Search
Keyword: usoj64_cve20175753.poc
CVE-2010-0811,CVE-2010-3973,CVE-2011-1243 This security update resolves two privately reported vulnerabilities and one publicly disclosed vulnerability in Microsoft software. The vulnerabilities
CVE-2013-1316,CVE-2013-1317,CVE-2013-1318,CVE-2013-1319,CVE-2013-1320,CVE-2013-1321,CVE-2013-1322,CVE-2013-1323,CVE-2013-1327,CVE-2013-1328,CVE-2013-1329 This security update patches eleven
CVE-2013-1278,CVE-2013-1279,CVE-2013-1280 This patch addresses vulnerabilities in Microsoft Windows, which can allow elevation of privilege once an attacker logs and runs a specially crafted
CVE-2013-1285,CVE-2013-1286,CVE-2013-1287 This patch addresses the vulnerabilities found in Microsoft Windows. These vulnerabilities when exploited can allow elevation of privilege once attacker
CVE-2012-4781,CVE-2012-4782,CVE-2012-4787 This patch addresses vulnerabilities in Internet Explorer. When successfully exploited via a specially crafted web page, it could result to remote code
CVE-2013-1333,CVE-2013-1334,CVE-2013-1332 This security update resolves three privately reported vulnerabilities in Microsoft Windows. The vulnerabilities could allow elevation of privilege if an
CVE-2011-1992,CVE-2011-2019,CVE-2011-3404 This security update resolves three privately reported vulnerabilities in Internet Explorer. The most severe vulnerability could allow remote code execution
(MS10-073) Vulnerabilities in Windows Kernel-Mode Drivers Could Allow Elevation of Privilege (981957)
CVE-2010-2549,CVE-2010-2743,CVE-2010-2744 This security update addresses vulnerabilities in Windows kernel-mode drivers that could increase in the privilege when an attacker is log on and is running
CVE-2006-2371,CVE-2006-2370,MS06-025 Various vulnerabilities exist in the RRAS RPC API of which the worst would allow an attacker to take control of the system. cve: Buffer overflow in the Routing
CVE-2010-2552,CVE-2010-2551,CVE-2010-2550 This security update resolves several privately reported vulnerabilities in Microsoft Windows . The most serious of these may allow remote code execution if
MS Advisory (2896666) Vulnerability in Microsoft Graphics Component Could Allow Remote Code Execution
CVE-2013-3906 The vulnerability is a remote code execution vulnerability that exists in the way affected components handle specially crafted TIFF images. An attacker could exploit this vulnerability
CVE-2014-0253,CVE-2014-0257,CVE-2014-0295 This security update resolves two publicly disclosed vulnerabilities and one privately reported vulnerability in Microsoft .NET Framework. The most severe
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It executes the dropped file(s). As a result, malicious
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It may be hosted on a website and run when a user
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It executes the dropped file(s). As a result, malicious routines of the dropped files are
This Trojan is a zero-day exploit for CVE-2014-4113, an identified vulnerability in Windows Kernel-Mode. This Trojan arrives on a system as a file dropped by other malware or as a file downloaded
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It executes the files it drops, prompting the affected system to exhibit the malicious
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It may be hosted on a website and run when a user
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a