Keyword: patch
1051 Total Search   |   Showing Results : 81 - 100
should run SSI certificates update procedure. This procedure is quite simple. All you have to do is click the link provided, to save the patch file and then run it from your computer location. That's all.
rule is same for both vulnerabilities CVE-2006-3738 & CVE-2007-5135 due to same vulnerable condition. Hence you may see over recommendation of this vulnerability when there is no patch detected for
CVE-2013-0075 This patch addresses a vulnerability found in Microsoft Windows, which could allow denial of service if a remote attacker sends a specially crafted connection termination packet to
Exploit-CVE2015-2426 (McAfee), Exp.CVE-2015-2426.A (Symantec) Hacking Team Leak Uncovers Another Windows Zero-Day, Fixed In Out-Of-Band Patch Downloaded from the Internet
may leverage this vulnerability. Adobe will release an emergency patch to address the said vulnerability. Adobe Flash Player Extended Support Release 18.0.0.333 and earlier,Adobe Flash Player for Google
CVE-2012-1527,CVE-2012-1528 This patch addresses vulnerabilities in Microsoft Windows, which could allow remote code execution via a specially crafted briefcase in Windows Explorer. When exploited,
SizerOne 8.0.20081.140, as used in ComponentOne Studio for ActiveX 2008, TSC2 Help Desk 4.1.8, SAP GUI 6.40 Patch 29 and 7.10, and possibly other products, allow remote attackers to execute arbitrary code by
CVE-2007-4743 The original patch for CVE-2007-3999 in svc_auth_gss.c in the RPCSEC_GSS RPC library in MIT Kerberos 5 (krb5) 1.4 through 1.6.2, as used by the Kerberos administration daemon (kadmind)
This patch addresses 30 vulnerabilities found in Microsoft Windows, which can result to elevation of privilege once a remote attacker logs on the affected system and execute a specially crafted
CVE-2013-0030 This patch addresses a vulnerability found in Microsoft implementation of Vector Markup Language (VML). It can allow remote code execution once users view a webpage via Internet
CVE-2013-1285,CVE-2013-1286,CVE-2013-1287 This patch addresses the vulnerabilities found in Microsoft Windows. These vulnerabilities when exploited can allow elevation of privilege once attacker
CVE-2012-2531,CVE-2012-2532 This patch addresses two vulnerabilities affecting Microsoft Internet Information Services (IIS). When exploited via a specially crafted FTP commands to a certain server,
CVE-2012-2556,CVE-2012-4786 This patch addresses two vulnerabilities in Microsoft Windows that when exploited could result to remote code execution. It can be exploited via a specially crafted
CVE-2012-1537 This patch addresses a vulnerability in Microsoft Windows, which could allow remote code execution thus compromising the security of the infected system. Remote attackers can exploit
run the “patch” module, which hooks the methods from known ad SDKs to its own implementation. It exploits a series of ‘Bundle’ vulnerabilities to install applications without the victim knowing. The 'AD
Application does the following: It is used to patch the following software: Cyberlink Power DVD Ultra 3D 13.0.27520.57 Retail HackTool:Win32/Patch.S(MICROSOFT); Riskware/GamePatcher(FORTINET)
Installation This Spyware creates the following folders: %System Root%\patch %User Profile%\Application Data\com6.{00C6D95F-329C-409a-81D7-C46C66EA7F33} (Note: %System Root% is the Windows root folder, where it
capabilities. More information on this vulnerability is available at the Microsoft Security Bulletin article, Patch Available for 'Microsoft VM ActiveX Component' Vulnerability . Modifies the default Internet
“Sandworm” October 2014 Patch Tuesday Fixes Sandworm Vulnerability MS Zero-Day Used in Attacks Against European Sectors, Industries Sandworm to Blacken: The SCADA Connection Downloaded from the Internet
CVE-2013-0015,CVE-2013-0018,CVE-2013-0019,CVE-2013-0020,CVE-2013-0021,CVE-2013-0022,CVE-2013-0023,CVE-2013-0024,CVE-2013-0025,CVE-2013-0026,CVE-2013-0027,CVE-2013-0028,CVE-2013-0029 This patch