[Forgot Password]
Login  Register Subscribe

24128

 
 

131573

 
 

110507

 
 

909

 
 

86504

 
 

136

 
 
Paid content will be excluded from the download.

Filter
Matches : 1094 Download | Alert*

The host is missing a security update according to Apple advisory, APPLE-SA-2018-02-19-2. The update is required to fix memory corruption vulnerability. The flaw is present in the application, which fails to properly handle an input validation issue. Successful exploitation could allow attackers processing a maliciously crafted string to lead to heap corruption.

The host is missing a critical update according to Adobe advisory, APSB18-16. The update is required to fix a type confusion vulnerability. The flaws are present in the application, which fails to properly handle unknown vectors. Successful exploitation allows remote attackers to cause arbitrary code execution.

The host is missing a critical severity security update according to Google advisory. The update is required to fix multiple vulnerabilities. The flaws are present in the application, which fail to handle a crafted data or unknown vectors. Successful exploitation allows attackers to cause a denial of service, obtain sensitive information, bypass a sandbox protection mechanism or execute arbitrary ...

The host is missing a critical security update according to Google advisory. The update is required to fix multiple vulnerabilities. The flaws are present in the application, which fails to handle crafted data. Successful exploitation allows attackers to have unspecified impact.

The host is missing a security update according to Apple advisory, APPLE-SA-2013-06-18-1. The update is required to fix multiple vulnerabilities. The flaws are present in the application, which fails to handle unspecified vectors. Successful exploitation could allow attackers to execute arbitrary code and gain sensitive information from affect system.

The host is missing a security update according to Apple advisory, APPLE-SA-2018-3-29-6. The update is required to fix multiple vulnerabilities. The flaws are present in the application, which fails to properly perform input validation. Successful exploitation could allow attackers to disclose sensitive information or crash the service.

The host is installed with Apple Mac OS 10.13.3 or 10.12.6 or 10.11.6 and is prone to multiple vulnerabilities. The flaw is present in the application, which fails to properly handle multiple issues. Successful exploitation allows remote attackers to execute arbitrary code or read restricted memory.

The host is missing a critical security update according to Apple advisory, APPLE-SA-2010-11-10-1. The update is required to fix multiple vulnerabilities. The flaws are present in the application, which fails to properly sanitize user supplied input. Successful exploitation could allow attackers to inject arbitrary web script or HTML or crash the service.

The host is missing a critical security update according to APSB10-14. The update is required to fix multiple vulnerabilities. The flaws are present in the applications, which fail to properly handle memory. Successful exploitation allows remote attackers to execute remote code.

The host is missing an important security update according to Microsoft bulletin, MS13-087. The update is required to fix information disclosure vulnerability. A flaw is present in the application, which fails to properly handle certain objects in memory. Successful exploitation allows attackers to disclose information on the local system.


Pages:      Start    5    6    7    8    9    10    11    12    13    14    15    16    17    18    ..   109

© SecPod Technologies