เรารองรับเบราว์เซอร์ ไม่ใช่ไดโนเสาร์ โปรดอัปเดตเบราว์เซอร์ของคุณหากคุณต้องการดูเนื้อหาของหน้าเว็บนี้อย่างถูกต้อง

Exploit protection

การป้องกันการใช้ประโยชน์

การหาประโยชน์อย่างไม่ถูกต้องมักจะถูกใช้เป็นกุญแจสำคัญในการเข้าสู่ระบบคอมพิวเตอร์ของเหยื่อผู้เคราะห์ร้าย ดังนั้น การป้องกันการใช้ประโยชน์จึงเป็นส่วนที่สำคัญอย่างมากของผลิตภัณฑ์การรักษาความปลอดภัยของเรา ส่วนที่สำคัญที่สุดของการป้องกันการใช้ประโยชน์คือ CommunityIQ พร้อมด้วยเซ็นเซอร์ตรวจสอบการกระทำที่น่าสงสัย และสร้างระบบการตรวจจับการหาประโยชน์ สิ่งเหล่านี้ช่วยให้เราสามารถมองเห็นการโจมตีใหม่ๆ และก่อนหน้านี้ที่มองไม่เห็น

นอกจากนี้ เรายังให้การปกป้องจากการหาประโยชน์ที่เป็นอันตรายที่เราเคยเห็นในป่าและความอ่อนแกที่ได้รับรายงานจากพันธมิตรของเรา:

! ปล่อย รายละเอียด ชื่อ
2018-07-21CVE-2018-5008This vulnerability occurs as a result of computation that reads data that is past the end... +
2018-07-21CVE-2018-5052This vulnerability is an instance of a heap overflow vulnerability in the Universal 3D (U... +
2018-06-10CVE-2018-4945This vulnerability is an instance of a type confusion overflow vulnerability in the Actio... +
2018-06-10CVE-2018-5000This vulnerability is an instance of an integer overflow vulnerability when processing RT... +
2018-05-13CVE-2018-4993This issue leads to an disclosure of information that can be abused by a malicious actor ... +
2018-02-23CVE-2018-4911This vulnerability is an instance of a use after free vulnerability in the JavaScript API... +
2018-02-12CVE-2018-4877This vulnerability is due to a dangling pointer that leads to a use after free vulnerabil... +
!2018-02-12CVE-2018-4878This vulnerability is due to a dangling pointer that leads to a use after free vulnerabil... +
2017-09-20CVE-2017-8759https://www.fireeye.com/blog/threat-research/2017/09/zero-day-used-to-distribute-finspy.h... +
2017-07-18CVE-2017-3099This vulnerability is an instance of a memory corruption vulnerability in the Action Scri... +
2017-07-18CVE-2017-3100This vulnerability is an instance of a memory corruption vulnerability in the Action Scri... +
2017-06-25CVE-2017-3079This vulnerability is an instance of a memory corruption vulnerability in the internal re... +
2017-06-25CVE-2017-3081This vulnerability is an instance of a use after free vulnerability in internal computati... +
2017-06-25CVE-2017-3082This vulnerability is an instance of a memory corruption vulnerability in the LocaleID cl... +
2017-06-25CVE-2017-3083This vulnerability is an instance of a use after free vulnerability in the Primetime SDK ... +
2017-06-25CVE-2017-3084This vulnerability is an instance of a use after free vulnerability in the advertising me... +
2017-05-19CVE-2017-0213A type confusion vulnerability has been found in Windows 10. Successful exploitation of t... +
2017-05-19CVE-2017-3069This vulnerability is an instance of a memory corruption vulnerability in the BlendMode c... +
2017-05-19CVE-2017-3070This vulnerability is an instance of a memory corruption vulnerability in the Convolution... +
2017-05-19CVE-2017-3071This vulnerability is an instance of a use after free vulnerability when masking display ... +
2017-05-19CVE-2017-3072This vulnerability is an instance of a memory corruption vulnerability in the BitmapData ... +
2017-05-19CVE-2017-3073This vulnerability is an instance of a use after free vulnerability when handling multipl... +
2017-05-19CVE-2017-3074This vulnerability is an instance of a memory corruption vulnerability in the Graphics cl... +
2017-04-23CVE-2017-3055This vulnerability is an instance of a heap overflow vulnerability in JPEG 2000 parsing o... +
2017-04-23CVE-2017-3056This vulnerability is an instance of a memory corruption vulnerability in the JavaScript ... +
2017-04-23CVE-2017-3057This vulnerability is an instance of a use after free vulnerability in the JavaScript API... +
2017-04-23CVE-2017-3062This vulnerability is an instance of a use after free vulnerability in ActionScript2 when... +
2017-04-23CVE-2017-3063This vulnerability is an instance of a use after free vulnerability in the ActionScript2 ... +
2017-03-15CVE-2017-0050An OOBW caused by a rounding error which exists in the NT kernel causes the machine to cr... +
2016-12-23CVE-2016-7262A Unsafe Command Execution vulnerability was discovered in Microsoft Excel. The issue lie... +
2016-10-21CVE-2016-6942This vulnerability is an instance of a memory corruption vulnerability. In particular, th... +
2016-10-21CVE-2016-6947This vulnerability is an instance of a memory corruption vulnerability. In particular, th... +
2016-10-21CVE-2016-6950This vulnerability is an instance of a memory corruption vulnerability. In particular, th... +
2016-10-21CVE-2016-6952This vulnerability is an instance of a use after free vulnerability. In particular, the v... +
2016-10-21CVE-2016-6970Vulnerability Description:This vulnerability is an instance of a memory corruption vulner... +
2016-10-20CVE-2016-6946This vulnerability is an instance of a use after free vulnerability. In particular, the v... +
2016-10-20CVE-2016-6960This vulnerability is an instance of a memory corruption vulnerability. In particular, th... +
2016-10-13CVE-2016-6987This vulnerability is an instance of a use after free vulnerability. In particular, the v... +
2016-09-15CVE-2016-4272Use after free vulnerability. vulnerability is caused by a flaw in ActionScript Displacam... +
2016-09-15CVE-2016-4279use after free vulnerability. watch method can trigger an access violation exception beca... +
2016-09-15CVE-2016-4280overflow vulnerability. vulnerability exists because NetStream object is confused with ... +
2016-09-15CVE-2016-4281memory corruption vulnerability. vulnerability exists in the Adobe Primetime TVDSK 2.0 fu... +
2016-09-15CVE-2016-4282memory corruption vulnerability. vulnerability exists in the Adobe Primetime TVDSK 2.0 fu... +
2016-09-15CVE-2016-4283Memory corruption vulnerability. vulnerability exists in the Adobe Primetime TVDSK 2.0 fu... +
2016-09-15CVE-2016-4285Memory corruption vulnerability. The vulnerability exists in the AS3 DRMManager class [0... +
2016-08-16CVE-2016-3304... +
2016-07-16CVE-2016-3264Microsoft Internet Explorer 9 through 11 and Microsoft Edge allow remote attackers to exe... +
2016-07-15CVE-2016-3239A local EOP vulnerability was discovered in the printing services of Microsoft Windows du... +
2016-07-14CVE-2016-3246Microsoft Edge allows remote attackers to execute arbitrary code or cause a denial of ser... +
2016-07-14CVE-2016-3259The Microsoft (1) JScript 9, (2) VBScript, and (3) Chakra JavaScript engines, as used in ... +
2016-07-14CVE-2016-3271The VBScript engine in Microsoft Edge allows remote attackers to obtain sensitive informa... +
2016-07-14CVE-2016-3277Microsoft Internet Explorer 10 and 11 and Microsoft Edge allow remote attackers to obtain... +
2016-07-13CVE-2016-3240Microsoft Internet Explorer 9 through 11 allows remote attackers to execute arbitrary cod... +
2016-07-13CVE-2016-3241Microsoft Internet Explorer 9 through 11 allows remote attackers to execute arbitrary cod... +
2016-07-13CVE-2016-3242Microsoft Internet Explorer 9 through 11 allows remote attackers to execute arbitrary cod... +
2016-07-13CVE-2016-3244Microsoft Edge allows remote attackers to bypass the ASLR protection mechanism via a craf... +
2016-07-13CVE-2016-3261Microsoft Internet Explorer 11 allows remote attackers to obtain sensitive information vi... +
2016-07-13CVE-2016-3274Microsoft Internet Explorer 9 through 11 and Microsoft Edge allow remote attackers to con... +
2016-07-13CVE-2016-3276Microsoft Internet Explorer 11 and Microsoft Edge allow remote attackers to conduct conte... +
2016-07-09CVE-2016-3211A vulnerbility was discovered within microsoft Internet Explorer. An attacker could use a... +
2016-07-09CVE-2016-3231A directory traversal vulnerability was discovered in Microsoft windows within the Diagno... +
