[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

250770

 
 

909

 
 

196157

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 4540 Download | Alert*

The host is missing an important security update according to Microsoft security bulletin, MS15-039. The update is required to fix a same origin policy SFB vulnerability. A flaw is present in the application, which fails to handle crafted data. Successful exploitation could allow attackers to access sensitive user information, such as username or password and files on the hard drive.

The host is missing an important security update according to Microsoft security bulletin, MS15-038. The update is required to fix an elevation of privilege vulnerabilities. The flaws are present in the application, which fails to properly validate and enforce impersonation levels. Successful exploitation could allow attackers to bypass impersonation-level security checks and gain elevated privile ...

The host is missing an important security update according to Microsoft security bulletin, MS15-050. The update is required to fix an elevation of privilege vulnerability. A flaw is present in the application, which improperly verifies impersonation levels. Successful exploitation could allow attackers to gain elevated privileges and make calls to SCM for which they lack sufficient privilege.

The host is missing an important security update according to Microsoft security bulletin, MS15-076. The update is required to fix a RPC elevation of privilege vulnerability. A flaw is present in the application, which inadvertently allows DCE/RPC connection reflection. An attacker who successfully exploited this vulnerability could take complete control of the affected system. An attacker could t ...

The host is missing an important security update according to Microsoft security bulletin, MS15-077. The update is required to fix a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle objects in memory. An attacker who successfully exploited this vulnerability could execute arbitrary code and take complete control of an affected system.

The host is missing an important security update according to Microsoft security bulletin, MS15-072. The update is required to fix an elevation of privilege vulnerability. A flaw is present in the application, which fails to process certain specially crafted bitmap conversions. Successful exploitation could allow attackers to install programs; view, change, or delete data; or create new accounts w ...

The host is missing an important security update according to Microsoft bulletin, MS15-090. The update is required to fix multiple vulnerabilities. The flaws are present in the application, which fails to handle a specially crafted application. An attacker who successfully exploited this vulnerability could escape the sandbox.

The host is missing a critical security update according to Microsoft security bulletin, MS16-041. The update is required to fix a remote code execution vulnerability. A flaw is present in the application, which fails to properly validate input before loading libraries. An attacker who successfully exploited this vulnerability could take control of an affected system.

The host is missing an important security update according to Microsoft bulletin, MS11-088. The update is required to fix a privilege escalation vulnerability. A flaw is present in the application, which fails to properly set configuration options. Successful exploitation could allow attackers to execute arbitrary code.

The host is missing an important security update according to Microsoft security bulletin, MS11-098. The update is required to fix a privilege escalation vulnerability. A flaw is present in the applications, which fail to properly handle the way the kernel accesses an object that has not been correctly initialized. Successful exploitation could allow attackers to run arbitrary code in kernel mode.


Pages:      Start    423    424    425    426    427    428    429    430    431    432    433    434    435    436    ..   453

© SecPod Technologies