[Forgot Password]
Login  Register Subscribe

23631

 
 

120353

 
 

98503

 
 

909

 
 

79321

 
 

109

 
 
Paid content will be excluded from the download.

Filter
Matches : 1075 Download | Alert*

The host is missing a critical security update according to Mozilla advisory, MFSA 2015-106. The update is required to fix an use-after-free vulnerability. A flaw is present in the applications, which fail to properly handle crafted JavaScript code that modifies the URI table of a media element. Successful exploitation could allow attackers to execute arbitrary code.

The host is missing a critical security update according to Mozilla advisory, MFSA2015-131. The update is required to fix multiple vulnerabilities. The flaws are present in the applications, which fail to properly handle vectors related to a cryptographic key. Successful exploitation could allow attackers to have an unspecified impact.

The host is missing a security update according to Mozilla advisory, MFSA2015-129. The update is required to fix an information disclosure vulnerability. A flaw is present in the application, which fails to properly recognize escaped characters in hostnames within Location headers. Successful exploitation could allow attackers to obtain sensitive information.

The host is missing a critical security update according to Mozilla advisory, MFSA2016-11. The update is required to fix a security bypass vulnerability. A flaw is present in the application, which fails to properly handle the absence of reputation data. Successful exploitation allows remote attackers to execute arbitrary code.

The host is missing a security update according to Adobe advisory, APSB16-09. The update is required to fix multiple vulnerabilities. The flaws are present in the applications, which fails to handle unspecified vectors. Successful exploitation allow attackers to execute arbitrary code or cause a denial of service (memory corruption).

The host is missing a critical update according to Adobe advisory, APSA16-03. The update is required to fix a critical vulnerability. The flaw is present in the application, which fail to properly handle unknown vectors. Successful exploitation allows remote attackers to cause unspecified attack.

The host is missing a security update according to Google advisory. The update is required to fix multiple vulnerabilities. The flaws are present in the application, which fails to handle crafted data. Successful exploitation allows attackers to have unspecified impact.

The host is missing an important security update according to Microsoft security bulletin, MS17-014. The update is required to fix multiple memory corruption vulnerabilities. The flaws are present in the application, which fails to handle objects in memory. Successful exploitation could run arbitrary code in the context of the current user.

The host is installed with Apple Mac OS X 10.6.3 and is prone to multiple unspecified vulnerabilities. The flaws are present in the application, which fail to sanitize user supplied input. Successful exploitation could allow attackers to affect confidentiality, integrity, and availability.

The host is missing a critical security update according to Mozilla advisory, MFSA 2012-04. The update is required to fix an use-after-free vulnerability. A flaw is present in the applications, which fail to handle vectors related to incorrect AttributeChildRemoved notifications. Successful exploitation could allow attackers to execute arbitrary code.


Pages:      Start    90    91    92    93    94    95    96    97    98    99    100    101    102    103    ..   107

© 2013 SecPod Technologies