[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248678

 
 

909

 
 

195426

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 15028 Download | Alert*

The host is installed with Google Chrome before 22.0.1229.92 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to handle vectors related to a regular expression. Successful exploitation could allow attackers to crash the service.

The host is installed with Google Chrome before 22.0.1229.92 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to handle vectors related to audio devices. Successful exploitation could allow attackers to execute arbitrary code.

The host is installed with Google Chrome before 22.0.1229.92 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to handle unknown vectors. Successful exploitation could allow attackers to crash the service.

The host is installed with Google Chrome before 22.0.1229.94 or Apple iTunes 11.0.3 and is prone to use-after-free vulnerability. A flaw is present in the application, which fails to properly handle SVG implementation in WebKit. Successful exploitation allows attackers to execute arbitrary code via unspecified vectors.

The host is installed with Google Chrome before 22.0.1229.94 and is prone to security bypass vulnerability. A flaw is present in the application, which fails to properly handle the Inter-process Communication (IPC) implementation. Successful exploitation allows remote attackers to bypass intended sandbox restrictions and write to arbitrary files by leveraging access to a renderer process.

The host is installed with Google Chrome before 4.0.249.89 and is prone to information disclosure vulnerability. A flaw is present in the application which sends DNS queries directly when a SOCKS 5 proxy server is configured. Successful exploitation allow remote DNS servers to obtain potentially sensitive information about the identity of a client user.

The host is installed with Google Chrome before 4.0.249.89 and is prone to integer overflow vulnerability. A flaw is present in the application which does not properly implement JavaScript arrays. Successful exploitation allow remote attackers to execute arbitrary code in the Chrome sandbox.

The host is installed with PHP and is prone to security bypass vulnerability. A flaw is present is in the extract function in PHP before 5.2.15, which overwrites $GLOBALS and $this when using EXTR_OVERWRITE. Successful exploitation allows context-dependent attackers to bypass intended access restrictions by modifying data structures that are not intended to depend on external input.

The host is installed with Google Chrome before 4.0.249.89 and is prone to arbitrary code vulnerability. A flaw is present in the application which does not properly process ruby tags. Successful exploitation allow remote attackers to execute arbitrary code on the system.

The host is installed with Google Chrome before 4.0.249.89 and is prone to integer overflow vulnerability. A flaw is present in the CrossCallParamsEx::CreateFromBuffer function in the application which does not properly handle deserializing of sandbox messages. Successful exploitation allow remote attackers to leverage renderer access to cause a denial of service (heap memory corruption) or possib ...


Pages:      Start    1219    1220    1221    1222    1223    1224    1225    1226    1227    1228    1229    1230    1231    1232    ..   1502

© SecPod Technologies