[Forgot Password]
Login  Register Subscribe

24547

 
 

132763

 
 

124222

 
 

909

 
 

106938

 
 

150

 
 
Paid content will be excluded from the download.

Filter
Matches : 779 Download | Alert*

Security researcher Holger Fuhrmannek discovered an out-of-bounds read during the creation of an audio timeline in Web Audio. This results in a crash and could allow for the reading of random memory values.

Mozilla developers David Chan and Gijs Kruitbosch reported that it is possible to create a drag and drop event in web content which mimics the behavior of a chrome customization event. This can occur when a user is customizing a page or panel. This results in a limited ability to move UI icons within the visible window but does not otherwise affect customization or window content.

The host is missing a high severity security update according to Google advisory. The update is required to fix multiple unspecified vulnerabilities. The flaws are present in the application, which fails to properly handle certain vectors. Successful exploitation could allow attackers to cause a denial of service, possibly have other impact.

The host is missing a critical security update according to security update APSB12-09. The update is required to fix object confusion vulnerability. A flaw is present in the application, which fails to handle a crafted file. Successful exploitation allows attackers to cause the application to crash and potentially take control of the affected system.

The host is missing a critical security update according to Adobe advisory, APSA11-02. The update is required to fix an unspecified vulnerability. A flaw is present in the application which does not properly handle malicious Web page or a Flash (.swf) file embedded in a Microsoft Word (.doc) file delivered as an email attachment. Successful exploitation allow remote attackers to execute arbitrary ...

The host is missing a critical security update according to Adobe advisory, APSB11-07. The update is required to fix a remote code execution vulnerability. A flaw is present in the application which does not properly handle malicious Web page or a Flash (.swf) file embedded in a Microsoft Word (.doc) file delivered as an email attachment. Successful exploitation allow remote attackers to execute a ...

The host is missing a critical security update according to Adobe advisory, APSB11-08. The update is required to fix multiple denial of service vulnerabilities. The flaws are present in cooltype library, which fails to avoid memory corruption. Successful exploitation could allow remote attackers to execute arbitrary code or cause a denial of service.

The host is missing a critical security update according to security update APSB12-03. The update is required to fix multiple vulnerabilities. The flaws are present in the application, which fails to properly handle memory and validate user inputs. Successful exploitation allows attackers to execute arbitrary code.

The host is missing a critical update according to Adobe advisory, APSA16-01. The update is required to fix a security bypass vulnerability. A flaw is present in the application, which fails to properly handle crafted data. Successful exploitation allows remote attackers to cause a crash and potentially allow an attacker to take control of the affected system.

The host is missing a critical update according to Microsoft security bulletin, MS16-050. The update is required to fix multiple remote code execution vulnerability. A flaw is present in the application, which fails to properly handle crafted data. Successful exploitation allows remote attackers to cause a crash and potentially allow an attacker to take control of the affected system.


Pages:      Start    1    2    3    4    5    6    7    8    9    10    11    12    13    14    ..   77

© SecPod Technologies