The host is installed with Google Chrome 3.0.195.21 and is prone to a cross-site scripting (XSS) vulnerability. The flaw is present in the application, which fails to handle a (1) RSS or (2) Atom feed. Successful exploitation allows remote attackers to inject arbitrary web script or HTML.
The host is installed with Google Chrome 2.0.172.37 and is prone to a heap-based buffer overflow vulnerability. The flaw is present in the application, which fails to handle crafted javascript regular expression. Successful exploitation allows remote attackers to execute arbitrary code in the chrome sandbox.
The host is installed with Google Chrome 2.0.172.37 and is prone to a denial of service vulnerability. The flaw is present in the application, which fails to handle unspecified vectors that trigger excessive memory allocation. Successful exploitation allows remote attackers to leverage renderer access to cause a denial of service (memory corruption and application crash) or possibly execute arbitr ...
The host is installed with Google Chrome 2.0.172.43 and is prone to an information disclosure vulnerability. The flaw is present in the application, which fails to handle a crafted javascript. Successful exploitation allows remote attackers to remote attackers to bypass intended restrictions on reading memory, and possibly obtain sensitive information or execute arbitrary code in the Chrome sandbo ...
The host is installed with Google Chrome 3.0.195.21 and is prone to a same origin policy bypass vulnerability. The flaw is present in the application, which fails to handle unknown vectors. Successful exploitation allows remote attackers to bypass the same origin policy and conduct cross-site scripting attacks.
The host is installed with Google Chrome 3.0.195.32 and is prone to an incomplete blacklist vulnerability. The flaw is present in the application, which fails to handle "Content-Disposition: attachment" designation. Successful exploitation allows remote attackers to force the download of certain dangerous files.
The host is installed with Google Chrome 3.0.195.32 and is prone to a denial of service vulnerability. The flaw is present in the application, which fails to handle unspecified use of the Gears SQL API. Successful exploitation allows remote attackers to cause denial of service (memory corruption and plugin crash).
The host is installed with Google Chrome 3.0.195.32 and is prone to a denial of service vulnerability. The flaw is present in the application, which fails to handle a web page that calls the javascript setinterval method. Successful exploitation allows remote attackers to cause denial of service (CPU consumption).
The host is installed with Google Chrome 3.0.195.32 and is prone to a denial of service vulnerability. The flaw is present in the application, which fails to handle a page-local link. Successful exploitation allows user-assisted remote attackers to cause a denial of service.
The host is installed with Apple iTunes before 10.2 or Apple Safari before 5.0.4 and is prone to denial of service vulnerability. A flaw is present in WebKit, which fails to prevent man-in-the-middle attack while browsing the iTunes Store via iTunes. Successful exploitation could allow remote attackers to execute arbitrary code or cause a denial of service condition.