|
Adding 1930 new threats. Keep your AVG software up-to-date by downloading the latest updates. No matter if you are using AVG Antivirus, Internet Security or another product, you are better protected with regular updates.
|
|
|
Full View / NID: 39665 / Submitted by: The Zilla of Zuron
|
|
Severity Rating: Important
Revision Note: V1.0 (October 11, 2011): Bulletin published.
Summary: This security update resolves five privately reported vulnerabilities in Forefront Unified Access Gateway (UAG). The most severe of these vulnerabilities could allow remote code execution if a user visits an affected Web site using a specially crafted URL. However, an attacker would have no way to force users to visit such a Web site. Instead, an attacker would have to persuade users to visit the Web site, typically by getting them to click a link in an e-mail message or Instant Messenger message that takes users to the attacker's Web site.
|
|
|
Full View / NID: 39700 / Submitted by: The Zilla of Zuron
|
|
Severity Rating: Important
Revision Note: V1.0 (October 11, 2011): Bulletin published.
Summary: This security update resolves a privately reported vulnerability in the Microsoft Windows Ancillary Function Driver (AFD). The vulnerability could allow elevation of privilege if an attacker logs on to a user's system and runs a specially crafted application. An attacker must have valid logon credentials and be able to log on locally to exploit the vulnerability.
|
|
|
Full View / NID: 39699 / Submitted by: The Zilla of Zuron
|
|
Severity Rating: Important
Revision Note: V1.0 (October 11, 2011): Bulletin published.
Summary: This security update resolves two publicly disclosed vulnerabilities in Host Integration Server. The vulnerabilities could allow denial of service if a remote attacker sends specially crafted network packets to a Host Integration Server listening on UDP port 1478 or TCP ports 1477 and 1478. Firewall best practices and standard default firewall configurations can help protect networks from attacks that originate outside the enterprise perimeter. Best practices recommend that systems that are connected to the Internet have a minimal number of ports exposed. In this case, the Host Integration Server ports should be blocked from the Internet.
|
|
|
Full View / NID: 39698 / Submitted by: The Zilla of Zuron
|
|
AnyDVD is a driver, which descrambles DVD-Movies automatically in the background. This DVD appears unprotected and region code free for all applications and the Windows operating system as well. With AnyDVD's help copy tools like CloneDVD, Pinnacle Instant Copy, InterVideo DVD-Copy, etc. are able to copy CSS and copy protected movies. With the help of AnyDVD you can watch movies with non matching region codes with every DVD Player Software you like!
|
|
|
Full View / NID: 39679 / Submitted by: TACKtech Team
|
|
UltraISO is an ISO CD/DVD image file creating/editing/converting tool and a bootable CD/DVD maker , it can directly edit the CD/DVD image file and extract files and folders from it, as well as directly make ISO files from your CD/DVD-ROM or hard disk. At the same time, you can maintain the ISO bootable information, thus creating your own bootable CD/DVDs. You now have the power to make and edit your own ISO files, and then burn them to CD/DVD for your own needs.
|
|
|
Full View / NID: 39669 / Submitted by: TACKtech Team
|
|
Severity Rating: Important
Revision Note: V1.0 (October 11, 2011): Bulletin published.
Summary: This security update resolves a publicly disclosed vulnerability in Windows Media Center. The vulnerability could allow remote code execution if an attacker convinces a user to open a legitimate file that is located in the same network directory as a specially crafted dynamic link library (DLL) file. Then, while opening the legitimate file, Windows Media Center could attempt to load the DLL file and execute any code it contained. For an attack to be successful, a user must visit an untrusted remote file system location or WebDAV share and open a legitimate file.
|
|
|
Full View / NID: 39664 / Submitted by: The Zilla of Zuron
|
|
Severity Rating: Important
Revision Note: V1.0 (October 11, 2011): Bulletin published.
Summary: This security update resolves a privately reported vulnerability in the Microsoft Active Accessibility component. The vulnerability could allow remote code execution if an attacker convinces a user to open a legitimate file that is located in the same network directory as a specially crafted dynamic link library (DLL) file. Then, while opening the legitimate file, the Microsoft Active Accessibility component could attempt to load the DLL file and execute any code it contained. For an attack to be successful, a user must visit an untrusted remote file system location or WebDAV share and open a document from this location that is then loaded by a vulnerable application.
|
|
|
Full View / NID: 39663 / Submitted by: The Zilla of Zuron
|
|
Severity Rating: Critical
Revision Note: V1.1 (October 11, 2011): Added an update FAQ to announce a detection change for KB2518870 and KB2518864 that corrects an installation issue. This is a detection change only. There were no changes to the security update files. Customers who have already successfully updated their systems do not need to take any action.
