[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248392

 
 

909

 
 

195452

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 2333 Download | Alert*

The host is missing an important security update according to Microsoft security bulletin, MS15-050. The update is required to fix an elevation of privilege vulnerability. A flaw is present in the application, which improperly verifies impersonation levels. Successful exploitation could allow attackers to gain elevated privileges and make calls to SCM for which they lack sufficient privilege.

The host is missing an important security update according to Microsoft security bulletin, MS15-076. The update is required to fix a RPC elevation of privilege vulnerability. A flaw is present in the application, which inadvertently allows DCE/RPC connection reflection. An attacker who successfully exploited this vulnerability could take complete control of the affected system. An attacker could t ...

The host is missing an important security update according to Microsoft security bulletin, MS15-077. The update is required to fix a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle objects in memory. An attacker who successfully exploited this vulnerability could execute arbitrary code and take complete control of an affected system.

The host is missing an important security update according to Microsoft security bulletin, MS15-072. The update is required to fix an elevation of privilege vulnerability. A flaw is present in the application, which fails to process certain specially crafted bitmap conversions. Successful exploitation could allow attackers to install programs; view, change, or delete data; or create new accounts w ...

The host is missing an important security update according to Microsoft bulletin, MS15-090. The update is required to fix multiple vulnerabilities. The flaws are present in the application, which fails to handle a specially crafted application. An attacker who successfully exploited this vulnerability could escape the sandbox.

The host is missing a critical security update according to Microsoft security bulletin, MS16-041. The update is required to fix a remote code execution vulnerability. A flaw is present in the application, which fails to properly validate input before loading libraries. An attacker who successfully exploited this vulnerability could take control of an affected system.

The host is missing an important security update according to Microsoft bulletin, MS11-088. The update is required to fix a privilege escalation vulnerability. A flaw is present in the application, which fails to properly set configuration options. Successful exploitation could allow attackers to execute arbitrary code.

The host is missing an important security update according to Microsoft security bulletin, MS11-098. The update is required to fix a privilege escalation vulnerability. A flaw is present in the applications, which fail to properly handle the way the kernel accesses an object that has not been correctly initialized. Successful exploitation could allow attackers to run arbitrary code in kernel mode.

The host is missing an important security update according to Microsoft security bulletin, MS16-058. The update is required to fix a remote code execution vulnerability. A flaw is present in the application, which fails to properly validate input before loading certain libraries. An attacker who successfully exploited this vulnerability could take control of an affected system.

The host is missing an important security update according to Microsoft security bulletin, MS16-139. The update is required to fix an elevation of privilege vulnerability. A flaw is present in the application, which fails to properly handle Windows Kernel API. An attacker who successfully exploited this vulnerability could gain access to information that is not intended for the user.


Pages:      Start    207    208    209    210    211    212    213    214    215    216    217    218    219    220    ..   233

© SecPod Technologies