[Forgot Password]
Login  Register Subscribe

24547

 
 

132804

 
 

129694

 
 

909

 
 

106691

 
 

152

 
 
Paid content will be excluded from the download.

Filter
Matches : 1227 Download | Alert*

The host is missing a security update according to MFSA 2014-89. The update is required to fix an arbitrary code execution vulnerability. A flaw is present in the applications, which fail to handle unknown vectors. Successful exploitation allows attackers to execute arbitrary code by leveraging an incorrect cast from the BasicThebesLayer data type to the BasicContainerLayer data type.

The host is missing a low severity security update according to Google advisory. The update is required to fix multiple vulnerabilities. The flaws are present in the WebKit, which fails to handle crafted dimensions, SVG document, HTML document, JavaScript code or text element. Successful exploitation allows remote attackers to cause a denial of service (application crash) or possibly have unspecif ...

The host is missing a critical security update according to Mozilla advisory, MSFA-2015-35. The update is required to clickjacking vulnerabilities. The flaws are present in the application, which fails to handle a Flash object in conjunction with DIV elements associated with layered presentation and crafted JavaScript code that interacts with an IMG element. Successful exploitation could allow att ...

The host is missing a critical security update according to Mozilla advisory, MFSA-2015-44. The update is required to fix a security bypass vulnerability. A flaw is present in the application, which does not properly handle an Alt-Svc header specification in the HTTP/2 response. Successful exploitation could allow attackers to bypass the SSL certificate verification for the specified alternate ser ...

The host is missing a security update according to Apple advisory, APPLE-SA-2015-09-16-2. The update is required to fix multiple vulnerabilities. The flaws are present in the application, which fails to properly handle crafted data. Successful exploitation could allow attackers to obtain sensitive information or crash the service.

The host is missing a high severity security update according to Google advisory. The update is required to fix multiple Same Origin Policy bypass vulnerabilities. The flaws are present in the application, which fails to handle crafted data. Successful exploitation could allow attackers to bypass the Same Origin Policy.

The host is missing a high severity security update according to Google advisory. The update is required to fix multiple vulnerabilities. The flaws are present in the application, which fails to properly handle unspecified vectors. Successful exploitation could allow remote attackers to crash the service or execute arbitrary webscript.

The host is missing security update according to Mozilla advisory, MFSA2015-141. The update is required to fix a data mishandling vulnerability. A flaw is present in the application, which fails to handle # (number sign) character in a data: URI. Successful exploitation allows remote attackers to spoof web sites.

The host is missing a critical security update according to Microsoft security bulletin, MS16-006. The update is required to fix a remote code execution vulnerability. A flaw is present in the application, which properly decodes strings using a malicious decoder that can return negative offsets. An attacker who successfully exploited this vulnerability could obtain the same permissions as the curr ...

The host is missing an important security update according to Mozilla advisory, MFSA2016-09. The update is required to fix a security bypass vulnerability. A flaw is present in the application, which fails to handle a URL which is invalid for an internal protocol is pasted into the addressbar. Successful exploitation allows remote attackers to manipulate the address bar contents to show location.


Pages:      Start    3    4    5    6    7    8    9    10    11    12    13    14    15    16    ..   122

© SecPod Technologies