Google Project Zero researcher Tavis Ormandy , who found that the extension exposed authentication tokens to all websites , making accessible a user?s documents , history , logs , and other data(passive) was initially discovered byvulnerability
missing input validation within a library used by the bundled Microsoft Office Document Imaging application(passive) caused bya vulnerability
in the one - X Portal component of IP Office that could allow an authenticated user to perform stored cross site scripting attacks that could affect other application users(passive) was discoveredA vulnerability
due to an error in the processing of XML files(passive) is causedA vulnerability
in Internet Explorer , which can potentially be exploited by malicious people to compromise a user 's system(passive) has been discoveredA vulnerability
Google Project Zero researcher Tavis Ormandydiscovereda vulnerability
in Creative Software AutoUpdate Engine ActiveX Control , which can be exploited by malicious people to compromise a user 's system(passive) has been discoveredA vulnerability
in Adobe Flash Player and Adobe AIR , which can be exploited by malicious people to compromise a user 's system(passive) has been discoveredA vulnerability
in Microsoft Windows , which can be exploited by malicious people to potentially compromise a user 's system(passive) has been discoveredA vulnerability
in multiple VMWare products , which can be exploited by malicious people to compromise a vulnerable system(passive) was discoveredA vulnerability
an input validation error when processing certain elements in a Ghost record(passive) caused byVulnerability
in Adobe Reader , which can be exploited by malicious people to compromise a user 's system(passive) has been discoveredA vulnerability
a memory corruption error when processing certain structures in an Excel file(passive) caused bya vulnerability
when Microsoft Office PowerPoint accesses an invalid object in memory when parsing a specially - crafted PowerPoint file(passive) is causedvulnerability
an input validation error in the " a " parameter to(passive) is caused byVulnerability
description Tavis Ormandy of the Gentoo Security Projectdiscovereda vulnerability
due to a boundary error(passive) is causedvulnerability
in Windows Movie Maker , which can be exploited by malicious people to compromise a user 's system(passive) was discoveredA vulnerability
in the WooCommerce plugin , which could allow an attacker to download any file on the vulnerable server(passive) has been discoveredvulnerability
due to a boundary error in the IMAP service(passive) is causedvulnerability
in Foxit Reader , which can be exploited by malicious people to compromise a user 's system(passive) has been discoveredA vulnerability
in versions of software development toolkits from RSA Security , which could allow an attacker to bypass SSL client authentication(passive) has been discoveredA vulnerability
in the Linux kernel's approach to memory management which could allow an application to access a region of memory that is not allocated to it(passive) has been discoveredA vulnerability
due to the application bundling a vulnerable version of Adobe Flash Player(passive) is causedvulnerability
in the error page mechanism in Tomcat 's DefaultServlet implementation(passive) was discoveredA vulnerability
due to an unspecified error(passive) is causedvulnerability
due to an integer overflow error within the Fpx.dll module(passive) is causedvulnerability
an input validation error(passive) is caused byVulnerability
in Pulse CMS , which can be exploited by malicious users to compromise a vulnerable system(passive) was discoveredA vulnerability
Google security researcher Tavis Ormandy(passive) discovered bya vulnerability
a use - after - free error in the WebKit library when handling certain iframe events(passive) is caused bya vulnerability
in Sun Java , which can be exploited by malicious people to compromise a user 's system(passive) has been discoveredA vulnerability
Tavis Ormandy of the Gentoo Security Projectdiscovereda vulnerability
corruption of memory leadingcan causecorruption of memory leading
to a total of 657466753760 hits by Program : Win32 / AdRevMedia since 7/13/2009 4:27:21 PM in Colombia , Malawi , Ukraine , Lithuania and Norwayleadsto a total of 657466753760 hits by Program : Win32 / AdRevMedia since 7/13/2009 4:27:21 PM in Colombia , Malawi , Ukraine , Lithuania and Norway
in Hyperion FTP Serverdiscoveredin Hyperion FTP Server
to hidden vulnerabilities in those who use who as a major defense mechanismmay leadto hidden vulnerabilities in those who use who as a major defense mechanism
to a site being compromisedcould leadto a site being compromised
to a total of 7069356983040 hits by Programleadsto a total of 7069356983040 hits by Program
in its IOS and IOS XE software which could allow an attacker to reload an affected device or remotely execute code with elevated privilegesdiscoveredin its IOS and IOS XE software which could allow an attacker to reload an affected device or remotely execute code with elevated privileges
the application to crash and potentially allow an attacker to take control of the affected systemcould causethe application to crash and potentially allow an attacker to take control of the affected system
