[Forgot Password]
Login  Register Subscribe

24003

 
 

131573

 
 

108530

 
 

909

 
 

85343

 
 

134

 
 
Paid content will be excluded from the download.

Filter
Matches : 85329 Download | Alert*

The host is installed with Oracle Java 1.6.0_43 and is prone to a security bypass vulnerability. A flaw is present in the application, which fails to enforce proper security restrictions. Successful exploitation could allow attackers to bypass Java sandbox restrictions.

The host is missing an important security update according to Microsoft security bulletin, MS15-046. The update is required to fix a memory corruption vulnerability. A flaw is present in the application, which fails to handle a crafted file. Successful exploitation could allow attackers to execute arbitrary code.

The host is missing a critical security update according to Microsoft security bulletin, MS15-129. The update is required to fix multiple vulnerabilities. The flaws are present in the application, which fails to properly handle crafted data. Successful exploitation could allow attackers to obtain the same permissions as the currently logged-on user or execute arbitrary code.

The host is missing a security update according to Apple advisory, APPLE-SA-2016-03-21-4. The update is required to fix multiple vulnerabilities. The flaws are present in the application, which fails to handle crafted data. Successful exploitation allows attackers to execute arbitrary code.

The host is missing a security update according to Apple advisory, APPLE-SA-2016-05-03-1. The update is required to fix multiple vulnerabilities. The flaws are present in the application, which fails to handle crafted data. Successful exploitation allows attackers to execute arbitrary code.

The host is installed with Word for Office 2011 for Mac and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to properly handle objects in memory. Successful exploitation could run arbitrary code in the context of the current user.

The host is installed with Apple Mac OS X 10.5.8 or 10.6.3 and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to sanitize user supplied input. Successful exploitation could allow attackers to affect confidentiality.

The host is installed with Apple Mac OS X 10.6.3 and is prone to a privilege escalation vulnerability. A flaw is present in the application, which fail to sanitize user supplied input. Successful exploitation could allow attackers to affect confidentiality, integrity, and availability.

The host is installed with Microsoft Office 2011 for Mac and is prone to an elevation of privilege vulnerability. A flaw is present in the application, which uses world-writable permissions for the Applications/Microsoft Office 2011/ directory and certain other directories. Successful exploitation could allow attackers to gain privileges by placing a Trojan horse executable file in one of these di ...

The host is installed with Oracle Java SE 6 Update 35 or earlier and is prone to unspecified vulnerability. A flaw is present in the application, which fails to handle vectors related to deployment. Successful exploitation allows attackers to affect confidentiality, integrity, and availability.


Pages:      Start    7945    7946    7947    7948    7949    7950    7951    7952    7953    7954    7955    7956    7957    7958    ..   8532

© SecPod Technologies