[Forgot Password]
Login  Register Subscribe

30480

 
 

423868

 
 

253390

 
 

909

 
 

197257

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 4262 Download | Alert*

The host is missing an important security update according to Microsoft security bulletin, MS15-014. The update is required to fix a security feature bypass vulnerability. A flaw is present in the group policy application of security configuration policies that could cause group policy settings on a targeted system to revert to their default, and potentially less secure, state. Successful exploita ...

The host is missing an important security update according to Microsoft bulletin, MS15-028. The update is required to fix a security feature bypass vulnerability. A flaw is present in the Windows Task Scheduler, which fails to properly validate and enforce impersonation levels. Successful exploitation could allow attackers to bypass ACL checks and run privileged executables.

The host is missing an important security update according to Microsoft bulletin, MS15-034. The update is required to fix a remote code execution vulnerability. A flaw is present in the HTTP.sys, which improperly parses specially crafted HTTP requests. Successful exploitation could allow attackers to execute arbitrary code in the context of the System account.

The host is missing an important security update according to Microsoft bulletin, MS15-036. The update is required to fix a cross-site scripting vulnerability. A flaw is present in the applications, which fail to properly sanitize a specially crafted request. Successful exploitation allows attackers to perform cross-site scripting attacks on affected systems and run script in the security context ...

The host is missing an important security update according to Microsoft security bulletin MS15-052. The update is required to fix a security feature bypass vulnerability. A flaw is present in the application, which fails to properly validate a memory address. An attacker who successfully exploited this vulnerability can then retrieve the base address of cng.sys from a compromised process.

The host is missing an critical security update according to Microsoft security bulletin, MS15-045. The update is required to fix a remote code execution vulnerability. A flaw is present in the application, which fails to properly handle a crafted journal file. Successful exploitation allows attackers to execute an arbitrary code in the context of the current user.

The host is missing an important security update according to Microsoft security bulletin, MS15-062. The update is required to fix an elevation of privilege vulnerability. A flaw is present in the application, which fails to properly handle crafted URLs. Successful exploitation could allow attackers to elevate privileges.

The host is missing an important security update according to Microsoft bulletin MS15-086. The update is required to fix a cross site scripting vulnerability. A flaw are present in the application, which does improper validation of input. An attacker who successfully exploited this vulnerability could inject a client-side script into the user's browser. The script could spoof content, disclose inf ...

The host is missing an important security update according to Microsoft security bulletin, MS11-096. The update is required to fix remote code execution vulnerability. A flaw is present in Microsoft Office, which fails to handle a specially crafted Excel file. Successful exploitation could allow an attacker to gain the same user rights as the logged-on user.

The host is missing an important security update according to Microsoft security bulletin, MS12-015. The update is required to fix remote code execution vulnerabilities. The flaws are present in the application, which fails to properly handle specially crafted Visio files. Successful exploitation allows attackers to take complete control of an affected system.


Pages:      Start    407    408    409    410    411    412    413    414    415    416    417    418    419    420    ..   426

© SecPod Technologies