Keyword: MS10-087
57578 Total Search   |   Showing Results : 2301 - 2320
CVE-2012-0157 This security update resolves a privately reported vulnerability in Microsoft Windows . The vulnerability could allow elevation of privilege if an attacker logs on to a system and runs
CVE-2012-0156 This security update resolves a publicly disclosed vulnerability in Windows DirectWrite . In an Instant Messenger-based attack scenario, the vulnerability could allow denial of service
CVE-2012-0016 This security update resolves one privately reported vulnerability in Microsoft Expression Design . The vulnerability could allow remote code execution if a user opens a legitimate file
CVE-2011-2013 This security update resolves a privately reported vulnerability in Microsoft Windows. The vulnerability could allow remote code execution if an attacker sends a continuous flow of
CVE-2011-2004 This security update resolves a privately reported vulnerability in Microsoft Windows. The vulnerability could allow denial of service if a user opens a specially crafted TrueType font
CVE-2011-2016 This security update resolves a privately reported vulnerability in Microsoft Windows. The vulnerability could allow remote code execution if a user opens a legitimate file (such as an
CVE-2011-2014 This security update resolves a privately reported vulnerability in Active Directory, Active Directory Application Mode (ADAM), and Active Directory Lightweight Directory Service (AD
CVE-2011-2010 This security update resolves a privately reported vulnerability in Microsoft Office IME (Chinese). The vulnerability could allow elevation of privilege if a logged-on user performed
CVE-2011-1983 This security update resolves a privately reported vulnerability in Microsoft Office . The vulnerability could allow remote code execution if a user opens a specially crafted Word file.
CVE-2011-3408 This security update resolves a privately reported vulnerability in Microsoft Windows . The vulnerability could allow elevation of privilege if an attacker logs on to an affected system
CVE-2011-2018 This security update resolves a privately reported vulnerability in Microsoft Windows . The vulnerability could allow elevation of privilege if an attacker logs on to an affected system
CVE-2011-1992,CVE-2011-2019,CVE-2011-3404 This security update resolves three privately reported vulnerabilities in Internet Explorer. The most severe vulnerability could allow remote code execution
Description Name: Possible MS14-068_KERBEROS Checksum Vulnerability . This is Trend Micro detection for packets passing through KERBEROS network protocols that manifests unusual behavior which can be a potential intrusion. Below are some indicators o...
Description Name: CVE-2020-0688 - Microsoft Exchange Validation Key Remote Code Execution - HTTP (Request) . This is Trend Micro detection for HTTP network protocol that manifests exploit activities and can be used for Point of Entry or Lateral Movem...
This Hacking Tool arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It may be manually installed by a user. This
This Worm arrives by connecting affected removable drives to a system. It arrives by accessing affected shared networks. It arrives on a system as a file dropped by other malware or as a file
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It does not have any propagation routine. It does not
This Worm arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It exploits software vulnerabilities to propagate to other
This Trojan Spy arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It gathers certain information on the affected
This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It drops files as ransom note. It avoids encrypting