Keyword: patch
1046 Total Search   |   Showing Results : 1 - 20
   Next  
Application drops the following files: %Application Data%\Adobe Activation Patch\Adobe Activation Patch 1.0.0\install\holder0.aiph %Application Data%\Adobe Activation Patch\Adobe Activation Patch 1.0.0\install
Rating: Critical This patch addresses a vulnerability found in Microsoft Windows, which could allow remote code execution when successfully exploited. Read more here. (MS13-002) Vulnerabilities in Microsoft
Microsoft addresses the following vulnerabilities in its November batch of patches: (MS12-071) Cumulative Security Update for Internet Explorer (2761451) Risk Rating: Critical This patch addresses
Microsoft addresses the following vulnerabilities in its December batch of patches: (MS12-077) Cumulative Security Update for Internet Explorer (2761465) Risk Rating: Critical This patch addresses
Microsoft addresses the following vulnerabilities in its May batch of patches: (MS13-037) Cumulative Security Update for Internet Explorer (2829530) Risk Rating: Critical This patch addresses eleven
Multiple cross-site scripting (XSS) vulnerabilities in Fuse Management Console in Red Hat JBoss Fuse 6.0.0 before patch 3 and JBoss A-MQ 6.0.0 before patch 3 allow remote attackers to inject
This hacking tool may be dropped by other malware. Arrival Details This hacking tool may be dropped by the following malware: WORM_PRASH.A NOTES: This hacking tool is a utility used to patch and
Vulnerability in Microsoft Works Could Allow Remote Code Execution (2754670) Risk Rating: Important This patch addresses a vulnerability affecting Microsoft Works that exists in Microsoft Works 9. Read more here.
CVE-2008-4830 Insecure method vulnerability in the KWEdit ActiveX control in SAP GUI 6.40 Patch 29 (KWEDIT.DLL 6400.1.1.41) and 7.10 Patch 5 (KWEDIT.DLL 7100.1.1.43) allows remote attackers to (1)
Microsoft addresses the following vulnerabilities in its February batch of patches: (MS13-009) Cumulative Security Update for Internet Explorer (2792100) Risk Rating: Critical This patch addresses
Microsoft addresses the following vulnerabilities in its March batch of patches: (MS13-021) Cumulative Security Update for Internet Explorer (2809289) Risk Rating: Critical This patch addresses
programs that generate and patch the following software: Internet Download Manager version 6.XX NOTES: This allows the use of the software without purchasing license and avoid product registration. Generate
CVE-2008-1365 Stack-based buffer overflow in Trend Micro OfficeScan Corporate Edition 8.0 Patch 2 build 1189 and earlier, and 7.3 Patch 3 build 1314 and earlier, allows remote attackers to execute
CVE-2007-4731 Stack-based buffer overflow in the TMregChange function in TMReg.dll in Trend Micro ServerProtect before 5.58 Security Patch 4 allows remote attackers to execute arbitrary code via a
CVE-2008-2439 Directory traversal vulnerability in the UpdateAgent function in TmListen.exe in the OfficeScanNT Listener service in the client in Trend Micro OfficeScan 7.3 Patch 4 build 1367 and
CVE-2008-3862 Stack-based buffer overflow in CGI programs in the server in Trend Micro OfficeScan 7.3 Patch 4 build 1367 and other builds before 1374, and 8.0 SP1 Patch 1 before build 3110, allows
Microsoft addresses the following vulnerabilities in its June batch of patches: (MS13-047) Cumulative Security Update for Internet Explorer (2838727) Risk Rating: Critical This patch addresses
CVE-2006-5784 Unspecified vulnerability in enserver.exe in SAP Web Application Server 6.40 before patch 136 and 7.00 before patch 66 allows remote attackers to read arbitrary files via crafted data
CVE-2008-1366 Trend Micro OfficeScan Corporate Edition 8.0 Patch 2 build 1189 and earlier, and 7.3 Patch 3 build 1314 and earlier, allows remote attackers to cause a denial of service (process
module used to intercept and patch revocation message from WeChat. It requires to be loaded by the WeChat application to perform its intended routine. Trojan.Win32.CredentialAccess(IKARUS