[Forgot Password]
Login  Register Subscribe

30430

 
 

423868

 
 

247862

 
 

909

 
 

194603

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 790 Download | Alert*

The host is missing an important security update according to Microsoft security bulletin, MS09-016. The update is required to fix denial of service vulnerabilities. The flaws are present in the Microsoft Internet Security and Acceleration (ISA) Server and Microsoft Forefront Threat Management Gateway (TMG), Medium Business Edition (MBE). The firewall engine fails to handle TCP state and HTTP form ...

The host is missing a cumulative security update according to Microsoft security bulletin, MS09-032. The update is required to fix remote code execution vulnerabilities. The flaws are present in the Microsoft Active Template Library (ATL) ActiveX Controls, which fails to handle a specially crafted Web page with Internet Explorer, instantiating the ActiveX control. Successful exploitation allows at ...

The host is missing a critical security update according to Microsoft security bulletin, MS09-052. The update is required to fix remote code execution vulnerability in Windows Media Player. A flaw is present in the Windows Media Player, which fails handle a specially crafted ASF file. Successful exploitation could allow an attacker to gain the same user rights as the local user and take complete c ...

The host is missing a critical security update according to Microsoft security bulletin, MS08-013. The update is required to fix remote code execution vulnerability. A flaw is present in Microsoft Office, which fails to handle a specially crafted Microsoft Office file. Successful exploitation could allow an attacker to install programs, view, change, or delete data or create new accounts with full ...

The host is missing an important security update according to Microsoft security bulletin, MS08-011. The update is required to fix remote code execution vulnerabilities. The flaws are present in Microsoft Works File Converter, which fails handle a specially crafted Works (.wps) file. Successful exploitation could allow an attacker to install programs, view, change, or delete data or create new acc ...

The host is missing a critical security update according to Microsoft security bulletin, MS08-018. The update is required to fix remote code execution vulnerability. A flaw is present in Microsoft Project, which fails handle a specially crafted Project file. Successful exploitation could allow an attacker to install programs, view, change, or delete data or create new accounts with full user right ...

The host is missing an important security update according to Microsoft security bulletin, MS08-034. The update is required to fix privilege escalation vulnerability. A flaw is present in the Windows Internet Name Service(WINS), which fails to handle validation of the data structures of network packets processed by WINS. Successful exploitation could allow an attacker to install programs, view, ch ...

The host is missing an important security update according to Microsoft security bulletin, MS08-002. The update is required to fix elevation of privilege vulnerability. A flaw is present in Microsoft Windows Local Security Authority Subsystem Service (LSASS), which fails to handle validating parameters passed to LSASS APIs. Successful exploitation allows attackers to take complete control of the a ...

The host is missing a critical security update according to Microsoft security bulletin, MS08-046. The update is required to fix remote code execution vulnerability. A flaw is present in the Microsoft Image Color Management (ICM) system, which fails handle a specially crafted image file. Successful exploitation could allow an attacker to install programs, view, change, or delete data or create new ...

The host is missing a critical security update according to Microsoft security bulletin, MS08-067. The update is required to fix remote code execution vulnerability. A flaw is present in Server service, which fails to handle a specially crafted RPC request. Successful exploitation could allow an attacker to run arbitrary code without authentication.


Pages:      Start    54    55    56    57    58    59    60    61    62    63    64    65    66    67    ..   78

© SecPod Technologies