[Forgot Password]
Login  Register Subscribe

30480

 
 

423868

 
 

252588

 
 

909

 
 

196930

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 1991 Download | Alert*

The host is missing an important security update according to Microsoft bulletin, MS15-080. The update is required to fix multiple TrueType Font Parsing vulnerabilities. A flaw is present in the application, which fails to properly handle TrueType fonts. Successful exploitation allows attackers to take complete control of the affected system.

The host is missing a critical security update according to Microsoft security bulletin, MS16-006. The update is required to fix a remote code execution vulnerability. A flaw is present in the application, which properly decodes strings using a malicious decoder that can return negative offsets. An attacker who successfully exploited this vulnerability could obtain the same permissions as the curr ...

The host is missing a critical security update according to Microsoft security bulletin, MS15-044. The update is required to fix a truetype font parsing vulnerability. A flaw is present in the application, which fails to handle a crafted TrueType font. Successful exploitation could allow attackers to execute arbitrary code.

The host is missing a security update according to Apple advisory. The update is required to fix multiple vulnerabilities. The flaws are present in the application, which fails to properly handle malicious vectors. Successful exploitation could allow attackers to bypass and disclose information.

The host is missing a security update according to Apple advisory, APPLE-SA-2019-1-22-2. The update is required to fix multiple vulnerabilities. The flaws are present in the application, which fails to properly handle unspecified vectors. Successful exploitation could allow attackers to cause memory corruption or arbitrary code execution.

The host is installed with Apple Xcode before 10.2 on Apple Mac OS X 10.13.6 or later and is prone to an arbitrary code execution vulnerability. The flaws are present in the application, which fails to properly handle a memory corruption issue. Successful exploitation allows attackers to execute arbitrary code with kernel privileges.

The host is missing a security update according to Apple advisory, APPLE-SA-2018-02-19-2. The update is required to fix memory corruption vulnerability. The flaw is present in the application, which fails to properly handle an input validation issue. Successful exploitation could allow attackers processing a maliciously crafted string to lead to heap corruption.

The host is missing a security update according to Apple advisory, APPLE-SA-2018-04-24-2. The update is required to fix multiple vulnerabilities. A flaw is present in the application, which fails to properly handle maliciously crafted vectors. Successful exploitation may lead to UI spoofing or memory corruption.

The host is missing a critical security update according to Adobe advisory, APSB11-18. The update is required to fix a memory corruption vulnerability. A flaw is present in the application, which fails to handle malicious data. Successful exploitation could allow attackers to execute arbitrary code or crash the service.

The host is missing a a critical security update according to APSB12-05. The update is required to fix multiple vulnerabilities. The flaws are present in the application, which fails to properly handle memory and integers. Successful exploitation allows remote attackers to execute remote code and gain sensitive information.


Pages:      Start    187    188    189    190    191    192    193    194    195    196    197    198    199    ..   199

© SecPod Technologies