[Forgot Password]
Login  Register Subscribe

24547

 
 

132803

 
 

128153

 
 

909

 
 

105829

 
 

152

 
 
Paid content will be excluded from the download.

Filter
Matches : 10478 Download | Alert*

The host is installed with Mozilla Firefox before 41.0.2 and is prone to a same origin policy bypass vulnerability. A flaw is present in the application, which fails to properly handle a crafted web site. Successful exploitation could allow attackers to bypass the Same Origin Policy.

The host is installed with Google Chrome before 49.0.2623.75 and is prone to a security bypass vulnerability. A flaw is present in the application, which fails to properly restrict use of Web APIs. Successful exploitation allows remote attackers to bypass intended access restrictions via a crafted platform app.

The host is installed with Apple Safari before 9.1 and is prone to a port redirection vulnerability. A flaw is present in the application, which fails to properly handle a crafted website. Successful exploitation could allow attackers to access restricted ports on arbitrary servers.

The host is installed with Wireshark 2.0.x before 2.0.3 and is prone to a denial of service vulnerability. A flaw is present in the NCP dissector, which fails to properly initialize memory for search patterns. Successful exploitation allows remote attackers to cause a denial of service (application crash).

The host is installed with Wireshark 1.12.x before 1.12.11 or 2.0.x before 2.0.3 and is prone to a denial of service vulnerability. A flaw is present in the IAX2 dissector, which uses an incorrect integer data type. Successful exploitation allows remote attackers to cause a denial of service (infinite loop).

The host is installed with Google Chrome before 50.0.2661.94 and is prone to an out-of-bounds vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation allows attackers to have unspecified impact.

The host is installed with Google Chrome before 50.0.2661.94 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation allows attackers to have unspecified impact.

The host is installed with Google Chrome before 50.0.2661.94 and is prone to an use-after-free vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation allows attackers to have unspecified impact.

The host is installed with Google Chrome before 50.0.2661.94 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation allows attackers to have unspecified impact.

The host is installed with Google Chrome before 50.0.2661.94 and is prone to multiple vulnerabilities. The flaws are present in the application, which fails to handle unspecified vectors. Successful exploitation allows attackers to have unspecified impact.


Pages:      Start    5    6    7    8    9    10    11    12    13    14    15    16    17    18    ..   1047

© SecPod Technologies