Summary: This security update resolves a publicly disclosed vulnerability in Microsoft .NET Framework. The vulnerability could allow remote code execution on a client system if a user views a specially crafted Web page using a Web browser that can run XAML Browser Applications (XBAPs). Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. The vulnerability could also allow remote code execution on a server system running IIS, if that server allows processing ASP.NET pages and an attacker succeeds in uploading a specially crafted ASP.NET page to that server and then executes the page, as could be the case in a Web hosting scenario. This vulnerability could also be used by Windows .NET applications to bypass Code Access Security (CAS) restrictions.
|
|
|
Full View / NID: 39662 / Submitted by: The Zilla of Zuron
|
|
Severity Rating: Important
Revision Note: V1.3 (October 11, 2011): Announced changes to detection logic for some affected configurations. There were no changes to the security update files. See the Update FAQ for details.
Summary: This security update resolves five privately reported vulnerabilities and one publicly disclosed vulnerability in Microsoft SharePoint and Windows SharePoint Services. The most severe vulnerabilities could allow elevation of privilege if a user clicked on a specially crafted URL or visited a specially crafted Web site. For the most severe vulnerabilities, Internet Explorer 8 and Internet Explorer 9 users browsing to a SharePoint site in the Internet Zone are at a reduced risk because, by default, the XSS Filter in Internet Explorer 8 and Internet Explorer 9 helps to block the attacks in the Internet Zone. The XSS Filter in Internet Explorer 8 and Internet Explorer 9, however, is not enabled by default in the Intranet Zone.
|
|
|
Full View / NID: 39661 / Submitted by: The Zilla of Zuron
|
|
Severity Rating: Important
Revision Note: V1.1 (October 11, 2011): Announced a detection logic change for update KB2553094. There were no changes to the security update files. See the Update FAQ for details.
Summary: This security update resolves five privately reported vulnerabilities in Microsoft Office. The vulnerabilities could allow remote code execution if a user opens a specially crafted Excel file. An attacker who successfully exploited any of these vulnerabilities could gain the same user rights as the logged-on user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. Installing and configuring Office File Validation (OFV) to prevent the opening of suspicious files blocks the attack vectors for exploiting the vulnerabilities described in CVE-2011-1986 and CVE-2011-1987. See the section, Frequently Asked Questions (FAQ) Related to This Security Update, for more information about how the Office File Validation feature can be configured to block the attack vectors.
|
|
|
Full View / NID: 39660 / Submitted by: The Zilla of Zuron
|
|
NOD32 Antivirus System provides well balanced, state-of-the-art protection against threats endangering your PC and enterprise systems running various platforms from Microsoft Windows 95 / 98 / ME / NT / 2000 / 2003 / XP, through a number of UNIX/Linux, Novell, MS DOS operating systems to Microsoft Exchange Server, Lotus Domino and other mail servers.
|
|
|
Full View / NID: 39659 / Submitted by: The Zilla of Zuron
|
|
|
Full View / NID: 39658 / Submitted by: The Zilla of Zuron
|
|
SANTA CLARA, CA (Marketwire) - NVIDIA today announced that Oak Ridge National Laboratory (ORNL), which operates the world's premier open science computing facility for the U.S. Department of Energy, will deploy a revolutionary new supercomputer, "Titan," based on NVIDIA(R) Tesla(TM) GPUs. With the potential to deliver over 20 petaflops of peak performance, Titan, a Cray XK6 supercomputer, would be more than two times faster and three times more energy efficient than today's fastest supercomputer, the K computer located in Japan.
|
|
|
Full View / NID: 39657 / Submitted by: The Zilla of Zuron
|
|
The Official Pattern Release or OPR is Trend Micro's latest compilation of patterns for identified viruses. It is guaranteed to have passed a series of critical tests to ensure that customers get optimum protection from the latest virus threats.
|
|
|
Full View / NID: 39656 / Submitted by: The Zilla of Zuron
|
|
NOD32 Antivirus System provides well balanced, state-of-the-art protection against threats endangering your PC and enterprise systems running various platforms from Microsoft Windows 95 / 98 / ME / NT / 2000 / 2003 / XP, through a number of UNIX/Linux, Novell, MS DOS operating systems to Microsoft Exchange Server, Lotus Domino and other mail servers.
