The host is installed with Google Chrome before 40.0.2214.91 and is prone to a denial of service vulnerability. A flaw is present in the application, which uses an incorrect data type for a certain length value. Successful exploitation could allow attackers to cause a denial of service (out-of-bounds read).
The host is installed with Google Chrome before 40.0.2214.91 and is prone to a security bypass vulnerability. A flaw is present in the application, which fails to handle a crafted JavaScript code with Proxy.create and console.log calls, related to HTTP responses that lack an "X-Content-Type-Options: nosniff" header. Successful exploitation could allow attackers to bypass the Same Origin Policy.
The host is installed with Google Chrome before 40.0.2214.91 and is prone to a security bypass vulnerability. A flaw is present in the application, which fails to handle a crafted JavaScript code with Proxy.create and console.log calls, related to HTTP responses that lack an "X-Content-Type-Options: nosniff" header. Successful exploitation could allow attackers to bypass the Same Origin Policy.
The host is installed with Google Chrome before 40.0.2214.91 and is prone to a denial of service vulnerability. A flaw is present in the application, which does not properly handle odd values of image width. Successful exploitation could allow attackers to cause a denial of service (out-of-bounds read).
The host is installed with Google Chrome before 40.0.2214.91 and is prone to a denial of service vulnerability. A flaw is present in the application, which does not properly handle odd values of image width. Successful exploitation could allow attackers to cause a denial of service (out-of-bounds read).
The host is installed with Google Chrome before 40.0.2214.91 and is prone to a denial of service vulnerability. A flaw is present in the application, which skips captions during table layout in certain situations. Successful exploitation could allow attackers to cause a denial of service (out-of-bounds read).
The host is installed with Google Chrome before 40.0.2214.91 and is prone to a denial of service vulnerability. A flaw is present in the application, which skips captions during table layout in certain situations. Successful exploitation could allow attackers to cause a denial of service (out-of-bounds read).
The host is installed with Google Chrome before 40.0.2214.91 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation could allow attackers to cause a denial of service (out-of-bounds read).
The host is installed with Google Chrome before 40.0.2214.91 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation could allow attackers to cause a denial of service (out-of-bounds read).
The host is installed with Google Chrome before 40.0.2214.91 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to handle a crafted PDF document, related to j2k.c, jp2.c and t2.c. Successful exploitation could allow attackers to cause a denial of service (out-of-bounds read).