[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

249966

 
 

909

 
 

195636

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 31258 Download | Alert*

The host is installed with Google Chrome before 40.0.2214.91 or Apple iTunes before 12.3 and is prone to multiple unspecified vulnerabilities. The flaws are present in the applications, which fail to handle unknown vectors. Successful exploitation could allow attackers to cause a denial of service or possibly have other impact.

The host is installed with Google Chrome before 40.0.2214.91 and is prone to multiple unspecified vulnerabilities. The flaws are present in the application, which fails to handle unknown vectors. Successful exploitation could allow attackers to cause a denial of service or possibly have other impact.

The host is installed with Google Chrome before 40.0.2214.91 and is prone to a HTML5 application content spoofing vulnerability. A flaw is present in the application, which proceeds with AppCache caching for SSL sessions even if there is an X.509 certificate error. Successful exploitation allows man-in-the-middle attackers to spoof HTML5 application content.

The host is installed with Google Chrome before 40.0.2214.91 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to handle vectors related to a (1) zero-length quantifier or (2) look-behind expression. Successful exploitation could allow attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact.

The host is installed with Google Chrome before 40.0.2214.91 and is prone to a denial of service vulnerability. A flaw is present in the applications, which fail to handle unspecified vectors. Successful exploitation allows attackers to to cause a denial of service (memory corruption) or possibly have unspecified other impact.

The host is installed with Google Chrome before 11.0.696.65 and is prone to denial of service vulnerability. A flaw is present in the rendering/svg/RenderSVGResourceFilter.cpp in WebCore in WebKit, which fails to properly handle a crafted SVG document that leads to a "stale pointer". Successful exploitation allows remote attackers to cause a denial of service (application crash) or possibly have u ...

The host is installed with Google Chrome before 11.0.696.65 and is prone to an integer overflow vulnerability. A flaw is present in the FilterEffect::copyImageBytes function in platform/graphics/filters/FilterEffect.cpp in the SVG filter implementation in WebCore in WebKit, which fails to properly handle crafted dimensions. Successful exploitation allows remote attackers to cause a denial of servi ...

The host is installed with Google Chrome before 11.0.696.65 and is prone to an integer underflow vulnerability. A flaw is present in the HTMLFormElement::removeFormElement function in html/HTMLFormElement.cpp in WebCore in WebKit, which fails to properly handle a crafted HTML document containing a FORM element. Successful exploitation allows remote attackers to cause a denial of service (applicati ...

The host is installed with Google Chrome before 11.0.696.65 and is prone to an use-after-free vulnerability. A flaw is present in the FrameView::calculateScrollbarModesForLayout function in page/FrameView.cpp in WebCore in WebKit, which fails to properly handle a crafted JavaScript code that calls the removeChild method during interaction with a FRAME element. Successful exploitation allows remote ...

The host is installed with Google Chrome before 11.0.696.65 and is prone to a denial of service vulnerability. A flaw is present in the rendering/svg/RenderSVGText.cpp in WebCore in WebKit, which does not properly perform a cast of an unspecified variable during an attempt to handle a block child. Successful exploitation allows remote attackers to cause a denial of service (application crash) or p ...


Pages:      Start    1748    1749    1750    1751    1752    1753    1754    1755    1756    1757    1758    1759    1760    1761    ..   3125

© SecPod Technologies