2016-06-17CVE-2016-3210Scripting Engine Memory Corruption Vulnerability.... +
2016-06-16CVE-2016-3198Microsoft Edge allows remote attackers to bypass the Content Security Policy (CSP) protec... +
2016-06-16CVE-2016-3206Scripting Engine Memory Corruption Vulnerability," a different vulnerability than CVE-201... +
2016-06-16CVE-2016-3207Scripting Engine Memory Corruption Vulnerability... +
2016-06-16CVE-2016-3222Microsoft Edge allows remote attackers to execute arbitrary code or cause a denial of ser... +
2016-06-15CVE-2016-0199A vulnerability for Microsoft Internet Explorer that could allow attackers to achieve rem... +
2016-06-15CVE-2016-0200Vulnerability for Microsoft Internet Explorer. A successful exploitation of this issue co... +
2016-06-15CVE-2016-3199A vulnerability for MicrosoftEDGE that could allow attackers to achieve remote code execu... +
2016-06-15CVE-2016-3205A vulnerability for Microsoft Internet Explorer scripting engine. A successfull exploitat... +
2016-05-11CVE-2016-0184Use-after-free vulnerability in GDI in Microsoft Windows Vista SP2, Windows Server 2008 S... +
2016-05-11CVE-2016-0187The Microsoft (1) JScript 5.8 and (2) VBScript 5.8 engines, as used in Internet Explorer ... +
2016-05-11CVE-2016-0189The Microsoft (1) JScript 5.8 and (2) VBScript 5.7 and 5.8 engines, as used in Internet E... +
2016-05-11CVE-2016-0191The Chakra JavaScript engine in Microsoft Edge allows remote attackers to execute arbitra... +
2016-05-11CVE-2016-0192Microsoft Internet Explorer 9 through 11 and Microsoft Edge allow remote attackers to exe... +
2016-05-11CVE-2016-0193The Chakra JavaScript engine in Microsoft Edge allows remote attackers to execute arbitra... +
2016-04-13CVE-2016-0147Microsoft XML Core Services 3.0 allows remote attackers to execute arbitrary code via a c... +
2016-04-13CVE-2016-0154Microsoft Internet Explorer 9 through 11 and Microsoft Edge allow remote attackers to exe... +
2016-04-13CVE-2016-0155Microsoft Edge allows remote attackers to execute arbitrary code or cause a denial of ser... +
2016-04-13CVE-2016-0156Microsoft Edge allows remote attackers to execute arbitrary code or cause a denial of ser... +
2016-04-13CVE-2016-0157Microsoft Edge allows remote attackers to execute arbitrary code or cause a denial of ser... +
2016-04-13CVE-2016-0158Microsoft Edge allows remote attackers to bypass the Same Origin Policy via unspecified v... +
2016-04-13CVE-2016-0159Microsoft Internet Explorer 9 allows remote attackers to execute arbitrary code or cause ... +
2016-04-13CVE-2016-0161Microsoft Edge allows remote attackers to bypass the Same Origin Policy via unspecified v... +
2016-04-13CVE-2016-0164Microsoft Internet Explorer 10 and 11 allows remote attackers to execute arbitrary code o... +
2016-04-13CVE-2016-0166Microsoft Internet Explorer 11 allows remote attackers to execute arbitrary code or cause... +
2016-03-15CVE-2016-0052Microsoft Word 2007 SP3, Office 2010 SP2, Word 2010 SP2, Word 2013 SP1, Word 2013 RT SP1,... +
2016-03-10CVE-2016-0021Microsoft InfoPath 2007 SP3, 2010 SP2, and 2013 SP1 allows remote attackers to execute ar... +
2016-03-10CVE-2016-0022Microsoft Word 2007 SP3, Office 2010 SP2, Word 2010 SP2, Word 2013 SP1, Word 2013 RT SP1,... +
2016-03-10CVE-2016-0053Microsoft Word 2007 SP3, Office 2010 SP2, Word 2010 SP2, Word 2013 SP1, Word 2013 RT SP1,... +
2016-03-09CVE-2016-0098Microsoft Windows Server 2008 R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gol... +
2016-03-09CVE-2016-0102Microsoft Internet Explorer 11 and Microsoft Edge allow remote attackers to execute arbit... +
2016-03-09CVE-2016-0103Microsoft Internet Explorer 11 allows remote attackers to execute arbitrary code or cause... +
2016-03-09CVE-2016-0104Microsoft Internet Explorer 10 allows remote attackers to execute arbitrary code or cause... +
2016-03-09CVE-2016-0105Microsoft Internet Explorer 9 through 11 and Microsoft Edge allow remote attackers to exe... +
2016-03-09CVE-2016-0106Microsoft Internet Explorer 11 allows remote attackers to execute arbitrary code or cause... +
2016-03-09CVE-2016-0107Microsoft Internet Explorer 9 through 11 allows remote attackers to execute arbitrary cod... +
2016-03-09CVE-2016-0108Microsoft Internet Explorer 11 allows remote attackers to execute arbitrary code or cause... +
2016-03-09CVE-2016-0109Microsoft Internet Explorer 11 and Microsoft Edge allow remote attackers to execute arbit... +
2016-03-09CVE-2016-0110Microsoft Internet Explorer 10 through 11 and Microsoft Edge allow remote attackers to ex... +
2016-03-09CVE-2016-0111Microsoft Internet Explorer 9 through 11 and Microsoft Edge allow remote attackers to exe... +
2016-03-09CVE-2016-0112Microsoft Internet Explorer 9 through 11 allows remote attackers to execute arbitrary cod... +
2016-03-09CVE-2016-0113Microsoft Internet Explorer 9 through 11 allows remote attackers to execute arbitrary cod... +
2016-03-09CVE-2016-0114Microsoft Internet Explorer 11 allows remote attackers to execute arbitrary code or cause... +
2016-03-09CVE-2016-0123Microsoft Edge allows remote attackers to execute arbitrary code or cause a denial of ser... +
2016-03-09CVE-2016-0124Microsoft Edge allows remote attackers to execute arbitrary code or cause a denial of ser... +
2016-03-08CVE-2016-1007This vulnerability is an instance of a memory corruption vulnerability. In particular, th... +
2016-02-10CVE-2016-0060Microsoft Internet Explorer 9 through 11 and Microsoft Edge allow remote attackers to exe... +
2016-02-10CVE-2016-0061Microsoft Internet Explorer 9 through 11 and Microsoft Edge allow remote attackers to exe... +
2016-02-10CVE-2016-0062Microsoft Internet Explorer 11 and Microsoft Edge allow remote attackers to execute arbit... +
2016-02-10CVE-2016-0063Microsoft Internet Explorer 9 through 11 allows remote attackers to execute arbitrary cod... +
2016-02-10CVE-2016-0067Microsoft Internet Explorer 9 through 11 allows remote attackers to execute arbitrary cod... +
2016-02-10CVE-2016-0068Microsoft Internet Explorer 9 through 11 allows remote attackers to bypass the Same Origi... +
2016-02-10CVE-2016-0071Microsoft Internet Explorer 9 allows remote attackers to execute arbitrary code or cause ... +
2016-02-10CVE-2016-0072Microsoft Internet Explorer 9 through 11 allows remote attackers to execute arbitrary cod... +
2016-02-10CVE-2016-0080Microsoft Edge mishandles exceptions during window-message dispatch operations, which all... +
2016-01-30CVE-2016-0931Adobe Reader and Acrobat before 11.0.14, Acrobat and Acrobat Reader DC Classic before 15.... +
2016-01-30CVE-2016-0932Use-after-free vulnerability in the Doc object implementation in Adobe Reader and Acrobat... +
2016-01-30CVE-2016-0937Use-after-free vulnerability in the OCG object implementation in Adobe Reader and Acrobat... +
2016-01-30CVE-2016-0941Use-after-free vulnerability in the Search object implementation in Adobe Reader and Acro... +
2016-01-30CVE-2016-0943Adobe Reader and Acrobat before 11.0.14, Acrobat and Acrobat Reader DC Classic before 15.... +
2016-01-18CVE-2016-0002The Microsoft (1) VBScript 5.7 and 5.8 and (2) JScript 5.7 and 5.8 engines, as used in In... +
2016-01-18CVE-2016-0003Microsoft Edge allows remote attackers to execute arbitrary code via unspecified vectors,... +
2016-01-18CVE-2016-0005Microsoft Internet Explorer 9 through 11 allows remote attackers to bypass the Same Origi... +
2016-01-18CVE-2016-0012Microsoft Office 2007 SP3, Excel 2007 SP3, PowerPoint 2007 SP3, Visio 2007 SP3, Word 2007... +
2016-01-18CVE-2016-0024The Chakra JavaScript engine in Microsoft Edge allows remote attackers to execute arbitra... +
2015-12-16CVE-2015-6083Microsoft Internet Explorer 8 through 11 allows remote attackers to execute arbitrary cod... +
2015-12-16CVE-2015-6127Windows Media Center in Microsoft Windows Vista SP2, Windows 7 SP1, Windows 8, and Window... +
