to bypass the blink same origin policy and a sandbox protection mechanism.

The host is missing a critical security update according to Adobe advisory APSB16-03. The update is required to fix an arbitrary code execution vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation could allow attackers to execute arbitrary code or cause a denial of service (memory corruption).

The host is missing a critical security update according to Adobe advisory APSB15-12. The update is required to fix multiple vulnerabilities. The flaws are present in the application, which fail to handle unspecified vectors. Successful exploitation could allow attackers to execute arbitrary code or cause a denial of service (memory corruption).

The host is missing a critical severity security update according to Google advisory. The update is required to fix a spoofing vulnerability. The flaw is present in the application, which fails to handle a crafted certificate. Successful exploitation allows man-in-the-middle attackers to spoof arbitrary HTTPS servers.

The host is missing a high severity security update according to Google advisory. The update is required to fix a cross-site scripting (XSS) vulnerability. The flaw is present in the application, which fails to handle a (1) RSS or (2) Atom feed. Successful exploitation allows remote attackers to inject arbitrary web script or HTML.

The host is missing a critical severity security update according to Google advisory. The update is required to fix a denial of service vulnerability. The flaw is present in the application, which fails to handle unspecified vectors that trigger excessive memory allocation. Successful exploitation allows remote attackers to leverage renderer access to cause a denial of service (memory corruption a ...

The host is missing a high severity security update according to Google advisory. The update is required to fix a same origin policy bypass vulnerability. The flaw is present in the application, which fails to handle unknown vectors. Successful exploitation allows remote attackers to bypass the same origin policy and conduct cross-site scripting attacks.

The host is missing a high severity security update according to Google advisory. The update is required to fix an incomplete blacklist vulnerability. The flaw is present in the application, which fails to handle "Content-Disposition: attachment" designation. Successful exploitation allows remote attackers to force the download of certain dangerous files.

The host is missing a high severity security update according to Google advisory. The update is required to fix an arbitrary code execution vulnerability. The flaw is present in the application, which fails to handle crafted use of javascript arrays. Successful exploitation allows remote attackers to execute arbitrary code in the chrome sandbox.


Pages:      Start    153    154    155    156    157    158    159    160    161    162    163    164    165    166    ..   221

© SecPod Technologies