Keyword: ms04028jpeggdi
3241 Total Search   |   Showing Results : 301 - 320
Microsoft addresses the following vulnerabilities in its May batch of patches: (MS11-035) Vulnerability in WINS Could Allow Remote Code Execution (2524426) Risk Rating: Critical This security update
CVE-2012-0002,CVE-2012-0152 This security update addresses two privately reported vulnerabilities in the Remote Desktop Protocol, which may result to code execution if an attacker sends specially
Explorer 7,Internet Explorer 8 MS Bulletin ID Vulnerability ID DPI Rule Number DPI Rule Name Release Date IDF Compatibility MS13-008 CVE-2012-4792 1005297 Microsoft Internet Explorer CDwnBindInfo Object
CVE-2008-4269,MS08-075 The search-ms protocol handler in Windows Explorer in Microsoft Windows Vista Gold and SP1 and Server 2008 uses untrusted parameter data obtained from incorrect parsing, which
CVE-2009-3677 The Internet Authentication Service (IAS) in Microsoft Windows 2000 SP4, XP SP2 and SP3, Server 2003 SP2, Vista Gold and SP1, and Server 2008 Gold does not properly verify the
CVE-2007-2447 The MS-RPC functionality in smbd in Samba 3.0.0 through 3.0.25rc3 allows remote attackers to execute arbitrary commands via shell metacharacters involving the (1) SamrChangePassword
CVE-2010-3945,CVE-2010-3946,CVE-2010-3949,CVE-2010-3950,CVE-2010-3951,CVE-2010-3952 This update resolves vulnerabilities in Microsoft Office, which could allow remote code execution. When users view
This exploit code is used to take advantage of the Remote Procedure Call (RPC) Distributed Component Object Model (DCOM) vulnerability discussed in Microsoft Security Bulletin MS03-026 . This code is
CVE-2008-4250 This security update resolves a privately reported vulnerability in the Server service. This vulnerability could allow remote code execution if an affected system received a
CVE-2009-2521,CVE-2009-3023 This update addresses vulnerabilities found in FTP Service in Microsoft Internet Information Services (IIS) 5.0, Microsoft Internet Information Services (IIS) 5.1,
CVE-2009-1923,CVE-2009-1924 This security update addresses two vulnerabilities in the Windows Internet Name Service (WINS). WINS is not installed on any affected operating system by default. Only
CVE-2012-0141,CVE-2012-0142,CVE-2012-0143,CVE-2012-0184,CVE-2012-0185,CVE-2012-1847 Several vulnerabilities in some versions of MS Excel are resolved in this particular bulletin. To exploit this
This backdoor arrives as attachment to mass-mailed email messages. It executes commands from a remote malicious user, effectively compromising the affected system. It deletes the initially executed
This backdoor arrives as attachment to mass-mailed email messages. It executes commands from a remote malicious user, effectively compromising the affected system. It deletes the initially executed
This backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It modifies registry entries to disable various system
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It disables Task Manager, Registry Editor, and Folder
This worm arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It disables Task Manager, Registry Editor, and Folder
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It may be downloaded by other malware/grayware from
This backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It runs certain commands that it receives remotely
This backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It does not have any propagation routine. It executes