[Forgot Password]
Login  Register Subscribe

24128

 
 

131615

 
 

111749

 
 

909

 
 

87255

 
 

136

 
 
Paid content will be excluded from the download.

Filter
Matches : 778 Download | Alert*

The host is missing an important security update according to Apple advisory, APPLE-SA-2010-03-31-1. The update is required to fix a security bypass vulnerability. A flaw is present in the application, which fails to properly distribute MAC address ACLs to network extenders. Successful exploitation could allow attackers to bypass intended access restrictions.

The host is missing an important security update according to Microsoft bulletin, MS11-095.The update is required to fix a remote code execution vulnerability. A flaw is present in the application, which fails to handle a crafted application when run by an authenticated attacker. Successful exploitation could allow attackers to take complete control of the affected system.

The host is missing an important security update according to Microsoft security bulletin, MS11-097. The update is required to fix elevation of privilege vulnerability. A flaw is present in the Client/Server Run-time Subsystem (CSRSS), which fails to properly validate permissions when a lower-integrity process communicates a device event message to a higher-integrity process. Successful exploitati ...

The host is missing an important security update according to Microsoft security bulletin, MS11-089. The update is required to fix a remote code execution vulnerability. A flaw is present in the application, which fails to handle specially crafted word files. Successful exploitation could allow attackers to execute arbitrary code.

The host is missing an important security update according to Microsoft security bulletin, MS11-091. The update is required to fix remote code execution vulnerabilities. The flaws are present in Microsoft Office Publisher, which fails to handle a specially crafted Publisher file. Successful exploitation could allow an attacker to gain complete control of an affected system.

The host is missing an important security update according to Microsoft security bulletin, MS11-094. The update is required to fix multiple remote code execution vulnerabilities. The flaws are present in the application, which fails to properly handle crafted powerpoint files and loading of libraries. Successful exploitation allows attackers to take complete control of an affected system.

The host is missing an important security update according to Microsoft security bulletin, MS11-096. The update is required to fix remote code execution vulnerability. A flaw is present in Microsoft Office, which fails to handle a specially crafted Excel file. Successful exploitation could allow an attacker to gain the same user rights as the logged-on user.

The host is missing a critical update according to Microsoft security bulletin, MS16-050. The update is required to fix multiple remote code execution vulnerability. A flaw is present in the application, which fails to properly handle crafted data. Successful exploitation allows remote attackers to cause a crash and potentially allow an attacker to take control of the affected system.

The host is missing an important security update according to Adobe advisory, APSB16-09. The update is required to fix multiple cross-site scripting (XSS) vulnerabilities. The flaws are present in the application, which fails to handle vectors involving viewer.swf and loadflash.js. Successful exploitation allows attackers to inject arbitrary web script or HTML.

The host is missing a critical security update according to Microsoft security bulletin, MS08-052. The update is required to fix remote code execution vulnerabilities. The flaws are present in Microsoft Windows GDI+, which fails handle a specially crafted image file or browsed a Web site that contains specially crafted content. Successful exploitation could allow an attacker to obtain credentials ...


Pages:      Start    3    4    5    6    7    8    9    10    11    12    13    14    15    16    ..   77

© SecPod Technologies