[Forgot Password]
Login  Register Subscribe

23631

 
 

126951

 
 

100123

 
 

909

 
 

80198

 
 

109

 
 
Paid content will be excluded from the download.

Filter
Matches : 1777 Download | Alert*

The host is installed with Microsoft Windows Vista or Server 2008/R2 or Windows 7 and is prone to file validation vulnerability. A flaw is present in the applications which does not validate the office file. Successful exploitation, exploit the integrity of a file and allows attacker to read sensitive information or install malware applications.

The host is missing a critical security update according to Microsoft Security Bulletin, MS12-072. The update is required to fix integer overflow and underflow vulnerabilities. The flaws are present in the application, which fails to properly handle a specially crafted briefcase. Successful exploitation allows attackers to run arbitrary code as the current user.

The host is missing an important security update according to Microsoft Security Bulletin, MS12-076. The update is required to fix multiple vulnerabilities. The flaws are present in the applications, which fail to properly handle memory when opening specially crafted Excel files. Successful exploitation allows attackers to run arbitrary code.

The host is missing a security update according to Apple advisory, APPLE-SA-2012-11-07-1. The update is required to fix multiple vulnerabilities. The flaws are present in the application, which fails to properly handle crafted files. Successful exploitation could allow attackers to execute arbitrary code or crash the service.

The host is missing a security update according to Google advisory. The update is required to fix multiple vulnerabilities. The flaws are present in the application, which fails to properly handle certain vectors. Successful exploitation allows attackers to cause denial of service.

The host is missing a critical security update according to Adobe advisory, APSB12-24. The update is required to fix multiple vulnerabilities. The flaws are present in the applications, which fail to handle certain specially crafted content. Successful exploitation allows attackers to execute arbitrary code.

The host is missing a security update according to Mozilla advisory, MFSA 2012-90. The update is required to fix multiple vulnerabilities. The flaws are present in the applications, which fail to certain objects and functions. Successful exploitation allows attackers to conduct cross-site scripting (XSS) attacks and execute arbitrary JavaScript code.

The host is missing a security update according to Mozilla advisory, MFSA 2012-89. The update is required to fix a security bypass vulnerability. The flaws are present in the applications, which fail to properly handle access to the Location object. Successful exploitation could allow attackers to execute arbitrary code.

The host is missing a security update according to Mozilla advisory, MFSA 2012-88. The update is required to fix a memory corruption vulnerability. A flaw is present in the applications, which fail to properly handle the mozilla::net::FailDelayManager::Lookup function in the WebSockets implementation. Successful exploitation could allow attackers to cause a denial of service (memory corruption and ...

The host is missing a security update according to Mozilla advisory, MFSA 2012-87. The update is required to fix a use-after-free vulnerability. A flaw is present in the applications, which fail to properly handle vectors related to the nsIContent::GetNameSpaceID function. Successful exploitation could allow attackers to execute arbitrary code.


Pages:      Start    8    9    10    11    12    13    14    15    16    17    18    19    20    21    ..   177

© 2013 SecPod Technologies