[Forgot Password]
Login  Register Subscribe

30480

 
 

423868

 
 

253164

 
 

909

 
 

197077

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 2333 Download | Alert*

The host is missing an important security update according to Microsoft security bulletin, MS10-105. The update is required to fix denial of service vulnerability. Multiple flaws are caused due to errors in processing CGM, PICT, TIFF, FlashPix image files. Successful exploitation could allows an attacker to cause buffer and integer overflows and memory corruption on affected software.

The host is missing a critical security update according to Microsoft security bulletin, MS10-103. The update is required to fix remote code execution vulnerability. A flaw is present in Microsoft Publisher, which fails to handle crafted Publisher file that uses an old file format. Successful exploitation could allow an attacker to cause a denial of service condition.

The host is missing a critical security update according to Microsoft security bulletin, MS10-088. The update is required to fix multiple buffer overflow vulnerabilities. Multiple flaws are present in PP7X32.DLL in Microsoft PowerPoint, which fails to validate crafted PowerPoint document. Successful exploitation could allow an attacker to execute arbitrary code or cause the application to crash on ...

The host is missing a critical security update according to Microsoft security bulletin, MS10-044. The update is required to fix remote code execution vulnerabilities. Flaws are present in the Microsoft Office Access ActiveX Controls, which fails to validate a specially crafted Office file. Successful exploitation allows an attacker to gain sensitive information such as same user rights as the log ...

The host is missing a critical security update according to Microsoft security bulletin, MS10-087. The update is required to fix multiple remote code execution vulnerabilities. Flaws are in Microsoft Office, which fails to validate crafted RTF data, msofbtSp records and unspecified flags. Successful exploitation could allow an attacker to execute arbitrary code via an Office document.

The host is missing an important security update according to Microsoft security bulletin, MS10-045. The update is required to fix remote code execution vulnerability. A flaw is present in the Microsoft Office Outlook, which fails to verify attachments in a specially crafted e-mail message. Successful exploitation allows an attacker to gain sensitive information such as same user rights as the log ...

The host is missing a critical security update according to Microsoft security bulletin, MS10-083. The update is required to fix remote code execution vulnerability. A flaw is present in the Windows Shell and WordPad in Microsoft Windows, which fails to validate COM objects during instantiation. Successful exploitation could allow an attacker to execute arbitrary code.

The host is missing a critical security update according to Microsoft security bulletin, MS11-053. The update is required to fix a remote code execution vulnerability. A flaw is present in in the Windows Bluetooth 2.1 Stack due to the way an object in memory is accessed when it has not been correctly initialized or has been deleted. Successful exploitation could allow an attacker to execute arbitr ...

The host is missing an Important security update according to Microsoft security bulletin, MS11-055. The update is required to fix remote code execution vulnerability in Microsoft Visio 2003. A flaw is present in the application which can be triggered while opening legitimate Visio file that is located in the same network directory as a specially crafted library file. Successful exploitation allow ...

The host is missing a critical security update according to Microsoft security bulletin, MS10-031. The update is required to fix remote code execution vulnerability. A flaw is present in the Microsoft Visual Basic for Applications, which fails to search for ActiveX Controls embedded in documents. Successful exploitation could allow an attacker to execute arbitrary code on the system.


Pages:      Start    194    195    196    197    198    199    200    201    202    203    204    205    206    207    ..   233

© SecPod Technologies