[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

249622

 
 

909

 
 

195549

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 4393 Download | Alert*

The host is missing an important security update according to Microsoft bulletin, MS15-028. The update is required to fix a security feature bypass vulnerability. A flaw is present in the Windows Task Scheduler, which fails to properly validate and enforce impersonation levels. Successful exploitation could allow attackers to bypass ACL checks and run privileged executables.

The host is missing an important security update according to Microsoft bulletin, MS15-034. The update is required to fix a remote code execution vulnerability. A flaw is present in the HTTP.sys, which improperly parses specially crafted HTTP requests. Successful exploitation could allow attackers to execute arbitrary code in the context of the System account.

The host is missing a critical security update according to Microsoft security bulletin, MS15-035. The update is required to fix a remote code execution vulnerability. A flaw is present in the application, which fails to process certain specially crafted Enhanced Metafile (EMF) image format files. Successful exploitation could allow attackers to execute arbitrary code.

The host is missing an important security update according to Microsoft bulletin, MS15-036. The update is required to fix a cross-site scripting vulnerability. A flaw is present in the applications, which fail to properly sanitize a specially crafted request. Successful exploitation allows attackers to perform cross-site scripting attacks on affected systems and run script in the security context ...

The host is missing an critical security update according to Microsoft security bulletin, MS15-045. The update is required to fix a remote code execution vulnerability. A flaw is present in the application, which fails to properly handle a crafted journal file. Successful exploitation allows attackers to execute an arbitrary code in the context of the current user.

The host is missing an important security update according to Microsoft bulletin MS15-086. The update is required to fix a cross site scripting vulnerability. A flaw are present in the application, which does improper validation of input. An attacker who successfully exploited this vulnerability could inject a client-side script into the user's browser. The script could spoof content, disclose inf ...

The host is missing an important security update according to Microsoft security bulletin, MS11-096. The update is required to fix remote code execution vulnerability. A flaw is present in Microsoft Office, which fails to handle a specially crafted Excel file. Successful exploitation could allow an attacker to gain the same user rights as the logged-on user.

The host is missing a critical security update according to Microsoft security bulletin, MS11-090. The update is required to fix remote code execution vulnerability. A flaw is present in Internet Explorer, which fails to handle a specially crafted web page. Successful exploitation could allow an attacker to gain administrative rights.

The host is missing an important security update according to Microsoft security bulletin, MS12-011. The update is required to fix elevation of privilege or information disclosure vulnerabilities. The flaws are present due to improper handling of URL containing malicious JavaScript elements. Successful exploitation could allow attackers to issue SharePoint commands in the context of the authentica ...

The host is missing an important security update according to Microsoft security bulletin, MS12-015. The update is required to fix remote code execution vulnerabilities. The flaws are present in the application, which fails to properly handle specially crafted Visio files. Successful exploitation allows attackers to take complete control of an affected system.


Pages:      Start    420    421    422    423    424    425    426    427    428    429    430    431    432    433    ..   439

© SecPod Technologies