[Forgot Password]
Login  Register Subscribe

23631

 
 

122183

 
 

98060

 
 

909

 
 

79198

 
 

109

 
 
Paid content will be excluded from the download.

Filter
Matches : 1614 Download | Alert*

Mozilla developer Eric Faust reported that during JavaScript compilation GetElementIC typed array stubs can be generated outside observed typesets. This could lead to unpredictable behavior with a potential security impact.

Google notified Mozilla that an intermediate certificate, which chains up to a root included in Mozilla's root store, was loaded into a man-in-the-middle (MITM) traffic management device. This certificate was issued by Agence nationale de la scurit des systmesd" information (ANSSI), an agency of the French government and a certificate authority in Mozilla's root program. A subordinate certificate ...

The host is missing a security update according to Adobe advisory, APSB14-19. The update is required to fix sandbox bypass vulnerability. The flaws are present in the applications, which fail to properly handle unspecified vectors. Successful exploitation allows attackers to bypass a sandbox protection mechanism, and consequently execute native code in a privileged context.

The host is missing a critical security update according to Microsoft security bulletin, MS13-099. The update is required to fix remote code execution vulnerability. The flaw is present in Microsoft Scripting Runtime Object Library, which fails to handle a website that hosts specially crafted content. Successful exploitation allows attackers to install programs; view, change, or delete data; or cr ...

The host is missing an important security update according to Microsoft security bulletin, MS14-044. The update is required to fix multiple elevation of privilege vulnerabilities. The flaws are present in the application, which fails to handle crafted data. Successful exploitation could allow attackers to stop responding until a manual reboot is initiated.

The host is missing a critical security update according to Adobe advisory, APSB08-23. The update is required to fix an unspecified vulnerability. The flaw is present in the application, which fails to properly handle unknown attack vectors. Successful exploitation allows context-dependent attackers to execute untrusted JavaScript in an AIR application.

The host is missing an important security update according to Adobe security bulletin, APSB13-03. The update is required to fix multiple vulnerabilities. The flaws are present in the application, which fails to properly handle the vectors. Successful exploitation allows remote attackers to execute arbitrary code or gain sensitive information via unspecified vectors.

The host is missing an important security update according to Adobe security bulletin, APSB12-26. The update is required to fix security bypass vulnerability. A flaw is present in the application, which fails to handle user crafted input. Successful exploitation allows remote attackers to bypass intended shared-hosting sandbox permissions via unspecified vectors.

The host is missing a critical security update according to Adobe advisory, APSB11-11. The update is required to fix a denial of service vulnerability. A flaw is present in the application, which fails to handle malicious XML data. Successful exploitation could allow remote attackers to cause a denial of service.

The host is missing a critical security update according to Adobe advisory, APSB11-20. The update is required to fix a denial of service vulnerability. A flaw is present in the application, which fails to avoid the memory corruption. Successful exploitation could allow remote attackers to cause a denial of service.


Pages:      Start    140    141    142    143    144    145    146    147    148    149    150    151    152    153    ..   161

© 2013 SecPod Technologies