[Forgot Password]
Login  Register Subscribe

24128

 
 

131615

 
 

114563

 
 

909

 
 

88860

 
 

136

 
 
Paid content will be excluded from the download.

Filter
Matches : 27 Download | Alert*

The host is missing a critical security update according to Microsoft bulletin MS12-004. The update is required to fix remote code execution vulnerability. A flaw is present in the application, which fails to handle a specially crafted media files. Successful exploitation allows attackers to run arbitrary code in the context of the current user.

The host is missing an important security update according to Microsoft security bulletin, MS16-059. The update is required to fix a remote code execution vulnerability. A flaw is present in the application, which fails to handle a specially crafted Media Center link (.mcl) file that references malicious code. Successful exploitation could allow attackers to take complete control of the affected s ...

The host is missing an important security update according to Microsoft security bulletin, MS08-048. The update is required to fix information disclosure vulnerability. A flaw is present in Outlook Express and Windows Mail, which fails handle a specially crafted Web page. Successful exploitation could allow an attacker to read data from another Internet Explorer domain or the local computer.

The host is missing a critical security update according to Microsoft security bulletin, MS10-039. The update is required to fix privilege escalation vulnerabilities. Flaws are present in the Microsoft SharePoint server and Office InfoPath, which fails to validate specially crafted requests. Successful exploitation could allow an attacker to gain sensitive information or execute arbitrary code wit ...

The host is missing a critical security update according to Microsoft security bulletin, MS10-083. The update is required to fix remote code execution vulnerability. A flaw is present in the Windows Shell and WordPad in Microsoft Windows, which fails to validate COM objects during instantiation. Successful exploitation could allow an attacker to execute arbitrary code.

The host is missing an important security update according to Microsoft security bulletin, MS15-134. The update is required to fix multiple remote code execution vulnerabilities. The flaws are present in the application, which fails to handle a specially crafted Media Center link (.mcl) file that references malicious code. An attacker who successfully exploited this vulnerability could take comple ...

The host is missing a Critical security update according to Microsoft security bulletin, MS11-015. The update is required to fix remote code execution vulnerability in Microsoft Windows Media Player/Windows Media Center and DirectShow. A flaw is present in the application which fails to handle a specially crafted Microsoft Digital Video Recording (.dvr-ms) file. Successful exploitation allows remo ...

The host is missing an important security update according to Microsoft security bulletin, MS15-100. The update is required to fix a remote code execution vulnerability. A flaw is present in the application, which fails to handle a specially crafted Media Center link (.mcl) file that references malicious code. An attacker who successfully exploited this vulnerability could gain the same user right ...

The host is missing an important security update according to Microsoft security bulletin, MS08-050. The update is required to fix information disclosure vulnerability. A flaw is present in the Windows Messenger, which fails handle scripting of an ActiveX control . Successful exploitation could allow an attacker to change state, get contact information, and initiate audio and video chat sessions w ...

The host is missing an important security update according to Microsoft security bulletin, MS15-082. The update is required to fix multiple remote code execution vulnerabilities. The flaws are present in the application, which fails to properly validate certificates during authentication. Successful exploitation could allow attackers to impersonate the client session.


Pages:      Start    1    2    ..   2

© SecPod Technologies