[Forgot Password]
Login  Register Subscribe

30481

 
 

423868

 
 

255116

 
 

909

 
 

198683

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 1997 Download | Alert*

The host is missing a critical security update according to Mozilla advisory, MFSA 2013-05. The update is required to fix use-after-free vulnerability. A flaw is present in the applications, which fail to handle an HTML document with a table containing many columns and column groups. Successful exploitation allows remote attackers to execute arbitrary code or cause a denial of service.

The host is missing a security update according to Mozilla advisory, MFSA 2013-09. The update is required to fix denial of service vulnerability. A flaw is present in the applications, which fail to properly implement quickstubs that use the jsval data type for their return values. Successful exploitation allows remote attackers to execute arbitrary code.

The host is missing a security update according to Mozilla advisory, MFSA 2013-11. The update is required to fix information disclosure vulnerability. A flaw is present in the applications, which fail to prevent calling the toString function of an XBL object. Successful exploitation allows remote attackers to bypass the ASLR protection mechanism.

The host is missing a security update according to Mozilla advisory, MFSA 2013-21. The update is required to fix multiple memory safety vulnerabilities. The flaws are present in the applications, which fail to handle certain unspecified vectors. Successful exploitation allows remote attackers to cause a denial of service.

The host is missing a security update according to Mozilla advisory, MFSA 2013-28. The update is required to fix multiple vulnerabilities. The flaws are present in the applications, which fail to handle certain functions. Successful exploitation allows remote attackers to execute arbitrary code or cause a denial of service.

The host is missing a security update according to Mozilla advisory, MFSA 2013-26. The update is required to fix use-after-free vulnerability. A flaw is present in the applications, which fail to handle the the nsImageLoadingContent::OnStopContainer function. Successful exploitation allows remote attackers to execute arbitrary code via crafted web script.

The host is missing a security update according to Mozilla advisory, MFSA 2013-27. The update is required to fix address spoofing vulnerability. A flaw is present in the applications, which fail to handle a proxy server that provides a 407 HTTP status code accompanied by web script. Successful exploitation allows attackers to disable HTTPS effectively.

The host is missing a security update according to Apple advisory, APPLE-SA-2014-09-29-1. The update is required to fix arbitrary code execution vulnerability. The flaw is present in the Bash's parsing of environment variables, which fails to handle certain vectors related to memory and crafted data. Successful exploitation allows attackers to execute remote code and have other impact.

The host is missing a critical security update according to Adobe advisory, APSB23-27. The update is required to fix multiple vulnerabilities. The flaws are present in the application, which fails to properly handle unspecified vectors. Successful exploitatation allows attackers to cause memory leak or execute arbitrary code.

The host is missing a critical security update according to Adobe advisory, APSB23-20. The update is required to fix multiple vulnerabilities. The flaws are present in the application, which fails to properly handle unspecified vectors. Successful exploitatation allows attackers to cause memory leak or execute arbitrary code.


Pages:      Start    90    91    92    93    94    95    96    97    98    99    100    101    102    103    ..   199

© SecPod Technologies