[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248268

 
 

909

 
 

195051

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 2079 Download | Alert*

The host is missing a critical security update according to Microsoft security bulletin, MS08-051. The update is required to fix remote code execution vulnerabilities. The flaws are present in Microsoft Office PowerPoint and Microsoft Office PowerPoint Viewer, which fails handle a specially crafted PowerPoint file. Successful exploitation could allow an attacker to install programs, view, change, ...

The host is missing a security update according to Adobe advisory, APSB15-22. The update is required to fix a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle unspecified vectors. Successful exploitation allows attackers to execute arbitrary code or crash the service.

The host is missing a security update according to APPLE-SA-2011-04-14-3. The update is required to fix multiple memory corruption vulnerabilities. The flaws are present in the application which fail to properly handle CSS style and certain text nodes. Successful exploitation allows remote attackers to execute arbitrary code

The host is missing a critical security update according to Microsoft security bulletin, MS08-074. The update is required to fix remote code execution vulnerabilities. The flaws are present in Microsoft Office Excel, which fails to properly handle specially crafted Excel file. Successful exploitation allows attackers to gain complete control of an affected system.

The host is missing a critical security update according to Adobe advisory, APSA15-05. The update is required to fix a denial of service vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation could allow attackers to crash and take control of the affected system.

The host is missing a high severity security update according to Google advisory. The update is required to fix multiple vulnerabilities. The flaws are present in the application, which fails to handle crafted data. Successful exploitation could allow attackers to bypass the Same Origin Policy, disclose sensitive information or crash the service.

The host is missing a high severity security update according to Google advisory. The update is required to fix multiple Same Origin Policy bypass vulnerabilities. The flaws are present in the application, which fails to handle crafted data. Successful exploitation could allow attackers to bypass the Same Origin Policy.

The host is missing a critical security update according to Adobe advisory, APSB15-26. The update is required to fix a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle unspecified vectors. Successful exploitation allows attackers to execute arbitrary code or crash the service.

The host is missing an important security update according to Microsoft security bulletin, MS15-121. The update is required to fix a tls triple handshake vulnerability. A flaw is present in the application, which fails to properly extend master secret binding support to all supported version of TLS. Successful exploitation could allow an attacker to impersonate a victim on any other server that us ...

The host is missing an important security update according to Microsoft bulletin, MS15-120. The update is required to fix Windows IPSec denial of service vulnerability in Microsoft Windows. An attacker who successfully exploited the vulnerabilities could run arbitrary code in kernel mode. Successful exploitation could allow attackers to run arbitrary code in kernel mode.


Pages:      Start    142    143    144    145    146    147    148    149    150    151    152    153    154    155    ..   207

© SecPod Technologies