2015-12-16CVE-2015-6134Microsoft Internet Explorer 9 allows remote attackers to execute arbitrary code or cause ... +
2015-12-16CVE-2015-6135The Microsoft (1) VBScript 5.7 and 5.8 and (2) JScript 5.7 and 5.8 engines, as used in In... +
2015-12-16CVE-2015-6136The Microsoft (1) VBScript 5.7 and 5.8 and (2) JScript 5.7 and 5.8 engines, as used in In... +
2015-12-16CVE-2015-6140Microsoft Internet Explorer 11 and Microsoft Edge allow remote attackers to execute arbit... +
2015-12-16CVE-2015-6141Microsoft Internet Explorer 9 allows remote attackers to execute arbitrary code or cause ... +
2015-12-16CVE-2015-6142Microsoft Internet Explorer 11 and Microsoft Edge allow remote attackers to execute arbit... +
2015-12-16CVE-2015-6143Microsoft Internet Explorer 11 allows remote attackers to execute arbitrary code or cause... +
2015-12-16CVE-2015-6145Microsoft Internet Explorer 7 and 8 allows remote attackers to execute arbitrary code or ... +
2015-12-16CVE-2015-6147Microsoft Internet Explorer 8 and 9 allows remote attackers to execute arbitrary code or ... +
2015-12-16CVE-2015-6148Microsoft Internet Explorer 9 through 11 and Microsoft Edge allow remote attackers to exe... +
2015-12-16CVE-2015-6149Microsoft Internet Explorer 8 and 9 allows remote attackers to execute arbitrary code or ... +
2015-12-16CVE-2015-6150Microsoft Internet Explorer 7 through 11 allows remote attackers to execute arbitrary cod... +
2015-12-16CVE-2015-6151Microsoft Internet Explorer 8 through 11 and Microsoft Edge allow remote attackers to exe... +
2015-12-16CVE-2015-6152Microsoft Internet Explorer 10 allows remote attackers to execute arbitrary code or cause... +
2015-12-16CVE-2015-6153Microsoft Internet Explorer 11 and Microsoft Edge allow remote attackers to execute arbit... +
2015-12-16CVE-2015-6154Microsoft Internet Explorer 7 through 11 and Microsoft Edge allow remote attackers to exe... +
2015-12-16CVE-2015-6155Microsoft Internet Explorer 10 and 11 and Microsoft Edge allow remote attackers to execut... +
2015-12-16CVE-2015-6156Microsoft Internet Explorer 9 through 11 allows remote attackers to execute arbitrary cod... +
2015-12-16CVE-2015-6157Microsoft Internet Explorer 11 allows remote attackers to obtain sensitive information fr... +
2015-12-16CVE-2015-6158Microsoft Internet Explorer 11 and Microsoft Edge allow remote attackers to execute arbit... +
2015-12-16CVE-2015-6159Microsoft Internet Explorer 11 and Microsoft Edge allow remote attackers to execute arbit... +
2015-12-16CVE-2015-6160Microsoft Internet Explorer 11 allows remote attackers to execute arbitrary code or cause... +
2015-12-16CVE-2015-6162Microsoft Internet Explorer 10 allows remote attackers to execute arbitrary code or cause... +
2015-12-16CVE-2015-6168Microsoft Edge allows remote attackers to execute arbitrary code or cause a denial of ser... +
2015-12-16CVE-2015-6170Microsoft Edge allows remote attackers to gain privileges via a crafted web site, aka "Mi... +
2015-11-17CVE-2015-6038A problem was found in Microsoft Excel that could be leveraged by attackers to execute ar... +
2015-11-17CVE-2015-6091A problem was found in Microsoft Word that could potentially allow attackers to achieve r... +
2015-11-17CVE-2015-6092A use-after-free vulnerability was found in Microsoft Word that could potentially be abus... +
2015-11-12CVE-2015-6081Microsoft Internet Explorer 8 through 11 allows remote attackers to execute arbitrary cod... +
2015-11-12CVE-2015-6123Cross-site scripting (XSS) vulnerability in Microsoft Excel for Mac 2011 and Excel 2016 f... +
2015-11-11CVE-2015-6064Microsoft Internet Explorer 10 and 11 and Microsoft Edge allow remote attackers to execut... +
2015-11-11CVE-2015-6065Microsoft Internet Explorer 9 through 11 allows remote attackers to execute arbitrary cod... +
2015-11-11CVE-2015-6066Microsoft Internet Explorer 7 through 11 allows remote attackers to execute arbitrary cod... +
2015-11-11CVE-2015-6068Microsoft Internet Explorer 11 allows remote attackers to execute arbitrary code or cause... +
2015-11-11CVE-2015-6070Microsoft Internet Explorer 7 through 11 allows remote attackers to execute arbitrary cod... +
2015-11-11CVE-2015-6071Microsoft Internet Explorer 7 through 11 allows remote attackers to execute arbitrary cod... +
2015-11-11CVE-2015-6072Microsoft Internet Explorer 11 allows remote attackers to execute arbitrary code or cause... +
2015-11-11CVE-2015-6073Microsoft Internet Explorer 11 and Microsoft Edge allow remote attackers to execute arbit... +
2015-11-11CVE-2015-6075Microsoft Internet Explorer 11 allows remote attackers to execute arbitrary code or cause... +
2015-11-11CVE-2015-6076Microsoft Internet Explorer 7 through 11 allows remote attackers to execute arbitrary cod... +
2015-11-11CVE-2015-6077Microsoft Internet Explorer 11 allows remote attackers to execute arbitrary code or cause... +
2015-11-11CVE-2015-6078Microsoft Internet Explorer 9 through 11 and Microsoft Edge allow remote attackers to exe... +
2015-11-11CVE-2015-6079Microsoft Internet Explorer 11 allows remote attackers to execute arbitrary code or cause... +
2015-11-11CVE-2015-6080Microsoft Internet Explorer 11 allows remote attackers to execute arbitrary code or cause... +
2015-11-11CVE-2015-6082Microsoft Internet Explorer 11 allows remote attackers to execute arbitrary code or cause... +
2015-11-11CVE-2015-6084Microsoft Internet Explorer 10 and 11 allows remote attackers to execute arbitrary code o... +
2015-11-11CVE-2015-6085Microsoft Internet Explorer 10 and 11 allows remote attackers to execute arbitrary code o... +
2015-11-11CVE-2015-6086Microsoft Internet Explorer 9 through 11 allows remote attackers to obtain sensitive info... +
2015-11-11CVE-2015-6087Microsoft Internet Explorer 7 through 11 allows remote attackers to execute arbitrary cod... +
2015-11-11CVE-2015-6088Microsoft Internet Explorer 9 through 11 and Microsoft Edge allow remote attackers to byp... +
2015-11-11CVE-2015-6089The Microsoft (1) VBScript and (2) JScript engines, as used in Internet Explorer 8 throug... +
2015-10-14CVE-2015-2482The Microsoft (1) VBScript 5.7 and 5.8 and (2) JScript 5.7 and 5.8 engines, as used in In... +
2015-10-14CVE-2015-2515Use-after-free vulnerability in Windows Shell in Microsoft Windows Vista SP2, Windows Ser... +
2015-10-14CVE-2015-2548Use-after-free vulnerability in the Tablet Input Band in Windows Shell in Microsoft Windo... +
2015-10-14CVE-2015-6042Use-after-free vulnerability in the CWindow object implementation in Microsoft Internet E... +
2015-10-14CVE-2015-6048Microsoft Internet Explorer 7 through 11 allows remote attackers to execute arbitrary cod... +
2015-10-14CVE-2015-6049Microsoft Internet Explorer 7 through 11 allows remote attackers to execute arbitrary cod... +
2015-10-14CVE-2015-6050Microsoft Internet Explorer 10 allows remote attackers to execute arbitrary code or cause... +
2015-10-14CVE-2015-6053Microsoft Internet Explorer 11 allows remote attackers to obtain sensitive information fr... +
2015-10-14CVE-2015-6055The Microsoft (1) VBScript 5.7 and 5.8 and (2) JScript 5.7 and 5.8 engines, as used in In... +
2015-10-14CVE-2015-6059The Microsoft (1) VBScript 5.7 and 5.8 and (2) JScript 5.7 and 5.8 engines, as used in In... +
2015-10-08CVE-2015-6678There is a Buffer Overflow vulnerability in Flash when using a DefineText tag. Flash will... +
2015-10-03CVE-2015-3073Misusing AFParseDate to execute arbitrary code. Adobe Reader and Acrobat 10.x before 10.1... +
2015-09-09CVE-2015-2483Microsoft Internet Explorer 10 and 11 allows remote attackers to obtain sensitive informa... +
2015-09-09CVE-2015-2485Microsoft Internet Explorer 9 through 11 and Microsoft Edge allow remote attackers to exe... +
2015-09-09CVE-2015-2486Microsoft Internet Explorer 7 through 11 and Microsoft Edge allow remote attackers to exe... +
2015-09-09CVE-2015-2487Microsoft Internet Explorer 7 through 11 allows remote attackers to execute arbitrary cod... +
