[Forgot Password]
Login  Register Subscribe

24003

 
 

131425

 
 

103942

 
 

909

 
 

84057

 
 

133

 
 
Paid content will be excluded from the download.

Filter
Matches : 777 Download | Alert*

The host is missing a critical security update according to Adobe advisory, APSB13-16. The update is required to fix an arbitrary code execution vulnerability. The flaws are present in the applications, which fail to handle crafted data. Successful exploitation could allow attackers to execute arbitrary code or crash the service.

The host is missing an important security update according to Microsoft bulletin, MS13-051. The update is required to fix buffer overflow vulnerability. A flaw is present in the application, which is caused when Microsoft Office components for processing PNG files do not properly handle memory allocation. Successful exploitation allows attackers to execute arbitrary code.

The host is missing a critical severity security update according to Google advisory. The update is required to fix multiple vulnerabilities. The flaws are present in the application, which fails to handle certain vectors related to implementation of certain functions and other vectors. Successful exploitation allows attackers to cause a denial of service or possibly have other impact.

The host is missing a high severity security update according to Google advisory. The update is required to fix multiple vulnerabilities. The flaws are present in the application, which fails to handle certain vectors related to some implementations and related to memory. Successful exploitation allows attackers to cause denial of service.

The host is installed with Apple QuickTime before 7.74.80.86 and is prone to a buffer overflow vulnerability. A flaw is present in the application, which fails to properly handle 'mvhd' atoms. Successful exploitation could allow attackers to execute arbitrary code or crash the service.

The host is missing a security update according to Mozilla advisory, MFSA 2013-41. The update is required to fix multiple unspecified vulnerabilities. The flaws are present in the application, which fails to properly handle certain unknown vectors. Successful exploitation allows attackers to cause a denial of service.

The host is missing a security update according to Mozilla advisory, MFSA 2013-42. The update is required to fix cross-site scripting (XSS) vulnerability. A flaw is present in the applications, which fail to prevent acquisition of chrome privileges during calls to content level constructors. Successful exploitation allows remote attackers to bypass certain read-only restrictions and conduct cross- ...

The host is missing a security update according to Mozilla advisory, MFSA 2013-43. The update is required to fix information disclosure vulnerability. A flaw is present in the application, which fails to properly implement the INPUT element. Successful exploitation allows attackers to obtain the full pathname via a crafted web site.

The host is missing a security update according to Mozilla advisory, MFSA 2013-44.The update is required to fix arbitrary code execution vulnerability. A flaw is present in the applications, which fail to handle vectors involving junctions. Successful exploitation allows attackers to bypass integrity verification and gain privileges.

The host is missing a security update according to Mozilla advisory, MFSA 2013-45. The update is required to fix privilege escalation vulnerability. A flaw is present in the application, which fails to properly maintain Mozilla Maintenance Service registry entries in certain situations involving upgrades from older Firefox versions. Successful exploitation allows local users to gain privileges by ...


Pages:      Start    1    2    3    4    5    6    7    8    9    10    11    12    13    14    ..   77

© 2013 SecPod Technologies