[Forgot Password]
Login  Register Subscribe

30430

 
 

423868

 
 

247768

 
 

909

 
 

194555

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 2333 Download | Alert*

The host is missing an important security update KB4011268

The host is missing an important security update KB4011266

The host is missing an important security update KB4011270

The host is missing an important security update KB4011265

The host is missing a security update according to Adobe advisory, APSB17-40. The update is required to fix a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle unspecified vectors. Successful exploitation could lead to remote code execution.

The host is missing a critical security update according to Adobe advisory, APSB11-10. The update is required to fix a buffer overflow vulnerability. A flaw is present in the application, which fails to sanitize the user input resulting in a memory corruption. Successful exploitation allows attacker to execute arbitrary code or cause denial of service.

The host is missing a critical security update for KB936021

The host is missing an important security update according to Microsoft bulletin, MS13-040. The update is required to fix spoofing vulnerability. A flaw is present in the application, which fails to properly handle a specially crafted XML file. Successful exploitation allows attackers to gain access to endpoint functions as if they were an authenticated user.

The host is missing an important update according to Microsoft Security bulletin, MS14-074. The update is required to fix a security bypass vulnerability. A flaw is present in the application, which fails to properly handle failed logon attempts. Successful exploitation could allow an attacker to bypass the audit logon security feature.

The host is missing an important security update according to Apple advisory, APPLE-SA-2010-09-15-1. The update is required to fix multiple arbitrary code execution vulnerabilities. The flaws are present in the application, which fails to sanitize malicious data. Successful exploitation could allow attackers to execute arbitrary code or crash the service.


Pages:      Start    222    223    224    225    226    227    228    229    230    231    232    233    ..   233

© SecPod Technologies