[Forgot Password]
Login  Register Subscribe

23631

 
 

122183

 
 

98060

 
 

909

 
 

79198

 
 

109

 
 
Paid content will be excluded from the download.

Filter
Matches : 1075 Download | Alert*

Security researcher Ash reported an issue where the extracted files for updates to existing files are not read only during the update process. This allows for the potential replacement or modification of these files during the update process if a malicious application is present on the local system.

Security researcher John Thomson discovered a memory corruption in the Cairo graphics library during font rendering of a PDF file for display. This memory corruption leads to a potentially exploitable crash and to a denial of service (DOS). This issues is not able to be triggered in a default configuration and would require a malicious extension to be installed.

The host is missing a security update according to Google advisory. The update is required to fix multiple vulnerabilities. The flaws are present in the application, which fails to properly handle unknown vectors. Successful exploitation could allow attackers to crash the service.

The host is missing an important security update according to Microsoft security bulletin, MS15-081. The update is required to fix multiple vulnerabilities. The flaws are present in the application, which fails to properly handle objects in memory. Successful exploitation could allow attackers to execute remote code.

The host is missing a security update according to Google advisory. The update is required to fix multiple Same Origin Policy bypass vulnerabilities. The flaws are present in the application, which fails to handle crafted data. Successful exploitation could allow attackers to bypass the Same Origin Policy.

The host is missing a critical security update according to Adobe advisory, APSB15-28. The update is required to fix multiple vulnerabilities. The flaws are present in the applications, which fail to properly handle crafted vectors. Successful exploitation could allow attackers to execute arbitrary code or bypass intended access restrictions and write to files.

The host is missing a security update according to Mozilla advisory, MFSA2015-121. The update is required to fix a cross site scripting vulnerability. A flaw is present in the applications, which fail to properly handle inline JavaScript code. Successful exploitation could allow attackers to conduct cross-site scripting (XSS) attacks.

The host is missing a critical security update according to Mozilla advisory, MFSA2015-116. The update is required to fix multiple unspecified vulnerabilities. The flaws are present in the applications, which fail to properly handle unknown vectors. Successful exploitation could allow attackers to execute arbitrary code or crash the service.

The host is missing a security update according to Apple advisory, APPLE-SA-2015-12-08-6. The update is required to fix multiple vulnerabilities. The flaws are present in the application, which fails to handle crafted data. Successful exploitation allows attackers to cause unspecified impact.

The host is missing a security update according to Mozilla advisory, MFSA2016-02. The update is required to fix a out of memory crash vulnerability. A flaw is present in the application, which fails to properly handle a crafted image file. Successful exploitation allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code.


Pages:      Start    94    95    96    97    98    99    100    101    102    103    104    105    106    107    ..   107

© 2013 SecPod Technologies