[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248038

 
 

909

 
 

194772

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 2212 Download | Alert*

The host is missing a critical security update according to Adobe advisory, APSB09-07. The update is required to fix multiple vulnerabilities. The flaws are present in the JBIG2 filter, which fails to handle the unspecified vectors. Successful exploitation allows remote attackers to execute arbitrary code.

The host is missing a critical security update according to APSB10-01. The update is required to fix multiple buffer overflow vulnerabilities. The flaws are present in the application, which fails to handle memory. Successful exploitation allows attackers to execute arbitrary code.

The host is missing a critical security update according to security update, APSB10-29. A flaw is present in the application, which is caused by insecure loading of libraries. Successful exploitation allows attackers to execute arbitrary code and conduct DLL hijacking attacks via a Trojan horse dwmapi.dll or aires.dll that is located in the same folder as an .ait or .eps file.

The host is missing a critical security update according to security update APSB19-36. The update is required to fix multiple vulnerabilities. The flaws are present in the application, which fails to handle unspecified vectors related memory. Successful exploitation allow attackers to execute arbitrary code.

The host is missing an critical security update according to Microsoft bulletin, MS15-057. The update is required to fix remote code execution vulnerability. A flaw is present in the application, which fails to handle crafted DataObject on a web site. Successful exploitation could allow attackers to execute arbitrary on affected system aka "Windows Media Player RCE via DataObject Vulnerability."

The host is missing a security update 4011720

The host is missing a security update 4011721

The host is missing a security update 4018309

The host is missing an important security update according to Microsoft bulletin, MS14-082. The update is required to fix a remote code execution vulnerability. A flaw is present in the applications, which improperly handle objects in memory while parsing specially crafted office files. Successful exploitation allows attackers to execute arbitrary code.

The host is missing a moderate security update according to Microsoft security bulletin, MS14-079. The update is required to fix denial of service vulnerability. A flaw is present in the application, which fails to properly handle a specially crafted TrueType fonts. Successful exploitation could allow attackers to cause the target system to stop responding and restart.


Pages:      Start    193    194    195    196    197    198    199    200    201    202    203    204    205    206    ..   221

© SecPod Technologies