2015-09-09CVE-2015-2490Microsoft Internet Explorer 7 through 11 allows remote attackers to execute arbitrary cod... +
2015-09-09CVE-2015-2491Microsoft Internet Explorer 9 through 11 allows remote attackers to execute arbitrary cod... +
2015-09-09CVE-2015-2492Microsoft Internet Explorer 7 through 11 allows remote attackers to execute arbitrary cod... +
2015-09-09CVE-2015-2493The (1) VBScript and (2) JScript engines in Microsoft Internet Explorer 8 allow remote at... +
2015-09-09CVE-2015-2498Microsoft Internet Explorer 7 through 11 allows remote attackers to execute arbitrary cod... +
2015-09-09CVE-2015-2499Microsoft Internet Explorer 7 through 11 allows remote attackers to execute arbitrary cod... +
2015-09-09CVE-2015-2500Microsoft Internet Explorer 7 and 8 allows remote attackers to execute arbitrary code or ... +
2015-09-09CVE-2015-2501 Microsoft Internet Explorer 9 allows remote attackers to execute arbitrary code or cause... +
2015-09-09CVE-2015-2509Windows Media Center in Microsoft Windows Vista SP2, Windows 7 SP1, Windows 8, and Window... +
2015-08-19CVE-2015-2442Microsoft Internet Explorer 8 through 11 and Edge allow remote attackers to execute arbit... +
2015-08-19CVE-2015-2443Microsoft Internet Explorer 10 and 11 allows remote attackers to execute arbitrary code o... +
2015-08-19CVE-2015-2444Microsoft Internet Explorer 8 through 11 allows remote attackers to execute arbitrary cod... +
2015-08-19CVE-2015-2446Microsoft Internet Explorer 11 and Edge allow remote attackers to execute arbitrary code ... +
2015-08-19CVE-2015-2448Microsoft Internet Explorer 9 and 10 allows remote attackers to execute arbitrary code or... +
2015-08-19CVE-2015-2450Microsoft Internet Explorer 9 through 11 allows remote attackers to execute arbitrary cod... +
2015-08-19CVE-2015-2452Microsoft Internet Explorer 7 through 11 allows remote attackers to execute arbitrary cod... +
!2015-08-19CVE-2015-2502The vulnerability could allow remote code execution if a user views a specially crafted w... +
2015-07-28CVE-2015-4447Adobe Reader and Acrobat 10.x before 10.1.15 and 11.x before 11.0.12, Acrobat and Acrobat... +
2015-07-28CVE-2015-5086Adobe Reader and Acrobat 10.x before 10.1.15 and 11.x before 11.0.12, Acrobat and Acrobat... +
2015-07-28CVE-2015-5094Adobe Reader and Acrobat 10.x before 10.1.15 and 11.x before 11.0.12, Acrobat and Acrobat... +
2015-07-28CVE-2015-5100Adobe Reader and Acrobat 10.x before 10.1.15 and 11.x before 11.0.12, Acrobat and Acrobat... +
2015-07-28CVE-2015-5101Use-after-free vulnerability in Adobe Reader and Acrobat 10.x before 10.1.15 and 11.x bef... +
2015-07-28CVE-2015-5102Adobe Reader and Acrobat 10.x before 10.1.15 and 11.x before 11.0.12, Acrobat and Acrobat... +
2015-07-28CVE-2015-5103Adobe Reader and Acrobat 10.x before 10.1.15 and 11.x before 11.0.12, Acrobat and Acrobat... +
2015-07-28CVE-2015-5104Adobe Reader and Acrobat 10.x before 10.1.15 and 11.x before 11.0.12, Acrobat and Acrobat... +
2015-07-28CVE-2015-5111Use-after-free vulnerability in Adobe Reader and Acrobat 10.x before 10.1.15 and 11.x bef... +
2015-07-28CVE-2015-5113Use-after-free vulnerability in Adobe Reader and Acrobat 10.x before 10.1.15 and 11.x bef... +
2015-07-19CVE-2014-8450Adobe Reader and Acrobat 10.x before 10.1.15 and 11.x before 11.0.12, Acrobat and Acrobat... +
!2015-07-19CVE-2015-2426The vulnerability could allow remote code execution if a user opens a specially crafted d... +
2015-07-19CVE-2015-5097Integer overflow in Adobe Reader and Acrobat 10.x before 10.1.15 and 11.x before 11.0.12,... +
2015-07-17CVE-2015-1729Microsoft Internet Explorer 9 through 11 allows remote attackers to read content from a d... +
2015-07-17CVE-2015-1733Microsoft Internet Explorer 10 and 11 allows remote attackers to execute arbitrary code o... +
2015-07-17CVE-2015-1738Microsoft Internet Explorer 8 and 9 allows remote attackers to execute arbitrary code or ... +
2015-07-17CVE-2015-1767Microsoft Internet Explorer 9 through 11 allows remote attackers to execute arbitrary cod... +
2015-07-17CVE-2015-2372vbscript.dll in Microsoft VBScript 5.6 through 5.8, as used with Internet Explorer 6 thro... +
2015-07-17CVE-2015-2383Microsoft Internet Explorer 11 allows remote attackers to execute arbitrary code or cause... +
2015-07-17CVE-2015-2388Microsoft Internet Explorer 8 and 9 allows remote attackers to execute arbitrary code or ... +
2015-07-17CVE-2015-2389Microsoft Internet Explorer 10 and 11 allows remote attackers to execute arbitrary code o... +
2015-07-17CVE-2015-2390Microsoft Internet Explorer 6 through 11 allows remote attackers to execute arbitrary cod... +
2015-07-17CVE-2015-2391Microsoft Internet Explorer 9 allows remote attackers to execute arbitrary code or cause ... +
2015-07-17CVE-2015-2397Microsoft Internet Explorer 6 through 11 allows remote attackers to execute arbitrary cod... +
2015-07-17CVE-2015-2401Microsoft Internet Explorer 9 through 11 allows remote attackers to execute arbitrary cod... +
2015-07-17CVE-2015-2403Microsoft Internet Explorer 8 allows remote attackers to execute arbitrary code or cause ... +
2015-07-17CVE-2015-2404Microsoft Internet Explorer 6 through 11 allows remote attackers to execute arbitrary cod... +
2015-07-17CVE-2015-2406Microsoft Internet Explorer 6 through 11 allows remote attackers to execute arbitrary cod... +
2015-07-17CVE-2015-2408Microsoft Internet Explorer 9 through 11 allows remote attackers to execute arbitrary cod... +
2015-07-17CVE-2015-2411Microsoft Internet Explorer 10 and 11 allows remote attackers to execute arbitrary code o... +
2015-07-17CVE-2015-2413Microsoft Internet Explorer 6 through 11 allows remote attackers to determine the existen... +
2015-07-17CVE-2015-2414Microsoft Internet Explorer 8 through 11 allows remote attackers to obtain sensitive brow... +
2015-07-17CVE-2015-2419JScript 9 in Microsoft Internet Explorer 10 and 11 allows remote attackers to execute arb... +
2015-07-17CVE-2015-2421Microsoft Internet Explorer 6 through 11 allows remote attackers to bypass the ASLR prote... +
2015-07-17CVE-2015-2422Microsoft Internet Explorer 6 through 11 allows remote attackers to execute arbitrary cod... +
2015-07-17CVE-2015-2425Microsoft Internet Explorer 11 allows remote attackers to execute arbitrary code or cause... +
2015-07-15CVE-2015-2369Untrusted search path vulnerability in Windows Media Device Manager in Microsoft Windows ... +
2015-07-01CVE-2015-3668Heap overflow vulnerability in Apple QuickTime that could lead to arbitrary code executio... +
2015-06-27CVE-2015-3113Heap-based buffer overflow in Adobe Flash Player before 13.0.0.296 and 14.x through 18.x ... +
2015-06-10CVE-2015-1687Microsoft Internet Explorer 6 through 9 allows remote attackers to execute arbitrary code... +
2015-06-10CVE-2015-1730Microsoft Internet Explorer 9 allows remote attackers to execute arbitrary code or cause ... +
2015-06-10CVE-2015-1731Microsoft Internet Explorer 10 and 11 allows remote attackers to execute arbitrary code o... +
2015-06-10CVE-2015-1732Microsoft Internet Explorer 11 allows remote attackers to execute arbitrary code or cause... +
2015-06-10CVE-2015-1735Microsoft Internet Explorer 6 through 11 allows remote attackers to execute arbitrary cod... +
2015-06-10CVE-2015-1736Microsoft Internet Explorer 10 and 11 allows remote attackers to execute arbitrary code o... +
2015-06-10CVE-2015-1737Microsoft Internet Explorer 10 and 11 allows remote attackers to execute arbitrary code o... +
2015-06-10CVE-2015-1740Microsoft Internet Explorer 6 through 11 allows remote attackers to execute arbitrary cod... +
2015-06-10CVE-2015-1741Microsoft Internet Explorer 9 through 11 allows remote attackers to execute arbitrary cod... +
2015-06-10CVE-2015-1742Microsoft Internet Explorer 11 allows remote attackers to execute arbitrary code or cause... +
2015-06-10CVE-2015-1744Microsoft Internet Explorer 6 through 11 allows remote attackers to execute arbitrary cod... +
