Search
Keyword: ms07047 windows media player 936782
CVE-2006-3439 Buffer overflow in the Server Service in Microsoft Windows 2000 SP4, XP SP1 and SP2, and Server 2003 SP1 allows remote attackers, including anonymous users, to execute arbitrary code
CVE-2007-1749 Integer underflow in the CDownloadSink class code in the Vector Markup Language (VML) component (VGX.DLL), as used in Internet Explorer 5.01, 6, and 7 allows remote attackers to execute
CVE-2007-2219 Unspecified vulnerability in the Win32 API on Microsoft Windows 2000, XP SP2, and Server 2003 SP1 and SP2 allows remote attackers to execute arbitrary code via certain parameters to an
CVE-2004-0567 cve: The Windows Internet Naming Service (WINS) in Windows NT Server 4.0 SP 6a, NT Terminal Server 4.0 SP 6, Windows 2000 Server SP3 and SP4, and Windows Server 2003 does not properly
CVE-2005-0050,MS05-010 The License Logging service for Windows NT Server, Windows 2000 Server, and Windows Server 2003 does not properly validate the length of messages, which leads to an "unchecked
CVE-2005-1206,MS05-027 Buffer overflow in the Server Message Block (SMB) functionality for Microsoft Windows 2000, XP SP1 and SP2, and Server 2003 and SP1 allows remote attackers to execute arbitrary
CVE-2012-5615 Oracle MySQL 5.5.38 and earlier, 5.6.19 and earlier, and MariaDB 5.5.28a, 5.3.11, 5.2.13, 5.1.66, and possibly other versions, generates different error messages with different time
Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, and Windows RT Gold and 8.1 allow remote attackers to execute
Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, and Windows RT Gold and 8.1 allow remote attackers to execute
\wilbert@www.bing[2].txt %User Profile%\Cookies\wilbert@www.msn[1].txt %Application Data%\IconCache.db %Application Data%\Microsoft\Windows Media\9.0\WMSDKNS.DTD %Application Data%\Microsoft\Windows Media\9.0
to install an executable file, usually a fake Adobe Instant Player . In reality, this .EXE file is a downloader of the KOOBFACE components. What happens once the threat gets inside computers/networks?
\64A6E60055D801F4BB8AC269354B72B8\ SourceList\Net HKEY_LOCAL_MACHINE\SOFTWARE\Classes\ Installer\Products\64A6E60055D801F4BB8AC269354B72B8\ SourceList\Media HKEY_LOCAL_MACHINE\Software\Microsoft\ Windows\CurrentVersion\Installer
application drops the following files: %Desktop%\Continue Flash Player Pro Installation.lnk %User Temp%\ICReinstall_{PUA filename}.exe %User Temp%\{random filename}.log %User Temp%\in{random 1}\css
1.0.3705; .NET CLR 1.1.4322; Media Center PC 4.0; .NET CLR 2.0.50727) Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322) Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET
1.0.3705; .NET CLR 1.1.4322; Media Center PC 4.0; .NET CLR 2.0.50727) Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322) Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET
Explorer\brndlog.bak %User Profile%\Internet Explorer\brndlog.txt %User Profile%\Cookies\index.dat %Application Data%\Microsoft\Media Player\CURREN~1.WMD %Application Data%\Microsoft\Windows Media\9.0
Windows 2000, XP, and Server 2003, or C:\Users\{user name} on Windows Vista and 7.) Other System Modifications This Trojan modifies the following file(s): %Application Data%\GDIPFONTCACHEV1.DAT (Note:
be taken offline. According to media reports, South Korea has raised the cyber alert level following the DoS attacks, which uses this Trojan. This Trojan arrives on a system as a file dropped by other
Menu%\desktop.ini %Start Menu%\Programs\desktop.ini %Start Menu%\Programs\Remote Assistance.lnk %Start Menu%\Programs\Windows Media Player.lnk %Start Menu%\Programs\Accessories\Command Prompt.lnk %Start
Player in IE 10 on all supported editions of Windows 8 and Windows Server 2012 . Were there other attacks that exploited this vulnerability? Yes. This exploit was also used in targeted attacks that dropped