Keyword: ms07047 windows media player 936782
96398 Total Search   |   Showing Results : 2641 - 2660
which is usually C:\Documents and Settings\{user name}\Local Settings\Application Data on Windows 2000, XP, and Server 2003, or C:\Users\{user name}\AppData\Local on Windows Vista and 7.. %Program Files%
Files%\Movie Maker\Shared\Sample2.jpg %Program Files%\Windows Media Player\npds.zip %Program Files%\Windows NT\Pinball\table.bmp %Windows%\Coffee Bean.bmp %Windows%\FeatherTexture.bmp %Windows%\Gone
run without admin privileges (Note: %AppDataLocal% is the Local Application Data folder, which is usually C:\Documents and Settings\{user name}\Local Settings\Application Data on Windows 2000(32-bit),
known as “Scorpion”, while another actor goes by the handle “Dekadent”. How do users encounter MEVADE malware? Users encounter the MEVADE malware via a fake Adobe Flash Player update (
folders: %User Profile%\Macromedia\Flash Player (Note: %User Profile% is the current user's profile folder, which is usually C:\Documents and Settings\{user name} on Windows 2000, XP, and Server 2003, or C:
Modifications This Trojan deletes the following folders: %User Profile%\Macromedia\Flash Player (Note: %User Profile% is the current user's profile folder, which is usually C:\Windows\Profiles\{user name} on
http://sjc1-te-cmsap1.sdi.trendnet.org/dumpImages/061201014454.jpeg How does this threat get into users' systems? Users received spammed messages purporting to come from Microsoft, telling them
CVE-2009-3103,MS09-050 Array index error in the SMBv2 protocol implementation in srv2.sys in Microsoft Windows Vista Gold, SP1, and SP2, Windows Server 2008 Gold and SP2, and Windows 7 RC allows
CVE-2008-5407 Multiple unspecified vulnerabilities in the Backup Exec remote-agent logon process in Symantec Backup Exec for Windows Servers 11.0 (aka 11d) builds 6235 and 7170, 12.0 build 1364, and
CVE-2010-0816,MS10-030 Integer overflow in inetcomm.dll in Microsoft Outlook Express 5.5 SP2, 6, and 6 SP1; Windows Live Mail on Windows XP SP2 and SP3, Windows Vista SP1 and SP2, Windows Server 2008
CVE-2010-1885,MS10-042 The MPC::HexToNum function in helpctr.exe in Microsoft Windows Help and Support Center in Windows XP and Windows Server 2003 does not properly handle malformed escape
msvidctl.dll in DirectShow, in Microsoft Windows 2000 SP4, XP SP2 and SP3, Server 2003 SP2, Vista Gold, SP1, and SP2, and Server 2008 Gold and SP2 allows remote attackers to execute arbitrary code via a crafted
CVE-2009-0119 Microsoft Windows is prone to a buffer-overflow vulnerability because of an issue when processing CHM files. Successfully exploiting this issue would allow attackers to corrupt memory
fonts. This can be exploited to crash an affected system. win32k.sys in Microsoft Windows Server 2003 SP2 allows remote attackers to cause a denial of service (system crash) by referencing a crafted .eot
CVE-2009-0389 Multiple insecure method vulnerabilities in the Web On Windows (WOW) ActiveX control in WOW ActiveX 2 allow remote attackers to (1) create and overwrite arbitrary files via the
CVE-2007-3028,MS07-039 The LDAP service in Windows Active Directory in Microsoft Windows 2000 Server SP4 does not properly check "the number of convertible attributes", which allows remote
CVE-2003-0352 cve: Buffer overflow in a certain DCOM interface for RPC in Microsoft Windows NT 4.0, 2000, XP, and Server 2003 allows remote attackers to execute arbitrary code via a malformed
CVE-2006-2372 Buffer overflow in the DHCP Client service for Microsoft Windows 2000 SP4, Windows XP SP1 and SP2, and Server 2003 up to SP1 allows remote attackers to execute arbitrary code via a
CVE-2006-4071 Sign extension vulnerability in the createBrushIndirect function in the GDI library (gdi32.dll) in Microsoft Windows XP, Server 2003, and possibly other versions, allows user-assisted
CVE-2007-3034,MS07-046 Integer overflow in the AttemptWrite function in Graphics Rendering Engine (GDI) on Microsoft Windows 2000 SP4, XP SP2, and Server 2003 SP1 allows remote attackers to execute