[Forgot Password]
Login  Register Subscribe

25354

 
 

132811

 
 

144497

 
 

909

 
 

116278

 
 

156

 
 
Paid content will be excluded from the download.

Filter
Matches : 14303 Download | Alert*

The host is installed with Google Chrome before 13.0.782.107 and is prone ot a security bypass vulnerability. A flaw is present in the application, which fails to restrict access to internal schemes. Successful exploitation could allow attackers to cause unknown impacts.

The host is installed with Google Chrome before 13.0.782.107 and is prone to a security bypass vulnerability. A flaw is present in the application,which fails to prevent calls to function in other frames. Successful exploitation could allow attackers to bypass security restrictions.

The host is installed with Google Chrome before 13.0.782.107 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle text iteration. Successful exploitation could allow attacker to crash the service.

The host is installed with Google Chrome before 13.0.782.107 and is prone to an Use-after-free vulnerability. A flaw is present in the application, which fails to properly handle the Pepper plug-in. Successful exploitation could allow attackers to crash the service or cause other unknown impacts.

The host is installed with Google Chrome before 13.0.782.107 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle re-entrancy issues associated with the GPU lock. Successful exploitation could allow attackers to crash the service.

The host is installed with Google Chrome before 13.0.782.107 and is prone to a security bypass vulnerability. A flaw is present in the application, which fails to ensure that the speech-input bubble is present on the product screen. Successful exploitation could allow attackers to make audio recordings via a crafted web page containing an INPUT element.

The host is installed with Google Chrome before 13.0.782.107 and is prone to an information disclosure vulnerability. A flaw is present in the application, which reveals a local path in an unspecified log entry. Successful exploitation could allow attacker to gain sensitive information.

The host is installed with Google Chrome before 13.0.782.107 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to handle strings when supplied to basic authentication dialog. Successful exploitation could allow attackers to obtain sensitive information like user credentials.

The host is installed with LibreOffice 6.3.x before 6.3.6 or 6.4.x before 6.4.3 and is prone to a missing encryption vulnerability. A flaw is present in the application, which fails to handle encryption of auto-saved non ODF file format upon subsequent saves after crash. Successful exploitation could leak sensitive data.

The host is installed with Adobe Reader or Acrobat before 11.0.23, Acrobat DC Classic or Acrobat Reader DC Classic before 15.006.30392, Acrobat DC Continuous or Acrobat Reader DC Continuous before 18.009.20044, Acrobat 2017 or Acrobat Reader 2017 before 17.011.30068 and is prone to an out-of-bounds read vulnerability. A flaw is present in the applications, which fail to handle unspecified vectors. ...


Pages:      Start    1    2    3    4    5    6    7    8    9    10    11    12    13    14    ..   1430

© SecPod Technologies