[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248038

 
 

909

 
 

194772

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 2333 Download | Alert*

The host is missing a critical security update according to Microsoft security bulletin, MS15-114. The update is required to fix a heap-based overflow vulnerability. A flaw is present in the application, which fails to properly handle crafted jnt files. Successful exploitation allows attackers to execute an arbitrary code in the context of the current user.

The host is missing an important security update according to Microsoft security bulletin, MS15-121. The update is required to fix a tls triple handshake vulnerability. A flaw is present in the application, which fails to properly extend master secret binding support to all supported version of TLS. Successful exploitation could allow an attacker to impersonate a victim on any other server that us ...

The host is missing a high severity security update according to Google advisory. The update is required to fix a same origin policy bypass vulnerability. A flaw is present in the application, which fails to properly handle an unintended embedder or unintended plugin loading, related to pdf.js and out_of_process_instance.cc. Successful exploitation could allow attackers to bypass the Same Origin P ...

The host is missing an important security update according to Microsoft security bulletin, MS15-134. The update is required to fix multiple remote code execution vulnerabilities. The flaws are present in the application, which fails to handle a specially crafted Media Center link (.mcl) file that references malicious code. An attacker who successfully exploited this vulnerability could take comple ...

The host is missing an important security update according to Microsoft security bulletin, MS15-126. The update is required to fix multiple vulnerabilities. The flaws are present in the application, which fails to handle a crafted website. An attacker who successfully exploited the vulnerability could execute remote code.

The host is missing a critical severity security update according to Google advisory. The update is required to fix a security bypass vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation allows remote attackers to bypass the blink same origin policy and a sandbox protection mechanism.

The host is missing a critical security update according to Adobe advisory APSB16-03. The update is required to fix an arbitrary code execution vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation could allow attackers to execute arbitrary code or cause a denial of service (memory corruption).

The host is missing a critical security update according to Adobe advisory APSB15-12. The update is required to fix multiple vulnerabilities. The flaws are present in the application, which fail to handle unspecified vectors. Successful exploitation could allow attackers to execute arbitrary code or cause a denial of service (memory corruption).

The host is missing a critical severity security update according to Google advisory. The update is required to fix a spoofing vulnerability. The flaw is present in the application, which fails to handle a crafted certificate. Successful exploitation allows man-in-the-middle attackers to spoof arbitrary HTTPS servers.

The host is missing a high severity security update according to Google advisory. The update is required to fix a cross-site scripting (XSS) vulnerability. The flaw is present in the application, which fails to handle a (1) RSS or (2) Atom feed. Successful exploitation allows remote attackers to inject arbitrary web script or HTML.


Pages:      Start    164    165    166    167    168    169    170    171    172    173    174    175    176    177    ..   233

© SecPod Technologies