[Forgot Password]
Login  Register Subscribe

24003

 
 

131425

 
 

103942

 
 

909

 
 

84057

 
 

133

 
 
Paid content will be excluded from the download.

Filter
Matches : 1875 Download | Alert*

The host is missing a critical security update according to Microsoft security bulletin, MS10-078. The update is required to fix privilege escalation vulnerabilities. Multiple flaws are present in the OpenType Font (OTF) format driver in Microsoft Windows, which is due to improper loading of formatted font. Successful exploitation could allow an attacker to execute arbitrary code with kernel privi ...

The host is missing a critical security update according to Microsoft security bulletin, MS10-076. The update is required to fix integer overflow vulnerability. A flaw is present in the Embedded OpenType (EOT) Font Engine (t2embed.dll) in Microsoft Windows, which fails to parse 'hdmx' records in an EOT font file. Successful exploitation could allow an attacker to execute arbitrary commands or code ...

The host is missing an Important security update according to Microsoft security bulletin, MS11-054. The update is required to fix elevation of privilege vulnerability in Windows 7 or Windows Server 2003 or Windows Server 2008 or Windows Vista or Windows XP. A flaw is present in windows Kernel-mode drivers in the Microsoft Windows, which does not properly manage kernel-mode driver objects. Success ...

The host is missing an important security update according to Microsoft security bulletin, MS11-056. The update is required to fix elevation of privilege vulnerability in Windows Client/Server Run-time Subsystem. A flaw is present in Client/Server Run-time Subsystem (CSRSS) that is caused by an integer overflow condition, memory corruption, input validation errors. Successful exploitation allows r ...

The host is missing an Important security update according to Microsoft security bulletin, MS11-055. The update is required to fix remote code execution vulnerability in Microsoft Visio 2003. A flaw is present in the application which can be triggered while opening legitimate Visio file that is located in the same network directory as a specially crafted library file. Successful exploitation allow ...

The host is missing a critical security update according to Microsoft security bulletin, MS10-032. The update is required to fix privilege escalation vulnerabilities. Flaws are present in the Windows kernel-mode drivers, which fails to validate callback parameter and the way it provides outlines of TrueType fonts to usermode applications. Successful exploitation could allow remote attackers to exe ...

The host is missing a critical security update according to Microsoft security bulletin, MS10-066. The update is required to fix code execution vulnerability. A flaw is present in the Remote Procedure Call (RPC) client implementation in Microsoft Windows, which fails to handle specially-crafted RPC response to a RPC request initiated by the client during allocation of memory. Successful exploitati ...

The host is missing a critical security update according to Microsoft security bulletin, MS10-067. The update is required to fix memory corruption vulnerability. A flaw is present in the Word 97 text converter in the WordPad Text Converters in Microsoft Windows, which fails to evaluate malformed structures in Word 97 documents. Successful exploitation could allow an attacker to execute arbitrary c ...

The host is missing a critical security update according to Microsoft security bulletin, MS10-081. The update is required to fix heap-based buffer overflow vulnerability. A flaw is present in the common control library (Comctl32.dll) in Microsoft Windows, which fails to handle messages passed from a 3rd-party scalable vector graphics (SVG) viewer. Successful exploitation could allow an attacker to ...

The host is missing a critical security update according to Microsoft security bulletin, MS10-029. The update is required to fix address spoofing vulnerability. A flaw is present in the ISATAP Component, which fails to check the inner packet's IPv6 source address in a tunneled ISATAP packets. Successful exploitation could allow an attacker to to spoof an IPv4 address.


Pages:      Start    5    6    7    8    9    10    11    12    13    14    15    16    17    18    ..   187

© 2013 SecPod Technologies