[Forgot Password]
Login  Register Subscribe

30481

 
 

423868

 
 

256148

 
 

909

 
 

199106

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 4435 Download | Alert*

The host is missing an Important security update according to Microsoft security bulletin, MS11-008. The update is required to fix remote code execution vulnerability in Microsoft Visio. The flaws are present in the application, which fails to validate objects in memory and fail to parse certain structures when handling specially crafted Visio files. Successful exploitation will allow attackers to ...

The host is missing an Important security update according to Microsoft security bulletin, MS11-009. The update is required to fix information disclosure vulnerability in JScript and VBScript scripting engines. A flaw is present in the JScript and VBScript scripting engines, which fails to properly load decoded scripts obtained from web pages. Successful exploitation could allow remote attackers t ...

The host is missing an important security update according to Microsoft security bulletin, MS11-045. The update is required to fix multiple vulnerabilities. The flaws are present in the applications, which fail to handle a specially crafted Excel file. Successful exploitation allows remote attacker to take complete control of the affected system.

The host is missing a Critical security update according to Microsoft security bulletin, MS11-048. The update is required to fix denial of service vulnerability. A flaw is present in SMB protocol software, which fails to handle crafted SMB requests. Successful exploitation could cause a user's system to stop responding until manually restarted.

The host is missing a critical security update according to Microsoft security bulletin, MS10-051. The update is required to fix a remote code execution vulnerability. The flaws are present in the Microsoft XML Core Services (MSXML) which fails to handle HTTP responses. Successful exploitation allows an attacker to gain sensitive information such as same user rights as the logged-on user.

The host is missing an important security update according to Microsoft security bulletin, MS10-105. The update is required to fix denial of service vulnerability. Multiple flaws are caused due to errors in processing CGM, PICT, TIFF, FlashPix image files. Successful exploitation could allows an attacker to cause buffer and integer overflows and memory corruption on affected software.

The host is missing a critical security update according to Microsoft security bulletin, MS10-103. The update is required to fix remote code execution vulnerability. A flaw is present in Microsoft Publisher, which fails to handle crafted Publisher file that uses an old file format. Successful exploitation could allow an attacker to cause a denial of service condition.

The host is missing a critical security update according to Microsoft security bulletin, MS10-095. The update is required to fix remote code execution vulnerability. A flaw is present in Microsoft Windows, which fails to load a BranchCache DLL library. Successful exploitation could allow a local attacker to execute arbitrary code via '.eml', '.rss' or '.wpost' file.

The host is missing a critical security update according to Microsoft security bulletin, MS10-088. The update is required to fix multiple buffer overflow vulnerabilities. Multiple flaws are present in PP7X32.DLL in Microsoft PowerPoint, which fails to validate crafted PowerPoint document. Successful exploitation could allow an attacker to execute arbitrary code or cause the application to crash on ...

The host is missing a critical security update according to Microsoft security bulletin, MS10-043. The update is required to fix integer overflow vulnerability. A flaw is present in the Canonical Display Driver (cdd.dll), which fails to parse information copied from user mode to kernel mode properly. Successful exploitation allows an attacker to execute code and restart the system.


Pages:      Start    395    396    397    398    399    400    401    402    403    404    405    406    407    408    ..   443

© SecPod Technologies