[Forgot Password]
Login  Register Subscribe

24547

 
 

132803

 
 

128796

 
 

909

 
 

106110

 
 

152

 
 
Paid content will be excluded from the download.

Filter
Matches : 2563 Download | Alert*

The host is missing a security update according to MFSA 2014-89. The update is required to fix an arbitrary code execution vulnerability. A flaw is present in the applications, which fail to handle unknown vectors. Successful exploitation allows attackers to execute arbitrary code by leveraging an incorrect cast from the BasicThebesLayer data type to the BasicContainerLayer data type.

The host is missing a low severity security update according to Google advisory. The update is required to fix multiple vulnerabilities. The flaws are present in the WebKit, which fails to handle crafted dimensions, SVG document, HTML document, JavaScript code or text element. Successful exploitation allows remote attackers to cause a denial of service (application crash) or possibly have unspecif ...

The host is missing a critical security update according to Mozilla advisory, MFSA-2015-44. The update is required to fix a security bypass vulnerability. A flaw is present in the application, which does not properly handle an Alt-Svc header specification in the HTTP/2 response. Successful exploitation could allow attackers to bypass the SSL certificate verification for the specified alternate ser ...

The host is missing a critical security update according to Microsoft bulletin, MS15-099. The update is required to fix multiple vulnerabilities. The flaws are present in the applications, which fail to properly handle objects in memory or handle a specially crafted Office file. An attacker who successfully exploited the vulnerabilities could run arbitrary code in the context of the current user.

The host is missing a high severity security update according to Google advisory. The update is required to fix multiple Same Origin Policy bypass vulnerabilities. The flaws are present in the application, which fails to handle crafted data. Successful exploitation could allow attackers to bypass the Same Origin Policy.

The host is missing a high severity security update according to Google advisory. The update is required to fix multiple vulnerabilities. The flaws are present in the application, which fails to properly handle unspecified vectors. Successful exploitation could allow remote attackers to crash the service or execute arbitrary webscript.

The host is missing security update according to Mozilla advisory, MFSA2015-141. The update is required to fix a data mishandling vulnerability. A flaw is present in the application, which fails to handle # (number sign) character in a data: URI. Successful exploitation allows remote attackers to spoof web sites.

The host is missing a critical security update according to Microsoft security bulletin, MS16-006. The update is required to fix a remote code execution vulnerability. A flaw is present in the application, which properly decodes strings using a malicious decoder that can return negative offsets. An attacker who successfully exploited this vulnerability could obtain the same permissions as the curr ...

The host is missing a critical security update according to Microsoft security bulletin, MS16-001. The update is required to fix an information disclosure vulnerability. A flaw is present in the application, which fails to handle a crafted web page discloses the contents of its memory. Successful exploitation could allow attackers to execute arbitrary code or cause denial of service.

The host is missing an important security update according to Microsoft advisory, 2974294. The update is required to fix a denial of service vulnerability. A flaw is present in the mpengine.dll, which fails to handle a crafted file. Successful exploitation allows attackers to cause a denial of service (system hang).


Pages:      Start    5    6    7    8    9    10    11    12    13    14    15    16    17    18    ..   256

© SecPod Technologies