The host is installed with Google Chrome 4.0.249.89 and is prone to an arbitrary code execution vulnerability. The flaw is present in the application, which fails to handle crafted use of javascript arrays. Successful exploitation allows remote attackers to execute arbitrary code in the chrome sandbox.
The host is installed with Google Chrome 4.1.249.1036 and is prone to a cross-site scripting (XSS) vulnerability. The flaw is present in the application, which fails to handle a crafted javascript: URL. Successful exploitation allows remote attackers to conduct cross-site scripting (XSS) attacks.
The host is installed with Google Chrome 5.0.375.70 and is prone to an information disclosure vulnerability. The flaw is present in the application, which fails to handle vectors related to list markers for HTML lists. Successful exploitation allows remote attackers to obtain sensitive information, cause a denial of service (memory corruption and application crash), or possibly execute arbitrary c ...
The host is installed with Google Chrome 7.0.517.41 and is prone to a denial of service vulnerability. The flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation allows remote attackers to attackers to cause a denial of service (application crash) via unspecified vectors.
The host is installed with Google Chrome 1.0.154.46 and is prone to a same origin policy bypass vulnerability. The flaw is present in the application, which fails to handle a crafted script. Successful exploitation allows remote attackers to read its full URL and possibly other sensitive information, or modifies the URL of this frame.
The host is installed with Google Chrome 1.0.154.59 and is prone to an argument injection vulnerability. The flaw is present in the application, which fails to handle a web page that sets document.location. Successful exploitation allows remote attackers to open tabs for URLs that do not satisfy the IsWebSafeScheme restriction.
The host is installed with Google Chrome 1.0.154.64 and is prone to a heap-based buffer overflow vulnerability. The flaw is present in the application, which fails to handle vectors related to a large bitmap that arrives over the IPC channel. Successful exploitation allows remote attackers to leverage renderer access to cause a denial of service (application crash) or possibly execute arbitrary co ...
The host is installed with Google Chrome 2.0.172.33 and is prone to a buffer overflow vulnerability. The flaw is present in the application, which fails to handle a crafted response. Successful exploitation allows remote HTTP servers to cause a denial of service (application crash) or possibly execute arbitrary code.
The host is installed with Apache Tomcat 6.x before 6.0.45, 7.x before 7.0.65 or 8.x before 8.0.27 and is prone to a directory traversal vulnerability. A flaw is present in RequestUtil.java, which fails to handle a /.. (slash dot dot) in a pathname used by a web application in a getResource, getResourceAsStream or getResourcePaths call. Successful exploitation allows remote authenticated users to ...
The host is installed with Wireshark 1.12.x before 1.12.10 or 2.0.x before 2.0.2 and is prone to an untrusted search path vulnerability. A flaw is present in the WiresharkApplication class, which fails to handle a Trojan horse riched20.dll.dll file in the current working directory, related to use of QLibrary. Successful exploitation could allow local users to gain privileges.