[Forgot Password]
Login  Register Subscribe

25354

 
 

132804

 
 

133467

 
 

909

 
 

108562

 
 

152

 
 
Paid content will be excluded from the download.

Filter
Matches : 779 Download | Alert*

The host is missing an Important security update according to Microsoft security bulletin, MS11-074. The update is required to fix cross-site-scripting and information disclosure vulnerabilities. A flaw is present in the applications, which fails to properly validate inputs. Successful exploitation allows remote attackers to gain privilege or disclose information.

The host is missing a critical security update according to Microsoft security bulletin, MS09-010. The update is required to fix memory corruption in WordPad and Office Text Converter. Multiple flaws are present due to which applications fail to process specially crafted Word 6 file, Word 97 document or WordPerfect document. Successful exploitation could allow attackers remote code execution on af ...

The host is missing a critical security update according to Microsoft security bulletin, MS09-064. The update is required to fix remote code execution vulnerability. A flaw is present in the Microsoft License Logging Server, which fails to handle specially crafted RPC packets. Successful exploitation allows an attacker to execute arbitrary code or take complete control of an affected system.

The host is missing a critical security update according to Microsoft security bulletin, MS09-067. The update is required to fix remote code execution vulnerabilities. The flaws are present in the Microsoft Office Excel, which fails to handle malformed records. Successful exploitation allows an attacker to execute arbitrary code.

The host is missing a critical security update according to Microsoft security bulletin, MS09-071. The update is required to fix remote code execution vulnerabilities. Flaws are present in the Microsoft Internet Authentication Service, which fails to validates authentication requests by PEAP clients. Successful exploitation allows an attacker to execute arbitrary code

The host is missing a critical security update according to Microsoft security bulletin, MS09-074. The update is required to fix remote code execution vulnerability. A flaw is present in the Microsoft Office Project, which fails to handle memory allocation for Project files. Successful exploitation allows an attacker to execute arbitrary code via specially crafted Project files.

The host is missing a critical security update according to Microsoft security bulletin, MS09-017. The update is required to fix remote code execution vulnerabilities. The flaws are present in the Microsoft Office PowerPoint, which fails handle a specially crafted PowerPoint file. Successful exploitation could allow an attacker to install programs, view, change, or delete data; or create new accou ...

The host is missing a critical security update according to Microsoft security bulletin, MS09-028. The update is required to fix remote code execution vulnerabilities. The flaws are present in the Microsoft DirectShow , which fails to handle a specially crafted QuickTime media file. Successful exploitation allows an attacker to gain the same user rights as the local user.

The host is missing a critical security update according to Microsoft security bulletin, MS09-039. The update is required to fix remote code execution vulnerabilities. The flaws are present in the Windows Internet Name Service (WINS), which fails to handle specially crafted WINS replication packet. Successful exploitation allows an attacker to execute arbitrary code.

The host is missing a critical security update according to Microsoft security bulletin, MS09-046. The update is required to fix remote code execution vulnerability. A flaw is present in the DHTML Editing Component ActiveX control , which fails to handle a specially crafted Web page. Successful exploitation allows an attackers to gain the same user rights as the logged-on user.


Pages:      Start    1    2    3    4    5    6    7    8    9    10    11    12    13    14    ..   77

© SecPod Technologies