[Forgot Password]
Login  Register Subscribe

24002

 
 

127027

 
 

102010

 
 

909

 
 

81374

 
 

133

 
 
Paid content will be excluded from the download.

Filter
Matches : 1685 Download | Alert*

The host is missing an important security update according to Microsoft bulletin, MS12-030. The update is required to fix multiple vulnerabilities. The flaws are present in the applications, which fail to handle a crafted spreadsheet. Successful exploitation could allow remote attackers to execute arbitrary code.

The host is missing a critical security update according to Microsoft security bulletin, MS12-029. The update is required to fix remote code execution vulnerability. A flaw is present in the applications, which fail to handle crafted RTF data. Successful exploitation could allow attackers to execute arbitrary code or crash the service.

The host is missing a critical security update according to Microsoft security bulletin, MS12-035. The update is required to fix a remote code execution vulnerability. The flaws are present in .NET Framework, which fail to handle a specially crafted webpage. Successful exploitation could allow remote code execution on a client system.

The host is missing an important security update according to Microsoft security bulletin, MS12-031. The update is required to fix a remote code execution vulnerability. A flaw is present in the application which fails to handle a specially crafted Visio file. Successful exploitation could allow attackers to gain elevated privileges.

The host is missing a critical security update according to security update APSB12-09. The update is required to fix object confusion vulnerability. A flaw is present in the application, which fails to handle a crafted file. Successful exploitation allows attackers to cause the application to crash and potentially take control of the affected system.

The host is missing a security update according to Google advisory. The update is required to fix multiple vulnerabilities. The flaws are present in the application, which fails to properly handle memory. Successful exploitation allows attackers to cause denial of service.

The host is missing a high security update according to Mozilla advisory, MFSA2012-33. The update is required to fix address bar spoofing vulnerability. A flaw is present in the applications, which fail to properly load RSS and Atom feed content. Successful exploitation could allow attackers to spoof the address bar.

The host is missing a critical security update according to Mozilla advisory, MFSA2012-30. The update is required to fix remote code execution vulnerability. A flaw is present in the applications, which fail to handle the texImage2D implementation. Successful exploitation could allow attackers to execute arbitrary code.

The host is missing a moderate security update according to Mozilla advisory, MFSA2012-29. The update is required to fix multiple cross-site scripting vulnerabilities. The flaws are present in the applications, which fail to handle the decoding of ISO-2022-KR and ISO-2022-CN character sets. Successful exploitation could allow attackers to inject arbitrary web script or HTML.

The host is missing a critical security update according to Mozilla advisory, MFSA2012-28. The update is required to fix origin bypass vulnerability. A flaw is present in the applications, which fail to properly construct the Origin and Sec-WebSocket-Origin HTTP headers. Successful exploitation could allow attackers to bypass an IPv6 literal ACL via a cross-site XMLHttpRequest or WebSocket operati ...


Pages:      Start    9    10    11    12    13    14    15    16    17    18    19    20    21    22    ..   168

© 2013 SecPod Technologies