[Forgot Password]
Login  Register Subscribe

23631

 
 

115038

 
 

95906

 
 

909

 
 

77982

 
 

109

 
 
Paid content will be excluded from the download.

Filter
Matches : 772 Download | Alert*

The host is missing a security update according to Google advisory. The update is required to fix multiple vulnerabilities. The flaws are present in the application, which fails to handle certain vectors related to some implementations and related to memory. Successful exploitation allows attackers to cause denial of service.

The host is missing a security update according to Google advisory. The update is required to fix multiple vulnerabilities. The flaws are present in the application, which fails to handle certain elements and implementations. Successful exploitation allows attackers to cause denial of service.

The host is missing a security update according to Google advisory. The update is required to fix multiple vulnerabilities. The flaws are present in the application, which fails to handle certain vectors related to some implementations and related to memory. Successful exploitation allows attackers to cause denial of service or possibly other unspecified impact.

The host is missing a security update according to Google advisory. The update is required to fix multiple vulnerabilities. The flaws are present in the application, which fails to handle certain vectors related to some implementations and related to memory. Successful exploitation allows attackers to cause denial of service.

The host is missing a security update according to Google advisory. The update is required to fix multiple vulnerabilities. The flaws are present in the application, which fails to handle certain vectors related to some implementations and related to memory. Successful exploitation allows attackers to cause denial of service.

The host is missing a security update according to Google advisory. The update is required to fix information disclosure vulnerability. The flaw is present in the application, which does not properly determine whether a user wishes to permit camera or microphone access by a Flash application. Successful exploitation allows attackers to obtain sensitive information from a machine's physical environ ...

The host is missing a security update according to Google advisory. The update is required to fix multiple vulnerabilities. The flaws are present in the application, which fails to handle certain vectors related to implementation of certain functions and other vectors. Successful exploitation allows attackers to cause a denial of service or possibly have other impact.

The host is missing a security update according to Google advisory. The update is required to fix multiple vulnerabilities. The flaws are present in the application, which fails to handle certain vectors related to some implementations and related to memory. Successful exploitation allows attackers to cause denial of service.

The host is missing a security update according to apple advisory, APPLE-SA-2013-10-22-8. The update is required to fix multiple memory corruption vulnerabilities. The flaws are present in the application, which fails to handle crafted data. Successful exploitation could allow attackers to crash the service or execute arbitrary code.

The host is missing a security update according to Apple advisory, APPLE-SA-2014-01-22-1. The update is required to fix multiple vulnerabilities. The flaws are present in the application, which fails to properly handle the contents of the iTunes Tutorials window. Successful exploitation allows attackers to gain control and inject arbitrary contents.


Pages:      Start    8    9    10    11    12    13    14    15    16    17    18    19    20    21    ..   77

© 2013 SecPod Technologies