[Forgot Password]
Login  Register Subscribe

23631

 
 

115084

 
 

97559

 
 

909

 
 

78730

 
 

109

 
 
Paid content will be excluded from the download.

Filter
Matches : 1027 Download | Alert*

The host is missing a critical security update according to Adobe advisory, APSB13-17. The update is required to fix multiple vulnerabilities. The flaws are present in the application, which fail to handle crafted data. Successful exploitation could allow attackers to execute arbitrary code or crash the service.

The host is missing a security update according to Adobe advisory, APSB13-12. The update is required to fix multiple vulnerabilities. The flaws are present in the application, which fails to properly handle memory. Successful exploitation allow attackers to execute remote code, information bypass or disruption of service.

Security researcher Fabián Cuchietti discovered that it was possible to bypass the restriction on JavaScript execution in mail by embedding an <iframe> with a data: URL within a message. If the victim replied or forwarded the mail after receiving it, quoting it "in-line" using Thunderbird"s HTML mail editor, it would run the attached script. The running script would be rest ...

The host is missing a security update according to Google advisory. The update is required to fix multiple vulnerabilities. The flaws are present in the WebKit, which fails to handle crafted dimensions, SVG document, HTML document, JavaScript code or text element. Successful exploitation allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other imp ...

The host is missing a security update according to Apple advisory, APPLE-SA-2014-12-11-1. The update is required to fix multiple memory corruption vulnerabilities. The flaws are present in the application, which fails to properly handle crafted data. Successful exploitation could allow attackers to execute arbitrary code.

The host is missing a security update according to Adobe advisory, APSB13-20. The update is required to fix memory corruption vulnerability. The flaw is present in the application, which fails to properly handle memory. Successful exploitation allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors.

The host is missing an important security update according to Apple security advisory, APPLE-SA-2014-05-16-1. The update is required to fix security bypass vulnerability. The flaw is present in the application, which fail to handle standard filesystem operations. Successful exploitation could allow attackers to modify files and consequently obtain access to arbitrary user accounts.


Pages:      Start    93    94    95    96    97    98    99    100    101    102    ..   102

© 2013 SecPod Technologies