[Forgot Password]
Login  Register Subscribe

24003

 
 

131425

 
 

103942

 
 

909

 
 

84057

 
 

133

 
 
Paid content will be excluded from the download.

Filter
Matches : 2029 Download | Alert*

The host is missing a critical security update according to Microsoft security bulletin, MS10-076. The update is required to fix integer overflow vulnerability. A flaw is present in the Embedded OpenType (EOT) Font Engine (t2embed.dll) in Microsoft Windows, which fails to parse 'hdmx' records in an EOT font file. Successful exploitation could allow an attacker to execute arbitrary commands or code ...

The host is missing a critical security update according to Microsoft security bulletin, MS11-053. The update is required to fix a remote code execution vulnerability. A flaw is present in in the Windows Bluetooth 2.1 Stack due to the way an object in memory is accessed when it has not been correctly initialized or has been deleted. Successful exploitation could allow an attacker to execute arbitr ...

The host is missing an Important security update according to Microsoft security bulletin, MS11-054. The update is required to fix elevation of privilege vulnerability in Windows 7 or Windows Server 2003 or Windows Server 2008 or Windows Vista or Windows XP. A flaw is present in windows Kernel-mode drivers in the Microsoft Windows, which does not properly manage kernel-mode driver objects. Success ...

The host is missing an important security update according to Microsoft security bulletin, MS11-056. The update is required to fix elevation of privilege vulnerability in Windows Client/Server Run-time Subsystem. A flaw is present in Client/Server Run-time Subsystem (CSRSS) that is caused by an integer overflow condition, memory corruption, input validation errors. Successful exploitation allows r ...

The host is missing an Important security update according to Microsoft security bulletin, MS11-055. The update is required to fix remote code execution vulnerability in Microsoft Visio 2003. A flaw is present in the application which can be triggered while opening legitimate Visio file that is located in the same network directory as a specially crafted library file. Successful exploitation allow ...

The host is missing a critical security update according to Microsoft security bulletin, MS10-032. The update is required to fix privilege escalation vulnerabilities. Flaws are present in the Windows kernel-mode drivers, which fails to validate callback parameter and the way it provides outlines of TrueType fonts to usermode applications. Successful exploitation could allow remote attackers to exe ...

The host is missing a critical security update according to Microsoft security bulletin, MS10-081. The update is required to fix heap-based buffer overflow vulnerability. A flaw is present in the common control library (Comctl32.dll) in Microsoft Windows, which fails to handle messages passed from a 3rd-party scalable vector graphics (SVG) viewer. Successful exploitation could allow an attacker to ...

The host is missing a critical security update according to Microsoft security bulletin, MS10-031. The update is required to fix remote code execution vulnerability. A flaw is present in the Microsoft Visual Basic for Applications, which fails to search for ActiveX Controls embedded in documents. Successful exploitation could allow an attacker to execute arbitrary code on the system.

The host is missing a Critical security update according to Microsoft security bulletin, MS10-040. The update is required to fix remote code execution vulnerability. A flaw is present in the Internet Information Services (IIS), which fails to validate a specially crafted HTTP request. Successful exploitation allows an attacker to gain sensitive information such as same user rights as the logged-on ...

The host is missing a Critical security update according to Microsoft security bulletin, MS11-046.. The update is required to fix a privilege escalation vulnerability. The flaw is present in the application, as it fails to validate input passed from the user mode to the kernel. Successful exploiation could allow an attacker to bypass access rights.


Pages:      Start    8    9    10    11    12    13    14    15    16    17    18    19    20    21    ..   202

© 2013 SecPod Technologies