[Forgot Password]
Login  Register Subscribe

23631

 
 

126998

 
 

101924

 
 

909

 
 

80911

 
 

121

 
 
Paid content will be excluded from the download.

Filter
Matches : 776 Download | Alert*

The host is missing a critical security update according to Mozilla advisory, MFSA2012-19. The update is required to fix an multiple memory corruption vulnerabilities. The flaws are present in the applications, which fail to sanitize user supplied input. Successful exploitation could allow attackers to execute arbitrary code.

The host is missing a moderate security update according to Mozilla advisory, MFSA2012-18. The update is required to fix a security bypass vulnerability. A flaw is present in the applications, which fail to handle a crafted web page. Successful exploitation could allow attackers to crash the service.

The host is missing a critical security update according to Mozilla advisory, MFSA2012-17. The update is required to fix a denial of service vulnerability. A flaw is present in the applications, which fail to handle dynamic modification of a keyframe followed by access to the cssText of the keyframe. Successful exploitation could allow attackers to crash the service.

The host is missing a critical security update according to Mozilla advisory, MFSA2012-16. The update is required to fix a privilege escalation vulnerability. A flaw is present in the applications, which fail to properly restrict setting the home page through the dragging of a URL to the home button. Successful exploitation could allow attackers to execute arbitrary code.

The host is missing a critical security update according to Mozilla advisory, MFSA2012-14. The update is required to fix multiple vulnerabilities. The flaws are present in the applications, which fail to sanitize user supplied input. Successful exploitation could allow attackers to execute arbitrary code.

The host is missing a moderate security update according to Mozilla advisory, MFSA2012-13. The update is required to fix a cross site scripting vulnerability. A flaw is present in the applications, which fail to properly restrict drag-and-drop operations on javascript: URLs. Successful exploitation could allow attackers to inject arbitrary code or web script.

The host is missing a moderate security update according to Mozilla advisory, MFSA2012-15. The update is required to fix a CRLF injection vulnerability. A flaw is present in the applications, which fail to handle crafted HTTP headers. Successful exploitation could allow attackers to bypass intended Content Security Policy (CSP) restrictions and possibly conduct cross-site scripting (XSS) attacks.

The host is missing an Important security update according to Microsoft security bulletin, MS11-025. The update is required to fix remote code execution vulnerability in Microsoft Visual Studio 2005 or 2008 or 2010 or Visual Studio .NET 2003 or Visual C++ 2005 or Visual C++ 2008 or Visual C++ 2010 Redistributable Package. A flaw is present in the applications which is caused when applications buil ...

The host is missing an Important security update according to Microsoft security bulletin, MS11-049. The update is required to fix information disclosure vulnerability in Microsoft InfoPath 2007 or Microsoft InfoPath 2010 or SQL Server 2005 or SQL Server 2008 or SQL Server 2008 R2 or Microsoft Visual Studio 2005 or Microsoft Visual Studio 2008 or Microsoft Visual Studio 2010 and is prone to inform ...

The host is missing a moderate security update according to Microsoft security bulletin, MS09-035. The update is required to fix remote code execution vulnerabilities. The flaws are present in the Microsoft Active Template Library (ATL) included with Visual Studio, which allows an attacker to force VariantClear to be called on a VARIANT that has not been correctly initialized and to read a string ...


Pages:      Start    1    2    3    4    5    6    7    8    9    10    11    12    13    14    ..   77

© 2013 SecPod Technologies