[Forgot Password]
Login  Register Subscribe

24128

 
 

131615

 
 

114563

 
 

909

 
 

88860

 
 

136

 
 
Paid content will be excluded from the download.

Filter
Matches : 1136 Download | Alert*

The host is missing a high severity security update according to Google advisory. The update is required to fix multiple vulnerabilities. The flaws are present in the application, which fails to handle crafted data. Successful exploitation allows attackers to have unspecified impact.

The host is missing a critical security update according to Adobe advisory, APSB18-28. The update is required to fix memory corruption vulnerability. The flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation could allow attackers to perform remote code execution.

The host is missing a security update according to Apple advisory, APPLE-SA-2015-08-13-1. The update is required to fix multiple vulnerabilities. The flaws are present in the application, which fails to handle a crafted web site. Successful exploitation leads to security bypass, arbitrary code execution or cause a denial of service (application crash).

The host is missing a security update according to APPLE-SA-2011-01-06-1. The update is required to fix multiple vulnerabilities. The flaws are present in PackageKit, which fail to handle distribution scripts. Successful exploitation could allow an attacker to execute arbitrary code or crash the service.

The host is missing an important security update according to Microsoft security bulletin, MS15-081. The update is required to fix multiple vulnerabilities. The flaws are present in the application, which fails to properly handle objects in memory. Successful exploitation could allow attackers to execute remote code.

The host is missing a security update according to APPLE-SA-2011-07-20-2. The update is required to fix multiple memory corruption vulnerabilities. Multiple flaws are present in the application, which fail to handle an excel file. Successful exploitation allows attackers to execute arbitrary code or crash the service.

The host is missing an important security update according to Microsoft bulletin, MS15-080. The update is required to fix multiple TrueType Font Parsing vulnerabilities. A flaw is present in the application, which fails to properly handle TrueType fonts. Successful exploitation allows attackers to take complete control of the affected system.

The host is missing a critical security update according to Mozilla advisory, MFSA-2015-59. The update is required to fix multiple unspecified vulnerabilities. The flaws are present in the applications, which fail to handle unknown vectors. Successful exploitation could allow attackers to cause denial of service (memory corruption and application crash) or possibly execute arbitrary code.

The host is missing a critical security update according to Mozilla advisory, MFSA-2015-71. The update is required to fix a security bypass vulnerability. A flaw is present in the applications, which do not properly determine state transitions for the TLS state machine. Successful exploitation could allow man-in-the-middle attackers to defeat cryptographic protection mechanisms by blocking message ...

The host is missing a high severity security update according to Google advisory. The update is required to fix multiple vulnerabilities in Google Chrome. The flaws are present in the application, which fails to handle crafted data. Successful exploitation could allow remote attackers to execute arbitrary code or crash the service.


Pages:      Start    1    2    3    4    5    6    7    8    9    10    11    12    13    14    ..   113

© SecPod Technologies