Keyword: patch
1051 Total Search   |   Showing Results : 61 - 80
part of patch that allows for multiple simultaneous RDP sessions. Riskware/TermServ (FORTINET) Dropped by other malware, Downloaded from the Internet
Windows Security Advisory." The message warns users of a "potentially dangerous software worm" targeting Windows users. It then advises them to download the new patch attached to the email. This .ZIP file
CVE-2013-0076 This patch addresses a vulnerability found in Microsoft Windows, which could allow elevation of privilege once a remote attacker logs and runs a specially crafted application on the
CVE-2013-0079 This patch addresses a vulnerability found in Microsoft Office. It can be exploited once a user opens a specially crafted Visio file thus resulting to remote code execution,
CVE-2013-0011 This patch addresses a vulnerability found in Microsoft Windows, which could allow remote code execution when successfully exploited. Accordingly, the said vulnerability can allow a
CVE-2012-1885,CVE-2012-1886,CVE-2012-1887,CVE-2012-2543 This patch addresses vulnerabilities existing in Microsoft Office, which could allow remote code execution once users opens a specially crafted
CVE-2012-1892 This patch resolves a cross-site scripting (XSS) vulnerability found in Visual Studio Team Foundation Server . When exploited, an attacker can use the vulnerability to inject a script
CVE-2012-1768,CVE-2012-3110,CVE-2012-1766,CVE-2012-1767,CVE-2012-1769,CVE-2012-1770,CVE-2012-1771,CVE-2012-1772,CVE-2012-1773,CVE-2012-3106,CVE-2012-3107,CVE-2012-3108,CVE-2012-3109 This patch
CVE-2013-0077 This patch addresses a vulnerability found in Microsoft Windows. Once an affected user opens a specially crated media file and a Microsoft Office document with a specially crafted
Details This Hacking Tool does the following: It can be used to load and patch Adobe application DLL and executable. It requires Administrative privilege to run properly. Trojan:Win32/Wacatac.A!ml(MICROSOFT
From: {BLOCKED} Subject: ATENCAO: Evite Fraudes Instalando o Novo Componente de Seguranca. {translated from the Portuguese} Security components Attention - Important Announcement - Patch 4.5
CVE-2004-1774 Buffer overflow in the SDO_CODE_SIZE peocedure of the MD2 package (MDSYS.MD2.SDO_CODE_SIZE) in Oracle 10g before 10.1.0.2 Patch 2 allows local users to execute arbitrary code via a long
CVE-2012-2551 This patch addresses a vulnerability existing in Microsoft Windows. It could allow denial of service attacks when a remote attacker sends a specially crafted request to the Kerberos
CVE-2012-2539 This patch addresses a vulnerability in Microsoft Office that could result in remote code execution when successfully exploited via a specially crafted .RTF file. Accordingly, users who
following: It displays the following GUI: It modifies the following files when Patch button is clicked: %Program Files%\Print2CAD 2017\pvgviewdxfp2c.exe %Program Files%\Print2CAD 2017\IP2Lib32.dll If the file
CVE-2008-2437 Stack-based buffer overflow in cgiRecvFile.exe in Trend Micro OfficeScan 7.3 patch 4 build 1362 and other builds, OfficeScan 8.0 and 8.0 SP1, and Client Server Messaging Security 3.6
CVE-2013-0074 This patch addresses a vulnerability found in Microsoft Silverlight. It can allow remote code execution when exploited via a specially crafted Silverlight application hosted on
identifier(s) specific to this advisory's vulnerability identifiers. For patch information and suggested workarounds, users are advised to refer to this Adobe webpage:
Windows Script Component (WSC) file or scriptlet (.sct) on the victim's machine Bypasses the Microsoft patch for CVE-2017-0199 This exploit typically follows the infection chain below:
\eMule\Incoming\messenger v4.7.3000 keygen + patch.exe %User Profile%\Downloads\Messenger v4.X PATCH + No-Cd.exe %System Root%\My Downloads\Messenger v4.7.3000 Loader.exe %Program Files%\Ares P2P\Downloads