[Forgot Password]
Login  Register Subscribe

25354

 
 

132805

 
 

139264

 
 

909

 
 

113180

 
 

156

 
 
Paid content will be excluded from the download.

Filter
Matches : 780 Download | Alert*

The host is installed with Microsoft Windows Vista or Server 2008/R2 or Windows 7 and is prone to file validation vulnerability. A flaw is present in the applications which does not validate the office file. Successful exploitation, exploit the integrity of a file and allows attacker to read sensitive information or install malware applications.

The host is missing a critical security update according to Adobe advisory, APSA11-04. The update is required to fix an unspecified vulnerability. A flaw is present in the applications, which fail to properly handle U3D component. Successful exploitation allows remote attackers to execute arbitrary code or cause a denial of service.

The host is missing a critical security update according to Adobe advisory, APSB11-28. The update is required to fix memory corruption vulnerability. A flaw is present in the applications, which fail to properly handle PRC component. Successful exploitation allows remote attackers to execute arbitrary code or cause a denial of service.

The host is missing a critical security update according to Adobe advisory, APSA13-02. The update is required to fix multiple vulnerabilities. The flaws are present in the applications, which fail to properly handle a crafted PDF document. Successful exploitation allows attackers to execute arbitrary code.

The host is missing a critical security update according to APSB13-07. The update is required to fix multiple vulnerabilities. The flaws are present in the applications, which fail to properly handle a crafted PDF document. Successful exploitation allows attackers to execute arbitrary code.

The host is missing an important security update according to Apple advisory, APPLE-SA-2010-03-31-1. The update is required to fix a security bypass vulnerability. A flaw is present in the application, which fails to properly distribute MAC address ACLs to network extenders. Successful exploitation could allow attackers to bypass intended access restrictions.

The host is missing a security update according to Adobe advisory, APSB09-08. The update is required to fix multiple unspecified vulnerabilities. The flaws are present in the application, which fails to handle crafted Shockwave Player 10 content. Successful exploitation allows attackers to execute arbitrary code.

The host is missing a security update according to Adobe advisory, APSB09-05. A flaw is present in the application, which fails to properly handle RPC requests. Successful exploitation allows attackers to execute arbitrary remote procedures within an ActionScript file on the server.

The host is missing an important security update according to APSB10-24. The update is required to fix untrusted search path vulnerability. A flaw is present in the application, which fails to handle the DLL hijacking attacks via a Trojan horse ibfs32.dll. Successful exploitation allows local users, and possibly remote attackers to execute arbitrary code.

The host is missing an important security update according to Adobe security bulletin, APSB12-06. The update is required to fix denial of service vulnerability. A flaw is present in the application, which fails to properly handle the hash values for form parameters. Successful exploitation allows remote attackers to cause a denial of service by sending many crafted parameters.


Pages:      Start    68    69    70    71    72    73    74    75    76    77    ..   77

© SecPod Technologies