[Forgot Password]
Login  Register Subscribe

25354

 
 

132804

 
 

134729

 
 

909

 
 

109403

 
 

153

 
 
Paid content will be excluded from the download.

Filter
Matches : 27 Download | Alert*

The host is missing an important security update according to Microsoft security bulletin, MS15-082. The update is required to fix multiple remote code execution vulnerabilities. The flaws are present in the application, which fails to properly validate certificates during authentication. Successful exploitation could allow attackers to impersonate the client session.

The host is missing an important security update according to Microsoft security bulletin, MS15-100. The update is required to fix a remote code execution vulnerability. A flaw is present in the application, which fails to handle a specially crafted Media Center link (.mcl) file that references malicious code. An attacker who successfully exploited this vulnerability could gain the same user right ...

The host is missing an important security update according to Microsoft security bulletin, MS15-134. The update is required to fix multiple remote code execution vulnerabilities. The flaws are present in the application, which fails to handle a specially crafted Media Center link (.mcl) file that references malicious code. An attacker who successfully exploited this vulnerability could take comple ...

The host is missing an important security update according to Microsoft advisory, 2974294. The update is required to fix a denial of service vulnerability. A flaw is present in the mpengine.dll, which fails to handle a crafted file. Successful exploitation allows attackers to cause a denial of service (system hang).

The host is missing an important security update according to Microsoft security bulletin, MS16-059. The update is required to fix a remote code execution vulnerability. A flaw is present in the application, which fails to handle a specially crafted Media Center link (.mcl) file that references malicious code. Successful exploitation could allow attackers to take complete control of the affected s ...

The host is missing a critical security update according to Microsoft security bulletin, MS14-043. The update is required to fix an use after free vulnerability. A flaw is present in the application, which fails to specially crafted Microsoft Office file that invokes Windows Media Center resources. Successful exploitation could allow attackers to gain the same user rights as the current user.

The host is missing a moderate security update according to Microsoft security bulletin, MS15-004. The update is required to fix a directory traversal elevation of privilege vulnerability. A flaw is present in the TS WebProxy Windows component, which fails to properly sanitize file paths. Successful exploitation could allow attackers to gain the same user rights as the current user.

The host is missing a Critical security update according to Microsoft security bulletin, MS11-015. The update is required to fix remote code execution vulnerability in Microsoft Windows Media Player/Windows Media Center and DirectShow. A flaw is present in the application which fails to handle a specially crafted Microsoft Digital Video Recording (.dvr-ms) file. Successful exploitation allows remo ...

The host is missing an important security update according to Microsoft security bulletin, MS11-001. The update is required to fix untrusted search path vulnerability in Microsoft Windows. A flaw is present in the Windows Backup Manager which passes an insufficiently qualified path when loading an external library. Successful exploitation allows remote attackers to to execute arbitrary code.

The host is missing a critical security update according to Microsoft security bulletin, MS10-083. The update is required to fix remote code execution vulnerability. A flaw is present in the Windows Shell and WordPad in Microsoft Windows, which fails to validate COM objects during instantiation. Successful exploitation could allow an attacker to execute arbitrary code.


Pages:      Start    1    2    ..   2

© SecPod Technologies