[Forgot Password]
Login  Register Subscribe

24003

 
 

131573

 
 

108684

 
 

909

 
 

85446

 
 

134

 
 
Paid content will be excluded from the download.

Filter
Matches : 2241 Download | Alert*

The host is missing an important security update according to Apple advisory, APPLE-SA-2012-05-09-2. The update is required to fix multiple vulnerabilities. The flaws are present in the application, which fails to properly handle malicious data. Successful exploitation could allow attackers bypass security, execute arbitrary code or crash the service.

The host is missing an important security update according to Apple advisory, APPLE-SA-2011-10-11-1. The update is required to fix multiple denial of service vulnerabilities. The flaws are present in the application, which fails to sanitize user supplied input. Successful exploitation could allow attackers to crash the service.

The host is missing an Important security update according to Microsoft security bulletin, MS11-012. The update is required to fix elevation of privilege vulnerability in Microsoft Windows. A flaw is present in the windows kernel-mode drivers which fails to validate data passed from user mode to kernel mode. Successful exploitation could allow an attacker to gain additional privileges and execute ...

The host is missing a critical security update according to Microsoft security bulletin, MS11-002. The update is required to fix remote code execution vulnerability in Microsoft Windows. A flaw is present in MDAC and WDAC which fails to properly validate string length and memory allocation. Successful exploitation allows remote attackers to execute arbitrary code.

The host is missing a critical security update according to Microsoft security bulletin, MS10-103. The update is required to fix remote code execution vulnerability. A flaw is present in Microsoft Publisher, which fails to handle crafted Publisher file that uses an old file format. Successful exploitation could allow an attacker to cause a denial of service condition.

The host is missing a critical security update according to Microsoft security bulletin, MS10-098. The update is required to fix multiple vulnerabilities. Flaws are present in the Win32k.sys in the kernel-mode drivers, which fails to allocate memory when copying data from user mode. Successful exploitation could allow a local attacker to overflow a buffer and execute arbitrary code on the system w ...

The host is missing a critical security update according to Microsoft security bulletin, MS10-100. The update is required to fix local privilege escalation vulnerability. A flaw is present in the Consent User Interface (UI) in User Account Control (UAC), which fails to handle an unspecified registry-key value. Successful exploitation could allow an attacker to execute arbitrary code and gain privi ...

The host is missing a critical security update according to Microsoft security bulletin, MS10-095. The update is required to fix remote code execution vulnerability. A flaw is present in Microsoft Windows, which fails to load a BranchCache DLL library. Successful exploitation could allow a local attacker to execute arbitrary code via '.eml', '.rss' or '.wpost' file.

The host is missing a critical security update according to Microsoft security bulletin, MS10-091. The update is required to fix multiple vulnerabilities. Multiple flaws are present in the OpenType Font (OTF) driver, which fails to parse specially crafted OpenType fonts. Successful exploitation could allow an attacker to execute arbitrary code with elevated privileges.

The host is missing a critical security update according to Microsoft security bulletin, MS10-094. The update is required to fix code execution vulnerability. A flaw is present in the Microsoft Windows Media Encoder, which fails to load dynamic-link libraries such as wmerrorDAN.dll, wininetDAN.dll. Successful exploitation could allow a local attacker to execute arbitrary code via '.prx' or '.wme' ...


Pages:      Start    178    179    180    181    182    183    184    185    186    187    188    189    190    191    ..   224

© SecPod Technologies