[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248364

 
 

909

 
 

195388

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 194669 Download | Alert*

The host is missing a high severity security update according to Google advisory. The update is required to fix multiple vulnerabilities. The flaws are present in the application, which fails to properly handle crafted data. Successful exploitation allows remote attackers to bypass the Same Origin Policy or cause a denial of service.

The OpenJPEG library is an open-source JPEG 2000 library developed in order to promote the use of JPEG 2000. This package contains * JPEG 2000 codec compliant with the Part 1 of the standard . * JP2

The OpenJPEG library is an open-source JPEG 2000 library developed in order to promote the use of JPEG 2000. This package contains * JPEG 2000 codec compliant with the Part 1 of the standard . * JP2

Several vulnerabilities have been discovered in the chromium web browser. CVE-2015-1291 A cross-origin bypass issue was discovered in DOM. CVE-2015-1292 Mariusz Mlynski discovered a cross-origin bypass issue in ServiceWorker. CVE-2015-1293 Mariusz Mlynski discovered a cross-origin bypass issue in DOM. CVE-2015-1294 cloudfuzzer discovered a use-after-free issue in the Skia graphics library. CVE-201 ...

The host is installed with Google Chrome before 45.0.2454.85 and is prone to a same-origin-policy bypass vulnerability. A flaw is present in the application, which fails to properly check whether a node is expected. Successful exploitation allows remote attackers to bypass the Same Origin Policy or cause a denial of service.

The host is installed with Google Chrome before 45.0.2454.85 and is prone to a same-origin-policy bypass vulnerability. A flaw is present in the application, which fails to properly access a Service Worker. Successful exploitation allows remote attackers to bypass the Same Origin Policy.

The host is installed with Google Chrome before 45.0.2454.85 and is prone to a same-origin-policy bypass vulnerability. A flaw is present in the application, which fails to properly handle crafted data. Successful exploitation allows remote attackers to bypass the Same Origin Policy.

The host is installed with Google Chrome before 45.0.2454.85 and is prone to an use-after-free vulnerability. The flaws are present in the application, which fails to properly handle the use of matrix elements that lead to an infinite result during an inversion calculation. Successful exploitation allows remote attackers to crash the service.

The host is installed with Google Chrome before 45.0.2454.85 and is prone to multiple use-after-free vulnerabilities. The flaws are present in the application, which fails to properly handle nested IPC messages triggered during preparation for printing. Successful exploitation allows remote attackers to crash the service.

The host is installed with Google Chrome before 45.0.2454.85 and is prone to a SSL spoofing vulnerability. A flaw is present in the application, which fails to properly prevent display of Unicode LOCK characters in the omnibox. Successful exploitation allows user-assisted remote attackers to spoof the SSL lock icon by placing one of these characters at the end of a URL.


Pages:      Start    9606    9607    9608    9609    9610    9611    9612    9613    9614    9615    9616    9617    9618    9619    ..   19466

© SecPod Technologies