[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

249461

 
 

909

 
 

195508

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 15145 Download | Alert*

The host is installed with Google Chrome before 34.0.1847.132 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to properly check renderer state upon a focus event. Successful exploitation allows attackers to cause a denial of service or possibly have unspecified other impact via vectors that leverage "type confusion" for SELECT elements.

The host is installed with Google Chrome before 34.0.1847.132 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to properly check renderer state upon a focus event. Successful exploitation allows attackers to cause a denial of service or possibly have unspecified other impact via vectors that leverage "type confusion" for SELECT elements.

The host is installed with Google Chrome before 38.0.2125.101 and is prone to a use-after-free vulnerability. The flaw is present in the application, which fail to handle unknown vectors. Successful exploitation allows attackers to cause a denial of service or possibly have unspecified other impact.

The host is installed with Google Chrome before 38.0.2125.101 and is prone to a use-after-free vulnerability. The flaw is present in the application, which fail to handle unknown vectors. Successful exploitation allows attackers to cause a denial of service or possibly have unspecified other impact.

This CVE is missing description

xmlSchemaPreRun in xmlschemas.c in libxml2 2.9.10 allows an xmlSchemaValidateStream memory leak.

The iconv program in the GNU C Library 2.25 and earlier, when invoked with the -c option, enters an infinite loop when processing invalid multi-byte input sequences, leading to a denial of service.

An exploitable signed comparison vulnerability exists in the ARMv7 memcpy implementation of GNU glibc 2.30.9000. Calling memcpy with a negative value for the "num" parameter results in a signed comparison vulnerability. If an attacker underflows the "num" parameter to memcpy, this vulnerability could lead to undefined behavior such as writing to out-of-bounds memory and potentially remote code ex ...

The wordexp function in the GNU C Library (aka glibc) through 2.33 may crash or read arbitrary memory in parse_param (in posix/wordexp.c) when called with an untrusted, crafted pattern, potentially resulting in a denial of service or disclosure of information. This occurs because atoi was used but strtoul should have been used to ensure correct calculations.

A flaw was discovered in processing setsockopt IP6T_SO_SET_REPLACE for 32 bit processes on 64 bit systems. This flaw will allow local user to gain privileges or cause a DoS through user name space. This action is usually restricted to root-privileged users but can also be leveraged if the kernel is compiled with CONFIG_USER_NS and CONFIG_NET_NS and the user is granted elevated privileges.


Pages:      Start    744    745    746    747    748    749    750    751    752    753    754    755    756    757    ..   1514

© SecPod Technologies