Keyword: usoj_cve20175753.pof
6191 Total Search   |   Showing Results : 341 - 360
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It executes the dropped file(s). As a result, malicious
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It may be hosted on a website and run when a user
This malware exploits a vulnerability found in Microsoft Office known as CVE-2017-0199. There are reports that exploits using the said vulnerability are in the wild. A security patch for the
This malware is related to the Shadow Broker dump that was released on late April, 2017. It exploits various vulnerabilities in Windows. Users affected by this malware may find malicious routines
This Exploit arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It arrives on a system as a file dropped by other malware or as a file downloaded
Microsoft addresses the following vulnerabilities in its January batch of patches: (MS12-001) Vulnerability in Windows Kernel Could Allow Security Feature Bypass (2644615) Risk Rating: Important This
CVE-2011-3414,CVE-2011-3415,CVE-2011-3416,CVE-2011-3417 This security update addresses one publicly and three privately disclosed vulnerabilities in Microsoft .NET Framework . The most dangerous of
CVE-2013-0087,CVE-2013-0088,CVE-2013-0089,CVE-2013-0090,CVE-2013-0091,CVE-2013-0092,CVE-2013-0093,CVE-2013-0094,CVE-2013-1288 This patch addresses several vulnerabilities found in Internet Explorer.
Microsoft addresses the following vulnerabilities in its January batch of patches: (MS13-001) Vulnerability in Windows Print Spooler Components Could Allow Remote Code Execution (2769369) Risk
CVE-2010-3945,CVE-2010-3946,CVE-2010-3949,CVE-2010-3950,CVE-2010-3951,CVE-2010-3952 This update resolves vulnerabilities in Microsoft Office, which could allow remote code execution. When users view
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It takes advantage of certain vulnerabilities. Arrival
CVE-2015-0056,CVE-2015-0099,CVE-2015-0100,CVE-2015-1622,CVE-2015-1623,CVE-2015-1624,CVE-2015-1625,CVE-2015-1626,CVE-2015-1634 This security update resolves several vulnerabilities found in several
CVE-2015-1652,CVE-2015-1660,CVE-2015-1665,CVE-2015-1668,CVE-2015-1657,CVE-2015-1659,CVE-2015-1662,CVE-2015-1666,CVE-2015-1667 This security update addresses vulnerabilities found in Internet
CVE-2010-2161,CVE-2010-2162,CVE-2010-2163,CVE-2010-2164,CVE-2010-2165,CVE-2010-2166,CVE-2010-2167,CVE-2010-2170,CVE-2010-2171 Adobe Flash Player is prone to remote code execution vulnerabilities.
CVE-2010-2161,CVE-2010-2162,CVE-2010-2163,CVE-2010-2164,CVE-2010-2165,CVE-2010-2166,CVE-2010-2167,CVE-2010-2170,CVE-2010-2171 Adobe Flash Player is prone to remote code execution vulnerabilities.
CVE-2011-0097,CVE-2011-0098,CVE-2011-0101,CVE-2011-0103,CVE-2011-0104,CVE-2011-0105,CVE-2011-0978,CVE-2011-0979,CVE-2011-0980 This security update resolves nine privately reported vulnerabilities in
CVE-2011-1993,CVE-2011-1995,CVE-2011-1996,CVE-2011-1997,CVE-2011-1998,CVE-2011-1999,CVE-2011-2000,CVE-2011-2001 This update resolves eight privately reported vulnerabilities in Internet Explorer .
* indicates a new version of an existing rule Deep Packet Inspection Rules: Advanced Message Queuing Protocol (AMQP) 1009126 - Pivotal Spring AMQP Remote Code Execution Vulnerability (CVE-2017-8045)
* indicates a new version of an existing rule Deep Packet Inspection Rules: Database Oracle 1009342 - Oracle Database DIRECTORY Object Information Disclosure Vulnerability (CVE-2005-0298) Suspicious