Keyword: ms08020 vulnerability in dns client could allow spoofing 945553
29008 Total Search   |   Showing Results : 1 - 20
   Next  
(MS10-029) Vulnerability in Windows ISATAP Component Could Allow Spoofing (978338) This security update resolves one privately reported vulnerability in Microsoft Windows. This vulnerability could
Microsoft addresses the following vulnerabilities in its March batch of patches: (MS12-017) Vulnerability in DNS Server Could Allow Denial of Service (2647170) Risk Rating: Important This update
attacker registers a domain, create NAPTR DNS record and send a malicious NAPTR query to a particular DNS server. Read more here. (MS11-059) Vulnerability in Data Access Components Could Allow Remote Code
Internet Explorer that may lead to remote code execution. Users may encounter this by visiting compromised webpage. Read more here . (MS13-039) Vulnerability in HTTP.sys Could Allow Denial of Service
(MS11-019) Vulnerabilities in SMB Client Could Allow Remote Code Execution (2511455) Risk Rating: Critical This update resolves one publicly disclosed and one privately reported vulnerability in
could send a specially crafted request via RDP. CVE-2020-0652 - Microsoft Office Memory Corruption Vulnerability Risk Rating: Important This remote code execution vulnerability exists in the improper
vulnerability in Microsoft Windows that could allow information disclosure when successfully exploited by an attacker. (MS16-090) Security Update for Windows Kernel-Mode Drivers (3171481) Risk Rating: Important
This security update resolves a vulnerability in Microsoft Windows. The vulnerability could allow remote code execution if a user opens a specially crafted Journal file. (MS15-115) Security Update for
that loads a specially crafted library file. Read more here . (MS11-004) Vulnerability in Internet Information Services (IIS) FTP Service Could Allow Remote Code Execution (2489256) Risk Rating:
non-administrative user rights could be less affected than users with administrative rights. Read more here. (MS11-040) Vulnerability in Threat Management Gateway Firewall Client Could Allow Remote Code Execution
Microsoft addresses the following vulnerabilities in its February batch of patches: (MS10-003) Vulnerability in Microsoft Office (MSO) Could Allow Remote Code Execution (978214) Risk Rating: High
email message that takes them to the attacker's website, and then convince them to click the specially crafted URL. (MS15-027) Vulnerability in NETLOGON Could Allow Spoofing (3002657) Risk Rating:
(MS13-029) Vulnerability in Remote Desktop Client Could Allow Remote Code Execution (2828223) Risk Rating: Critical This security update addresses a reported vulnerability in Windows Remote Desktop Client
when an attacker on the same network as the victim spoofs responses to DNS and LDAP traffic initiated by the victim. (MS15-006) Vulnerability in Windows Error Reporting Could Allow Security Feature
CVE-2012-0006 This security update resolves a privately reported vulnerability in Microsoft Windows . The vulnerability could allow denial of service if a remote unauthenticated attacker sends a
Microsoft addresses several vulnerabilities in its June batch of patches: MS08-067 | Vulnerability in Server Service Could Allow Remote Code Execution (958644) Risk Rating: Critical This security
Address Remote Code Execution (3125540) Risk Rating: Critical This security update resolves a vulnerability in the VBScript scripting engine in Microsoft Windows. The vulnerability could allow remote code
via Internet Explorer. (MS14-066) Vulnerability in Schannel Could Allow Remote Code Execution (2992611) Risk Rating: Critical This security update addresses a vulnerability found existing in the
the same network directory as a specially crafted library file. Read more here . (MS11-017) Vulnerability in Remote Desktop Client Could Allow Remote Code Execution (2508062) Risk Rating: Important This
specially crafted application. Read more here . (MS13-102) Vulnerability in LRPC Client Could Allow Elevation of Privilege (2898715) Risk Rating: Important This security update resolves a privately reported