[Forgot Password]
Login  Register Subscribe

24003

 
 

131425

 
 

104705

 
 

909

 
 

84119

 
 

133

 
 
Paid content will be excluded from the download.

Filter
Matches : 2002 Download | Alert*

The host is missing a critical security update according to Microsoft security bulletin, MS10-031. The update is required to fix remote code execution vulnerability. A flaw is present in the Microsoft Visual Basic for Applications, which fails to search for ActiveX Controls embedded in documents. Successful exploitation could allow an attacker to execute arbitrary code on the system.

The host is missing a Critical security update according to Microsoft security bulletin, MS10-040. The update is required to fix remote code execution vulnerability. A flaw is present in the Internet Information Services (IIS), which fails to validate a specially crafted HTTP request. Successful exploitation allows an attacker to gain sensitive information such as same user rights as the logged-on ...

The host is missing a Critical security update according to Microsoft security bulletin, MS11-046.. The update is required to fix a privilege escalation vulnerability. The flaw is present in the application, as it fails to validate input passed from the user mode to the kernel. Successful exploiation could allow an attacker to bypass access rights.

The host is missing a critical security update according to Microsoft security bulletin, MS10-013. The update is required to fix remote code execution vulnerability. A flaw is present in Microsoft DirectShow, which fails to parse a specially crafted AVI file before opening it. Successful exploitation could allow an attacker to execute arbitrary code on the affected system.

The host is missing a critical security update according to Microsoft security bulletin, MS10-003. The update is required to fix buffer overflow vulnerability. A flaw is present in the MSO.dll in Office XP, which fails to validate crafted Office document. Successful exploitation could allow an attacker to execute arbitrary code on the system.

The host is missing a critical security update according to Microsoft security bulletin, MS10-006. The update is required to fix code execution vulnerabilities. Flaws are present in the SMB Client in Microsoft Windows, which fails to validate crafted response from SMB servers and man-in-the-middle attackers. Successful exploitation could allow an attacker to execute arbitrary code on the system.

The host is missing a critical security update according to Microsoft security bulletin, MS10-007. The update is required to fix code execution vulnerability. A flaw is present in the ShellExecute API function in Microsoft Windows, which fails to validate user supplied input parameters. Successful exploitation could allow an attacker to execute arbitrary code on the system.

The host is missing a critical security update according to Microsoft security bulletin, MS10-028. The update is required to fix remote code execution vulnerabilities. Flaws are present in Microsoft Office Visio, which fails to validate attributes and index calculation of a specially crafted Visio file. Successful exploitation allows an attacker to gain sensitive information such as same user righ ...

The host is missing a critical security update according to Microsoft security bulletin, MS10-020. The update is required to fix remote code execution vulnerabilities. Flaws are present in the Windows SMB Client, which fails to handle a specially crafted SMB response sent to a client-initiated SMB request. Successful exploitation could allow an attacker to execute arbitrary code on the affected sy ...

The host is missing a critical security update according to Microsoft security bulletin, MS10-021. The update is required to fix privilege escalation vulnerabilities. Flaws are present in the Windows Kernel, which fails to validate specially crafted applications like the creation of symbolic links or exceptions handling. Successful exploitation could allow an attacker to execute arbitrary code wit ...


Pages:      Start    7    8    9    10    11    12    13    14    15    16    17    18    19    20    ..   200

© 2013 SecPod Technologies