The host is installed with Google Chrome before 13.0.782.215 and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to prevent URL parsing confusion on command line. Successful exploitation could allow attackers to produce unknown impacts.
The host is installed with Google Chrome before 13.0.782.215 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to handle vertex data. Successful exploitation could allow attackers to execute arbitrary code or crash the service.
The host is installed with Apache HTTP Server 1.3.x or 2.0.x through 2.0.64 or 2.2.x through 2.2.19 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to prevent creation of multiple number of threads that use multiple range headers. Successful exploitation could allow attackers to crash the service.
The host is installed with Apache Tomcat 7.0.0 through 7.0.20, or 6.0.0 through 6.0.33 or 5.5.0 through 5.5.33 and is prone to security bypass vulnerability. A flaw is present in the application which is caused by the improper handling of messages by the AJP protocol. Successful exploitation allows attackers to bypass authentication or obtain potentially sensitive information.
The host is installed with Apache Tomcat 6.x before 6.0.34, and 7.x before 7.0.23 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to properly perform certain caching and recycling operations involving request objects. Successful exploitation could allow attackers to obtain unintended read access to IP address and HTTP header information in ...
The host is installed with Google Chrome before 14.0.835.163 and is prone to unspecified vulnerability. A flaw is present in the application, which does not make use of Infobar interaction before use of the Windows Media Player plug-in. Successful exploitation allows remote attackers to have an unspecified impact.
The host is installed with Google Chrome before 14.0.835.163 and is prone to denial of service vulnerability. A flaw is present in the application, where a race condition exists within the certificate cache. Successful exploitation allows remote attackers to causes denial of service or possibly have unspecified other impact.
The host is installed with Google Chrome before 14.0.835.163 and is prone to double free vulnerability. A flaw is present in the application which fails in XPath handling. Successful exploitation allows remote attackers to cause denial of service or possibly have unspecified other impact.
The host is installed with Google Chrome before 14.0.835.163 and is prone to denial of service vulnerability. A flaw is present in the application, which does not properly handle media buffers. Successful exploitation allows remote attackers to cause an out-of-bounds read.
The host is installed with Google Chrome before 14.0.835.163 and is prone to denial of service vulnerability. A flaw is present in the application, which does not properly perform garbage collection during the processing of PDF documents. Successful exploitation allows remote attackers to cause a denial of service or possibly have unspecified other impact.