[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248392

 
 

909

 
 

195452

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 2212 Download | Alert*

The host is missing an important security update KB4011178

The host is missing an important security update KB4011196

The host is missing an important security update for KB4018308

The host is missing an important security update for KB4022142

The host is missing an important security update for KB4022137

The host is missing an important security update for KB4022135

The host is missing an important security update according to Microsoft bulletin, MS13-035. The update is required to fix elevation of privilege vulnerability. A flaw is present in the applications, which is caused by the way that HTML strings are sanitized. Successful exploitation allows attackers to perform cross-site scripting attacks on affected systems and run script in the security context o ...

The host is missing an important security update according to Microsoft bulletin, MS14-026. The update is required to fix multiple vulnerabilities. The flaw is present in the .NET Remoting implementation, which fails to handle a crafted website. Successful exploitation allows attacker to execute arbitrary code via vectors involving malformed objects.

The host is missing an important security update according to Microsoft security bulletin, MS14-032. The update is required to fix an information disclosure vulnerability. A flaw is present in the application, which fails to fails to properly sanitize specially crafted content. Successful exploitation could allow attackers to potentially execute scripts in the users browser to obtain information f ...

The host is missing an important security update according to Microsoft security bulletin, MS14-058. The update is required to fix multiple vulnerabilities. The flaws are present in the application, which fails to properly handle objects in memory and TrueType fonts. Successful exploitation could allow attackers to take complete control of the affected system and could then install programs; view, ...


Pages:      Start    203    204    205    206    207    208    209    210    211    212    213    214    215    216    ..   221

© SecPod Technologies