[Forgot Password]
Login  Register Subscribe

30481

 
 

423868

 
 

255116

 
 

909

 
 

198683

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 1825 Download | Alert*

The host is missing an update according to Apple advisory APPLE-SA-2012-09-05-1. The update is required to fix Unspecified vulnerability. A flaw is present in the application, which fail to handle malicious input. Successful exploitation could allow attackers to execute arbitrary code.

The host is missing important security update according to Apple advisory, APPLE-SA-2013-02-01-1. The update is required to fix multiple vulnerabilities. The flaws are present in the application, which fails to sanitize user supplied input. Successful exploitation could allow attackers to execute arbitrary code with the privileges of the current user.

The host is missing important security update according to Apple advisory, APPLE-SA-2013-02-19-1. The update is required to fix multiple vulnerabilities. The flaws are present in the application, which fails to sanitize user supplied input. Successful exploitation could allow attackers to execute arbitrary code with the privileges of the current user.

The host is missing a security update according to Apple advisory, APPLE-SA-2013-03-04-1. The update is required to fix multiple arbitrary code execution vulnerabilities. The flaws are present in the application, which fails to handle a specially crafted applet or Web Start application. Successful exploitation allows attackers to cause arbitrary code to be executed on the target user's system.

The host is missing a security update according to Apple advisory, APPLE-SA-2013-03-06-1. The update is required to fix multiple arbitrary code execution vulnerabilities. The flaws are present in the application, which fails to handle the web plug-in blocking mechanism. Successful exploitation allows attackers to cause arbitrary code to be executed on the target user's system.

The host is missing a critical security update according to Mozilla advisory, MFSA 2013-02. The update is required to fix multiple vulnerabilities. The flaws are present in the applications, which fail to handle certain vectors and memory. Successful exploitation allows attackers to execute arbitrary code.

The host is missing a critical security update according to Mozilla advisory, MFSA 2013-01. The update is required to fix multiple vulnerabilities. The flaws are present in the applications, which fail to handle certain vectors and memory. Successful exploitation allows attackers to execute arbitrary code.

The host is missing a security update according to Mozilla advisory, MFSA 2013-04. The update is required to fix URL spoofing vulnerability. A flaw is present in the applications, which fail to handle vectors involving authentication information in the userinfo field of a URL. Successful exploitation allows remote attackers to spoof the address bar.

The host is missing a critical security update according to Mozilla advisory, MFSA 2013-15. The update is required to fix privilege escalation vulnerability. A flaw is present in the applications, which fail to handle improper interaction between plugin objects and SVG elements. Successful exploitation allows remote attackers to execute arbitrary JavaScript code.

The host is missing a critical security update according to Mozilla advisory, MFSA 2013-17. The update is required to fix use-after-free vulnerability. A flaw is present in the applications, which fail to handle vectors that involve the triggering of garbage collection after memory allocation for listener objects. Successful exploitation allows remote attackers to execute arbitrary code.


Pages:      Start    78    79    80    81    82    83    84    85    86    87    88    89    90    91    ..   182

© SecPod Technologies