Search
Keyword: (ms10-061) vulnerability in print spooler service could allow remote code execution (2347290)
(MS10-052) Vulnerability in Microsoft MPEG Layer-3 Codecs Could Allow Remote Code Execution (2115168)

This security update addresses a privately reported vulnerability in Microsoft MPEG Layer-3 audio codecs.The vulnerability may allow remote code exe...
Microsoft Office Word 2002 SP3, 2003 SP3, and 2007 SP2; Microsoft Office 2004 and 2008 for Mac; Open XML File Format Converter for Mac; Office Word Viewer; and Office Compatibility Pack for Word...
Unspecified vulnerability in Microsoft Office Excel 2002 SP3, 2003 SP3, 2007 SP1 and SP2; Office 2004 for mac; Office 2008 for Mac; Open XML File Format Converter for Mac; Office Excel Viewer SP1 a...
The DNS implementation in smtpsvc.dll before 6.0.2600.5949 in Microsoft Windows 2000 SP4 and earlier, Windows XP SP3 and earlier, Windows Server 2003 SP2 and earlier, Windows Server 2008 SP2 and ea...
Unspecified vulnerability in Microsoft Office Excel 2002 SP3, 2003 SP3, 2007 SP1 and SP2; Office 2004 for mac; Office 2008 for Mac; Open XML File Format Converter for Mac; Office Excel V...
The WinVerifyTrust function in Authenticode Signature
Verification 5.1, 6.0, and 6.1 in Microsoft Windows 2000 SP4, Windows XP SP2 and
SP3, Windows Server 2003 SP2, Windows Vista Gold, SP1, and SP2,...
Once a malware successfully exploits the said vulnerability, it causes certain actions to be done on the system.
This security update addresses vulnerabilities in Internet Explorer (IE) that could allow remote code execution once a user views a specially crafted Web page using Internet Explor...
Integer overflow in inetcomm.dll in Microsoft Outlook Express 5.5
SP2, 6, and 6 SP1; Windows Live Mail on Windows XP SP2 and SP3, Windows Vista
SP1 and SP2, Windows Server 2008 Gold, S...
Microsoft Internet Explorer 6, 6 SP1, 7, and 8 does not properly handle objects in memory, which allows remote attackers to execute arbitrary code by accessing an object that (1) was not properly...
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users.However, due to errors in its code, it fails to perform its intended routine.
This Trojan may be dropped by other malware.
Microsoft Internet Explorer 6, 6 SP1, 7, and 8 does not properly handle objects in memory, which allows remote attackers to execute arbitrary code by accessing an object that (1) was ...
This security update resolves a total of seven vulnerabilities in Internet Explorer (IE). Of these vulnerabilities, the most severe flaws could allow remote users to remotely execu...
This Trojan arrives as attachment to mass-mailed email messages.It contains errors in its code. This stops it from performing its routines.
This Trojan may be hosted on a website and run when a user accesses the said website.As of this writing, the said sites are inaccessible.
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.However, due to errors in its code, it fails to perform its intended routine.
It takes advantage of the Use-after-free vulnerability in the Peer Objects component in Microsoft Internet Explorer to download possibly malicious files.This Trojan may be hosted on a website and run when a user accesses the said website.As of this ...
(MS10-060) Vulnerabilities in the Microsoft .NET Common Language Runtime and in Microsoft Silverlight Could Allow Remote Code Execution (2265906)

This security update addresses two vulnerabilities in Microsoft .NET
Framework and Microsoft Silverligh...
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It may be unknowingly downloaded by a user while visiting malicious websites.