[Forgot Password]
Login  Register Subscribe

24437

 
 

132035

 
 

118594

 
 

909

 
 

92444

 
 

143

 
 
Paid content will be excluded from the download.

Filter
Matches : 1171 Download | Alert*

The host is missing a critical security update according to Google advisory. The update is required to fix multiple vulnerabilities. The flaws are present in the application, which fails to handle crafted data. Successful exploitation allows attackers to have unspecified impact.

The host is missing a high severity security update according to Google advisory. The update is required to fix a security bypass vulnerability. A flaw is present in the application, which fails to properly handle derived class instantiation in V8. Successful exploitation allows attackers to exploit this issue to bypass certain security restrictions to gain unauthorized access.

The host is missing a security update according to apple advisory, APPLE-SA-2016-03-31-1. The update is required to fix an information disclosure vulnerability. A flaw is present in the application, which fails to handle the issue in XML External Entity (XXE). Successful exploitation allows remote attackers to read arbitrary files via an iBooks Author file.

The host is installed with Apple Mac OS 10.13.4, 10.12.6 or 10.11.6 and is prone to multiple vulnerabilities. The flaw is present in the application, which fails to properly handle multiple issues. Successful exploitation allows remote attackers to execute arbitrary code or read restricted memory or cause denial of service.

The host is installed with Apple Mac OS 10.13.5, 10.12.6 or 10.11.6 and is prone to multiple vulnerabilities. The flaw is present in the application, which fails to properly handle multiple issues. Successful exploitation allows remote attackers to execute arbitrary code or read restricted memory.

The host is missing a security update according to Apple advisory, APPLE-SA-2018-3-29-6. The update is required to fix multiple vulnerabilities. The flaws are present in the application, which fails to properly perform input validation. Successful exploitation could allow attackers to disclose sensitive information or crash the service.

The host is missing a security update according to Apple advisory, APPLE-SA-2018-02-19-2. The update is required to fix memory corruption vulnerability. The flaw is present in the application, which fails to properly handle an input validation issue. Successful exploitation could allow attackers processing a maliciously crafted string to lead to heap corruption.

The host is missing a high severity security update according to Google advisory. The update is required to fix multiple vulnerabilities. The flaws are present in the application, which fails to handle unspecified vectors. Successful exploitation allows attackers to have unspecified impact.

The host is missing a security update for Apple advisory, APPLE-SA-2018-1-23-5. The update is required to fix multiple vulnerabilities. The flaws are present in the applications, which fails to properly handle crafted web content. Successful exploitation could allow attackers to crash the service.

The host is installed with Apple Mac OS 10.13.1 or 10.12.6 or 10.11.6 and is prone to multiple vulnerabilities. The flaw is present in the application, which fails to properly handle multiple issues. Successful exploitation allows remote attackers to execute arbitrary code or read restricted memory.


Pages:      Start    1    2    3    4    5    6    7    8    9    10    11    12    13    14    ..   117

© SecPod Technologies