[Forgot Password]
Login  Register Subscribe

23631

 
 

115083

 
 

97147

 
 

909

 
 

78764

 
 

109

 
 
Paid content will be excluded from the download.

Filter
Matches : 772 Download | Alert*

The host is missing a security update according to Apple advisory, APPLE-SA-2008-11-13. The update is required to fix multiple vulnerabilities. The flaws are present in the application, which fails to properly handle crafted data. Successful exploitation could allow attackers to obtain sensitive information, execute arbitrary code or crash the service.

The host is missing a critical security update according to Microsoft bulletin, MS08-045. The update is required to fix multiple remote code execution vulnerabilities. The flaws are present in the application, which fails to handle a specially crafted web page. Successful exploitation could allow attackers to execute arbitrary code.

The host is missing a critical security update according to Microsoft security bulletin, MS08-042. The update is required to fix remote code execution vulnerability. A flaw is present in Microsoft Word, which fails handle a specially crafted Word file. Successful exploitation could allow an attacker to install programs, view, change, or delete data or create new accounts with full user rights.

The host is missing a critical security update according to Microsoft security bulletin, MS08-046. The update is required to fix remote code execution vulnerability. A flaw is present in the Microsoft Image Color Management (ICM) system, which fails handle a specially crafted image file. Successful exploitation could allow an attacker to install programs, view, change, or delete data or create new ...

The host is missing an important security update according to Microsoft bulletin, MS08-061. The update is required to fix a Windows kerne vulnerability. A flaw is present in Windows kernel, which improperly validating input passed from user mode to the kernel during the new window creation process. Successfully exploited could execute arbitrary code and take complete control of an affected system ...

The host is missing a critical security update according to Microsoft security bulletin, MS08-071. The update is required to fix remote code execution vulnerabilities. The flaws are present in GDI, which fails to handle a specially crafted WMF image file. Successful exploitation allows attackers to install programs, view, change, or delete data, or create new accounts with full user rights.

The host is missing a critical security update according to Microsoft bulletin, MS08-031. The update is required to fix multiple remote code execution vulnerabilities. The flaws are present in the application, which fails to handle a specially crafted web page. Successful exploitation could allow attackers to disclose sensitive information.

The host is missing a critical security update according to Microsoft security bulletin, MS08-049. The update is required to fix remote code execution vulnerabilities. The flaws are present in Microsoft Windows Event System, which fails to handle per-user subscriptions correctly. Successful exploitation allows attackers to gain complete control of an affected system.

The host is missing an important security update according to Microsoft security bulletin, MS08-034. The update is required to fix privilege escalation vulnerability. A flaw is present in the Windows Internet Name Service(WINS), which fails to handle validation of the data structures of network packets processed by WINS. Successful exploitation could allow an attacker to install programs, view, ch ...

The host is missing an important security update according to Microsoft bulletin, MS08-037. The update is required to fix a security bypass vulnerability. The flaws are present in the DNS client and DNS server, which fail to prevent spoofing. Successful exploitation could allow attackers to redirect network traffic intended for systems on the Internet to the attackers own systems.


Pages:      Start    2    3    4    5    6    7    8    9    10    11    12    13    14    15    ..   77

© 2013 SecPod Technologies