[Forgot Password]
Login  Register Subscribe

24003

 
 

131486

 
 

106342

 
 

909

 
 

84584

 
 

134

 
 
Paid content will be excluded from the download.

Filter
Matches : 1903 Download | Alert*

The host is missing a critical security update according to Microsoft security bulletin, MS09-069. The update is required to fix denial of service condition. A flaw is present in the Windows Local Security Authority Subsystem Service (LSASS), which fails to handle specially crafted ISAKMP messages communicated through IPsec. Successful exploitation allows an attacker to cause a denial of service c ...

The host is missing an important security update according to Microsoft security bulletin, MS11-073. The update is required to fix multiple remote code execution vulnerabilities. The flaws are present in the applications, which fail to properly handle different a specially crafted office file. Successful exploitation could allow attackers to gain the same user rights as the logged on user.

The host is missing a important security update according to Microsoft security bulletin, MS11-070. The update is required to fix privilege elevation vulnerability. The flaw is present in the Windows Internet Name Service, which fails to handle a specially crafted WINS replication packet. Successful exploitation allows an attackers to gain privileges via a crafted replication packet.

The host is missing a critical security update according to Microsoft security bulletin, MS09-065. The update is required to fix remote code execution vulnerabilities. The flaws are present in the Windows kernel, which fails to validate the argument passed to the system call and input passed from user mode through the kernel and handle a specially crafted Embedded OpenType (EOT) font. Successful e ...

The host is missing an important security update according to Adobe security bulletin, APSB14-29. The update is required to fix a denial of service vulnerability. A flaw is present in the application, which fails to handle the unspecified vectors. Successful exploitation allows remote attackers to cause a denial of service (resource consumption).

The host is missing a security update according to MFSA 2014-89. The update is required to fix an arbitrary code execution vulnerability. A flaw is present in the applications, which fail to handle unknown vectors. Successful exploitation allows attackers to execute arbitrary code by leveraging an incorrect cast from the BasicThebesLayer data type to the BasicContainerLayer data type.

The host is missing a security update according to MFSA 2014-88. The update is required to fix a stack-based buffer overflow vulnerability. A flaw is present in the applications, which fail to handle a crafted media content. Successful exploitation allows attackers to execute arbitrary code.

The host is missing a security update according to MFSA 2014-87. The update is required to fix an use-after-free vulnerability. A flaw is present in the applications, which fail to handle a addition of a second root element to an HTML5 document during parsing. Successful exploitation allows attackers to execute arbitrary code.

The host is missing a security update according to MFSA 2014-86. The update is required to fix an information disclosure vulnerability. A flaw is present in the path strings in CSP violation reports, which fail to handle a crafted a web site that receives a report after a redirect. Successful exploitation allows attackers to obtain sensitive information.

The host is missing a security update according to MFSA 2014-85. The update is required to fix a denial of service vulnerability. A flaw is present in the applications, which fail to handle a crafted JavaScript object. Successful exploitation allows attackers to cause a denial of service (application crash).


Pages:      Start    4    5    6    7    8    9    10    11    12    13    14    15    16    17    ..   190

© 2013 SecPod Technologies