[Forgot Password]
Login  Register Subscribe

23631

 
 

115084

 
 

97559

 
 

909

 
 

78730

 
 

109

 
 
Paid content will be excluded from the download.

Filter
Matches : 1027 Download | Alert*

The host is missing an important security update according to Mozilla advisory, MFSA2016-44. The update is required to fix a heap buffer overflow vulnerability. A flaw is present in the libstagefright library, which fails to handle CENC offsets and the sizes table. Successful exploitation allows remote attackers to execute arbitrary code.

The host is missing an important security update according to Mozilla advisory, MFSA2016-45. The update is required to fix a cross-site scripting (XSS) vulnerability. A flaw is present in the application, which fails to handle the multipart/x-mixed-replace content type. Successful exploitation allows remote attackers to bypass the Content Security Policy (CSP) protection mechanism.

The host is missing an important security update according to Mozilla advisory, MFSA2016-46. The update is required to fix an universal cross-site scripting (XSS) vulnerability. A flaw is present in the WebExtension sandbox feature, which does not properly restrict principal inheritance during chrome.tabs.create and chrome.tabs.update API calls. Successful exploitation allows remote attackers to c ...

The host is missing a critical security update according to Mozilla advisory, MFSA2016-49. The update is required to fix multiple memory corruption vulnerabilities. The flaws are present in the application, which fail to handle unknown vectors. Successful exploitation allows remote attackers to run arbitrary code.

The host is missing an important security update according to Mozilla advisory, MFSA2016-39. The update is required to fix multiple memory corruption vulnerabilities. The flaws are present in the applications, which fail to handle unknown vectors. Successful exploitation allows remote attackers to execute arbitrary code or crash the memory.

The host is missing an important security update according to Mozilla advisory, MFSA2016-47. The update is required to fix an arbitrary code execution vulnerability. A flaw is present in the JavaScript .watch() method, which can be used to overflow the 32-bit generation count of the underlying HashMap, resulting in a write to an invalid entry. Successful exploitation allows remote attackers to exe ...

The host is missing a security update according to Apple advisory, APPLE-SA-2016-05-03-1. The update is required to fix multiple vulnerabilities. The flaws are present in the application, which fails to handle crafted data. Successful exploitation allows attackers to execute arbitrary code.

The host is missing an important security update according to Mozilla advisory, MFSA2016-15. The update is required to fix use-after-free vulnerability. A flaw is present in the Mozilla Network Security Services (NSS), which fails to handle ssl3_HandleECDHServerKeyExchange function. Successful exploitation allows remote attackers to cause a denial of service or possibly have unknown other impact b ...

The host is missing an important security update according to Mozilla advisory, MFSA2016-36. The update is required to fix an use-after-free vulnerability. A flaw is present in the application, which fails to handle a crafted key data with DER encoding. Successful exploitation allows remote attackers to cause a denial of service or possibly have unknown other impact.

The host is missing an important security update according to Mozilla advisory, MFSA2016-37. The update is required to fix multiple vulnerabilities. The flaws are present in the applications, which fails to handle a crafted graphite smart font. Successful exploitation allows remote attackers to cause a denial of service (buffer over-read) or possibly have unknown other impact.


Pages:      Start    4    5    6    7    8    9    10    11    12    13    14    15    16    17    ..   102

© 2013 SecPod Technologies