[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248149

 
 

909

 
 

194803

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 790 Download | Alert*

The host is missing an important security update according to Microsoft security bulletin, MS08-065. The update is required to fix remote code execution vulnerability. The vulnerability could allow remote code execution on Microsoft Windows 2000 systems with the MSMQ service enabled. Remote attackers who successfully exploited this vulnerability could read memory contents and execute arbitrary cod ...

The host is missing an important security update according to Microsoft security bulletin, MS08-019. The update is required to fix remote code execution vulnerabilities. The flaws are present in Microsoft Visio, which fails to handle a specially crafted Visio file. Successful exploitation allows an attacker to install programs, view, change, or delete data or create new accounts with full user rig ...

The host is missing a critical security update according to Microsoft bulletin, MS08-022. The update is required to fix a remote code execution vulnerability. A flaw is present in (1) VBScript (VBScript.dll) and (2) JScript (JScript.dll) scripting engines 5.1 and 5.6, as used in Microsoft Windows 2000 SP4, XP SP2, and Server 2003 SP1 and SP2, which fail to decode the script. Successful exploitatio ...

The host is missing a critical security update according to Microsoft security bulletin, MS08-041. The update is required to fix remote code execution vulnerability. A flaw is present in the ActiveX control for the Snapshot Viewer for Microsoft Access, which fails to handle a specially crafted Web page. Successful exploitation could allow an attacker to gain the same user rights as the logged-on u ...

The host is missing a critical security update according to Microsoft security bulletin, MS08-072. The update is required to fix remote code execution vulnerabilities. The flaws are present in Microsoft Office Word and Microsoft Office Outlook, which allows remote code execution if a user opens a specially crafted Word or Rich Text Format (RTF) file. Successful exploitation allows an attacker to o ...

The host is missing a critical security update according to Microsoft security bulletin, MS08-051. The update is required to fix remote code execution vulnerabilities. The flaws are present in Microsoft Office PowerPoint and Microsoft Office PowerPoint Viewer, which fails handle a specially crafted PowerPoint file. Successful exploitation could allow an attacker to install programs, view, change, ...

The host is missing a critical security update according to Microsoft security bulletin, MS10-014. The update is required to fix denial of service vulnerability. A flaw is present in the Kerberos server, which fails to handle Ticket-Granting-Ticket renewal requests by a client. Successful exploitation could allow an attacker to cause a denial of service condition.

The host is missing a security update according to Microsoft security bulletin, MS09-023. The update is required to fix remote code execution vulnerabilities. The flaws are present in the Microsoft ActiveX Controls and Yahoo! Music Jukebox product, which fails to handle a specially crafted Web page with Internet Explorer, instantiating the ActiveX control. Successful exploitation allows attackers ...

The host is missing a critical security update according to Microsoft security bulletin, MS08-033. The update is required to fix remote code execution vulnerability. A flaw is present in Microsoft DirectX, which fails to handle a specially crafted media file. Successful exploitation could allow an attacker to install programs, view, change, or delete data or create new accounts with full user rig ...

The host is missing a critical security update according to Microsoft security bulletin, MS08-074. The update is required to fix remote code execution vulnerabilities. The flaws are present in Microsoft Office Excel, which fails to properly handle specially crafted Excel file. Successful exploitation allows attackers to gain complete control of an affected system.


Pages:      Start    57    58    59    60    61    62    63    64    65    66    67    68    69    70    ..   78

© SecPod Technologies