[Forgot Password]
Login  Register Subscribe

23631

 
 

127000

 
 

102010

 
 

909

 
 

81059

 
 

123

 
 
Paid content will be excluded from the download.

Filter
Matches : 1950 Download | Alert*

The host is missing a security update according to Adobe advisory, APSB09-05. A flaw is present in the application, which fails to properly handle RPC requests. Successful exploitation allows attackers to execute arbitrary remote procedures within an ActionScript file on the server.

The host is missing a security update according to Adobe advisory, APSA08-11. A flaw is present in the Flash Media Interactive Server and Flash Media Streaming Server, which fails to enable SWF Verification for RTMPE and RTMPTE sessions. Successful exploitation allows attackers to make copies of video content via stream-capture software.

The host missing a security update according to Adobe advisory. The update is required to fix memory corruption vulnerability. A flaw is present in the application, which fails to properly handle MDBMS.dll. Successful exploitation allows attackers to execute arbitrary code or cause a denial of service.

The host is missing an important security update according to APSB10-24. The update is required to fix untrusted search path vulnerability. A flaw is present in the application, which fails to handle the DLL hijacking attacks via a Trojan horse ibfs32.dll. Successful exploitation allows local users, and possibly remote attackers to execute arbitrary code.

The host is missing an important security update according to Microsoft security bulletin, MS11-056. The update is required to fix elevation of privilege vulnerability in Windows Client/Server Run-time Subsystem. The flaw is present in Client/Server Run-time Subsystem (CSRSS), which fails to restrict the arbitrary code to be executed in the context of another process. Successful exploitation allow ...

The host is missing a critical security update according to Microsoft Security Advisory, 2647518. The update is required to fix remote code execution vulnerability. A flaw is present in the application, which fails to prevent few ActiveX controls from being run in Internet Explorer. Successful exploitation could allow attackers to execute arbitrary code.

The host is missing an important security update according to Microsoft security advisory (2820197). The update is required to fix a vulnerability, which prevents ActiveX control from being loaded by the Internet Explorer. Successful exploitation could allow attackers to execute arbitrary code.

The host is missing an important security update according to Microsoft advisory, 2862152. The update is required to fix security feature bypass vulnerability. A flaw is present in the application, which fails to properly handle a DirectAccess server. Successful exploitation allows the attacker to spoof servers and read encrypted domain credentials.

The host is missing an important security update according to Microsoft security bulletin, MS13-098. The updated is required to fix a signature validation vulnerability. The flaw is present in WinVerifyTrust in the operating system, which fails to handle signature. Successful exploitation could allow attackers to execute arbitrary code if a user or application runs or installs a specially crafted, ...

The host is missing a critical security update according to Microsoft bulletin, MS13-097. The update is required to fix multiple vulnerabilities. The flaws are present in the application, which fails to properly validate permissions and handle an object in memory. Successful exploitation allows attacker to gain elevation of privilege and execute remote code.


Pages:      Start    173    174    175    176    177    178    179    180    181    182    183    184    185    186    ..   194

© 2013 SecPod Technologies