2015-06-10CVE-2015-1745Microsoft Internet Explorer 6 through 11 allows remote attackers to execute arbitrary cod... +
2015-06-10CVE-2015-1747Microsoft Internet Explorer 11 allows remote attackers to execute arbitrary code or cause... +
2015-06-10CVE-2015-1748Microsoft Internet Explorer 7 through 11 allows remote attackers to gain privileges via a... +
2015-06-10CVE-2015-1750Microsoft Internet Explorer 11 allows remote attackers to execute arbitrary code or cause... +
2015-06-10CVE-2015-1751Microsoft Internet Explorer 10 allows remote attackers to execute arbitrary code or cause... +
2015-06-10CVE-2015-1752Microsoft Internet Explorer 9 through 11 allows remote attackers to execute arbitrary cod... +
2015-06-10CVE-2015-1755Microsoft Internet Explorer 10 and 11 allows remote attackers to execute arbitrary code o... +
2015-06-10CVE-2015-1766Microsoft Internet Explorer 6 through 11 allows remote attackers to execute arbitrary cod... +
2015-06-10CVE-2015-1770Microsoft Office 2013 SP1 and 2013 RT SP1 allows remote attackers to execute arbitrary co... +
2015-06-09CVE-2015-1753Microsoft Internet Explorer 11 allows remote attackers to execute arbitrary code or cause... +
2015-05-27CVE-2015-3053Use-after-free vulnerability in Adobe Reader and Acrobat 10.x before 10.1.14 and 11.x bef... +
2015-05-27CVE-2015-3054Use-after-free vulnerability in Adobe Reader and Acrobat 10.x before 10.1.14 and 11.x bef... +
2015-05-27CVE-2015-3055Use-after-free vulnerability in Adobe Reader and Acrobat 10.x before 10.1.14 and 11.x bef... +
2015-05-27CVE-2015-3056Adobe Reader and Acrobat 10.x before 10.1.14 and 11.x before 11.0.11 on Windows and OS X ... +
2015-05-27CVE-2015-3057Adobe Reader and Acrobat 10.x before 10.1.14 and 11.x before 11.0.11 on Windows and OS X ... +
2015-05-27CVE-2015-3059Use-after-free vulnerability in Adobe Reader and Acrobat 10.x before 10.1.14 and 11.x bef... +
2015-05-15CVE-2015-1658Microsoft Internet Explorer 11 allows remote attackers to execute arbitrary code or cause... +
2015-05-15CVE-2015-1685Microsoft Internet Explorer 11 allows remote attackers to bypass the ASLR protection mech... +
2015-05-15CVE-2015-1686The Microsoft (1) VBScript 5.6 through 5.8 and (2) JScript 5.6 through 5.8 engines, as us... +
2015-05-15CVE-2015-1689Microsoft Internet Explorer 9 through 11 allows remote attackers to execute arbitrary cod... +
2015-05-15CVE-2015-1691Microsoft Internet Explorer 8 and 9 allows remote attackers to execute arbitrary code or ... +
2015-05-15CVE-2015-1692Microsoft Internet Explorer 7 through 11 allows user-assisted remote attackers to read th... +
2015-05-15CVE-2015-1705Microsoft Internet Explorer 9 through 11 allows remote attackers to execute arbitrary cod... +
2015-05-15CVE-2015-1706Microsoft Internet Explorer 11 allows remote attackers to execute arbitrary code or cause... +
2015-05-15CVE-2015-1708Microsoft Internet Explorer 7 and 8 allows remote attackers to execute arbitrary code or ... +
2015-05-15CVE-2015-1709Microsoft Internet Explorer 7 through 11 allows remote attackers to execute arbitrary cod... +
2015-05-15CVE-2015-1710Microsoft Internet Explorer 6 through 11 allows remote attackers to execute arbitrary cod... +
2015-05-15CVE-2015-1711Microsoft Internet Explorer 11 allows remote attackers to execute arbitrary code or cause... +
2015-05-15CVE-2015-1712Microsoft Internet Explorer 8 and 9 allows remote attackers to execute arbitrary code or ... +
2015-05-15CVE-2015-1714Microsoft Internet Explorer 10 and 11 allows remote attackers to execute arbitrary code o... +
2015-05-15CVE-2015-1717Microsoft Internet Explorer 11 allows remote attackers to execute arbitrary code or cause... +
2015-05-15CVE-2015-1718Microsoft Internet Explorer 11 allows remote attackers to execute arbitrary code or cause... +
2015-05-12CVE-2015-1671The Windows DirectWrite library, as used in Microsoft .NET Framework 3.0 SP2, 3.5, 3.5.1,... +
!2015-04-22CVE-2015-1701Vulnerability in Microsoft Windows before 8 allows local users to gain privileges via unk... +
2015-04-21CVE-2015-1645Microsoft Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1,... +
2015-04-19CVE-2015-1662Microsoft Internet Explorer 11 allows remote attackers to execute arbitrary code or cause... +
2015-04-17CVE-2015-1646Microsoft XML Core Services (aka MSXML) 3.0 allows remote attackers to bypass the Same Or... +
2015-04-17CVE-2015-1652Microsoft Internet Explorer 6 through 11 allows remote attackers to execute arbitrary cod... +
2015-04-17CVE-2015-1657Microsoft Internet Explorer 9 through 11 allows remote attackers to execute arbitrary cod... +
2015-04-17CVE-2015-1660Microsoft Internet Explorer 9 allows remote attackers to execute arbitrary code or cause ... +
2015-04-17CVE-2015-1661Microsoft Internet Explorer 6 through 11 allows remote attackers to bypass the ASLR prote... +
2015-04-17CVE-2015-1665Microsoft Internet Explorer 11 allows remote attackers to execute arbitrary code or cause... +
2015-04-17CVE-2015-1666Microsoft Internet Explorer 6 through 11 allows remote attackers to execute arbitrary cod... +
2015-04-17CVE-2015-1667Microsoft Internet Explorer 8 through 11 allows remote attackers to execute arbitrary cod... +
2015-04-17CVE-2015-1668Microsoft Internet Explorer 10 and 11 allows remote attackers to execute arbitrary code o... +
2015-03-11CVE-2015-0032vbscript.dll in Microsoft VBScript 5.6 through 5.8, as used with Internet Explorer 8 thro... +
2015-03-11CVE-2015-0081Windows Text Services (WTS) in Microsoft Windows Server 2003 SP2, Windows Vista SP2, Wind... +
2015-03-11CVE-2015-0097Microsoft Excel 2007 SP3, PowerPoint 2007 SP3, Word 2007 SP3, Excel 2010 SP2, PowerPoint ... +
2015-03-11CVE-2015-0099Microsoft Internet Explorer 10 allows remote attackers to execute arbitrary code or cause... +
2015-03-11CVE-2015-0100Microsoft Internet Explorer 8 allows remote attackers to execute arbitrary code or cause ... +
2015-03-11CVE-2015-1622Microsoft Internet Explorer 10 and 11 allows remote attackers to execute arbitrary code o... +
2015-03-11CVE-2015-1623Microsoft Internet Explorer 11 allows remote attackers to execute arbitrary code or cause... +
2015-03-11CVE-2015-1624Microsoft Internet Explorer 8 through 11 allows remote attackers to execute arbitrary cod... +
2015-03-11CVE-2015-1625Microsoft Internet Explorer 6 through 11 allows remote attackers to execute arbitrary cod... +
2015-03-11CVE-2015-1634Microsoft Internet Explorer 6 through 11 allows remote attackers to execute arbitrary cod... +
2015-02-18CVE-2015-0017Microsoft Internet Explorer 6 through 11 allows remote attackers to execute arbitrary cod... +
2015-02-18CVE-2015-0018Microsoft Internet Explorer 11 allows remote attackers to execute arbitrary code or cause... +
2015-02-18CVE-2015-0019Microsoft Internet Explorer 9 and 10 allows remote attackers to execute arbitrary code or... +
2015-02-18CVE-2015-0020Microsoft Internet Explorer 6 through 11 allows remote attackers to execute arbitrary cod... +
2015-02-18CVE-2015-0021Microsoft Internet Explorer 6 through 10 allows remote attackers to execute arbitrary cod... +
2015-02-18CVE-2015-0022Microsoft Internet Explorer 6 through 11 allows remote attackers to execute arbitrary cod... +
2015-02-18CVE-2015-0023Microsoft Internet Explorer 10 allows remote attackers to execute arbitrary code or cause... +
2015-02-18CVE-2015-0025Microsoft Internet Explorer 10 allows remote attackers to execute arbitrary code or cause... +
2015-02-18CVE-2015-0026Microsoft Internet Explorer 6 through 11 allows remote attackers to execute arbitrary cod... +
2015-02-17CVE-2015-0031Microsoft Internet Explorer 6 through 11 allows remote attackers to execute arbitrary cod... +
2015-02-17CVE-2015-0035Microsoft Internet Explorer 10 and 11 allows remote attackers to execute arbitrary code o... +
