[Forgot Password]
Login  Register Subscribe

24547

 
 

132763

 
 

123799

 
 

909

 
 

102620

 
 

150

 
 
Paid content will be excluded from the download.

Filter
Matches : 96352 Download | Alert*

The host is missing an important security update for KB4503276

The host is missing an important security update for KB4503273

The host is missing an important security update for KB4503269

The host is missing an important security update for KB4503267

The host is missing an important security update for KB4503263

The host is missing a critical security update according to Microsoft advisory, ADV190015. The update is required to fix a use-after-free vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation could allow attackers to execute arbitrary code in the context of the current user.

The host is installed with Adobe Flash Player before 32.0.0.207 or flash plugin for IE10, IE 11 or Microsoft Edge and is prone to a use-after-free vulnerability. A flaw is present in the applications, which fail to handle unspecified vectors. Successful exploitation could allow attackers to execute arbitrary code.

The host is missing a critical update according to Adobe advisory, APSB19-30. The update is required to fix a use-after-free vulnerability. A flaw is present in the application, which fails to properly handle unknown vectors. Successful exploitation could lead to arbitrary code execution in the context of the current user.

An elevation of privilege vulnerability exists in the way the Task Scheduler Service validates certain file operations. An attacker who successfully exploited the vulnerability could gain elevated privileges on a victim system.To exploit the vulnerability, an attacker would require unprivileged code execution on a victim system.The security update addresses the vulnerability by correctly validatin ...

An elevation of privilege vulnerability exists when the Windows kernel fails to properly handle objects in memory. An attacker who successfully exploited this vulnerability could run arbitrary code in kernel mode. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.To exploit this vulnerability, an attacker would first have to log on ...


Pages:      Start    2    3    4    5    6    7    8    9    10    11    12    13    14    15    ..   9635

© SecPod Technologies