[Forgot Password]
Login  Register Subscribe

30481

 
 

423868

 
 

255116

 
 

909

 
 

198683

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 14865 Download | Alert*

WebKit in Apple Safari before 5.0 or Apple iTunes before 9.2 does not properly handle libxml contexts, allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via a crafted HTML document, related to an "API abuse issue."

The SPDY protocol implementation in Google Chrome before 6.0.472.62 does not properly manage buffers, which might allow remote attackers to execute arbitrary code via unspecified vectors.

The host is installed with Google Chrome and is prone to denial of service vulnerability. A flaw is present in the application, which tries to use unavailable memory. Successful exploitation could allow an attacker to cause a denial of service condition using vectors related to image loading.

The host is installed with Google Chrome and is prone to security bypass vulnerability. A flaw is present in the application, which fails to handle drag and drop operations. Successful exploitation will allow an attacker to bypass the policy settings.

The host is installed with Google Chrome and is prone to denial of service vulnerability. A flaw is present in the application, which fails to properly handle keys if any extension is missing in it. Successful exploitation will allow an attacker to crash the application using a crafted extension.

The host is installed with Google Chrome and is prone to denial of service vulnerability. A flaw is present in the application, which fails to properly process volume settings requests. Successful exploitation will allow an attacker to crash the application through vectors involving bad volume settings.

The host is installed with Google Chrome and is prone to remote code execution Vulnerability. A flaw is present in the application, which fails to handle vectors related to audio. Successful exploitation will allow an attacker to execute arbitrary code.

The host is installed with Google Chrome and is prone to denial of service vulnerability. A flaw is present in the application, which fails to handle extensions notification properly. Successful exploitation will allow the attackers to cause a denial of service condition.

The host is installed with Google Chrome and is prone to denial of service vulnerability. A flaw is present in the node-iteration implementation, which fails to properly handle pointers. Successful exploitation will allow the attacker to cause a denial of service condition.

The host is installed with Google Chrome and is prone to denial of service vulnerability. A flaw is present in the node-iteration implementation, which fails to properly handle the printing of PDF documents. Successful exploitation will allow the attacker to cause a denial of service condition using a multi-page document.


Pages:      Start    1153    1154    1155    1156    1157    1158    1159    1160    1161    1162    1163    1164    1165    1166    ..   1486

© SecPod Technologies