[Forgot Password]
Login  Register Subscribe

25354

 
 

132804

 
 

133467

 
 

909

 
 

108562

 
 

152

 
 
Paid content will be excluded from the download.

Filter
Matches : 779 Download | Alert*

The host is missing a moderate security update according to Microsoft security bulletin, MS09-035. The update is required to fix remote code execution vulnerabilities. The flaws are present in the Microsoft Active Template Library (ATL) included with Visual Studio, which allows an attacker to force VariantClear to be called on a VARIANT that has not been correctly initialized and to read a string ...

The host is missing a important security update according to Microsoft security bulletin, MS09-004. The update is required to fix remote code execution vulnerability. A flaw is present in the Microsoft SQL Server, which fails to validate input parameters passed to an extended stored procedure. Successful exploitation allows an attacker to execute arbitrary code or take complete control of an affec ...

The host is missing a critical security update according to Microsoft security bulletin, MS08-049. The update is required to fix remote code execution vulnerabilities. The flaws are present in Microsoft Windows Event System, which fails to handle per-user subscriptions correctly. Successful exploitation allows attackers to gain complete control of an affected system.

The host is missing impotant security update according to Microsoft security bulletin, MS09-008. The update is required to fix DNS and WINS server spoofing vulnerability. DNS Resolver Cache Service (aka DNSCache) when dynamic updates are enabled, does not reuse cached DNS responses and WINS server does not restrict registration of the (1) "wpad" and (2) "isatap" NetBIOS names, which allows remote ...

The host is missing a critical security update according to Microsoft security bulletin, MS09-037. The update is required to fix remote code execution vulnerabilities. The flaws are present in the Microsoft Active Template Library (ATL) header. Components and controls built using ATL headers fails to safely initialize from a data and also does not provide updated versions. Successful exploitation ...

The host is missing a critical security update according to Microsoft security bulletin, MS08-021. The update is required to fix multiple remote code execution vulnerabilities. The flaws are present in the application, which fails to properly process a malformed header or a malformed file name parameter in a specially crafted EMF or WMF image file. Successful exploitation allows attackers to take ...

The host is missing a critical security update according to Microsoft bulletin, MS08-045. The update is required to fix multiple remote code execution vulnerabilities. The flaws are present in the application, which fails to handle a specially crafted web page. Successful exploitation could allow attackers to execute arbitrary code.

The host is missing a critical security update according to Microsoft bulletin, MS08-031. The update is required to fix multiple remote code execution vulnerabilities. The flaws are present in the application, which fails to handle a specially crafted web page. Successful exploitation could allow attackers to disclose sensitive information.

The host is missing an important security update according to Microsoft bulletin, MS08-063. The update is required to fix a remote code execution vulnerability. A flaw is present in the application, which fails to handle sharing of files and folders. Successful exploitation could allow attackers to install programs; view, change, or delete data; or create new accounts with full user rights.

The host is missing a critical security update according to bulletin, MS08-078. The update is required to fix multiple remote code execution vulnerabilities. The flaw are present in the application, which fails to handle a specially crafted Web page. Successful exploitation could allow remote code execution.


Pages:      Start    3    4    5    6    7    8    9    10    11    12    13    14    15    16    ..   77

© SecPod Technologies