[Forgot Password]
Login  Register Subscribe

24128

 
 

131615

 
 

111666

 
 

909

 
 

87321

 
 

136

 
 
Paid content will be excluded from the download.

Filter
Matches : 2272 Download | Alert*

The host is missing an important security update 4011607

The host is missing an important security update 4011574

The host is missing an important security update 4011656

The host is missing an important security update 4011657

The host is missing an important security update 4011651

The host is missing a high severity security update according to Google advisory. The update is required to fix multiple vulnerabilities. The flaws are present in the application, which fails to handle crafted data. Successful exploitation allows attackers to have unspecified impact.

The update addresses a vulnerability that could allow remote code execution if the Microsoft Malware Protection Engine scans a specially crafted file. An attacker who successfully exploited this vulnerability could execute arbitrary code in the security context of the LocalSystem account and take control of the system.

The host is missing an important security update according to Microsoft advisory, 2974294. The update is required to fix a denial of service vulnerability. A flaw is present in the mpengine.dll, which fails to handle a crafted file. Successful exploitation allows attackers to cause a denial of service (system hang).

The host is missing an important security update according to Microsoft advisory, 2846338. The update is required to fix a remote code execution vulnerability. A flaw is present in the mpengine.dll, which fails to handle a crafted file. Successful exploitation allows attackers to execute arbitrary code in the security context of the LocalSystem account and take complete control of the system.

The host is missing a critical security update according to Adobe advisory, APSB13-02. The update is required to fix multiple vulnerabilities. The flaws are present in the application, which fails to properly handle certain unspecified vectors. Successful exploitation allows attackers to execute arbitrary code or cause a denial of service.


Pages:      Start    176    177    178    179    180    181    182    183    184    185    186    187    188    189    ..   227

© SecPod Technologies