[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248392

 
 

909

 
 

195452

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 2212 Download | Alert*

The host is missing a critical security update according to Microsoft bulletin, MS14-067. The update is required to fix a remote code execution vulnerability. A flaw is present in the application, which improperly parses XML content. Successful exploitation allows attackers to run arbitrary code and install programs; view, change, or delete data; or create new accounts with full user rights.

The host is missing an critical security update according to Microsoft security bulletin, MS14-064. The update is required to fix a remote code execution vulnerability. A flaw is present in the application, which fails to handle crafted OLE objects. Successful exploitation could allow attackers to run arbitrary code in the context of the current user.

The host is missing an important security update according to Microsoft security bulletin, MS14-069. The update is required to fix multiple remote code execution vulnerabilities. The flaws are present in the applications, which fail to properly handle objects in memory while parsing specially crafted Office files. Successful exploitation could allow attackers to execute arbitrary code.

The host is missing a critical security update according to Microsoft bulletin, MS14-066. The update is required to fix a remote code execution vulnerability. A flaw is present in the application, which fails to properly handle processing of specially crafted packets. Successful exploitation allows attackers to run arbitrary code on a target server.

The host is missing an important security update according to Microsoft security bulletin, MS14-083. The update is required to fix multiple remote code execution vulnerabilities. The flaws are present in the applications, which fail to handle certain objects in memory while parsing specially crafted Office files. Successful exploitation allows attackers to execute arbitrary code.

The host is missing an important security update according to Microsoft security bulletin, MS15-014. The update is required to fix a security feature bypass vulnerability. A flaw is present in the group policy application of security configuration policies that could cause group policy settings on a targeted system to revert to their default, and potentially less secure, state. Successful exploita ...

The host is missing a critical security update according to Microsoft security bulletin, MS15-035. The update is required to fix a remote code execution vulnerability. A flaw is present in the application, which fails to process certain specially crafted Enhanced Metafile (EMF) image format files. Successful exploitation could allow attackers to execute arbitrary code.

The host is missing an important security update according to Microsoft security bulletin, MS11-096. The update is required to fix remote code execution vulnerability. A flaw is present in Microsoft Office, which fails to handle a specially crafted Excel file. Successful exploitation could allow an attacker to gain the same user rights as the logged-on user.

The host is missing an important security update according to Microsoft security bulletin, MS11-091. The update is required to fix remote code execution vulnerabilities. The flaws are present in Microsoft Office Publisher, which fails to handle a specially crafted Publisher file. Successful exploitation could allow an attacker to gain complete control of an affected system.

The host is missing an important security update according to Microsoft security bulletin, MS11-093. The update is required to fix remote code execution vulnerability. A flaw is present in the Object Linking and Embedding (OLE), which fails to properly handle OLE objects in memory. Successful exploitation allows attackers to take complete control of an affected system remotely.


Pages:      Start    204    205    206    207    208    209    210    211    212    213    214    215    216    217    ..   221

© SecPod Technologies