[Forgot Password]
Login  Register Subscribe

23631

 
 

126951

 
 

99602

 
 

909

 
 

80198

 
 

109

 
 
Paid content will be excluded from the download.

Filter
Matches : 1797 Download | Alert*

The host is missing an important security update according to Microsoft advisory, MS13-102. The update is required to fix elevation of privilege vulnerability. A flaw is present in the application, which fails to properly handle the crafted LPC port message. Successful exploitation allows the attacker to cause a stack-based buffer overflow condition on the LRPC client.

The host is missing a critical security update according to Microsoft bulletin, MS13-097. The update is required to fix multiple vulnerabilities. The flaws are present in the application, which fails to properly validate permissions and handle an object in memory. Successful exploitation allows attacker to gain elevation of privilege and execute remote code.

The host is missing a critical security update according to Microsoft bulletin, MS13-101. The update is required to fix multiple vulnerabilities. The flaws are present in the application, which fails to properly handle certain objects in memory. Successful exploitation allows local users to gain privileges.

The host is missing an important security update according to Microsoft security bulletin, MS14-015. The update is required to fix multiple vulnerabilities. The flaws are present in the application, which fails to properly handle objects in memory. Successful exploitation could allow attackers to disclose sensitive information or gain elevated privileges and read arbitrary amounts of kernel memory ...

The host is missing a critical security update according to Microsoft bulletin MS14-013. The update is required to fix a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle specially crafted JPEG image files. Successful exploitation could allow attackers to execute arbitrary code.

The host is missing an important security update according to Microsoft bulletin, MS14-016. The update is required to fix a security bypass vulnerability. A flaw is present in an application, which fails to handle validation of user lockout state. Successful exploitation could allow attackers to cause brute force attacks against user passwords.

The host is missing a critical security update according to Microsoft security bulletin, MS14-012. The update is required to fix multiple memory corruption vulnerabilities.The flaws are present in the application, which fails to properly handle objects in memory. Successful exploitation could allow attackers to gain the same user rights as the current user or execute arbitrary code.

The host is missing a critical security update according to Microsoft security bulletin, MS14-019. The update is required to fix a remote code execution vulnerability. A flaw is present in the application, which improperly restricts the path used for processing .bat and .cmd files. Successful exploitation could allow attackers to execute arbitrary code.

The host is missing a critical security update according to Microsoft bulletin, MS14-021. The update is required to fix memory corruption vulnerability. The flaws are present in the application, which fails to handle certain vectors related to memory. Successful exploitation allows attackers to execute arbitrary code or cause a denial of service .

The host is missing an important security update according to Microsoft bulletin, MS14-026. The update is required to fix multiple vulnerabilities. The flaw is present in the .NET Remoting implementation, which fails to handle a crafted website. Successful exploitation allows attacker to execute arbitrary code via vectors involving malformed objects.


Pages:      Start    159    160    161    162    163    164    165    166    167    168    169    170    171    172    ..   179

© 2013 SecPod Technologies