Search
Keyword: (ms09-012) vulnerabilities in windows could allow elevation of privilege (959454)
The Microsoft Office Web Components Spreadsheet ActiveX control (aka OWC10 or OWC11), as distributed in Office XP SP3 and Office 2003 SP3, Office XP Web Components SP3,...
�Microsoft Office PowerPoint 2000 SP3, 2002 SP3, 2003 SP3, and 2007 SP1 and SP2; PowerPoint Viewer 2003 and 2007 SP1 and SP2; PowerPoint in Microsoft Office 2004 for Mac and 2008 for Mac; Open XML ...
Windows 2000, XP, Server 2003
Other DetailsMore information on this vulnerability can be found below: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0557It does the following: This trojan takes advantage of a vulnerability in ...
* indicates a new version of an existing ruleDeep Packet Inspection Rules:H2 Database1011316* - H2 Database Remote Code Execution Vulnerability (CVE-2022-23221)Web Application PHP Based1011319 - WordPress '404 to 301' Plugin Bl...
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
This security update resolves two privately reported vulnerabilities in Microsoft Remote Desktop Connection which could allow remote code execution if ...
GDI in Microsoft Office XP SP3 does not properly handle
malformed objects in Office Art Property Tables, which allows remote attackers
to execute arbitrary code via a crafted Office...
Integer overflow in Excel in Microsoft Office 2000 SP3, Office XP SP3, Office 2003 SP3, and Office 2004 and 2008 for Mac; Excel in 2007 Microsoft Office System SP1 and SP2; Open XML F...
Microsoft addresses the following vulnerabilities in its February batch of patches:
(MS16-009) Cumulative Security Update for Internet Explorer (3134220)
Risk Rating: Critical
This security ...
This backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
Integer overflow in GDI+ in Microsoft Internet Explorer 6 SP1, Windows XP SP2 and SP3, Office XP SP3, Office 2003 SP3, 2007 Microsoft Office System SP1 and SP2, Office Project 2002 SP1, Visio 2002 SP2, Office W...
It takes advantage of the Excel Featheader Record Memory Corruption Vulnerability.This Trojan may be dropped by other malware. It may be unknowingly downloaded by a user while visiting malicious websites.It executes the dropped file(s). As a result,...
Microsoft Internet Explorer is prone to a security-bypass vulnerability because it fails to properly validate the domain name in a signed CA certificate...
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users.It takes advantage of certain vulnerabilities.
* indicates a new version of an existing ruleDeep Packet Inspection Rules:DCERPC Services1000735* - Microsoft Windows Server Service Remote Code ExecutionDNS Server1000167* - Snort Back Orifice Pre-Processor Buffer Overflow...
* indicates a new version of an existing ruleDeep Packet Inspection Rules:DCERPC Services1009579 - Microsoft Windows SMB Information Disclosure Vulnerability (CVE-2019-0703)Web Application Common1009540 - Red Hat Ceph Storage ...
Microsoft addresses the following vulnerabilities in its February batch of patches:
(MS11-003) Cumulative Security Update for Internet Explorer (2482017)
Risk Rating: Critical
This security update a...
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.It executes the dropped file(s). As a result, malicious routines of the dropped files are exhibited on the ...
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users.
This Trojan takes advantage of the following software vulnerability to drop malicious files: CVE-2009-3129This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users.