[Forgot Password]
Login  Register Subscribe

25354

 
 

132805

 
 

136938

 
 

909

 
 

113195

 
 

156

 
 
Paid content will be excluded from the download.

Filter
Matches : 2038 Download | Alert*

The host is missing a security update according to Adobe advisory, APSB09-08. The update is required to fix multiple unspecified vulnerabilities. The flaws are present in the application, which fails to handle crafted Shockwave Player 10 content. Successful exploitation allows attackers to execute arbitrary code.

The host is missing a security update according to Adobe advisory, APSB09-05. A flaw is present in the application, which fails to properly handle RPC requests. Successful exploitation allows attackers to execute arbitrary remote procedures within an ActionScript file on the server.

The host is missing a security update according to Microsoft advisory, 2868725. The update is required to remove RC4 as an available cipher on affected systems through registry settings. The flaw is present in the application, which fails to handle crafted data. Successful exploitation could allow an attacker to perform man-in-the-middle attacks and recover plaintext from encrypted sessions.

The host is missing a security update according to Microsoft advisory, 2854544. The update is required to fix a update to improve cryptography and digital certificate handling in windows. The flaw is present in the application, which fails to handle crafted data. Successful exploitation could allow attackers to gain privileges.

The host is missing a critical security update according to APSB10-01. The update is required to fix multiple buffer overflow vulnerabilities. The flaws are present in the application, which fails to handle memory. Successful exploitation allows attackers to execute arbitrary code.

The host is missing an important security update according to APSB10-24. The update is required to fix untrusted search path vulnerability. A flaw is present in the application, which fails to handle the DLL hijacking attacks via a Trojan horse ibfs32.dll. Successful exploitation allows local users, and possibly remote attackers to execute arbitrary code.

The host is missing an important security update according to Adobe security bulletin, APSB12-06. The update is required to fix denial of service vulnerability. A flaw is present in the application, which fails to properly handle the hash values for form parameters. Successful exploitation allows remote attackers to cause a denial of service by sending many crafted parameters.

The host is missing an important security update according to Microsoft security advisory (2820197). The update is required to fix a vulnerability, which prevents ActiveX control from being loaded by the Internet Explorer. Successful exploitation could allow attackers to execute arbitrary code.


Pages:      Start    194    195    196    197    198    199    200    201    202    203    ..   203

© SecPod Technologies