[Forgot Password]
Login  Register Subscribe

23631

 
 

126951

 
 

99602

 
 

909

 
 

80170

 
 

109

 
 
Paid content will be excluded from the download.

Filter
Matches : 1036 Download | Alert*

The host is installed with Apple Mac OS X 10.6.3 and is prone to multiple unspecified vulnerabilities. The flaws are present in the application, which fail to sanitize user supplied input. Successful exploitation could allow attackers to affect confidentiality, integrity, and availability.

The host is missing a critical security update according to APSB10-15. The update is required to fix multiple vulnerabilities. The flaws are present in the application, which fail to properly handle memory. Successful exploitation allows remote attackers to execute remote code.

The host is missing a security update according to Apple advisory, APPLE-SA-2013-03-06-1. The update is required to fix multiple arbitrary code execution vulnerabilities. The flaws are present in the application, which fails to handle the web plug-in blocking mechanism. Successful exploitation allows attackers to cause arbitrary code to be executed on the target user's system.

The host is missing a critical security update according to Microsoft security bulletin, MS13-022. The update is required to fix remote code execution vulnerability. A flaw is present in the Microsoft Silverlight, which fail to handle a specially crafted Silverlight application. Successful exploitation could allow an attacker to install programs, view, change, or delete data or create new accounts ...

The host is missing an important security update according to Microsoft bulletin, MS13-051. The update is required to fix buffer overflow vulnerability. A flaw is present in the application, which is caused when Microsoft Office components for processing PNG files do not properly handle memory allocation. Successful exploitation allows attackers to execute arbitrary code.

The host is missing an important security update according to Microsoft bulletin, MS13-087. The update is required to fix information disclosure vulnerability. A flaw is present in the application, which fails to properly handle certain objects in memory. Successful exploitation allows attackers to disclose information on the local system.

The host is missing a security update according to Adobe advisory, APSB14-20. The update is required to fix multiple vulnerabilities. The flaws are present in the application, which fails to handle unknown vectors. Successful exploitation allows attackers to execute remote code, cause a denial of service (memory corruption) or bypass a sandbox protection mechanism, and consequently execute native ...

The host is missing a critical security update according to Mozilla advisory, MFSA2016-96. The update is required to fix multiple vulnerabilities. The flaws are present in the application, which fails to handle crafted data. Successful exploitation allows remote attackers to execute arbitrary code or crash the service.

The host is missing a critical security update according to APSA10-02. The update is required to fix stack-based buffer overflow vulnerability. A flaw is present in the application, which fails to handle a PDF document with a long field in a Smart Independent Glyphlets (SING) table in a TTF font. Successful exploitation allows remote attackers to execute arbitrary code or cause a denial of service ...

The host is missing a security update according to Adobe advisory, APSB13-04. The update is required to fix multiple vulnerabilities. The flaws are present in the applications, which fail to handle a crafted SWF content. Successful exploitation could allow attackers to execute arbitrary code or crash the service.


Pages:      Start    93    94    95    96    97    98    99    100    101    102    103    ..   103

© 2013 SecPod Technologies