[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

250770

 
 

909

 
 

196157

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 43419 Download | Alert*

The host is missing a security update according to Adobe advisory, APSB10-16. The update is required to fix multiple vulnerabilities. The flaws are present in an application, which fails to handle the unknown vectors. Successful exploitation could allow attackers to a denial of service (application crash) or possibly execute arbitrary code.

The host is missing a security update according to Adobe advisory, APSB10-16. The update is required to fix multiple vulnerabilities. The flaws are present in an application, which fails to handle the unknown vectors. Successful exploitation could allow attackers to a denial of service (application crash) or possibly execute arbitrary code.

The host is missing a critical security update according to Adobe advisory, APSA10-05. The update is required to fix multiple vulnerabilities. The flaws are present in the applications, which fail to properly handle crafted data. Successful exploitation could allow attackers to execute arbitrary code.

The host missing a security update according to Adobe advisory, APSB10-21. The update is required to fix multiple vulnerabilities. The flaws are present in the application, which fails to properly handle crafted data. Successful exploitation allows remote attackers to execute arbitrary code or cause a denial of service.

The host is installed with Adobe Reader 9.x before 9.3.3 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle crafted data. Successful exploitation allows remote attackers to execute arbitrary code or crash the service.

The host is missing a critical security update according to Adobe advisory, APSA10-01. The update is required to fix a memory corruption vulnerability. A flaw is present in an applications, which fail to handle the unspecified vectors. Successful exploitation could allow attackers to cause a denial of service (memory corruption) or possibly execute arbitrary code.

The host is missing a critical security update according to Adobe advisory, APSB10-28. The update is required to fix multiple vulnerabilities. The flaws are present in the application, which fails to handle crafted data. Successful exploitation could allow attackers to execute arbitrary code or crash the service.

FreeType is a free, high-quality, portable font engine that can open and manage font files. It also loads, hints, and renders individual glyphs efficiently. The freetype packages for Red Hat Enterprise Linux 4 provide both the FreeType 1 and FreeType 2 font engines. The freetype packages for Red Hat Enterprise Linux 5 provide only the FreeType 2 font engine. It was discovered that the FreeType fon ...

FreeType is a free, high-quality, portable font engine that can open and manage font files. It also loads, hints, and renders individual glyphs efficiently. The freetype packages for Red Hat Enterprise Linux 3 provide both the FreeType 1 and FreeType 2 font engines. It was discovered that the FreeType font rendering engine improperly validated certain position values when processing input streams. ...

FreeType is a free, high-quality, portable font engine that can open and manage font files. It also loads, hints, and renders individual glyphs efficiently. The freetype packages for Red Hat Enterprise Linux 4 provide both the FreeType 1 and FreeType 2 font engines. The freetype packages for Red Hat Enterprise Linux 5 provide only the FreeType 2 font engine. It was discovered that the FreeType fon ...


Pages:      Start    1274    1275    1276    1277    1278    1279    1280    1281    1282    1283    1284    1285    1286    1287    ..   4341

© SecPod Technologies