[Forgot Password]
Login  Register Subscribe

24128

 
 

131615

 
 

112965

 
 

909

 
 

87888

 
 

136

 
 
Paid content will be excluded from the download.

Filter
Matches : 778 Download | Alert*

The host is missing a security update according to Mozilla advisory, MFSA 2013-21. The update is required to fix multiple memory safety vulnerabilities. The flaws are present in the applications, which fail to handle certain unspecified vectors. Successful exploitation allows remote attackers to cause a denial of service.

The host is missing an important security update according to Adobe security bulletin, APSB13-03. The update is required to fix multiple vulnerabilities. The flaws are present in the application, which fails to properly handle the vectors. Successful exploitation allows remote attackers to execute arbitrary code or gain sensitive information via unspecified vectors.

The host is missing a critical security update according to Microsoft security bulletin, MS13-022. The update is required to fix remote code execution vulnerability. A flaw is present in the Microsoft Silverlight, which fail to handle a specially crafted Silverlight application. Successful exploitation could allow an attacker to install programs, view, change, or delete data or create new accounts ...

The host is missing a critical security update according to Adobe advisory, APSB12-28. The update is required to fix buffer underflow and overflow vulnerabilities. The flaws are present in the application, which fails to properly handle memory. Successful exploitation allows attackers to execute arbitrary code via unspecified vectors.

The host is missing an important security update according to Adobe security bulletin, APSB12-26. The update is required to fix security bypass vulnerability. A flaw is present in the application, which fails to handle user crafted input. Successful exploitation allows remote attackers to bypass intended shared-hosting sandbox permissions via unspecified vectors.

The host is missing a security update according to Mozilla advisory, MFSA 2012-75. The update is required to fix a click-jacking attack and spoofing vulnerability. The flaws are present in the applications, which fail to properly handle SELECT elements. Successful exploitation could allow attackers to spoof page content or conduct click-jacking attacks.

The host is missing a high severity security update according to Google advisory. The update is required to fix multiple vulnerabilities. The flaws are present in the application, which fails to properly handle certain vectors. Successful exploitation allows attackers to cause denial of service.

The host is missing a critical severity security update according to Google advisory. The update is required to fix multiple vulnerabilities. The flaws are present in the application, which fails to handle certain elements and vectors. Successful exploitation allows remote attackers to cause a denial of service or possibly have unspecified other impact.

The host is missing a security update according to MFSA 2012-98. The update is required to fix untrusted search path vulnerability. A flaw is present in the application, which fails to handle a Trojan horse DLL in the default downloads directory. Successful exploitation allows local users to gain privileges.

The host is missing a critical security update according to Adobe advisory, APSB12-20. The update is required to fix multiple vulnerabilities. The flaws are present in the application, which fails to handle crafted data. Successful exploitation could allow attackers to crash the service.


Pages:      Start    64    65    66    67    68    69    70    71    72    73    74    75    76    77    ..   77

© SecPod Technologies