[Forgot Password]
Login  Register Subscribe

30430

 
 

423868

 
 

247862

 
 

909

 
 

194603

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 4513 Download | Alert*

The host is missing a critical security update according to Microsoft security bulletin, MS10-092. The update is required to fix privilege escalation vulnerability. A flaw is present in the Microsoft Windows Task Scheduler, which fails to validate whether scheduled tasks run within the intended security context. Successful exploitation could allow a local attacker to execute arbitrary code with el ...

The host is missing a critical security update according to Microsoft security bulletin, MS10-090. The update is required to fix multiple vulnerabilities. Multiple flaws are present in the Internet Explorer, which fails to handle objects in memory and script. Successful exploitation could allow an attacker to execute arbitrary code and gain sensitive information on the affected software.

The host is missing a critical security update according to Microsoft security bulletin, MS10-098. The update is required to fix multiple vulnerabilities. Flaws are present in the Win32k.sys in the kernel-mode drivers, which fails to allocate memory when copying data from user mode. Successful exploitation could allow a local attacker to overflow a buffer and execute arbitrary code on the system w ...

The host is missing a critical security update according to Microsoft security bulletin, MS10-091. The update is required to fix multiple vulnerabilities. Multiple flaws are present in the OpenType Font (OTF) driver, which fails to parse specially crafted OpenType fonts. Successful exploitation could allow an attacker to execute arbitrary code with elevated privileges.

The host is missing an critical security update according to Microsoft security bulletin, MS11-006. The update is required to fix stack-based buffer overflow vulnerability. A flaw is present in the "CreateSizedDIBSECTION()" function within the "shimgvw.dll" module, which fails to properly parse a malformed thumbnail image. Successful exploitation could allow remote attackers to execute arbitrary c ...

The host is missing a critical security update according to Microsoft security bulletin, MS10-100. The update is required to fix local privilege escalation vulnerability. A flaw is present in the Consent User Interface (UI) in User Account Control (UAC), which fails to handle an unspecified registry-key value. Successful exploitation could allow an attacker to execute arbitrary code and gain privi ...

The host is missing a critical security update according to Microsoft security bulletin, MS10-094. The update is required to fix code execution vulnerability. A flaw is present in the Microsoft Windows Media Encoder, which fails to load dynamic-link libraries such as wmerrorDAN.dll, wininetDAN.dll. Successful exploitation could allow a local attacker to execute arbitrary code via '.prx' or '.wme' ...

The host is missing a critical security update according to Microsoft security bulletin, MS11-002. The update is required to fix remote code execution vulnerability in Microsoft Windows. A flaw is present in MDAC and WDAC which fails to properly validate string length and memory allocation. Successful exploitation allows remote attackers to execute arbitrary code.

The host is missing an important security update according to Microsoft security bulletin, MS11-026. The update is required to fix information disclosure vulnerability. A flaw is present in MHTML implementation which fails to properly handle MIME format in a request for content blocks in a document. Successful exploitation allows remote attackers to obtain sensitive information via a crafted web s ...

The host is missing a Critical security update according to Microsoft security bulletin, MS11-007. The update is required to fix remote code execution vulnerability in Windows OpenType Compact Font Format (CFF) driver. A flaw is present in the the driver which fails to properly parse specially crafted OpenType fonts. Successful exploitation allows an attacker to run arbitrary code in kernel mode a ...


Pages:      Start    175    176    177    178    179    180    181    182    183    184    185    186    187    188    ..   451

© SecPod Technologies