[Forgot Password]
Login  Register Subscribe

23631

 
 

115084

 
 

97559

 
 

909

 
 

78730

 
 

109

 
 
Paid content will be excluded from the download.

Filter
Matches : 772 Download | Alert*

The host is missing a critical security update according to Microsoft security bulletin, MS09-029. The update is required to fix remote code execution vulnerabilities. The flaws are present in the Microsoft Windows component, the Embedded OpenType (EOT) Font Engine, which fails to parse data records, name tables and content containing specially crafted embedded fonts. Successful exploitation could ...

The host is missing impotant security update according to Microsoft security bulletin, MS09-008. The update is required to fix DNS and WINS server spoofing vulnerability. DNS Resolver Cache Service (aka DNSCache) when dynamic updates are enabled, does not reuse cached DNS responses and WINS server does not restrict registration of the (1) "wpad" and (2) "isatap" NetBIOS names, which allows remote ...

The host is missing a critical security update according to Microsoft security bulletin, MS10-041. The update is required to fix data tampering vulnerability. A flaw is present in the Microsoft .NET Framework, which allows data tampering of signed XML content without being detected. Successful exploitation allows an attacker to gain sensitive information.

The host is installed with Apple QuickTime before 7.6.2 and is prone to a heap-based memory corruption vulnerability. A flaw is present in the application, which fails to properly handle a crafted JP2 image. Successful exploitation could allow attackers to execute arbitrary code or crash the service.

The host is missing a critical security update according to Microsoft security bulletin, MS09-074. The update is required to fix remote code execution vulnerability. A flaw is present in the Microsoft Office Project, which fails to handle memory allocation for Project files. Successful exploitation allows an attacker to execute arbitrary code via specially crafted Project files.

The host is missing a critical security update according to Microsoft security bulletin, MS09-061. The update is required to fix remote code execution vulnerabilities. The flaws are present in the Microsoft .NET Common Language Runtime (CLR), which fails to handle interfaces and verify the rules of Microsoft .NET verifiable code. Successful exploitation allows an attacker to execute arbitrary code ...

The host is missing a critical security update according to Microsoft security bulletin, MS09-003. The update is required to fix remote code execution vulnerabilities. The flaws are present in the Microsoft Exchange Server , which fails to handle a specially crafted TNEF message. Successful exploitation could allow an attackers to take complete control of the affected system with Exchange Server s ...

The host is missing a critical security update according to Microsoft security bulletin, MS09-006. The update is required to fix remote code execution vulnerabilities. A flaw is present in the Windows kernel, which fails to handle specially crafted EMF or WMF image file. Successful exploitation could allow an attacker to execute code of an affected system.

The host is missing a security update according to Microsoft security bulletin, MS09-011. The update is required to fix heap memory error. The flaw is present in MJPEG file or video stream with a malformed Huffman table, which triggers an exception that frees heap memory. Successful exploitation could result in arbitrary code execution via MJPEG file or video stream.

The host is missing a security update according to Microsoft security bulletin, MS09-007. The update is required to fix Secure Channel (aka SChannel) authentication component in Microsoft Windows platforms. When certificate authentication is used and does not properly validate the client's key exchange data in Transport Layer Security (TLS) handshake messages. Successful exploitation allows remote ...


Pages:      Start    1    2    3    4    5    6    7    8    9    10    11    12    13    14    ..   77

© 2013 SecPod Technologies