[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248268

 
 

909

 
 

195051

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 2333 Download | Alert*

The host is missing an important security update according to Microsoft security bulletin MS13-043. The update is required to fix a remote code execution vulnerability. A flaw is present in the applications, which fail to properly handle a crafted shape data in a Word document. Successful exploitation could allow attackers to execute remote code.

The host is missing an important security update according to Microsoft bulletin, MS13-041. The update is required to fix remote code execution vulnerability. A flaw is present in the applications, which attempts to access an object in memory that has been deleted. Successful exploitation allows attackers to execute arbitrary code.

The host is missing a critical security update according to Microsoft Security bulletin MS13-037. The update is required to fix multiple vulnerabilities. The flaws are present in the application, which fails to handle a crafted web site that triggers access to a deleted object. Successful exploitation could allow attackers to execute arbitrary code.

The host is missing an important security update according to Microsoft security bulletin, MS14-023. The update is required to fix a remote code execution vulnerability. A flaw is present in the application, which does not properly validate the path used for loading external libraries. Successful exploitation could allow attackers to execute arbitrary code.

The host is missing an important security update according to Microsoft bulletin, MS14-024. The update is required to fix security feature bypass vulnerability. A flaw is present in the application, which fails to handle a specially crafted content. Successful exploitation could allow remote attackers to bypass the ASLR security feature and predict memory offsets of specific instructions in a give ...

The host is missing an important security update according to Microsoft security bulletin, MS13-029. The update is required to fix remote code execution vulnerability in Microsoft Windows Remote Desktop Client. A flaw is present in the application which fails to handle the specially crafted webpage. Successful exploitation could allow an attacker to execute arbitrary code and gain the user rights ...

The host is missing an critical security update according to Microsoft security bulletin, MS11-004. The update is required to fix a heap buffer overrun vulnerability in Microsoft FTP Service for Internet Information Services (IIS). A flaw is present in the TELNET_STREAM_CONTEXT::OnSendData function in the FTP protocol handler (ftpsvc.dll), which fails to properly handle a crafted FTP request that ...

The host is missing an Important security update according to Microsoft security bulletin, MS11-022. The update is required to fix remote code execution vulnerability in Microsoft Powerpoint 2002, 2003, 2007 or 2010 or powerpoint viewer 2007 or 2010 or Office Compatibility Pack for Word, Excel, and PowerPoint 2007 File Formats. A flaw is present in the application which is caused when PowerPoint r ...

The host is missing an Important security update according to Microsoft security bulletin, MS11-011. The update is required to fix elevation of privilege vulnerability in Windows 7 or Windows Server 2003 or Windows Server 2008 or Windows Vista or Windows XP. A flaw is present in the Microsoft Windows, which fails to handle proper interaction of drivers with the Windows kernel. Successful exploitat ...

The host is missing a critical security update according to Mozilla advisory, MFSA2017-25. The update is required to fix multiple vulnerabilities. The flaws are present in the application, which fails to handle crafted data. Successful exploitation allows remote attackers to execute arbitrary code, bypass security or crash the service.


Pages:      Start    187    188    189    190    191    192    193    194    195    196    197    198    199    200    ..   233

© SecPod Technologies