[Forgot Password]
Login  Register Subscribe

23631

 
 

126998

 
 

102010

 
 

909

 
 

80911

 
 

121

 
 
Paid content will be excluded from the download.

Filter
Matches : 1949 Download | Alert*

Google notified Mozilla that an intermediate certificate, which chains up to a root included in Mozilla's root store, was loaded into a man-in-the-middle (MITM) traffic management device. This certificate was issued by Agence nationale de la scurit des systmesd" information (ANSSI), an agency of the French government and a certificate authority in Mozilla's root program. A subordinate certificate ...

The host is missing a security update according to Adobe advisory, APSB14-19. The update is required to fix sandbox bypass vulnerability. The flaws are present in the applications, which fail to properly handle unspecified vectors. Successful exploitation allows attackers to bypass a sandbox protection mechanism, and consequently execute native code in a privileged context.

The host is missing a critical security update according to Microsoft security bulletin, MS13-099. The update is required to fix remote code execution vulnerability. The flaw is present in Microsoft Scripting Runtime Object Library, which fails to handle a website that hosts specially crafted content. Successful exploitation allows attackers to install programs; view, change, or delete data; or cr ...

The host is missing an important security update according to Microsoft security bulletin, MS14-044. The update is required to fix multiple elevation of privilege vulnerabilities. The flaws are present in the application, which fails to handle crafted data. Successful exploitation could allow attackers to stop responding until a manual reboot is initiated.

The host is missing a critical security update according to Adobe advisory, APSB08-23. The update is required to fix an unspecified vulnerability. The flaw is present in the application, which fails to properly handle unknown attack vectors. Successful exploitation allows context-dependent attackers to execute untrusted JavaScript in an AIR application.

The host is missing a critical security update according to Adobe advisory, APSB11-11. The update is required to fix a denial of service vulnerability. A flaw is present in the application, which fails to handle malicious XML data. Successful exploitation could allow remote attackers to cause a denial of service.

The host is missing a critical security update according to Adobe advisory, APSB11-20. The update is required to fix a denial of service vulnerability. A flaw is present in the application, which fails to avoid the memory corruption. Successful exploitation could allow remote attackers to cause a denial of service.

The host is missing a critical security update according to APSB10-19. The update is required to fix multiple denial of service vulnerabilities. The flaws are present in the application, which fails to properly handle memory and validate user input. Successful exploitation allows remote attackers to execute remote code.

The host is missing a security update according to Adobe advisory, APSB09-18. A flaw is present in the application, which fails to handle certain DLL files and unknown vectors. Successful exploitation allows attackers to cause a denial of service (resource exhaustion).

The host is missing a security update according to Adobe advisory, APSB09-05. A flaw is present in the application, which fails to properly handle RPC requests. Successful exploitation allows attackers to execute arbitrary remote procedures within an ActionScript file on the server.


Pages:      Start    172    173    174    175    176    177    178    179    180    181    182    183    184    185    ..   194

© 2013 SecPod Technologies