[Forgot Password]
Login  Register Subscribe

23631

 
 

120164

 
 

98250

 
 

909

 
 

79281

 
 

109

 
 
Paid content will be excluded from the download.

Filter
Matches : 1715 Download | Alert*

The host is missing an important security update according to Microsoft security bulletin, MS14-006. The update is required to fix a denial of service vulnerability. A flaw is present in the application, which fails to handle crafted data. Successful exploitation could allow attackers to crash the service.

The host is missing an important security update according to Microsoft advisory, 2871997. The update is required to fix security feature bypass vulnerability. A flaw is present in the application, which fails to properly handle domain authentication controls. Successful exploitation allows attackers to execute arbitrary code.

The host is missing a critical security update according to Adobe advisory, APSB11-11. The update is required to fix a denial of service vulnerability. A flaw is present in the application, which fails to handle malicious XML data. Successful exploitation could allow remote attackers to cause a denial of service.

The host is missing a critical security update according to Adobe advisory, APSB11-20. The update is required to fix a denial of service vulnerability. A flaw is present in the application, which fails to avoid the memory corruption. Successful exploitation could allow remote attackers to cause a denial of service.

The host is missing a critical security update according to APSB10-19. The update is required to fix multiple denial of service vulnerabilities. The flaws are present in the application, which fails to properly handle memory and validate user input. Successful exploitation allows remote attackers to execute remote code.

The host is missing a security update according to Adobe advisory, APSB09-18. A flaw is present in the application, which fails to handle certain DLL files and unknown vectors. Successful exploitation allows attackers to cause a denial of service (resource exhaustion).

The host is missing a security update according to Adobe advisory, APSB09-05. A flaw is present in the application, which fails to properly handle RPC requests. Successful exploitation allows attackers to execute arbitrary remote procedures within an ActionScript file on the server.

The host is missing a security update according to Adobe advisory, APSA08-11. A flaw is present in the Flash Media Interactive Server and Flash Media Streaming Server, which fails to enable SWF Verification for RTMPE and RTMPTE sessions. Successful exploitation allows attackers to make copies of video content via stream-capture software.

The host missing a security update according to Adobe advisory. The update is required to fix memory corruption vulnerability. A flaw is present in the application, which fails to properly handle MDBMS.dll. Successful exploitation allows attackers to execute arbitrary code or cause a denial of service.

The host is missing an important security update according to APSB10-24. The update is required to fix untrusted search path vulnerability. A flaw is present in the application, which fails to handle the DLL hijacking attacks via a Trojan horse ibfs32.dll. Successful exploitation allows local users, and possibly remote attackers to execute arbitrary code.


Pages:      Start    147    148    149    150    151    152    153    154    155    156    157    158    159    160    ..   171

© 2013 SecPod Technologies