[Forgot Password]
Login  Register Subscribe

25354

 
 

132811

 
 

144584

 
 

909

 
 

116218

 
 

156

 
 
Paid content will be excluded from the download.

Filter
Matches : 780 Download | Alert*

The host is missing a critical severity security update according to Google advisory. The update is required to fix multiple vulnerabilities. The flaws are present in the application, which fails to handle certain vectors related to implementation of certain functions and other vectors. Successful exploitation allows attackers to cause a denial of service or possibly have other impact.

The host is missing a high severity security update according to Google advisory. The update is required to fix multiple vulnerabilities. The flaws are present in the application, which fails to handle certain vectors related to some implementations and related to memory. Successful exploitation allows attackers to cause denial of service.

The host is missing a critical severity security update according to Google advisory. The update is required to fix multiple vulnerabilities. The flaws are present in the application, which fails to handle certain vectors related to some implementations and related to memory. Successful exploitation allows attackers to cause denial of service.

The host is missing a critical severity security update according to Google advisory. The update is required to fix multiple vulnerabilities. The flaws are present in the application, which fails to handle certain vectors related to some implementations and related to memory. Successful exploitation allows attackers to cause denial of service.

Google security researcher Michal Zalewski reported issues with JPEG format image processing with Start Of Scan (SOS) and Define HuffmanTable (DHT) markers in the libjpeg library. This could allow for the possible reading of arbitrary memory content as well as cross-domain image theft.

The host is missing a high severity security update according to Google advisory. The update is required to fix multiple vulnerabilities. The flaws are present in the application, which fails to handle crafted data. Successful exploitation could allow attackers to crash the service.

The host is missing a critical severity security update according to Google advisory. The update is required to fix multiple vulnerabilities. The flaws are present in the application, which fail to handle a crafted data or unknown vectors. Successful exploitation allows attackers to cause a denial of service, obtain sensitive information, bypass a sandbox protection mechanism or execute arbitrary ...

The host is missing an Important security update according to Microsoft security bulletin, MS11-074. The update is required to fix cross-site-scripting and information disclosure vulnerabilities. A flaw is present in the applications, which fails to properly validate inputs. Successful exploitation allows remote attackers to gain privilege or disclose information.

The host is missing an important security update according to Microsoft security bulletin, MS12-011. The update is required to fix elevation of privilege or information disclosure vulnerabilities. The flaws are present due to improper handling of URL containing malicious JavaScript elements. Successful exploitation could allow attackers to issue SharePoint commands in the context of the authentica ...

The host is missing a critical security update according to Adobe advisory, APSB12-02. The update is required to fix multiple memory corruption vulnerabilities. The flaws are present in the application, which fails to sanitize user supplied input. Successful exploitation could allow attackers to execute arbitrary code.


Pages:      Start    1    2    3    4    5    6    7    8    9    10    11    12    13    14    ..   77

© SecPod Technologies