[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

250770

 
 

909

 
 

196157

 
 

282

Paid content will be excluded from the download.


Download | Alert*


oval:org.secpod.oval:def:505569
Chromium is an open-source web browser, powered by WebKit . This update upgrades Chromium to version 50.0.2661.102. Security Fix: * Multiple flaws were found in the processing of malformed web content. A web page containing malicious content could cause Chromium to crash, execute arbitrary code, or ...

oval:org.secpod.oval:def:34393
The host is installed with Google Chrome before 50.0.2661.102 and is prone to a race condition vulnerability. A flaw is present in the application, which fails to handle crafted data. Successful exploitation allows remote attackers to make arbitrary HTTP requests.

oval:org.secpod.oval:def:34400
The host is installed with Google Chrome before 50.0.2661.102 and is prone to a race condition vulnerability. A flaw is present in the application, which fails to handle crafted data. Successful exploitation allows remote attackers to make arbitrary HTTP requests.

oval:org.secpod.oval:def:34401
The host is missing a high severity security update according to Google advisory. The update is required to fix multiple vulnerabilities. The flaws are present in the application, which fails to handle crafted data. Successful exploitation allows attackers to have unspecified impact.

oval:org.secpod.oval:def:34396
The host is missing a high severity security update according to Google advisory. The update is required to fix multiple vulnerabilities. The flaws are present in the application, which fails to handle crafted data. Successful exploitation allows attackers to have unspecified impact.

oval:org.secpod.oval:def:34394
The host is installed with Google Chrome before 50.0.2661.102 and is prone to a race condition vulnerability. A flaw is present in the application, which fails to handle crafted data. Successful exploitation allows remote attackers to make arbitrary HTTP requests.

oval:org.secpod.oval:def:34395
The host is missing a high severity security update according to Google advisory. The update is required to fix multiple vulnerabilities. The flaws are present in the application, which fails to handle crafted data. Successful exploitation allows attackers to have unspecified impact.

oval:org.secpod.oval:def:34406
The host is missing a high severity security update according to Google advisory. The update is required to fix multiple vulnerabilities. The flaws are present in the application, which fails to handle crafted data. Successful exploitation allows attackers to have unspecified impact.

oval:org.secpod.oval:def:34405
The host is installed with Google Chrome before 50.0.2661.102 and is prone to a race condition vulnerability. A flaw is present in the application, which fails to handle crafted data. Successful exploitation allows remote attackers to make arbitrary HTTP requests.

oval:org.secpod.oval:def:51566
oxide-qt: Web browser engine for Qt Several security issues were fixed in Oxide.

oval:org.secpod.oval:def:703118
oxide-qt: Web browser engine for Qt Several security issues were fixed in Oxide.

oval:org.secpod.oval:def:602520
Several vulnerabilities have been discovered in the chromium web browser. CVE-2016-1667 Mariusz Mylinski discovered a cross-origin bypass. CVE-2016-1668 Mariusz Mylinski discovered a cross-origin bypass in bindings to v8. CVE-2016-1669 Choongwoo Han discovered a buffer overflow in the v8 javascript ...

oval:org.secpod.oval:def:1800123
CVE-2016-1667: Same origin bypass in DOM. CVE-2016-1668: Same origin bypass in Blink V8 bindings. CVE-2016-1669: Buffer overflow in V8. CVE-2016-1670: Race condition in loader. CVE-2016-1671: Directory traversal using the file scheme on Android. Fixed In Version: 50.0.2661.102

oval:org.secpod.oval:def:1800824
CVE-2016-1667: Same origin bypass in DOM. CVE-2016-1668: Same origin bypass in Blink V8 bindings. CVE-2016-1669: Buffer overflow in V8. CVE-2016-1670: Race condition in loader. CVE-2016-1671: Directory traversal using the file scheme on Android. Fixed In Version: 50.0.2661.102

CPE    3
cpe:/o:opensuse:opensuse:13.1
cpe:/o:debian:debian_linux:8.0
cpe:/a:google:chrome
CWE    1
CWE-362
*CVE
CVE-2016-1670

© SecPod Technologies