[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248392

 
 

909

 
 

195452

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 15134 Download | Alert*

In QEMU 4.2.0, a MemoryRegionOps object may lack read/write callback methods, leading to a NULL pointer dereference.

WebCore/platform/network/soup/SocketStreamHandleImplSoup.cpp in the libsoup network backend of WebKit, as used in WebKitGTK+ prior to version 2.20.0 or without libsoup 2.62.0, unexpectedly failed to use system proxy settings for WebSocket connections. As a result, users could be deanonymized by crafted web sites via a WebSocket connection.

WebCore/platform/network/soup/SocketStreamHandleImplSoup.cpp in the libsoup network backend of WebKit, as used in WebKitGTK+ versions 2.20.0 and 2.20.1, failed to perform TLS certificate verification for WebSocket connections.

The host is installed with Adobe Flash Media Server before 3.5.6, and 4.x before 4.0.2 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to sanitize user supplied input. Successful exploitation could allow attackers to crash the service.

The host is installed with Google Chrome before 7.0.517.44 and is prone to memory corruption vulnerability. A flaw is present in the application, which fails to properly handle invalid frames. Successful exploitation allows attackers to execute arbitrary code.

The host is installed with Google Chrome before 7.0.517.44 and is prone to memory corruption vulnerability. A flaw is present in the application, which fails to properly handle invalid frames. Successful exploitation allows attackers to execute arbitrary code.

Stack consumption vulnerability in the regcomp implementation in the GNU C Library through 2.11.3, and 2.12.x through 2.12.2, allows context-dependent attackers to cause a denial of service via a regular expression containing adjacent repetition operators, as demonstrated by a {10,}{10,}{10,}{10,} sequence in the proftpd.gnu.c exploit for ProFTPD.

The host is installed with Google Chrome and is prone to denial of service vulnerability. A flaw is present in vorbis_dec.c in the Vorbis decoder in FFmpeg, a decoder component used in the application, which fails to properly handle WebM file. Successful exploitation will allow the attacker to cause a denial of service condition.

The host is installed with Google Chrome and is prone to denial of service vulnerability. A flaw is present in vorbis_dec.c in the Vorbis decoder in FFmpeg, a decoder component used in the application, which fails to properly handle WebM file. Successful exploitation will allow the attacker to cause a denial of service condition.

The host is installed with Google Chrome before 13.0.782.107 and is prone to a security bypass vulnerability. A flaw is present in the application, which fails to enforce proper permissions for files. Successful exploitation could allow attackers to bypass intended access restrictions.


Pages:      Start    936    937    938    939    940    941    942    943    944    945    946    947    948    949    ..   1513

© SecPod Technologies