2015-02-17CVE-2015-0039Microsoft Internet Explorer 10 and 11 allows remote attackers to execute arbitrary code o... +
2015-02-17CVE-2015-0040Microsoft Internet Explorer 11 allows remote attackers to execute arbitrary code or cause... +
2015-02-17CVE-2015-0041Microsoft Internet Explorer 6 through 11 allows remote attackers to execute arbitrary cod... +
2015-02-17CVE-2015-0042Microsoft Internet Explorer 9 through 11 allows remote attackers to execute arbitrary cod... +
2015-02-17CVE-2015-0043Microsoft Internet Explorer 8 through 11 allows remote attackers to execute arbitrary cod... +
2015-02-17CVE-2015-0044Microsoft Internet Explorer 8 and 9 allows remote attackers to execute arbitrary code or ... +
2015-02-17CVE-2015-0045Microsoft Internet Explorer 6 through 8 allows remote attackers to execute arbitrary code... +
2015-02-17CVE-2015-0046Microsoft Internet Explorer 9 through 11 allows remote attackers to execute arbitrary cod... +
2015-02-17CVE-2015-0048Microsoft Internet Explorer 9 allows remote attackers to execute arbitrary code or cause ... +
2015-02-17CVE-2015-0049Microsoft Internet Explorer 8 and 10 allows remote attackers to execute arbitrary code or... +
2015-02-17CVE-2015-0051Microsoft Internet Explorer 8 allows remote attackers to bypass the ASLR protection mecha... +
2015-02-17CVE-2015-0052Microsoft Internet Explorer 10 and 11 allows remote attackers to execute arbitrary code o... +
2015-02-17CVE-2015-0053Microsoft Internet Explorer 6 through 8 allows remote attackers to execute arbitrary code... +
2015-02-17CVE-2015-0067Microsoft Internet Explorer 6 through 9 allows remote attackers to execute arbitrary code... +
2015-02-17CVE-2015-0068Microsoft Internet Explorer 10 and 11 allows remote attackers to execute arbitrary code o... +
2015-02-17CVE-2015-0071Microsoft Internet Explorer 9 through 11 allows remote attackers to bypass the ASLR prote... +
2015-02-07CVE-2015-0313Use-after-free vulnerability in Adobe Flash Player before 13.0.0.269 and 14.x through 16.... +
2015-02-04CVE-2015-0072Cross-site scripting (XSS) vulnerability in Microsoft Internet Explorer 10 and 11 allows ... +
2015-01-30CVE-2015-0311Unspecified vulnerability in Adobe Flash Player through 13.0.0.262 and 14.x, 15.x, and 16... +
    avast! detection:
    • SWF:CVE-2015-0311-A [Expl]+
    • SWF:CVE-2015-0311-B [Expl]
    • SWF:CVE-2015-0311-C [Expl]
    • SWF:CVE-2015-0311-D [Expl]
    • SWF:CVE-2015-0311-E [Expl]
    • SWF:CVE-2015-0311-F [Expl]
    • SWF:CVE-2015-0311-G [Expl]
    • SWF:CVE-2015-0311-H [Expl]
    • SWF:CVE-2015-0311-I [Expl]
  • VPS release: 150130-00
  • Security advisory:
2015-01-20CVE-2014-8438Use-after-free vulnerability in Adobe Flash Player before 13.0.0.252 and 14.x and 15.x be... +
2014-12-13CVE-2014-6357Use-after-free vulnerability in Microsoft Office 2010 SP2, Office 2013 Gold and SP1, Offi... +
2014-12-13CVE-2014-8452Adobe Reader and Acrobat 10.x before 10.1.13 and 11.x before 11.0.10 on Windows and OS X ... +
2014-12-12CVE-2014-8967Use-after-free vulnerability in Microsoft Internet Explorer allows remote attackers to ex... +
2014-12-11CVE-2014-8451An unspecified JavaScript API in Adobe Reader and Acrobat 10.x before 10.1.13 and 11.x be... +
2014-12-10CVE-2014-6327Microsoft Internet Explorer 11 allows remote attackers to execute arbitrary code or cause... +
2014-12-10CVE-2014-6329Microsoft Internet Explorer 11 allows remote attackers to execute arbitrary code or cause... +
2014-12-10CVE-2014-6330Microsoft Internet Explorer 9 allows remote attackers to execute arbitrary code or cause ... +
2014-12-10CVE-2014-6355The Graphics Component in Microsoft Windows Server 2003 SP2, Windows Vista SP2, Windows S... +
2014-12-10CVE-2014-6366Microsoft Internet Explorer 6 and 7 allows remote attackers to execute arbitrary code or ... +
2014-12-10CVE-2014-6369Microsoft Internet Explorer 9 through 11 allows remote attackers to execute arbitrary cod... +
2014-12-10CVE-2014-6373Microsoft Internet Explorer 10 allows remote attackers to execute arbitrary code or cause... +
2014-12-10CVE-2014-6374Microsoft Internet Explorer 6 through 11 allows remote attackers to execute arbitrary cod... +
2014-12-10CVE-2014-6376Microsoft Internet Explorer 11 allows remote attackers to execute arbitrary code or cause... +
2014-12-10CVE-2014-8449Integer overflow in Adobe Reader and Acrobat 10.x before 10.1.13 and 11.x before 11.0.10 ... +
2014-12-10CVE-2014-8966Microsoft Internet Explorer 6 through 8 allows remote attackers to execute arbitrary code... +
2014-11-13CVE-2014-8441Adobe Flash Player before 13.0.0.252 and 14.x and 15.x before 15.0.0.223 on Windows and O... +
2014-11-12CVE-2014-4143Microsoft Internet Explorer 6 through 11 allows remote attackers to execute arbitrary cod... +
2014-11-12CVE-2014-6323Microsoft Internet Explorer 7 through 11 allows remote attackers to obtain sensitive clip... +
2014-11-12CVE-2014-6332OleAut32.dll in OLE in Microsoft Windows Server 2003 SP2, Windows Vista SP2, Windows Serv... +
    avast! detection:
    • JS:CVE-2014-6332-A [Expl]+
    • VBS:CVE-2014-6332-A [Expl]
    • VBS:CVE-2014-6332-B [Expl]
    • VBS:CVE-2014-6332-C [Trj]
    • VBS:CVE-2014-6332-D [Expl]
    • VBS:CVE-2014-6332-E [Trj]
    • VBS:CVE-2014-6332-F [Trj]
    • VBS:CVE-2014-6332-G [Trj]
    • VBS:CVE-2014-6332-H [Trj]
  • VPS release: 141112-00
  • Security advisory:
2014-11-12CVE-2014-6337Microsoft Internet Explorer 10 and 11 allows remote attackers to execute arbitrary code o... +
2014-11-12CVE-2014-6339Microsoft Internet Explorer 8 and 9 allows remote attackers to bypass the ASLR protection... +
2014-11-12CVE-2014-6340Microsoft Internet Explorer 6 through 11 allows remote attackers to read content from a d... +
2014-11-12CVE-2014-6341Microsoft Internet Explorer 6 through 11 allows remote attackers to execute arbitrary cod... +
2014-11-12CVE-2014-6342Microsoft Internet Explorer 9 allows remote attackers to execute arbitrary code or cause ... +
2014-11-12CVE-2014-6347Microsoft Internet Explorer 11 allows remote attackers to execute arbitrary code or cause... +
2014-11-12CVE-2014-6348Microsoft Internet Explorer 9 allows remote attackers to execute arbitrary code or cause ... +
2014-11-12CVE-2014-6351Microsoft Internet Explorer 8 through 11 allows remote attackers to execute arbitrary cod... +
2014-11-12CVE-2014-6353Microsoft Internet Explorer 6 through 10 allows remote attackers to execute arbitrary cod... +
2014-11-11CVE-2014-0576Adobe Flash Player before 13.0.0.252 and 14.x and 15.x before 15.0.0.223 on Windows and O... +
2014-11-10CVE-2014-6333Microsoft Word 2007 SP3, Word Viewer, and Office Compatibility Pack SP3 allow remote atta... +
2014-11-10CVE-2014-6334Microsoft Word 2007 SP3, Word Viewer, and Office Compatibility Pack SP3 allow remote atta... +
2014-11-10CVE-2014-6335Microsoft Word 2007 SP3, Word Viewer, and Office Compatibility Pack SP3 allow remote atta... +
2014-11-09CVE-2014-0553Use-after-free vulnerability in Adobe Flash Player before 13.0.0.244 and 14.x and 15.x be... +
2014-11-01CVE-2014-4671Adobe Flash Player before 13.0.0.231 and 14.x before 14.0.0.145 on Windows and OS X and b... +
2014-10-17CVE-2014-4126Microsoft Internet Explorer 10 and 11 allows remote attackers to execute arbitrary code o... +
2014-10-17CVE-2014-4127Microsoft Internet Explorer 6 through 10 allows remote attackers to execute arbitrary cod... +
2014-10-17CVE-2014-4128Microsoft Internet Explorer 6 through 11 allows remote attackers to execute arbitrary cod... +
2014-10-17CVE-2014-4129Microsoft Internet Explorer 8 allows remote attackers to execute arbitrary code or cause ... +
2014-10-17CVE-2014-4130Microsoft Internet Explorer 11 allows remote attackers to execute arbitrary code or cause... +
2014-10-17CVE-2014-4132Microsoft Internet Explorer 11 allows remote attackers to execute arbitrary code or cause... +
2014-10-17CVE-2014-4133Microsoft Internet Explorer 6 and 7 allows remote attackers to execute arbitrary code or ... +
