[Forgot Password]
Login  Register Subscribe

30430

 
 

423868

 
 

247862

 
 

909

 
 

194603

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 15162 Download | Alert*

The host is installed with Google Chrome and is prone to denial of service vulnerability. A flaw is present in the pickle function in base/pickle.cc, which fails to properly perform pointer arithmetic. Successful exploitation will allow the attacker to cause a denial of service condition using a crafted pickle data as an input to the function.

The host is installed with WMV video codec 9, Windows Media Format Runtime 9, 9.5, Windows Media Format Runtime 11, Windows Media Player 11 or 12 and is prone to a remote code execution vulnerability. A flaw is present in the applications, which fail to handle crafted media files. Successful exploitation could allow attackers to execute arbitrary code.

The host is installed with Microsoft Windows Vista, Windows XP, Windows Server 2003, Windows Server 2008, Windows Server 2008 R2, Windows 7, Windows 8 or Windows Server 2012 and is prone to a elevation of privilege vulnerability. The flaw is present in the application, which fails to properly handle objects in memory. Successful exploitation could allow attackers to execute arbitrary code with el ...

The host is installed with Microsoft .NET Framework 2.0 SP2, 3.5.1, 4 or 4.5 and is prone to delegate serialization vulnerability. A flaw is present in the application, which fails to properly check the permissions of delegate objects. Successful exploitation allows attackers to execute arbitrary code.

Microsoft .NET Framework 2.0 SP2, 3.5.1, 4 or 4.5 on 64-bit platforms and is prone to array allocation vulnerability. A flaw is present in the application, which fails to properly allocate arrays of structures. Successful exploitation allows attackers to execute arbitrary code.

The host is installed with Microsoft .NET Framework 2.0 SP2, 3.5.1, 4 or 4.5 and is prone to anonymous method injection vulnerability. A flaw is present in the application, which fails to properly check the permissions of objects that use reflection. Successful exploitation allows attackers to execute arbitrary code.

The host is installed with Microsoft .NET Framework 1.0 SP3, 1.1 SP1, 2.0 SP2, 3.5.1, 4 or 4.5 and is prone to delegate reflection bypass vulnerability. A flaw is present in the application, which fails to properly check the permissions of objects that use reflection. Successful exploitation allows attackers to execute arbitrary code.

The host is installed with Google Chrome and is prone to denial of service vulnerability. A flaw is present in ThemeInstalledInfoBarDelegate::Observe function in browser/extensions/theme_installed_infobar_delegate.cc, which fails to properly handle incorrect tab interaction by an extension. Successful exploitation will allow the attacker to cause a denial of service condition using a crafted exten ...

The host is installed with Google Chrome and is prone to denial of service vulnerability. A flaw is present in the application, which fails to properly handle certain postMessage calls. Successful exploitation will allow the attacker to cause a denial of service condition using a crafted javascript code that creates a web worker.

The host is installed with Google Chrome and is prone to denial of service vulnerability. A flaw is present in the application, which fails to properly perform cursor handling. Successful exploitation will allow the attacker to cause a denial of service condition using unknown vectors that lead to an aliasing bug.


Pages:      Start    1160    1161    1162    1163    1164    1165    1166    1167    1168    1169    1170    1171    1172    1173    ..   1516

© SecPod Technologies