|
|
|
Full View / NID: 39655 / Submitted by: The Zilla of Zuron
|
|
Adding 1188 new threats. Keep your AVG software up-to-date by downloading the latest updates. No matter if you are using AVG Antivirus, Internet Security or another product, you are better protected with regular updates.
|
|
|
Full View / NID: 39654 / Submitted by: The Zilla of Zuron
|
|
The Microsoft Windows Malicious Software Removal Tool checks Windows Vista, Windows 7, Windows XP, Windows 2000, and Windows Server 2003 computers for and helps remove infections by specific, prevalent malicious software—including Blaster, Sasser, and Mydoom. When the detection and removal process is complete, the tool displays a report describing the outcome, including which, if any, malicious software was detected and removed.
|
|
|
Full View / NID: 39653 / Submitted by: TACKtech Team
|
|
The Official Pattern Release or OPR is Trend Micro's latest compilation of patterns for identified viruses. It is guaranteed to have passed a series of critical tests to ensure that customers get optimum protection from the latest virus threats.
|
|
|
Full View / NID: 39651 / Submitted by: The Zilla of Zuron
|
|
NOD32 Antivirus System provides well balanced, state-of-the-art protection against threats endangering your PC and enterprise systems running various platforms from Microsoft Windows 95 / 98 / ME / NT / 2000 / 2003 / XP, through a number of UNIX/Linux, Novell, MS DOS operating systems to Microsoft Exchange Server, Lotus Domino and other mail servers.
|
|
|
Full View / NID: 39650 / Submitted by: The Zilla of Zuron
|
|
Latest study analyzes data from more than 600 million systems worldwide and provides comprehensive information and protective guidance on the threat landscape.
|
|
|
Full View / NID: 39649 / Submitted by: The Zilla of Zuron
|
|
Adding 9453 new threats. Keep your AVG software up-to-date by downloading the latest updates. No matter if you are using AVG Antivirus, Internet Security or another product, you are better protected with regular updates.
|
|
|
Full View / NID: 39648 / Submitted by: The Zilla of Zuron
|
|
The Bat! is a powerful, highly configurable, yet easy to use email client. We've designed it especially to help you deal with your growing volume of email as quickly and efficiently as possible, saving much of your precious time.
|
|
|
Full View / NID: 40588 / Submitted by: TACKtech Team
|
|
LedgerSMB is a Perl/PostgreSQL-based accounting and ERP package for small to midsize businesses. LedgerSMB 1.3 provides enhanced security, data integrity, and features, but that's not all.
|
|
|
Full View / NID: 39855 / Submitted by: The Zilla of Zuron
|
|
NOD32 Antivirus System provides well balanced, state-of-the-art protection against threats endangering your PC and enterprise systems running various platforms from Microsoft Windows 95 / 98 / ME / NT / 2000 / 2003 / XP, through a number of UNIX/Linux, Novell, MS DOS operating systems to Microsoft Exchange Server, Lotus Domino and other mail servers.
|
|
|
Full View / NID: 39644 / Submitted by: The Zilla of Zuron
|
|
|
Full View / NID: 39643 / Submitted by: The Zilla of Zuron
|
|
NOD32 Antivirus System provides well balanced, state-of-the-art protection against threats endangering your PC and enterprise systems running various platforms from Microsoft Windows 95 / 98 / ME / NT / 2000 / 2003 / XP, through a number of UNIX/Linux, Novell, MS DOS operating systems to Microsoft Exchange Server, Lotus Domino and other mail servers.
|
|
|
Full View / NID: 39642 / Submitted by: The Zilla of Zuron
|
|
The Official Pattern Release or OPR is Trend Micro's latest compilation of patterns for identified viruses. It is guaranteed to have passed a series of critical tests to ensure that customers get optimum protection from the latest virus threats.
|
|
|
Full View / NID: 39641 / Submitted by: The Zilla of Zuron
|
|
NOD32 Antivirus System provides well balanced, state-of-the-art protection against threats endangering your PC and enterprise systems running various platforms from Microsoft Windows 95 / 98 / ME / NT / 2000 / 2003 / XP, through a number of UNIX/Linux, Novell, MS DOS operating systems to Microsoft Exchange Server, Lotus Domino and other mail servers.
|
|
|
Full View / NID: 39640 / Submitted by: The Zilla of Zuron
|
|
Celebrity costume designers to Jennifer Lopez and Rihanna show you how to shine like a rock star without spending a fortune.
|
|
|
Full View / NID: 39639 / Submitted by: The Zilla of Zuron
|