2014-10-17CVE-2014-4137Microsoft Internet Explorer 6 and 7 allows remote attackers to execute arbitrary code or ... +
2014-10-17CVE-2014-4138Microsoft Internet Explorer 11 allows remote attackers to execute arbitrary code or cause... +
2014-10-17CVE-2014-4140Microsoft Internet Explorer 8 through 11 allows remote attackers to bypass the ASLR prote... +
2014-10-17CVE-2014-4141Microsoft Internet Explorer 8 through 11 allows remote attackers to execute arbitrary cod... +
!2014-10-16CVE-2014-4114Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8... +
2014-09-22CVE-2014-0552Adobe Flash Player before 13.0.0.244 and 14.x and 15.x before 15.0.0.152 on Windows and O... +
2014-09-22CVE-2014-0565Adobe Reader and Acrobat 10.x before 10.1.12 and 11.x before 11.0.09 on Windows and OS X ... +
2014-09-16CVE-2014-4082Microsoft Internet Explorer 6 through 10 allows remote attackers to execute arbitrary cod... +
2014-09-16CVE-2014-4086Microsoft Internet Explorer 6 through 8 allows remote attackers to execute arbitrary code... +
2014-09-11CVE-2014-2799Microsoft Internet Explorer 6 through 11 allows remote attackers to execute arbitrary cod... +
2014-09-11CVE-2014-4065Microsoft Internet Explorer 6 through 11 allows remote attackers to execute arbitrary cod... +
2014-09-11CVE-2014-4080Microsoft Internet Explorer 10 and 11 allows remote attackers to execute arbitrary code o... +
2014-09-11CVE-2014-4081Microsoft Internet Explorer 6 through 11 allows remote attackers to execute arbitrary cod... +
2014-09-11CVE-2014-4084Microsoft Internet Explorer 10 allows remote attackers to execute arbitrary code or cause... +
2014-09-11CVE-2014-4087Microsoft Internet Explorer 11 allows remote attackers to execute arbitrary code or cause... +
2014-09-11CVE-2014-4088Microsoft Internet Explorer 6 through 11 allows remote attackers to execute arbitrary cod... +
2014-09-11CVE-2014-4089Microsoft Internet Explorer 10 and 11 allows remote attackers to execute arbitrary code o... +
2014-09-11CVE-2014-4092Microsoft Internet Explorer 8 through 11 allows remote attackers to execute arbitrary cod... +
2014-09-11CVE-2014-4094Microsoft Internet Explorer 6 through 11 allows remote attackers to execute arbitrary cod... +
2014-09-11CVE-2014-4095Microsoft Internet Explorer 11 allows remote attackers to execute arbitrary code or cause... +
2014-09-01CVE-2014-0543Adobe Flash Player before 13.0.0.241 and 14.x before 14.0.0.176 on Windows and OS X and b... +
2014-08-14CVE-2014-2820Microsoft Internet Explorer 6 through 11 allows remote attackers to execute arbitrary cod... +
2014-08-14CVE-2014-2823Microsoft Internet Explorer 11 allows remote attackers to execute arbitrary code or cause... +
2014-08-14CVE-2014-2824Microsoft Internet Explorer 8 allows remote attackers to execute arbitrary code or cause ... +
2014-08-14CVE-2014-4050Microsoft Internet Explorer 10 and 11 allows remote attackers to execute arbitrary code o... +
2014-08-14CVE-2014-4057Microsoft Internet Explorer 11 allows remote attackers to execute arbitrary code or cause... +
2014-08-14CVE-2014-4063Microsoft Internet Explorer 6 through 11 allows remote attackers to execute arbitrary cod... +
2014-07-15CVE-2014-1765Multiple use-after-free vulnerabilities in Microsoft Internet Explorer 11 allow remote at... +
2014-07-15CVE-2014-2801Microsoft Internet Explorer 10 and 11 allows remote attackers to execute arbitrary code o... +
2014-07-09CVE-2014-0514The Adobe Reader Mobile application before 11.2 for Android does not properly restrict us... +
2014-06-22CVE-2014-0196The n_tty_write function in drivers/tty/n_tty.c in the Linux kernel through 3.14.3 does n... +
2014-06-11CVE-2014-1762Unspecified vulnerability in Microsoft Internet Explorer 6 through 11 allows remote attac... +
2014-06-11CVE-2014-1785Microsoft Internet Explorer 11 allows remote attackers to execute arbitrary code or cause... +
2014-06-11CVE-2014-1791Microsoft Internet Explorer 7 through 11 allows remote attackers to execute arbitrary cod... +
2014-06-11CVE-2014-1795Microsoft Internet Explorer 9 through 11 allows remote attackers to execute arbitrary cod... +
2014-06-11CVE-2014-1797Microsoft Internet Explorer 10 and 11 allows remote attackers to execute arbitrary code o... +
2014-06-11CVE-2014-1802Microsoft Internet Explorer 10 and 11 allows remote attackers to execute arbitrary code o... +
2014-06-11CVE-2014-1804Microsoft Internet Explorer 8 allows remote attackers to execute arbitrary code or cause ... +
2014-06-11CVE-2014-1805Microsoft Internet Explorer 9 through 11 allows remote attackers to execute arbitrary cod... +
2014-05-22CVE-2014-0529Buffer overflow in Adobe Reader and Acrobat 10.x before 10.1.10 and 11.x before 11.0.07 o... +
2014-05-21CVE-2014-0511Heap-based buffer overflow in Adobe Reader 11.0.06 allows remote attackers to execute arb... +
2014-05-14CVE-2014-0310Microsoft Internet Explorer 6 through 11 allows remote attackers to execute arbitrary cod... +
2014-05-14CVE-2014-1815Microsoft Internet Explorer 6 through 11 allows remote attackers to execute arbitrary cod... +
!2014-04-29CVE-2014-0515Buffer overflow in Adobe Flash Player before 11.7.700.279 and 11.8.x through 13.0.x befor... +
    avast! detection:
    • SWF:CVE-2014-0515-A [Expl]+
    • SWF:CVE-2014-0515-B [Expl]
    • SWF:CVE-2014-0515-C [Expl]
    • SWF:CVE-2014-0515-D [Expl]
    • SWF:CVE-2014-0515-E [Expl]
    • SWF:CVE-2014-0515-F [Expl]
    • SWF:CVE-2014-0515-G [Expl]
    • SWF:CVE-2014-0515-H [Expl]
  • VPS release: 140429-00
  • Security advisory:
!2014-04-28CVE-2014-1776Use-after-free vulnerability in Microsoft Internet Explorer 6 through 11 allows remote at... +
2014-04-24CVE-2013-3882Microsoft Internet Explorer is prone to a memory-corruption vulnerability. Attackers can ... +
2014-04-09CVE-2014-1751Microsoft Internet Explorer 9 allows remote attackers to execute arbitrary code or cause ... +
2014-04-09CVE-2014-1752Microsoft Internet Explorer 6 and 7 allows remote attackers to execute arbitrary code or ... +
2014-04-09CVE-2014-1753Microsoft Internet Explorer 6 through 9 allows remote attackers to execute arbitrary code... +
2014-04-09CVE-2014-1755Microsoft Internet Explorer 9 allows remote attackers to execute arbitrary code or cause ... +
!2014-04-08CVE-2014-1761Microsoft Word; Word Viewer; Office Compatibility Pack; Office for Mac 2011; Word Automat... +
2014-03-13CVE-2014-0297Microsoft Internet Explorer 8 through 11 allows remote attackers to execute arbitrary cod... +
2014-03-13CVE-2014-0298Microsoft Internet Explorer 9 through 11 allows remote attackers to execute arbitrary cod... +
2014-03-13CVE-2014-0299Microsoft Internet Explorer 6 through 11 allows remote attackers to execute arbitrary cod... +
2014-03-13CVE-2014-0302Microsoft Internet Explorer 6 through 8 allows remote attackers to execute arbitrary code... +
2014-03-13CVE-2014-0303Microsoft Internet Explorer 6 through 8 allows remote attackers to execute arbitrary code... +
2014-03-13CVE-2014-0304Microsoft Internet Explorer 11 allows remote attackers to execute arbitrary code or cause... +
2014-03-13CVE-2014-0305Microsoft Internet Explorer 6 through 11 allows remote attackers to execute arbitrary cod... +
2014-03-13CVE-2014-0312Microsoft Internet Explorer 8 through 11 allows remote attackers to execute arbitrary cod... +
2014-03-13CVE-2014-0313Microsoft Internet Explorer 10 and 11 allows remote attackers to execute arbitrary code o... +
2014-02-27CVE-2014-0309Microsoft Internet Explorer 8 through 10 allows remote attackers to execute arbitrary cod... +
2014-02-27CVE-2014-0324Microsoft Internet Explorer 8 through 11 allows remote attackers to execute arbitrary cod... +
!2014-02-15CVE-2014-0322Use-after-free vulnerability in Microsoft Internet Explorer 10 allows remote attackers to... +
2014-02-14CVE-2013-5329Adobe Flash Player on Windows, Mac OS X and Linux, Adobe AIR , Adobe AIR SDK, Adobe AIR S... +
