[Forgot Password]
Login  Register Subscribe

30480

 
 

423868

 
 

252271

 
 

909

 
 

196835

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 14865 Download | Alert*

The host is installed with Mozilla Firefox 4.x through 7.0 or Thunderbird 5.0 through 7.0 and is prone to elevation of privilege vulnerability. A flaw is present in the applications, which perform access control without checking for use of the NoWaiverWrapper wrapper. Successful exploitation allows remote attackers to gain privileges via a crafted web site.

The host is installed with Apple iTunes before 11.1.4 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to handle a crafted website. Successful exploitation could allow attackers to crash the service.

The host is installed with Google Chrome before 19.0.1084.46 and is prone to off-by-one out-of-bounds write vulnerability. A flaw is present in the application, which fails to properly handle memory. Successful exploitation allows remote attackers to cause a denial of service.

The host is installed with Google Chrome before 19.0.1084.46 and is prone to out-of-bounds read vulnerability. A flaw is present in the application, which fails to properly draw dash paths. Successful exploitation allows remote attackers to cause a denial of service.

The host is installed with Google Chrome before 19.0.1084.46 and is prone to use-after-free vulnerability. A flaw is present in the application, which fails to properly handle a malformed name for the font encoding. Successful exploitation allows remote attackers to cause a denial of service or possibly have unspecified other impact.

The host is installed with Google Chrome before 19.0.1084.46 and is prone to privilege escalation vulnerability. A flaw is present in the application, which uses an incorrect search path for the Windows Media Player plug-in. Successful exploitation allows local users to gain privileges via a Trojan horse plug-in in an unspecified directory.

The host is installed with Google Chrome before 19.0.1084.46 and is prone to out-of-bounds write vulnerability. A flaw is present in the application, which fails to properly handle the PDF functionality. Successful exploitation allows remote attackers to cause a denial of service.

The host is installed with Google Chrome before 19.0.1084.46 and is prone to out-of-bounds write vulnerability. A flaw is present in the application, which fails to properly handle the OGG container. Successful exploitation allows remote attackers to cause a denial of service or possibly have unspecified other impact.

The host is installed with Google Chrome before 19.0.1084.46 and is prone to out-of-bounds read vulnerability. A flaw is present in the application, which fails to properly handle Tibetan text. Successful exploitation allows remote attackers to cause a denial of service.

The host is installed with Google Chrome before 19.0.1084.46 and is prone to out-of-bounds read vulnerability. A flaw is present in the application, which fails to properly handle glyphs. Successful exploitation allows remote attackers to cause a denial of service.


Pages:      Start    10    11    12    13    14    15    16    17    18    19    20    21    22    23    ..   1486

© SecPod Technologies