[Forgot Password]
Login  Register Subscribe

24128

 
 

131573

 
 

110210

 
 

909

 
 

86021

 
 

136

 
 
Paid content will be excluded from the download.

Filter
Matches : 1947 Download | Alert*

The host is missing a high severity security update for Google Chrome according to Google advisory. The update is required to fix multiple vulnerabilities. The flaws are present in the application, which fails to handle crafted data. Successful exploitation allows attackers to have unspecified impact.

The host is missing an important security update according to Apple security advisory, APPLE-SA-2012-06-11-1. The update is required to fix Multiple vulnerabilities. The flaws are present in the application, which fails to sanitize user supplied input. Successful exploitation could allow attackers to crash the service.

The host is missing a security update according to Apple advisory, APPLE-SA-2009-06-01-2. The update is required to fix a buffer overflow vulnerability. A flaw is present in the application, which fails to handle a long URL component after a colon. Successful exploitation could allow attackers to execute arbitrary code or crash the service.

The host is missing an important security update according to Apple advisory, APPLE-SA-2009-03-11. The update is required to fix multiple denial of service vulnerabilities. The flaws are present in the application, which fails to sanitize user supplied input. Successful exploitation could allow attackers to crash the service.

The host is missing a security update according to Apple advisory, APPLE-SA-2010-07-19-1. The update is required to fix a buffer overflow vulnerability. A flaw is present in the application, which fails to handle a crafted itpc. Successful exploitation could allow attackers to execute arbitrary code or crash the service.

The host is missing an important security update according to Apple advisory, APPLE-SA-2011-11-14-1. The update is required to fix a DNS cache poisoning vulnerability. A flaw is present in the application, as it fails to handle a Trojan horse update. Successful exploitation could allow attackers to execute arbitrary code.

The host is missing an important security update according to Apple advisory, APPLE-SA-2010-03-30-2. A flaw is present in the application, which fails to sanitize user supplied input. Successful exploitation could allow attackers to disclose sensitive information.

The host is missing a security update according to Apple advisory, APPLE-SA-2013-09-18-1. The update is required to fix a remote code execution vulnerability. A flaw is present in the application, which fails to handle certain vectors in ActiveX control. Successful exploitation allows attackers to cause an unexpected application termination or arbitrary code execution.

The host is missing a security update according to apple advisory, APPLE-SA-2013-10-22-8. The update is required to fix multiple memory corruption vulnerabilities. The flaws are present in the application, which fails to handle crafted data. Successful exploitation could allow attackers to crash the service or execute arbitrary code.

The host is missing a security update according to Apple advisory, APPLE-SA-2014-01-22-1. The update is required to fix multiple vulnerabilities. The flaws are present in the application, which fails to properly handle the contents of the iTunes Tutorials window. Successful exploitation allows attackers to gain control and inject arbitrary contents.


Pages:      Start    158    159    160    161    162    163    164    165    166    167    168    169    170    171    ..   194

© SecPod Technologies