[Forgot Password]
Login  Register Subscribe

23631

 
 

115084

 
 

97147

 
 

909

 
 

78730

 
 

109

 
 
Paid content will be excluded from the download.

Filter
Matches : 1032 Download | Alert*

The host is missing a critical security update according to Mozilla advisory, MFSA2016-95. The update is required to fix multiple vulnerabilities. The flaws are present in the application, which fails to handle crafted data. Successful exploitation allows remote attackers to execute arbitrary code or crash the service.

The host is missing a security update according to Google advisory. The update is required to fix multiple vulnerabilities. The flaws are present in the application, which fails to handle crafted data. Successful exploitation allows attackers to have unspecified impact.

The host is missing a security update according to APPLE-SA-2011-07-20-2. The update is required to fix multiple memory corruption vulnerabilities. Multiple flaws are present in the application, which fail to handle an excel file. Successful exploitation allows attackers to execute arbitrary code or crash the service.

The host is missing a critical security update according to Adobe advisory, APSB12-02. The update is required to fix multiple memory corruption vulnerabilities. The flaws are present in the application, which fails to sanitize user supplied input. Successful exploitation could allow attackers to execute arbitrary code.

The host is missing a critical security update according to Mozilla advisory, MFSA 2012-02. The update is required to fix an information disclosure vulnerability. A flaw is present in the applications, which fail to handle XMLHttpRequest calls through a proxy. Successful exploitation could allow attackers to obtain sensitive information by reading the error messages.

The host is missing a moderate security update according to Mozilla advisory, MFSA2012-15. The update is required to fix a CRLF injection vulnerability. A flaw is present in the applications, which fail to handle crafted HTTP headers. Successful exploitation could allow attackers to bypass intended Content Security Policy (CSP) restrictions and possibly conduct cross-site scripting (XSS) attacks.

The host is missing critical security update according to APSB11-02. The update is required to fix denial of service (memory corruption) vulnerability. A flaw is present in the application, which fails to avoid memory corruptions. Successful exploitation allows remote attackers to corrupt memory to execute arbitrary code on the system.

The host is missing a critical security update according to Adobe advisory, APSA11-04. The update is required to fix unspecified vulnerability. A flaw is present in the application, which fails to properly handle U3D component. Successful exploitation could allow attackers to execute arbitrary code or crash the service.

The host is missing a critical security update according to Mozilla advisory, MFSA2012-21. The update is required to fix multiple denial of service vulnerabilities. The flaws are present in the application, which fails to handle the FreeType library. Successful exploitation could allow attackers to cause memory corruption.

The host is missing a critical security update according to security update APSB12-10. The update is required to fix multiple memory corruption vulnerabilities. The flaws are present in the application, which fails to handle unspecified vectors related memory. Successful exploitation allow attackers to execute arbitrary code.


Pages:      Start    1    2    3    4    5    6    7    8    9    10    11    12    13    14    ..   103

© 2013 SecPod Technologies