[Forgot Password]
Login  Register Subscribe

30481

 
 

423868

 
 

255116

 
 

909

 
 

198683

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 197798 Download | Alert*

Several vulnerabilities have been discovered in the chromium web browser. CVE-2015-1291 A cross-origin bypass issue was discovered in DOM. CVE-2015-1292 Mariusz Mlynski discovered a cross-origin bypass issue in ServiceWorker. CVE-2015-1293 Mariusz Mlynski discovered a cross-origin bypass issue in DOM. CVE-2015-1294 cloudfuzzer discovered a use-after-free issue in the Skia graphics library. CVE-201 ...

The OpenJPEG library is an open-source JPEG 2000 library developed in order to promote the use of JPEG 2000. This package contains * JPEG 2000 codec compliant with the Part 1 of the standard . * JP2

The OpenJPEG library is an open-source JPEG 2000 library developed in order to promote the use of JPEG 2000. This package contains * JPEG 2000 codec compliant with the Part 1 of the standard . * JP2

The host is installed with Google Chrome before 45.0.2454.85 and is prone to a same-origin-policy bypass vulnerability. A flaw is present in the application, which fails to properly check whether a node is expected. Successful exploitation allows remote attackers to bypass the Same Origin Policy or cause a denial of service.

The host is installed with Google Chrome before 45.0.2454.85 and is prone to a same-origin-policy bypass vulnerability. A flaw is present in the application, which fails to properly access a Service Worker. Successful exploitation allows remote attackers to bypass the Same Origin Policy.

The host is installed with Google Chrome before 45.0.2454.85 and is prone to a same-origin-policy bypass vulnerability. A flaw is present in the application, which fails to properly handle crafted data. Successful exploitation allows remote attackers to bypass the Same Origin Policy.

The host is installed with Google Chrome before 45.0.2454.85 and is prone to an use-after-free vulnerability. The flaws are present in the application, which fails to properly handle the use of matrix elements that lead to an infinite result during an inversion calculation. Successful exploitation allows remote attackers to crash the service.

The host is installed with Google Chrome before 45.0.2454.85 and is prone to multiple use-after-free vulnerabilities. The flaws are present in the application, which fails to properly handle nested IPC messages triggered during preparation for printing. Successful exploitation allows remote attackers to crash the service.

The host is installed with Google Chrome before 45.0.2454.85 and is prone to a SSL spoofing vulnerability. A flaw is present in the application, which fails to properly prevent display of Unicode LOCK characters in the omnibox. Successful exploitation allows user-assisted remote attackers to spoof the SSL lock icon by placing one of these characters at the end of a URL.

The host is installed with Google Chrome before 45.0.2454.85 and is prone to a security bypass vulnerability. A flaw is present in the application, which fails to properly handle a crafted (1) app or (2) extension. Successful exploitation allows user-assisted remote attackers to bypass intended access restrictions.


Pages:      Start    10136    10137    10138    10139    10140    10141    10142    10143    10144    10145    10146    10147    10148    10149    ..   19779

© SecPod Technologies