Keyword: MS10-087
56022 Total Search   |   Showing Results : 601 - 620
CVE-2013-3181 This security update resolves a reported vulnerability in the Unicode Scripts Processor included in Microsoft Windows. The vulnerability could allow remote code execution if a user
CVE-2013-2393,CVE-2013-3776,CVE-2013-3781 This security update resolves three publicly disclosed vulnerabilities in Microsoft Exchange Server. The vulnerabilities exist in the WebReady Document
CVE-2015-1770,CVE-2015-1760,CVE-2015-1759 This security update addresses vulnerabilities found in Microsoft Office that could allow remote code execution once a user opens a specially crafted
CVE-2010-3970 This security update addresses a vulnerability in the Windows Shell graphics processor, which could allow remote code execution if a user views a specially crafted thumbnail image. A
CVE-2010-3972 This security update addresses a vulnerability in Microsoft Internet Information Services (IIS) FTP Service, which could allow remote code execution if an FTP server receives a
CVE-2011-1270 This security update resolves two reported vulnerabilities in Microsoft PowerPoint . The vulnerabilities allow remote code execution if a user opens a maliciously-crafted PowerPoint
CVE-2011-0658 A vulnerability in Microsoft Windows Object Linking and Embedding (OLE) could allow remote code execution if a user visits a site with a malicious Windows Metafile (WMF) image. An
CVE-2011-2007,CVE-2011-2008 This security update resolves two publicly disclosed vulnerabilities in Host Integration Server. The vulnerabilities could allow denial of service if a remote attacker
This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It drops files as ransom note. It avoids encrypting
This Adware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Adware arrives on a system as a
This Backdoor modifies the Internet Explorer Zone Settings. As of this writing, the said sites are inaccessible. However, as of this writing, the said sites are inaccessible. Installation This
This Ransomware executes the dropped file(s). As a result, malicious routines of the dropped files are exhibited on the affected system. Arrival Details This malware arrives via the following means:
This Hacking Tool arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It does not have any propagation routine. It does
This backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This backdoor arrives on a system as a
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It modifies files, disabling programs and applications
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a