The host is installed with Google Chrome 1.0.154.53 and is prone to an use-after-free vulnerability. A flaw is present in the application, which fails to handle a crafted JavaScript regular expression. Successful exploitation to execute arbitrary code or cause a denial of service (memory corruption and application crash).
The host is installed with Google Chrome before 1.0.154.53 and is prone to an use-after-free vulnerability. A flaw is present in the application, which fails to handle a crafted JavaScript regular expression. Successful exploitation to execute arbitrary code or cause a denial of service (memory corruption and application crash).
The host is installed with Google Chrome before 17.0.963.56 and is prone to an integer overflow vulnerability. A flaw is present in the application, which fails to handle unknown vectors that trigger an integer truncation. Successful exploitation could allow attackers to crash the service.
The host is installed with Google Chrome before 17.0.963.56 and is prone to an integer overflow vulnerability. A flaw is present in the application, which fails to handle unknown vectors that trigger an integer truncation. Successful exploitation could allow attackers to crash the service.
The host is installed with ntp on RHEL 6 or 7 and is prone to an IP ACLs bypass vulnerability. A flaw is present in the application, which fails to properly handle spoofed packets with ::1 source address. Successful exploitation could allow attackers to bypass source IP ACLs on some OSes.
block/scsi_ioctl.c in the Linux kernel through 3.8 does not properly consider the SCSI device class during authorization of SCSI commands, which allows local users to bypass intended access restrictions via an SG_IO ioctl call that leverages overlapping opcodes.
The host is installed with Google Chrome before 103.0.5060.53 and is prone to an use after free vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation allows attackers to have unspecified impact.
The host is installed with Google Chrome before 103.0.5060.53 and is prone to a Use after free vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation allows attackers to have unspecified impact.
The host is installed with Google Chrome before 103.0.5060.53 and is prone to an use after free vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation allows attackers to have unspecified impact.
The host is installed with Google Chrome before 103.0.5060.53 and is prone to an use after free vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation allows attackers to have unspecified impact.