[Forgot Password]
Login  Register Subscribe

25354

 
 

132805

 
 

140669

 
 

909

 
 

113959

 
 

156

 
 
Paid content will be excluded from the download.

Filter
Matches : 780 Download | Alert*

The host is missing an important security update according to APSB12-04. The update is required to fix multiple cross-site scripting (XSS) vulnerabilities. The flaws are present in Adobe RoboHelp for Word, which fails to handle a crafted URL. Successful exploitation allows remote attackers to inject arbitrary web script or HTML.

The host is missing a critical security update according to Adobe advisory, APSB11-13. The update is required to fix a cross-site scripting (XSS) vulnerability. A flaw is present in the applications, which is caused by improper validation of user-supplied input. Successful exploitation allows remote attacker to inject arbitrary web script.

The host is missing a critical security update according to Adobe advisory, APSB11-23. The update is required to fix a cross site scripting vulnerability. A flaw is present in the application, which fails to sanitize user supplied input. Successful exploitation could allow attackers to inject arbitrary code.

The host is missing a critical security update according to Adobe advisory, APSB11-26. The update is required to fix multiple denial of service vulnerabilities. A flaw is present in the application, which is caused due to logic error. Successful exploitation allows remote attackers to execute arbitrary code or cause the browser to crash.

The host is missing a security update according to Apple advisory, APPLE-SA-2012-11-07-1. The update is required to fix multiple vulnerabilities. The flaws are present in the application, which fails to properly handle crafted files. Successful exploitation could allow attackers to execute arbitrary code or crash the service.

The host is missing a security update according to MFSA 2012-95. The update is required to fix arbitrary code execution vulnerability. A flaw is present in the application, which fails to handle a javascript: URL in a bookmark. Successful exploitation allows user-assisted remote attackers to run arbitrary programs by leveraging a javascript: URL in a bookmark.

The host is missing a security update according to MFSA 2012-99. The update is required to fix security bypass vulnerability. A flaw is present in the applications, which fail to consider the compartment during property filtering. Successful exploitation allows remote attackers to bypass intended chrome-only restrictions on reading DOM object properties via a crafted web site.

The host is missing an important security update according to Adobe security bulletin, APSB10-11. The update is required to fix multiple vulnerabilities. The flaws are present in the application due to an error in the Administrator page and other modules, which fails to properly handle the vectors. Successful exploitation allows remote attackers to obtain sensitive information or inject arbitrary ...

The host is missing an important security update according to Adobe security bulletin, APSB11-29. The update is required to fix multiple cross-site scripting vulnerabilities. The flaws are present in the RDS and cfform tag components in the application, which fails to properly handle the vectors. Successful exploitation allows remote attackers to inject arbitrary web script or HTML.

The host is missing an important security update according to Adobe security bulletin, APSB11-04. The update is required to fix session fixation vulnerability. A flaw is present in the application, which fails to handle user crafted input. Successful exploitation allows remote attackers to hijack web sessions via unspecified vectors.


Pages:      Start    1    2    3    4    5    6    7    8    9    10    11    12    13    14    ..   77

© SecPod Technologies