[Forgot Password]
Login  Register Subscribe

24003

 
 

131401

 
 

103942

 
 

909

 
 

84051

 
 

133

 
 
Paid content will be excluded from the download.

Filter
Matches : 27 Download | Alert*

The host is missing a important security update according to Microsoft security bulletin, MS09-041. The update is required to fix privilege elevation vulnerability. The flaw is present in the Windows Workstation Service, which fails to handle a specially crafted RPC message. Successful exploitation allows an attackers to install programs; view, change, or delete data; or create new accounts with f ...

The host is missing an important security update according to Microsoft security bulletin, MS08-048. The update is required to fix information disclosure vulnerability. A flaw is present in Outlook Express and Windows Mail, which fails handle a specially crafted Web page. Successful exploitation could allow an attacker to read data from another Internet Explorer domain or the local computer.

The host is missing an important security update according to Microsoft security bulletin, MS08-029. The update is required to fix denial of service vulnerabilities. The flaws are present due to specially crafted file that could allow denial of service when received by the target computer system and scanned by the Microsoft Malware Protection Engine. Successful exploitation could cause the Microso ...

The host is missing a critical security update according to Microsoft bulletin MS12-004. The update is required to fix remote code execution vulnerability. A flaw is present in the application, which fails to handle a specially crafted media files. Successful exploitation allows attackers to run arbitrary code in the context of the current user.

The host is missing a critical security update according to MS12-036. The update is required to fix remote code execution vulnerability. A flaw is present in the application, which fails to handle specially crafted RDP packets. Successful exploitation allows remote attackers to take complete control of the target system.

The update addresses a vulnerability that could allow remote code execution if the Microsoft Malware Protection Engine scans a specially crafted file. An attacker who successfully exploited this vulnerability could execute arbitrary code in the security context of the LocalSystem account and take control of the system.

The host is missing an important security update according to Microsoft advisory, 2974294. The update is required to fix a denial of service vulnerability. A flaw is present in the mpengine.dll, which fails to handle a crafted file. Successful exploitation allows attackers to cause a denial of service (system hang).

The host is missing an important security update according to Microsoft advisory, 2846338. The update is required to fix a remote code execution vulnerability. A flaw is present in the mpengine.dll, which fails to handle a crafted file. Successful exploitation allows attackers to execute arbitrary code in the security context of the LocalSystem account and take complete control of the system.

The host is missing a moderate security update according to Microsoft security bulletin, MS15-004. The update is required to fix a directory traversal elevation of privilege vulnerability. A flaw is present in the TS WebProxy Windows component, which fails to properly sanitize file paths. Successful exploitation could allow attackers to gain the same user rights as the current user.

The host is missing an important security update according to Microsoft security bulletin, MS11-001. The update is required to fix untrusted search path vulnerability in Microsoft Windows. A flaw is present in the Windows Backup Manager which passes an insufficiently qualified path when loading an external library. Successful exploitation allows remote attackers to to execute arbitrary code.


Pages:      Start    1    2    ..   2

© 2013 SecPod Technologies