[Forgot Password]
Login  Register Subscribe

30481

 
 

423868

 
 

256288

 
 

909

 
 

199146

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 4563 Download | Alert*

The host is missing a critical security update according to Adobe advisory, APSA11-03. The update is required to fix multiple buffer overflow vulnerabilities. The flaws are present in the application, which fails to properly handle crafted files. Successful exploitation allows remote attackers to cause a denial of service.

The host is missing a critical security update according to APSB10-13. The update is required to fix multiple buffer overflow vulnerabilities. The flaws are present in the application, which fails to properly handle crafted ASL. ABR, GRD files. Successful exploitation allows remote attackers to execute arbitrary code.

The host is missing an important security update according to APSB10-30. The update is required to fix untrusted search path vulnerability. A flaw is present in the application, which fails to properly handle DLL files. Successful exploitation allows remote attackers to load arbitrary libraries.

The host is missing a security update according to Wireshark Advisory. The update is required to fix a denial-of-service vulnerability. A flaw is present in the application, which fails to properly handle issues in epan/dissectors/packet-btatt.c file. Successful exploitation allows attackers to crash the bluetooth attribute dissector.

The host is missing a critical security update according to Adobe security bulletin, APSB19-52. The update is required to fix multiple vulnerabilities. The flaws are present in the application, which fails to handle crafted data. Successful exploitation could allow attackers to execute an arbitrary code in the system.

The host is missing an important security update according to Adobe security bulletin, APSB21-32. The update is required to fix an out-of-bounds read vulnerability. A flaw is present in the application, which fails to handle the unspecified vectors. Successful exploitation allows attackers to cause privilege escalation.

The host is missing a critical security update according to Adobe security bulletin, APSB19-29. The update is required to fix multiple vulnerabilities. The flaws is present in the application, which fails to handle crafted data. Successful exploitation could allow attackers to execute arbitrary code.

The host is missing a critical security update according to Adobe advisory, APSB18-11. The update is required to fix multiple vulnerabilities. The flaws are present in the application, which fails to handle the specially crafted .inx file. Successful exploitation allows local users, and possibly remote attackers to cause privilege escalation.

The host is missing an important security update according to APSB10-24. The update is required to fix untrusted search path vulnerability. A flaw is present in the application, which fails to handle the DLL hijacking attacks via a Trojan horse ibfs32.dll. Successful exploitation allows local users, and possibly remote attackers to execute arbitrary code.

The host is missing a critical security update according to Adobe advisory, APSB17-38. The update is required to fix a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle crafted data. Successful exploitation allows local users, and possibly remote attackers to execute arbitrary code.


Pages:      Start    418    419    420    421    422    423    424    425    426    427    428    429    430    431    ..   456

© SecPod Technologies