[Forgot Password]
Login  Register Subscribe

24437

 
 

132035

 
 

118594

 
 

909

 
 

92444

 
 

143

 
 
Paid content will be excluded from the download.

Filter
Matches : 2377 Download | Alert*

The host is missing an important security update according to Microsoft advisory, 2846338. The update is required to fix a remote code execution vulnerability. A flaw is present in the mpengine.dll, which fails to handle a crafted file. Successful exploitation allows attackers to execute arbitrary code in the security context of the LocalSystem account and take complete control of the system.

The host is missing a Critical security update according to Microsoft security bulletin, MS10-001. The update is required to fix remote code execution vulnerability. A flaw is present in the OpenType (EOT) Font Client which fails to properly parse specially crafted EOT fonts. Successful exploitation allows an attacker to run arbitrary code in kernel mode and hence install programs, view, change, o ...

The host is missing a critical security update according to Microsoft security bulletin, MS10-037. The update is required to fix privilege escalation vulnerability. A flaw is present in the Windows OpenType Compact Font Format (CFF) driver, which fails to validate a specially crafted CFF font. Successful exploitation could allow an attacker to execute arbitrary code with elevated privileges.

The host is missing a critical security update according to Microsoft security bulletin, MS10-032. The update is required to fix privilege escalation vulnerabilities. Flaws are present in the Windows kernel-mode drivers, which fails to validate callback parameter and the way it provides outlines of TrueType fonts to usermode applications. Successful exploitation could allow remote attackers to exe ...

The host is missing a critical security update according to Adobe advisory, APSB12-02. The update is required to fix multiple memory corruption vulnerabilities. The flaws are present in the application, which fails to sanitize user supplied input. Successful exploitation could allow attackers to execute arbitrary code.

The host is missing a security update according to Adobe advisory APSB12-13. The update is required to fix memory corruption vulnerability. A flaw is present in the application, which fails to properly handle memory. Successful exploitation allows attackers to execute arbitrary code or cause a denial of service.

The host is missing a security update according to APSB12-17. The update is required to fix multiple memory corruption vulnerabilities. The flaws are present in the application, which fails to handle vectors related to memory. Successful exploitation allows attackers to execute arbitrary code or cause a denial of service.

The host is missing a critical security update according to Adobe advisory, APSB12-23. The update is required to fix multiple vulnerabilities. The flaws are present in the application, which fails to properly handle memory. Successful exploitation allows attackers to execute remote code.

The host is missing a security update according to Adobe advisory, APSB13-06. The update is required to fix multiple vulnerabilities. The flaws are present in the application, which fails to properly handle memory. Successful exploitation allows attackers to execute remote code.

The host is missing a critical security update according to Apple advisory, APPLE-SA-2015-10-21-5. The update is required to fix multiple vulnerabilities. The flaws are present in the application, which fails to properly handle crafted data. Successful exploitation could allow attackers to execute arbitrary code or crash the service.


Pages:      Start    210    211    212    213    214    215    216    217    218    219    220    221    222    223    ..   237

© SecPod Technologies