[Forgot Password]
Login  Register Subscribe

30481

 
 

423868

 
 

255116

 
 

909

 
 

198683

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 44042 Download | Alert*

A security vulnerability has been identified and fixed in avahi which could allow remote attackers to cause a denial of service via a crafted legacy unicast mDNS query packet . The updated packages have been patched to prevent this.

A vulnerability has been discovered in Avahi before 0.6.24, which allows remote attackers to cause a denial of service via a crafted mDNS packet with a source port of 0 . The updated packages have been patched to prevent this.

Affected versions: PostfixAdmin 3.0 and 3.0.1 PostfixAdmin 2.91, 2.92 and 2.93 Older PostfixAdmin releases are not affected. PostfixAdmin 3.0.2 will fix this issue

Affected versions: PostfixAdmin 3.0 and 3.0.1 PostfixAdmin 2.91, 2.92 and 2.93 Older PostfixAdmin releases are not affected. PostfixAdmin 3.0.2 will fix this issue

Affected versions PostfixAdmin 3.0 and 3.0.1 PostfixAdmin 2.91, 2.92 and 2.93 Older PostfixAdmin releases are not affected. PostfixAdmin 3.0.2 will fix this issue

The host is missing a security update according to Adobe advisory, APSB14-09. The update is required to fix Multiple vulnerabilities. The flaws are present in an application, which fails to handle the unknown vectors. Successful exploitation could allow attackers to obtain sensitive information or cause a denial of service or execute arbitrary code.

The host is missing a security update according to Adobe advisory, APSB14-09. The update is required to fix Multiple vulnerabilities. The flaws are present in an application, which fails to handle the unknown vectors. Successful exploitation could allow attackers to obtain sensitive information or cause a denial of service or execute arbitrary code.

The host is missing a a critical security update according to APSB12-05. The update is required to fix multiple vulnerabilities. The flaws are present in the application, which fails to properly handle memory and integers. Successful exploitation allows remote attackers to execute remote code and gain sensitive information.

The host is missing a a critical security update according to APSB12-05. The update is required to fix multiple vulnerabilities. The flaws are present in the application, which fails to properly handle memory and integers. Successful exploitation allows remote attackers to execute remote code and gain sensitive information.

The flash-plugin package contains a Mozilla Firefox compatible Adobe Flash Player web browser plug-in. This update fixes one vulnerability in Adobe Flash Player. This vulnerability is detailed in the Adobe Security bulletin APSB13-16, listed in the References section. Specially-crafted SWF content could cause flash-plugin to crash or, potentially, execute arbitrary code when a victim loads a page ...


Pages:      Start    4226    4227    4228    4229    4230    4231    4232    4233    4234    4235    4236    4237    4238    4239    ..   4404

© SecPod Technologies