[Forgot Password]
Login  Register Subscribe

30481

 
 

423868

 
 

255116

 
 

909

 
 

198683

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 14865 Download | Alert*

The host is installed with Google Chrome before 25.0.1364.152 and is prone to use-after-free vulnerability. A flaw is present in the application, which fails to handle vectors involving an SVG animation. Successful exploitation allows remote attackers to cause a denial of service or possibly have unspecified other impact.

The host is installed with Google Chrome before 25.0.1364.152 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to handle the Web Audio implementation. Successful exploitation allows remote attackers to cause a denial of service or memory corruption or possibly have unspecified other impact via unknown vectors.

The host is installed with Google Chrome before 25.0.1364.152 and is prone to use-after-free vulnerability. A flaw is present in the application, which fails to handle vectors related to the handling of browser navigation. Successful exploitation allows remote attackers to cause a denial of service or possibly have unspecified other impact.

The host is installed with Google Chrome before 25.0.1364.152 and is prone to use-after-free vulnerability. A flaw is present in the application, which fails to handle the frame-loader implementation. Successful exploitation allows remote attackers to cause a denial of service or possibly have unspecified other impact.

The host is installed with Google Chrome and is prone to security bypass vulnerability. A flaw is present in the browser, which fails to enforce ASLR/DEP/Sandbox security restrictions and fails to validate data. Successful exploitation could allow remote attackers to cause bypass security restriction, execute arbitrary code or cause denial of service.

The host is installed with Opera Browser and is prone to memory-corruption vulnerability. A flaw is present in the application which is caused by an error when handling malformed tags. Successful exploitation allows remote attacker to execute arbitrary code and cause denial of service condition.

The host is installed with Adobe Flash Media Server and is prone to denial of service vulnerability. A flaw is present in the application, which fails to handle malicious XML data. Successful exploitation could allow remote attackers to cause a denial of service.

The host is installed with SharePoint Server 2013 Client Components SDK, Microsoft SharePoint Designer 2007 SP3, 2010 SP1, SP2, 2013, SP1, Microsoft Office Web Apps Server 2013, SP1, Microsoft Windows SharePoint Services 3.0 SP3, SharePoint Server 2007, 2010 SP1, SP2, 2013, Microsoft SharePoint Foundation 2013 , 2010 SP1, SP2, Microsoft Web Applications 2010 SP1, SP2, Microsoft Project Server 2013 ...

The host is installed with SharePoint Server 2013 Client Components SDK, Microsoft Office Web Apps Server 2013, SP1, Microsoft SharePoint Server 2013 or Microsoft SharePoint Foundation 2013 and is prone to elevation of privilege vulnerability. A flaw is present in the applications, which fail to properly sanitize a specially crafted request to an affected SharePoint server. Successful exploitation ...

The host is installed with Microsoft Web Applications 2010 SP1 or SP2 and is prone to remote code execution vulnerability. A flaw is present in the application, which fail to properly sanitize the page content. Successful exploitation allows attackers to run arbitrary code in the security context of the W3WP service account.


Pages:      Start    1295    1296    1297    1298    1299    1300    1301    1302    1303    1304    1305    1306    1307    1308    ..   1486

© SecPod Technologies