[Forgot Password]
Login  Register Subscribe

24128

 
 

131573

 
 

110210

 
 

909

 
 

86021

 
 

136

 
 
Paid content will be excluded from the download.

Filter
Matches : 778 Download | Alert*

The host is missing an important security update according to Adobe security bulletin, APSB13-03. The update is required to fix multiple vulnerabilities. The flaws are present in the application, which fails to properly handle the vectors. Successful exploitation allows remote attackers to execute arbitrary code or gain sensitive information via unspecified vectors.

The host is missing a critical security update according to Adobe advisory, APSA08-10. The update is required to fix multiple vulnerabilities. The flaws are present in the application, which fails to properly handle PMD file. Successful exploitation allows remote attackers to execute arbitrary code.

The host is missing a critical security update according to Adobe advisory, APSB12-28. The update is required to fix buffer underflow and overflow vulnerabilities. The flaws are present in the application, which fails to properly handle memory. Successful exploitation allows attackers to execute arbitrary code via unspecified vectors.

The host is missing a security update according to MFSA 2012-98. The update is required to fix untrusted search path vulnerability. A flaw is present in the application, which fails to handle a Trojan horse DLL in the default downloads directory. Successful exploitation allows local users to gain privileges.

The host is missing a security update according to MFSA 2012-99. The update is required to fix security bypass vulnerability. A flaw is present in the applications, which fail to consider the compartment during property filtering. Successful exploitation allows remote attackers to bypass intended chrome-only restrictions on reading DOM object properties via a crafted web site.

The host is missing a security update according to MFSA 2012-95. The update is required to fix arbitrary code execution vulnerability. A flaw is present in the application, which fails to handle a javascript: URL in a bookmark. Successful exploitation allows user-assisted remote attackers to run arbitrary programs by leveraging a javascript: URL in a bookmark.

The host is missing a security update according to MFSA 2012-93. The update is required to fix cross-site scripting vulnerability. A flaw is present in the applications, which uses an incorrect context during the handling of JavaScript code that sets the location.href property. Successful exploitation allows remote attackers to conduct cross-site scripting (XSS) attacks or read arbitrary files by ...

The host is missing a security update according to MFSA 2012-92. The update is required to fix heap-based buffer overflow vulnerability. A flaw is present in the applications, which fails to handle crafted GIF image. Successful exploitation allows remote attackers to execute arbitrary code.

The host is installed with Microsoft Windows Vista or Server 2008/R2 or Windows 7 and is prone to file validation vulnerability. A flaw is present in the applications which does not validate the office file. Successful exploitation, exploit the integrity of a file and allows attacker to read sensitive information or install malware applications.

The host is missing a security update according to Apple advisory, APPLE-SA-2012-11-07-1. The update is required to fix multiple vulnerabilities. The flaws are present in the application, which fails to properly handle crafted files. Successful exploitation could allow attackers to execute arbitrary code or crash the service.


Pages:      Start    62    63    64    65    66    67    68    69    70    71    72    73    74    75    ..   77

© SecPod Technologies