Keyword: (ms10-073) vulnerabilities in windows kernel-mode drivers could allow elevation of privilege (981957)
276 Total Search   |   Showing Results : 21 - 40
This patch addresses two vulnerabilities affecting Microsoft Internet Information Services (IIS). When exploited via a specially ...
This spyware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
Microsoft addresses the following vulnerabilities in its September batch of patches: (MS11-070) Vulnerability in WINS Could Allow Elevation of Privilege (2571621) Risk Rating: Important Th...
Untrusted search path vulnerability in Microsoft Office 2007 SP2 and 2010 allows local users to gain privileges via a Trojan horse DLL in the current working directory, aka "Insecure Library Load...
(MS10-019) Vulnerabilities in Windows Could Allow Remote Code Execution (981210) This security update resolves two privately reported vulnerabilities in Windows Authenticode Verification tha...
This security update resolves vulnerabilities in Microsoft Windows. The vulnerabilities could allow elevation of privilege if an attacker logs on to a...
Heap-based buffer overflow in Comctl32.dll (aka the common control library) in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP1 and SP2, Windows Server 2008 Gold, SP2, and R2, and Windo...
Microsoft addresses the following vulnerabilities in its July batch of patches: (MS10-042) Vulnerability in Help and SupportCenter Could Allow Remote Code Execution (2229593) Risk Rating: Critic...
This Trojan takes advantage of the following vulnerability:RTF Stack Buffer Overflow vulnerabilityMore information about this vulnerability can be found in the following Web page:Microsoft Security Bulletin MS10-087
This update resolves vulnerabilities in Microsoft Office, which could allow remote code execution. When users view a specially crafted imag...
Once this Trojan successfully exploits the said vulnerability, it attempts to drop and execute a malicious file.This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious s...
Cross-site scripting (XSS) vulnerability in the Web Monitor in Microsoft Forefront Unified Access Gateway (UAG) 2010 Gold, 2010 Update 1, and 2010 Update 2 allows remote attackers to inject arbitrary web script or HTM...
Microsoft Internet Explorer 6, 7, and 8 does not properly handle objects in memory, which allows remote attackers to execute arbitrary code by accessing an object that (1) was not properly ...
Integer underflow in Microsoft PowerPoint 2002 SP3 and 2003 SP3, PowerPoint Viewer SP2, and Office 2004 for Mac allows remote attackers to execute arbitrary code via a ...
This security update addresses the Microsoft Office vulnerability that could allow remote code execution whenever a user opens a specially crafted Excel ...
Cross-site scripting (XSS) vulnerability in the mobile portal in Microsoft Forefront Unified Access Gateway (UAG) 2010 Gold, 2010 Update 1, and 2010 Update 2 all...
Unspecified vulnerability in Microsoft Office Excel 2002 SP3 and Office 2004 for Mac allows remote attackers to execute arbitrary code via a crafted Excel file, aka "Excel String Variable Vulnerability."...
Unspecified vulnerability in Microsoft Office Excel 2002 SP3 and Office 2004 for Mac allows remote attackers to execute arbitrary code via a crafted Excel file, aka "Excel Record Stack Corruption...
Stack-based buffer overflow in Microsoft Office Excel 2002 SP3 allows remote attackers to execute arbitrary code via an Excel file with a malformed RTD (0x813) record, aka "Excel RTD Memory Corrupt...
This security update addresses a vulnerability that could allow remote code execution once a user opened a specially crafted email message via an affected ver...