[Forgot Password]
Login  Register Subscribe

26408

 
 

132812

 
 

151352

 
 

909

 
 

120842

 
 

163

 
 
Paid content will be excluded from the download.

Filter
Matches : 24 Download | Alert*

The host is missing an important security update according to Microsoft advisory, 2846338. The update is required to fix a remote code execution vulnerability. A flaw is present in the mpengine.dll, which fails to handle a crafted file. Successful exploitation allows attackers to execute arbitrary code in the security context of the LocalSystem account and take complete control of the system.

The update addresses a vulnerability that could allow remote code execution if the Microsoft Malware Protection Engine scans a specially crafted file. An attacker who successfully exploited this vulnerability could execute arbitrary code in the security context of the LocalSystem account and take control of the system.

ADV180003 : Microsoft has released an update for Microsoft Office that provides enhanced security as a defense-in-depth measure.

The host is missing an important security update according to Microsoft advisory, 2974294. The update is required to fix a denial of service vulnerability. A flaw is present in the mpengine.dll, which fails to handle a crafted file. Successful exploitation allows attackers to cause a denial of service (system hang).

The host is missing an important security update according to Microsoft security bulletin, MS08-029. The update is required to fix denial of service vulnerabilities. The flaws are present due to specially crafted file that could allow denial of service when received by the target computer system and scanned by the Microsoft Malware Protection Engine. Successful exploitation could cause the Microso ...

The host is missing a security update according to Mozilla advisory, MFSA 2012-89. The update is required to fix a security bypass vulnerability. The flaws are present in the applications, which fail to properly handle access to the Location object. Successful exploitation could allow attackers to execute arbitrary code.

Security researcher Mariusz Mlynski reported that it is possible to compile a user-defined function in the XBL scope of a specific element and then trigger an event within this scope to run code. In some circumstances, when this code is run, it can access content protected by SystemOnly Wrappers (SOW) and chrome-privileged pages. This could potentially lead to arbitrary code execution. Additional ...

Mozilla security researcher moz_bug_r_a4 reported that XrayWrappers can be bypassed to call content-defined toString and valueOf methods through DefaultValue . This can lead to unexpected behavior when privileged code acts on the incorrect values.

The host is missing a security update according to Mozilla advisory, MFSA 2013-91. The update is required to fix a security bypass vulnerability. A flaw is present in the applications, which fail to properly identify the "this" object during use of user-defined getter methods on DOM proxies. Successful exploitation could allow attackers to bypass intended access restrictions.

The host is missing a security update according to Mozilla advisory, MFSA 2013-92. The update is required to fix an use-after-free vulnerability. A flaw is present in the applications, which fail to handle crafted data. Successful exploitation could allow attackers to execute arbitrary code by leveraging incorrect garbage collection in situations involving default compartments and frame-chain rest ...


Pages:      Start    1    2    ..   2

© SecPod Technologies