[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

249622

 
 

909

 
 

195521

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 26189 Download | Alert*

The host is installed with Vista SP2, Server 2008 SP2, Windows 7 SP1, Server 2008 R2 SP1, Server 2012, Windows 8.1, Server 2012 R2 or Windows 10 and is prone to an elevation of privilege vulnerability. A flaw is present in the Windows kernel, which fails to properly handle objects in memory. An attacker who successfully exploited this vulnerability could allow elevation of privilege if an attacker ...

The host is installed with Microsoft Windows 8.1, Windows 10, Server 2012 or 2012 R2 and is prone to a buffer overflow vulnerability. A flaw is present in the PDF library, which fails to properly handle application programming interface (API) calls. Successful exploitation allows attackers to execute arbitrary code.

The host is installed with Microsoft Windows 8.1, 10, Server 2012 or 2012 R2 and is prone to a remote code execution vulnerability. A flaw is present in the Microsoft Windows Reader, which fails to properly handle crafted file. Successful exploitation allows attackers to execute arbitrary code.

The host is installed with Vista SP2, Server 2008 SP2, Windows 7 SP1, Server 2008 R2 SP1, Server 2012, Windows 8.1, Server 2012 R2 or Windows 10 and is prone to remote code execution vulnerability. A flaw is present in the Windows, which fails validates input before loading dynamic link library (DLL) files. Successful exploitation could take control of an affected system and runs a specially craft ...

The host is installed with Vista SP2, Server 2008 SP2, Windows 7 SP1, Server 2008 R2 SP1, Server 2012, Windows 8.1, Server 2012 R2 or Windows 10 and is prone to a security bypass vulnerability. A flaw is present in the Windows, when Kerberos fails to check the password change of a user signing into a workstation. Successfully exploitation could allow to bypass Kerberos authentication on a target m ...

The host is installed with Microsoft Windows and is prone to remote code execution vulnerability. A flaw is present in the Microsoft Windows Media Parsing, which fails to handle specially crafted media content that is hosted on a website. Successful exploitation could allow attackers to take control of an affected system remotely.

The host is installed with Microsoft Windows and is prone to remote code execution vulnerability. A flaw is present in the Microsoft Windows Media Parsing, which fails to handle specially crafted media content that is hosted on a website. Successful exploitation could allow attackers to take control of an affected system remotely.

The host is installed with Microsoft Windows Server 2008, Server 2008 R2, Windows Vista, Windows 7, Server 2012, Server 2012 R2, Windows 8.1 or Windows 10 and is prone to a remote code execution vulnerability. A flaw is present in the Windows OLE, which fails to properly validate user input. Successful exploitation could allow attackers to execute malicious code.

The host is installed with Microsoft Windows Server 2008, Server 2008 R2, Windows Vista, Windows 7, Server 2012, Server 2012 R2, Windows 8.1 or Windows 10 and is prone to a remote code execution vulnerability. A flaw is present in the Windows OLE, which fails to properly validate user input. Successful exploitation could allow attackers to execute malicious code.

The host is installed with Microsoft Windows Server 2008, Server 2008 R2, Windows Vista, Windows 7, Server 2012, Server 2012 R2, Windows 8.1 or Windows 10 and is prone to an elevation of privilege vulnerability. A flaw is present in USB Mass Storage, which fails to properly validate objects in memory. Successful exploitation could allow attackers to run arbitrary code in kernel mode.


Pages:      Start    11    12    13    14    15    16    17    18    19    20    21    22    23    24    ..   2618

© SecPod Technologies