[Forgot Password]
Login  Register Subscribe

24128

 
 

131615

 
 

111666

 
 

909

 
 

87321

 
 

136

 
 
Paid content will be excluded from the download.

Filter
Matches : 1947 Download | Alert*

The host is missing a critical security update according to Mozilla advisory, MFSA2012-38. The update is required to fix use-after-free vulnerability. A flaw is present in the applications, which fail to properly document changes involving replacement or insertion of a node. Successful exploitation could allow remote attackers to execute arbitrary code.

The host is missing a high security update according to Mozilla advisory, MFSA2012-37. The update is required to fix information disclosure vulnerability. A flaw is present in the applications, which fail to handle Windows file shares and shortcut files. Successful exploitation could allow local users to obtain sensitive information via an HTML document.

The host is missing a high security update according to Mozilla advisory, MFSA2012-36. The update is required to fix cross-site scripting vulnerability. A flaw is present in the applications, which fail to handle the Content Security Policy implementation. Successful exploitation could allow remote attackers to conduct cross-site scripting (XSS) attacks.

The host is missing a critical security update according to Mozilla advisory, MFSA2012-35. The update is required to fix privilege escalation vulnerability. A flaw is present in the applications, which fail to handle the Mozilla updater and the Mozilla updater service. Successful exploitation could allow local users to gain privileges.

The host is missing a critical security update according to Mozilla advisory, MFSA2012-34. The update is required to fix memory corruption vulnerability. A flaw is present in the applications, which fail to handle the browser engine. Successful exploitation could allow attackers to run arbitrary code.

The host is missing a critical security update according to Microsoft Security Advisory, 2718704. The update is required to fix spoofing vulnerability. A flaw is present in the application, which fails to properly handle authorization of digital certificates. Successful exploitation could allow attackers to spoof content, perform phishing attacks, or perform man-in-the-middle attacks.

The host is missing a critical security update according to Apple advisory, APPLE-SA-2011-10-26-1. The update is required to fix multiple vulnerabilities. The flaws are present in the application, which fails to sanitize malicious data. Successful exploitation could allow attackers to execute arbitrary code or crash the service.

The host is missing a critical security update according to Adobe advisory APSB12-11. The update is required to fix multiple vulnerabilities. The flaws are present in the application, which fails to handle a crafted TIFF file. Successful exploitation allows remote attackers to execute arbitrary code.

The host is missing a critical security update according to security update APSB12-10. The update is required to fix multiple memory corruption vulnerabilities. The flaws are present in the application, which fails to handle unspecified vectors related memory. Successful exploitation allow attackers to execute arbitrary code.

The host is missing an important security update according to Apple advisory, APPLE-SA-2012-05-15-1. The update is required to fix a buffer underflow vulnerability. The flaws are present in the application, which fails to properly handle malicious data. Successful exploitation could allow attackers to execute arbitrary code or crash the service.


Pages:      Start    160    161    162    163    164    165    166    167    168    169    170    171    172    173    ..   194

© SecPod Technologies