[Forgot Password]
Login  Register Subscribe

25354

 
 

132804

 
 

134312

 
 

909

 
 

108836

 
 

152

 
 
Paid content will be excluded from the download.

Filter
Matches : 2012 Download | Alert*

The host is missing a critical security update according to Microsoft security bulletin, MS10-067. The update is required to fix memory corruption vulnerability. A flaw is present in the Word 97 text converter in the WordPad Text Converters in Microsoft Windows, which fails to evaluate malformed structures in Word 97 documents. Successful exploitation could allow an attacker to execute arbitrary c ...

The host is missing a critical security update according to Microsoft security bulletin, MS10-069. The update is required to fix privilege escalation vulnerability. A flaw is present in the Client/Server Runtime Subsystem (CSRSS) in Win32 subsystem, which fails to allocate memory for transactions. Successful exploitation could allow a local attacker to gain privileges via a crafted application on ...

The host is missing a critical security update according to Microsoft security bulletin, MS10-071. The update is required to fix multiple vulnerabilities. Multiple flaws are present in Microsoft Internet Explorer, which fails to handle unspecified special characters in CSS documents. Successful exploitation could allow an attacker to execute arbitrary code or disclose information on the system.

The host is missing a critical security update according to Microsoft security bulletin, MS10-081. The update is required to fix heap-based buffer overflow vulnerability. A flaw is present in the common control library (Comctl32.dll) in Microsoft Windows, which fails to handle messages passed from a 3rd-party scalable vector graphics (SVG) viewer. Successful exploitation could allow an attacker to ...

The host is missing a critical security update according to Microsoft security bulletin, MS10-029. The update is required to fix address spoofing vulnerability. A flaw is present in the ISATAP Component, which fails to check the inner packet's IPv6 source address in a tunneled ISATAP packets. Successful exploitation could allow an attacker to to spoof an IPv4 address.

The host is missing a critical security update according to Microsoft security bulletin, MS10-073. The update is required to fix privilege escalation vulnerability. A flaw is present in the Win32k.sys in Kernel-Mode drivers in the Microsoft Windows, which fails to load keyboard layouts from disk or manage a window class data. Successful exploitation could allow a local attacker to gain privileges ...

The host is missing a critical security update according to Microsoft security bulletin, MS10-031. The update is required to fix remote code execution vulnerability. A flaw is present in the Microsoft Visual Basic for Applications, which fails to search for ActiveX Controls embedded in documents. Successful exploitation could allow an attacker to execute arbitrary code on the system.

The host is missing a Critical security update according to Microsoft security bulletin, MS11-046.. The update is required to fix a privilege escalation vulnerability. The flaw is present in the application, as it fails to validate input passed from the user mode to the kernel. Successful exploiation could allow an attacker to bypass access rights.

The host is missing a critical security update according to Microsoft security bulletin, MS10-080. The update is required to fix remote code execution vulnerabilities. Multiple flaws are present in the Microsoft Excel, which fails to validate Excel document with crafted record information. Successful exploitation could allow an attacker to execute arbitrary code on the system.

The host is missing a critical security update according to Microsoft security bulletin, MS10-090. The update is required to fix multiple vulnerabilities. Multiple flaws are present in the Internet Explorer, which fails to handle objects in memory and script. Successful exploitation could allow an attacker to execute arbitrary code and gain sensitive information on the affected software.


Pages:      Start    3    4    5    6    7    8    9    10    11    12    13    14    15    16    ..   201

© SecPod Technologies