Search
Keyword: usoj64_cve20175753.poc
CVE-2009-2526,CVE-2009-2532,CVE-2009-3103 This update resolves three reported vulnerabilities in Server Message Block Version 2 (SMBv2) -- one publicly disclosed and two in private. Successful
CVE-2012-1858,CVE-2012-1859,CVE-2012-1860,CVE-2012-1861,CVE-2012-1862,CVE-2012-1863 This update resolves several vulnerabilities affecting InfoPath , SharePoint Server , SharePoint Services ,
CVE-2012-1895,CVE-2012-1896,CVE-2012-2519,CVE-2012-4776,CVE-2012-4777 This patch addresses vulnerabilities existing in the .NET Framework. It could allow remote code execution once a remote attacker
(MS12-041) Vulnerabilities in Windows Kernel-Mode Drivers Could Allow Elevation of Privilege (2709162)
CVE-2012-1864,CVE-2012-1865,CVE-2012-1866,CVE-2012-1867,CVE-2012-1868 This update resolves five vulnerabilities in Windows, all of which allows elevation of privilege when successfully exploited. The
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
(MS13-101) Vulnerabilities in Windows Kernel-Mode Drivers Could Allow Elevation of Privilege (2880430)
CVE-2013-3902,CVE-2013-3903,CVE-2013-3907,CVE-2013-3899,CVE-2013-5058 This security update resolves five privately reported vulnerabilities in Microsoft Windows. The more severe of these
(MS11-056) Vulnerabilities in Windows Client/Server Run-time Subsystem Could Allow Elevation of Privilege (2507938)
CVE-2011-1281,CVE-2011-1282,CVE-2011-1283,CVE-2011-1284,CVE-2011-1870 This security update fixes five reported vulnerabilities in the Microsoft Windows Client/Server Run-time Subsystem (CSRSS) ,
CVE-2011-3402 A vulnerability in a Microsoft Windows component that may allow an attacker to execute code on the vulnerable machine. The vulnerability exists in the Win32k TrueType font parsing
This malware was involved in the Red October campaign, a series of attacks targeting diplomatic and government agencies. It drops malicious files onto the affected system and executes them, causing
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
(MS15-061) Vulnerabilities in Windows Kernel-Mode Drivers Could Allow Elevation of Privilege (3057839)
CVE-2015-1719,CVE-2015-1720,CVE-2015-1721,CVE-2015-1722,CVE-2015-1723 This security update addresses vulnerabilities in Microsoft Windows that could allow elevation of privilege once an attacker logs
(MS10-091) Vulnerabilities in the OpenType Font (OTF) Driver Could Allow Remote Code Execution (2296199)
CVE-2010-3956,CVE-2010-3957,CVE-2010-3959 This security update resolves several vulnerabilities in the Windows Open Type Font (OTF) driver, which could allow remote users to execute code remotely on
(MS11-012) Vulnerabilities in Windows Kernel-Mode Drivers Could Allow Elevation of Privilege (2479628)
CVE-2011-0086,CVE-2011-0087,CVE-2011-0088,CVE-2011-0089,CVE-2011-0090 This security update addresses vulnerabilities in Microsoft Windows, which could allow elevation of privilege if an attacker
(MS10-048) Vulnerabilities in Windows Kernel-Mode Drivers Could Allow Elevation of Privilege (2160329)
CVE-2010-1887,CVE-2010-1894,CVE-2010-1895,CVE-2010-1896,CVE-2010-1897 This update addresses one publicly disclosed and four privately reported vulnerabilities in the Windows kernel-mode drivers. The
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a