Search
Keyword: (ms10-061) vulnerability in print spooler service could allow remote code execution (2347290)
This security update addresses a vulnerability that could allow remote code
execution once a user opened a specially crafted email message via an affected
ver...
This security update addresses a vulnerability in Windows Server 2008 R2 when used as a shared failover cluster. More specifically, this vulnerability could allo...
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users.It takes advantage of software vulnerabilities in certain software to drop malicious files.
This update resolves a vulnerability in Microsoft Exchange Server, which could allow denial of service on the affected system. The vulnerability could be ex...
Microsoft addresses the following vulnerabilities in its March batch of patches:
(MS10-016) Vulnerability in Windows Movie Maker Could Allow Remote Code Execution (975561)
This security upda...
(MS10-084) Vulnerability in Windows Local Procedure Call Could Cause Elevation of Privilege (2360937)

This security update addresses a vulnerability in Microsoft Windows that could allow elevation of privilege if an attacker logs on to an affected sy...
The URL validation functionality in Microsoft Internet Explorer 5.01, 6, 6 SP1, 7 and 8, and the ShellExecute API function in Windows 2000 SP4, XP SP2 and SP3, and Server 2003 SP2, does not...
Microsoft Silverlight 3 before 3.0.50611.0 on Windows, and before 3.0.41130.0 on Mac OS X, does not properly handle pointers, which allows remote attackers to execute arbitrary code or ...
VBE6.DLL in Microsoft Office XP SP3, Office 2003 SP3, 2007 Microsoft Office System SP1 and SP2, Visual Basic for Applications (VBA), and VBA SDK 6.3 through 6.5 does not properly search for Ac...
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.It executes the dropped file(s). As a result, malicious routines of the dropped files are exhibited on the ...
This update resolves a vulnerability in the Routing and Remote Access NDProxy component of Microsoft Windows. An attacker with valid logon credentials ...
The Microsoft Data Analyzer ActiveX control (aka the Office Excel ActiveX control for Data Analysis) in max3activex.dll in Microsoft Windows 2000 SP4, Windows XP SP2 and SP3,...
This security update addresses 11 vulnerabilities in �Microsoft Office that could allow remote code execution if a user opens a specially crafted Word file.Once ...
Windows Shell in Microsoft Windows XP SP3, Server 2003 SP2, Vista SP1 and SP2, Server 2008 SP2 and R2, and Windows 7 allows local users or remote attackers to execute arbitrary code via a...
(MS10-097) Insecure Library Loading in Internet Connection Signup Wizard Could Allow Remote Code Execution (2443105)

This update resolves a vulnerability in the Internet Connection Signup Wizard of Microsoft Windows, which could allow remote code exe...
(MS10-059) Vulnerabilities in the Tracing Feature for Services Could Allow Elevation of Privilege (982799)

This security update addresses vulnerabilities in the the Tracing Feature for
Services that could allow increase in privilege once an attacker...
This security update resolves a privately reported vulnerability in
Cinepak Codec, which may allow remote code execution if a user opens a
specific media file or r...
It takes advantage of the vulnerabilities in Microsoft Office that could allow remote code execution (MS10-087). Once it successfully exploits the said vulnerability, it drops a file detected as TROJ_DROPR.VTG.Once a malware successfully exploits the...
This Trojan may be unknowingly downloaded by a user while visiting malicious websites.Once a malware successfully exploits the said vulnerability, it causes certain actions to be done on the system.
It takes advantage of vulnerabilities in Microsoft Office that could allow remote code execution (MS10-087). After successfully exploiting the said vulnerability, it drops a file detected as BKDR_AGENT.U.Upon execution, it opens a .DOC file in order ...