[Forgot Password]
Login  Register Subscribe

24547

 
 

132804

 
 

131369

 
 

909

 
 

107907

 
 

152

 
 
Paid content will be excluded from the download.

Filter
Matches : 779 Download | Alert*

The host is missing an Important security update according to Microsoft security bulletin, MS11-008. The update is required to fix remote code execution vulnerability in Microsoft Visio. The flaws are present in the application, which fails to validate objects in memory and fail to parse certain structures when handling specially crafted Visio files. Successful exploitation will allow attackers to ...

The host is missing an Important security update according to Microsoft security bulletin, MS11-022. The update is required to fix remote code execution vulnerability in Microsoft Powerpoint 2002, 2003, 2007 or 2010 or powerpoint viewer 2007 or 2010 or Office Compatibility Pack for Word, Excel, and PowerPoint 2007 File Formats. A flaw is present in the application which is caused when PowerPoint r ...

The host is missing an important security update according to Microsoft security bulletin, MS11-045. The update is required to fix multiple vulnerabilities. The flaws are present in the applications, which fail to handle a specially crafted Excel file. Successful exploitation allows remote attacker to take complete control of the affected system.

The host is missing a critical security update according to Microsoft security bulletin, MS10-051. The update is required to fix a remote code execution vulnerability. The flaws are present in the Microsoft XML Core Services (MSXML) which fails to handle HTTP responses. Successful exploitation allows an attacker to gain sensitive information such as same user rights as the logged-on user.

The host is missing an important security update according to Microsoft security bulletin, MS10-105. The update is required to fix denial of service vulnerability. Multiple flaws are caused due to errors in processing CGM, PICT, TIFF, FlashPix image files. Successful exploitation could allows an attacker to cause buffer and integer overflows and memory corruption on affected software.

The host is missing a Critical security update according to Microsoft security bulletin, MS10-001. The update is required to fix remote code execution vulnerability. A flaw is present in the OpenType (EOT) Font Client which fails to properly parse specially crafted EOT fonts. Successful exploitation allows an attacker to run arbitrary code in kernel mode and hence install programs, view, change, o ...

The host is missing an Important security update according to Microsoft security bulletin, MS11-049. The update is required to fix information disclosure vulnerability in Microsoft InfoPath 2007 or Microsoft InfoPath 2010 or SQL Server 2005 or SQL Server 2008 or SQL Server 2008 R2 or Microsoft Visual Studio 2005 or Microsoft Visual Studio 2008 or Microsoft Visual Studio 2010 and is prone to inform ...

The host is missing a critical security update according to Microsoft security bulletin, MS10-044. The update is required to fix remote code execution vulnerabilities. Flaws are present in the Microsoft Office Access ActiveX Controls, which fails to validate a specially crafted Office file. Successful exploitation allows an attacker to gain sensitive information such as same user rights as the log ...

The host is missing a critical security update according to Microsoft security bulletin, MS10-087. The update is required to fix multiple remote code execution vulnerabilities. Flaws are in Microsoft Office, which fails to validate crafted RTF data, msofbtSp records and unspecified flags. Successful exploitation could allow an attacker to execute arbitrary code via an Office document.

The host is missing an important security update according to Microsoft security bulletin, MS10-045. The update is required to fix remote code execution vulnerability. A flaw is present in the Microsoft Office Outlook, which fails to verify attachments in a specially crafted e-mail message. Successful exploitation allows an attacker to gain sensitive information such as same user rights as the log ...


Pages:      Start    1    2    3    4    5    6    7    8    9    10    11    12    13    14    ..   77

© SecPod Technologies