in a system that is not disclosed publicly before being used in an attackdiscoveredin a system that is not disclosed publicly before being used in an attack
a crash and potentially allow an attacker to take control of the affected systemcould causea crash and potentially allow an attacker to take control of the affected system
in unauthorized creation , deletion or modification access to critical data or all Java SE accessible datacan resultin unauthorized creation , deletion or modification access to critical data or all Java SE accessible data
a crash and potentially allow an attacker to executable arbitrary code on the affected systemcould causea crash and potentially allow an attacker to executable arbitrary code on the affected system
an affected device to reload when the affected device processes a malformed BGP update that has been crafted to trigger the issuecould causean affected device to reload when the affected device processes a malformed BGP update that has been crafted to trigger the issue
the Historian Data Archiver service to crash and potentially allow an attacker to take control of a system running the affected softwarecould causethe Historian Data Archiver service to crash and potentially allow an attacker to take control of a system running the affected software
to denial - of - service ( DoS ) attackscould leadto denial - of - service ( DoS ) attacks
to a malicious user gaining full administrative accessmay leadto a malicious user gaining full administrative access
to arbitrary code execution in the context of the current usercould leadto arbitrary code execution in the context of the current user
Remote command execution and privilege escalation vulnerabilitiesdiscoveredRemote command execution and privilege escalation vulnerabilities
in an attacker running arbitrary code on the systemcould resultin an attacker running arbitrary code on the system
to a heap buffer overflow vulnerability that could lead to code execution ( CVE-2017 - 2973could leadto a heap buffer overflow vulnerability that could lead to code execution ( CVE-2017 - 2973
to code execution memory corruption vulnerabilities that could lead to code executioncould leadto code execution memory corruption vulnerabilities that could lead to code execution
in a Denial of Service ( DoS ) attack - CVE-2012 - 2048could resultin a Denial of Service ( DoS ) attack - CVE-2012 - 2048
to Remote Command Execution Unauthenticated File Disclosure Unauthenticated Server Side Request Forgeryleadsto Remote Command Execution Unauthenticated File Disclosure Unauthenticated Server Side Request Forgery
to escalation of privileges , denial of service , or assistance disclosuremay ... leadto escalation of privileges , denial of service , or assistance disclosure
a denial of service via a crafted ELF fileto causea denial of service via a crafted ELF file
to remote execution of the arbitrary code in system ( RCEcould leadto remote execution of the arbitrary code in system ( RCE
to a Windows stop error ( kernel panic , or blue screen error ) , or to arbitrary code executionwill leadto a Windows stop error ( kernel panic , or blue screen error ) , or to arbitrary code execution
in unauthorized permission to delete Default Resource Types in Password Manager Proresultedin unauthorized permission to delete Default Resource Types in Password Manager Pro
in Wireshark , which can be exploited by malicious people to cause a DoS ( Denial of Servicehas been discoveredin Wireshark , which can be exploited by malicious people to cause a DoS ( Denial of Service
to code execution ... while the other six are out - of - bounds read vulnerabilities that could lead to information disclosurecould leadto code execution ... while the other six are out - of - bounds read vulnerabilities that could lead to information disclosure
an affected device to reloadcould causean affected device to reload
in takeover of Java SEcan resultin takeover of Java SE
to medium - integrity code execution vulnerabilityleadingto medium - integrity code execution vulnerability
in the wild Vulnerability corrected by vendordiscoveredin the wild Vulnerability corrected by vendor
to information disclosure , including in some cases the session keys which could then be used to decrypt all data in the sessioncould leadto information disclosure , including in some cases the session keys which could then be used to decrypt all data in the session
a denial of service via a crafted zip fileto causea denial of service via a crafted zip file
in memory corruption , which can potentially lead to arbitrary code executionresultingin memory corruption , which can potentially lead to arbitrary code execution
to a security bypass and exposure of sensitive informationcan leadto a security bypass and exposure of sensitive information
to remote code execution if a user opens a file that contains a specially crafted OLE objectcould leadto remote code execution if a user opens a file that contains a specially crafted OLE object
to addition or modification of data , or disclosure of sensitive informationcould leadto addition or modification of data , or disclosure of sensitive information