[Forgot Password]
Login  Register Subscribe

30430

 
 

423868

 
 

247974

 
 

909

 
 

194654

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 790 Download | Alert*

The host is missing an important security update according to Microsoft bulletin, MS13-106. The update is required to fix security feature bypass vulnerability. A flaw is present in the application, because a specific Microsoft Office shared component was not built to implement the ASLR security feature. Successful exploitation allows attackers to bypass the ASLR security feature.

The host is missing a security update according to Adobe advisory, ASPB13-29. The update is required to fix multiple memory corruption vulnerabilities. The flaws are present in the application, which fails to handle crafted data. Successful exploitation could allow attackers to execute arbitrary code or crash the service.

The host is missing a security update according to Apple advisory, APPLE-SA-2008-01-15. The update is required to fix multiple memory corruption vulnerabilities. The flaws are present in the application, which fails to handle crafted data. Successful exploitation could allow attackers to execute arbitrary code or crash the service.

The host is missing a security update according to, APPLE-SA-2008-02-06. The update is required to fix a buffer overflow vulnerability. A flaw is present in the application, which fails to handle a long Reason-Phrase response to an rtsp:// request, as demonstrated using a 404 error message. Successful exploitation could allow attackers to execute arbitrary code.

The host is missing a security update according to Apple advisory, APPLE-SA-2008-04-02. The update is required to fix multiple vulnerabilities. The flaws are present in the application, which fails to properly handle multiple vulnerabilities. The flaws are present in the application, which fails to properly handle crafted data. Successful exploitation could allow attackers to execute arbitrary cod ...

The host is missing a security update according to Apple advisory, APPLE-SA-2008-06-09. The update is required to fix multiple vulnerabilities. The flaws are present in the application, which fails to handle a crafted file. Successful exploitation could allow attackers to execute arbitrary code or crash the service.

The host is installed with Apple QuickTime before 7.5.5 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to handle a crafted PICT image. Successful exploitation could allow attackers to execute arbitrary code or crash the service.

The host is installed with Apple QuickTime before 7.6.2 and is prone to a heap-based memory corruption vulnerability. A flaw is present in the application, which fails to properly handle a crafted JP2 image. Successful exploitation could allow attackers to execute arbitrary code or crash the service.

The host is missing a security update according to Apple advisory, APPLE-SA-2009-01-21. The update is required to fix multiple vulnerabilities. The flaws are present in the application, which fails to handle crafted data. Successful exploitation could allow attackers to execute arbitrary code or crash the service.

The host is missing a critical security update according to Adobe advisory, APSB08-18. The update is required to fix multiple vulnerabilities. The flaws are present in the application, which fails to handle malicious data. Successful exploitation could allow remote attackers to disclose sensitive information or crash the service.


Pages:      Start    50    51    52    53    54    55    56    57    58    59    60    61    62    63    ..   78

© SecPod Technologies