[Forgot Password]
Login  Register Subscribe

23631

 
 

126995

 
 

100182

 
 

909

 
 

80298

 
 

109

 
 
Paid content will be excluded from the download.

Filter
Matches : 1797 Download | Alert*

The host is missing a security update according to Google advisory. The update is required to fix an arbitrary code execution vulnerability. A flaw is present in the application, which fails to handle vectors that leverage type confusion. Successful exploitation could allow attackers to execute arbitrary code.

The host is missing an important security update according to MS bulletin, MS13-027 and is prone to an privilege escalation vulnerability. A flaw is present in the kernel-mode drivers, which fails to properly handle objects in memory. Successful exploitation could allow attackers to run arbitrary code in kernel mode.

The host is missing a critical security update according to Microsoft bulletin, MS13-023. The update is required to fix remote code execution vulnerability. A flaw is present in the applications, which fail to properly handle memory when parsing specially crafted Visio files. Successful exploitation allows attackers to run arbitrary code in the context of the current user.

The host is missing an important security update according to Microsoft bulletin, MS13-025. The update is required to fix information disclosure vulnerability. A flaw is present in the application, which fails to properly validate a buffer size. Successful exploitation allows attackers to read arbitrary data in memory.

The host is missing a critical security update according to Microsoft bulletin, MS13-024. The update is required to fix multiple vulnerabilities. The flaws are present in the applications, which fail to properly validate user input. Successful exploitation allows attackers to read unauthorized content.

The host is missing a critical security update according to Microsoft security bulletin, MS13-022. The update is required to fix remote code execution vulnerability. A flaw is present in the Microsoft Silverlight, which fail to handle a specially crafted Silverlight application. Successful exploitation could allow an attacker to install programs, view, change, or delete data or create new accounts ...

The host is missing a critical security update according to Microsoft bulletin, MS13-012 and is prone to multiple use after free vulnerabilities. The flaws are present in the application, which fails to handle crafted data. Successful exploitation could allow attackers to execute arbitrary code.

The host is missing a security update according to Mozilla advisory, MFSA 2013-11. The update is required to fix information disclosure vulnerability. A flaw is present in the applications, which fail to prevent calling the toString function of an XBL object. Successful exploitation allows remote attackers to bypass the ASLR protection mechanism.

The host is missing a security update according to Mozilla advisory, MFSA 2013-10. The update is required to fix same-origin policy bypass vulnerability. A flaw is present in the applications, which fail to properly enforce the Same Origin Policy. Successful exploitation allows remote attackers to conduct clickjacking attacks via crafted JavaScript code that listens for a mutation event.

The host is missing a security update according to Mozilla advisory, MFSA 2013-09. The update is required to fix denial of service vulnerability. A flaw is present in the applications, which fail to properly implement quickstubs that use the jsval data type for their return values. Successful exploitation allows remote attackers to execute arbitrary code.


Pages:      Start    1    2    3    4    5    6    7    8    9    10    11    12    13    14    ..   179

© 2013 SecPod Technologies