[Forgot Password]
Login  Register Subscribe

30430

 
 

423868

 
 

247974

 
 

909

 
 

194654

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 2048 Download | Alert*

The host is missing a important security update according to Microsoft security bulletin, MS09-040. The update is required to fix privilege elevation vulnerability. The flaw is present in the Windows Message Queuing Service, which fails to handle a specially crafted request sent to MSMQ service. Successful exploitation allows local users to gain user privileges via a crafted request.

The host is missing an important security update according to Microsoft security bulletin, MS09-005. The update is required to fix remote code execution vulnerabilities. The flaws are present in the Microsoft Office Visio, which fails to handle a specially crafted Visio file. Successful exploitation allows an attacker to execute arbitrary code or take complete control of an affected system.

The host is missing a important security update according to Microsoft security bulletin, MS09-026. The update is required to fix privilege escalation vulnerability. A flaw is present in the Windows RPC. The RPC Marshalling Engine fails to update its internal state appropriately. Successful exploitation could allow an attacker to execute arbitrary code and take complete control of an affected syst ...

The host is missing a important security update according to Microsoft security bulletin, MS09-020. The update is required to fix privilege elevation vulnerabilities. The flaws are present in the Microsoft Internet Information Services, which fails to handle a specially crafted HTTP request. Successful exploitation allows local users to gain privileges via a crafted request.

The host is missing an important security update according to Microsoft security bulletin, MS09-030. The update is required to fix remote code execution vulnerability. A flaw is present in the Microsoft Office Publisher, which fails to handle a specially crafted Publisher file. Successful exploitation allows an attacker to execute arbitrary code or take complete control of an affected system.

The host is missing a critical security update according to Microsoft security bulletin, MS09-021. The update is required to fix remote code execution vulnerabilities. The flaws are present in the Microsoft Office Excel, which fails to handle a specially crafted Excel file that includes a malformed record object. Successful exploitation could allow an attacker to gain the user rights and take comp ...

The host is missing a moderate security update according to Microsoft security bulletin, MS09-023. The update is required to fix information disclosure vulnerability. A flaw is present in Windows Search, which fails to handle a specially crafted file from the search results. Successful exploitation could allow an attacker to preview a specially crafted file from the search results.

The host is missing an important security update according to Microsoft security bulletin, MS09-016. The update is required to fix denial of service vulnerabilities. The flaws are present in the Microsoft Internet Security and Acceleration (ISA) Server and Microsoft Forefront Threat Management Gateway (TMG), Medium Business Edition (MBE). The firewall engine fails to handle TCP state and HTTP form ...

The host is missing a cumulative security update according to Microsoft security bulletin, MS09-032. The update is required to fix remote code execution vulnerabilities. The flaws are present in the Microsoft Active Template Library (ATL) ActiveX Controls, which fails to handle a specially crafted Web page with Internet Explorer, instantiating the ActiveX control. Successful exploitation allows at ...

The host is missing an important security update according to Microsoft security bulletin, MS11-080. The update is required to fix privilege elevation vulnerability. A flaw is present in the Microsoft Windows Ancillary Function Driver (AFD), which fails to handle a specially crafted application. Successful exploitation allows an attackers to log on to a user's system, runs a specially crafted appl ...


Pages:      Start    139    140    141    142    143    144    145    146    147    148    149    150    151    152    ..   204

© SecPod Technologies