Keyword: (ms09-012) vulnerabilities in windows could allow elevation of privilege (959454)
151 Total Search   |   Showing Results : 1 - 20
   Next  
Microsoft addresses the following vulnerabilities in its March batch of patches: (MS14-012) Cumulative Security Update for Internet Explorer (2925418)Risk Rating: Critical This security update...
Microsoft addresses the following vulnerabilities in its April batch of patches: (MS11-018) Cumulative Security Update for Internet Explorer (2497640) Risk Rating: CriticalThis update resolves f...
Microsoft addresses the following vulnerabilities in its May batch of patches: (MS12-029) Vulnerability in Microsoft Word Could Allow Remote Code Execution (2680352) Risk Rating: Critical A vulner...
The Active Template Library (ATL) in Microsoft Visual Studio .NET 2003 SP1, Visual Studio 2005 SP1 and 2008 Gold and SP1, and Visual C++ 2005 SP1 and 2008 Gold and SP1; and Windows 2000 SP4, XP SP2 and SP3,...
Microsoft addressed the following vulnerabilities in its December batch of patches: (MS09-071) Vulnerabilities in Internet Authentication Service Could Allow Remote Code Execution (974318) ...
The Active Template Library (ATL) in Microsoft Visual Studio .NET 2003 SP1, Visual Studio 2005 SP1 and 2008 Gold, and Visual C++ 2005 SP1 and 2008 Gold and SP1; and Windows 2000 SP4, XP SP2 and SP3, Serve...
The Active Template Library (ATL) in Microsoft Visual Studio .NET 2003 SP1, Visual Studio 2005 SP1 and 2008 Gold, and Visual C++ 2005 SP1 and 2008 Gold and SP1; and Windows 2000 SP4, XP SP2 and SP3, Server 2003 ...
This update resolves three reported vulnerabilities in Server Message Block Version 2 (SMBv2) -- one publicly disclosed and two in private. Successful exploitation of the ...
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
This security update addresses vulnerabilities in Microsoft Windows, which could allow elevation of privilege if an attacker logged on locally and ...
This security update addresses two vulnerabilities in the Windows Internet Name Service (WINS). WINS is not installed on any affected operating system by default. Only user...
Stack-based buffer overflow in the CComVariant::ReadFromStream function in the Active Template Library (ATL), as used in the MPEG2TuneRequest ActiveX control in msvidctl....
This Trojan executes the dropped file(s). As a result, malicious routines of the dropped files are exhibited on the affected system.
The Active Template Library (ATL) in Microsoft Windows 2000 SP4, XP SP2 and SP3, Server 2003 SP2, Vista Gold, SP1, and SP2, and Server 2008 Gold and SP2 allows remote attackers to execute arbitrary co...
Stack-based buffer overflow in the CComVariant::ReadFromStream function in the Active Template Library (ATL), as used in the MPEG2TuneRequest ActiveX control in msvidctl.dll in DirectShow, in Microsoft Wi...
The WINS server in Microsoft Windows 2000 SP4 and Server 2003 SP1 and SP2 does not restrict registration of the (1) "wpad" and (2) "isatap" NetBIOS names, which allows remote authenticated users to hijack t...
This update addresses vulnerabilities found in FTP Service in Microsoft Internet Information Services (IIS) 5.0, Microsoft Internet...
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users.It executes the dropped file(s). As a result, malicious routines of the dropped files are exhibited on the affected system.
This patch addresses vulnerabilities found in Microsoft Exchange Server. One of the vulnerabilities, which exists in Microsoft Exchange Server WebRead...
* indicates a new version of an existing ruleDeep Packet Inspection Rules:Web Server Miscellaneous1010670* - Apache Struts2 Remote Code Execution Vulnerability (CVE-2020-17530)Integrity Monitoring Rules:There are no new or upd...