[Forgot Password]
Login  Register Subscribe

23631

 
 

115038

 
 

96174

 
 

909

 
 

78077

 
 

109

 
 
Paid content will be excluded from the download.

Filter
Matches : 1723 Download | Alert*

The host is missing a critical security update according to Microsoft bulletin, MS14-067. The update is required to fix a remote code execution vulnerability. A flaw is present in the application, which improperly parses XML content. Successful exploitation allows attackers to run arbitrary code and install programs; view, change, or delete data; or create new accounts with full user rights.

The host is missing a critical security update according to Microsoft bulletin, MS14-066. The update is required to fix a remote code execution vulnerability. A flaw is present in the application, which fails to properly handle processing of specially crafted packets. Successful exploitation allows attackers to run arbitrary code on a target server.

The host is missing an important security update according to Microsoft bulletin, MS14-072. The update is required to fix an elevation of privilege vulnerability. A flaw is present in the application, which fails to handle TypeFilterLevel checks for some malformed objects. Successful exploitation allows attacker to execute arbitrary code.

The host is missing a moderate security update according to Microsoft security bulletin, MS14-078. The update is required to fix an elevation of privilege vulnerability. A flaw is present in the application, which fails to properly handle a specially crafted file. Successful exploitation could allow attackers to install programs; view, change or delete data; or create new accounts with full admini ...

The host is missing a critical security update according to Microsoft bulletin, MS14-065. The update is required to fix multiple vulnerabilities. The flaws are present in the application, which fails to properly access objects in memory or to handle a crafted webpage. Successful exploitation could allow attackers to execute arbitrary code or elevate privileges in affected versions of Internet Expl ...

The host is missing a critical security update according to Microsoft security bulletin, MS14-068. The update is required to fix a remote elevation of privilege vulnerability. A flaw is present in the application, which fails to handle a forged signature in a ticket. Successful exploitation could allow remote authenticated domain users to obtain domain administrator privileges.

The host is missing a important security update according to Microsoft security advisory, 2905247. The update is required to fix an elevation of privilege vulnerability. A flaw is present in the application, which fails to handle a improper configuration of view state MAC. Successful exploitation allows remote attackers to elevate privileges to the level of the service account running on the vulne ...

The host is missing a important security update according to Microsoft bulletin, MS14-034. The update is required to fix remote code execution vulnerability. A flaw is present in the applications, which fail to properly handle objects in memory while parsing specially crafted Office files. Successful exploitation allows attackers to execute arbitrary code.

The host is missing an important security update according to Microsoft security bulletin, MS14-083. The update is required to fix multiple remote code execution vulnerabilities. The flaws are present in the applications, which fail to handle certain objects in memory while parsing specially crafted Office files. Successful exploitation allows attackers to execute arbitrary code.

The host is missing an important security update according to Apple security advisory, APPLE-SA-2014-05-15-2. The update is required to fix information disclosure vulnerability. A flaw is present in the application, which fails to properly handle Set-Cookie HTTP headers. Successful exploitation could allow attackers to strip security settings from the cookie by forcing the connection to close befo ...


Pages:      Start    152    153    154    155    156    157    158    159    160    161    162    163    164    165    ..   172

© 2013 SecPod Technologies