2014-02-12CVE-2014-0266The XMLHTTP ActiveX controls in XML Core Services 3.0 allow remote attackers to bypass t... +
2014-02-12CVE-2014-0267Microsoft Internet Explorer 11 allows remote attackers to execute arbitrary code or cause... +
2014-02-12CVE-2014-0270Microsoft Internet Explorer 9 through 11 allows remote attackers to execute arbitrary cod... +
2014-02-12CVE-2014-0273Microsoft Internet Explorer 9 through 11 allows remote attackers to execute arbitrary cod... +
2014-02-12CVE-2014-0274Microsoft Internet Explorer 9 through 11 allows remote attackers to execute arbitrary cod... +
2014-02-12CVE-2014-0275Microsoft Internet Explorer 6 through 11 allows remote attackers to execute arbitrary cod... +
2014-02-12CVE-2014-0276Microsoft Internet Explorer 8 and 9 allows remote attackers to execute arbitrary code or ... +
2014-02-12CVE-2014-0278Microsoft Internet Explorer 8 allows remote attackers to execute arbitrary code or cause ... +
2014-02-12CVE-2014-0279Microsoft Internet Explorer 8 allows remote attackers to execute arbitrary code or cause ... +
2014-02-12CVE-2014-0281Microsoft Internet Explorer 8 through 11 allows remote attackers to execute arbitrary cod... +
2014-02-12CVE-2014-0282Microsoft Internet Explorer 6 through 11 allows remote attackers to execute arbitrary cod... +
2014-02-12CVE-2014-0284Microsoft Internet Explorer 9 and 10 allows remote attackers to execute arbitrary code or... +
2014-02-12CVE-2014-0286Microsoft Internet Explorer 6 through 11 allows remote attackers to execute arbitrary cod... +
2014-02-12CVE-2014-0287Microsoft Internet Explorer 8 through 11 allows remote attackers to execute arbitrary cod... +
2014-02-12CVE-2014-0288Microsoft Internet Explorer 9 through 11 allows remote attackers to execute arbitrary cod... +
2014-02-12CVE-2014-0289Microsoft Internet Explorer 11 allows remote attackers to execute arbitrary code or cause... +
2014-02-12CVE-2014-0290Microsoft Internet Explorer 11 allows remote attackers to execute arbitrary code or cause... +
2014-02-12CVE-2014-0493Adobe Reader and Acrobat 10.x before 10.1.9 and 11.x before 11.0.06 on Windows and Mac OS... +
2013-12-12CVE-2013-2471Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java ... +
    avast! detection:
    • Java:CVE-2013-2471-A [Expl]+
    • Java:CVE-2013-2471-B [Expl]
    • Java:CVE-2013-2471-C [Expl]
    • Java:CVE-2013-2471-D [Expl]
    • Java:CVE-2013-2471-E [Expl]
    • Java:CVE-2013-2471-F [Expl]
    • Java:CVE-2013-2471-G [Expl]
    • Java:CVE-2013-2471-H [Expl]
    • Java:CVE-2013-2471-I [Expl]
    • Java:CVE-2013-2471-J [Expl]
  • VPS release: 131212-01
  • Security advisory:
2013-12-03CVE-2013-5049Microsoft Internet Explorer 6 through 9 allows remote attackers to execute arbitrary code... +
2013-12-03CVE-2013-5051Microsoft Internet Explorer 10 and 11 allows remote attackers to execute arbitrary code o... +
2013-12-03CVE-2013-5052Microsoft Internet Explorer 7 allows remote attackers to execute arbitrary code or cause ... +
2013-12-03CVE-2013-5056Use-after-free vulnerability in the Scripting Runtime Object Library allows remote attack... +
2013-11-19CVE-2013-3353Buffer overflow in Adobe Reader and Acrobat before 10.1.8 and 11.x before 11.0.04 on Wind... +
2013-11-19CVE-2013-3358Integer overflow in Adobe Reader and Acrobat before 10.1.8 and 11.x before 11.0.04 on Win... +
2013-11-17CVE-2013-2460Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java ... +
    avast! detection:
    • Java:CVE-2013-2460-A [Expl]+
    • Java:CVE-2013-2460-B [Expl]
    • Java:CVE-2013-2460-C [Expl]
    • Java:CVE-2013-2460-D [Expl]
    • Java:CVE-2013-2460-E [Expl]
    • Java:CVE-2013-2460-F [Expl]
    • Java:CVE-2013-2460-G [Expl]
    • Java:CVE-2013-2460-H [Expl]
    • Java:CVE-2013-2460-I [Expl]
    • Java:CVE-2013-2460-J [Expl]
    • Java:CVE-2013-2460-K [Expl]
    • Java:CVE-2013-2460-L [Expl]
    • Java:CVE-2013-2460-M [Expl]
    • Java:CVE-2013-2460-N [Expl]
    • Java:CVE-2013-2460-O [Expl]
    • Java:CVE-2013-2460-P [Expl]
    • Java:CVE-2013-2460-Q [Expl]
    • Java:CVE-2013-2460-R [Expl]
    • Java:CVE-2013-2460-S [Expl]
    • Java:CVE-2013-2460-T [Expl]
    • Java:CVE-2013-2460-U [Expl]
    • Java:CVE-2013-2460-V [Expl]
    • Java:CVE-2013-2460-W [Expl]
    • Java:CVE-2013-2460-X [Expl]
    • Java:CVE-2013-2460-Y [Expl]
    • Java:CVE-2013-2460-Z [Expl]
    • Java:CVE-2013-2460-AA [Expl]
  • VPS release: 131117-00
  • Security advisory:
2013-11-14CVE-2013-3354Adobe Reader and Acrobat before 10.1.8 and 11.x before 11.0.04 on Windows and Mac OS X al... +
2013-11-14CVE-2013-3910Microsoft Internet Explorer 6 through 9 allows remote attackers to execute arbitrary code... +
2013-11-14CVE-2013-3911Microsoft Internet Explorer 9 and 10 allows remote attackers to execute arbitrary code or... +
2013-11-14CVE-2013-3912Microsoft Internet Explorer 8 through 11 allows remote attackers to execute arbitrary cod... +
2013-11-14CVE-2013-3914Microsoft Internet Explorer 9 through 11 allows remote attackers to execute arbitrary cod... +
2013-11-14CVE-2013-3915Microsoft Internet Explorer 6 through 11 allows remote attackers to execute arbitrary cod... +
2013-11-14CVE-2013-3917Microsoft Internet Explorer 6 through 11 allows remote attackers to execute arbitrary cod... +
!2013-11-14CVE-2013-3918An unspecified ActiveX control in Microsoft Internet Explorer 7 through 10 allows remote ... +
!2013-11-05CVE-2013-3906The vulnerability is a remote code execution vulnerability that exists in the way affecte... +
2013-10-17CVE-2013-3871Microsoft Internet Explorer 6 through 10 allows remote attackers to execute arbitrary cod... +
2013-10-17CVE-2013-3873Microsoft Internet Explorer 10 allows remote attackers to execute arbitrary code or cause... +
2013-10-17CVE-2013-3874Microsoft Internet Explorer 9 allows remote attackers to execute arbitrary code or cause ... +
2013-10-17CVE-2013-3875Microsoft Internet Explorer 8 and 9 allows remote attackers to execute arbitrary code or ... +
2013-10-17CVE-2013-3885Microsoft Internet Explorer 10 allows remote attackers to execute arbitrary code or cause... +
2013-10-17CVE-2013-3886Microsoft Internet Explorer 9 and 10 allows remote attackers to execute arbitrary code or... +
!2013-10-11CVE-2013-3897Use-after-free vulnerability in the CDisplayPointer class in mshtml.dll in Microsoft Inte... +
2013-09-19CVE-2013-3893Use-after-free vulnerability in the SetMouseCapture implementation in mshtml.dll in Micro... +
2013-09-15CVE-2013-3202Microsoft Internet Explorer 10 allows remote attackers to execute arbitrary code or cause... +
2013-09-15CVE-2013-3203Microsoft Internet Explorer 9 and 10 allows remote attackers to execute arbitrary code or... +
2013-09-15CVE-2013-3205Microsoft Internet Explorer 6 through 8 allows remote attackers to execute arbitrary code... +
2013-09-15CVE-2013-3206Microsoft Internet Explorer 9 and 10 allows remote attackers to execute arbitrary code or... +
2013-09-15CVE-2013-3207Microsoft Internet Explorer 9 and 10 allows remote attackers to execute arbitrary code or... +
2013-09-15CVE-2013-3208Microsoft Internet Explorer 8 through 10 allows remote attackers to execute arbitrary cod... +
2013-09-15CVE-2013-3209Microsoft Internet Explorer 9 and 10 allows remote attackers to execute arbitrary code or... +
2013-09-15CVE-2013-3845Microsoft Internet Explorer 8 and 9 allows remote attackers to execute arbitrary code or ... +
!2013-08-30CVE-2013-2463It allows to bypass the Java sandbox via vectors related to Incorrect image attribute ver... +
    avast! detection:
    • Java:CVE-2013-2463-A [Expl]+
    • Java:CVE-2013-2463-B [Expl]
    • Java:CVE-2013-2463-C [Expl]
    • Java:CVE-2013-2463-D [Expl]
    • Java:CVE-2013-2463-E [Expl]
    • Java:CVE-2013-2463-F [Expl]
    • Java:CVE-2013-2463-G [Expl]
    • Java:CVE-2013-2463-H [Expl]
    • Java:CVE-2013-2463-I [Expl]
  • VPS release: 130830-00
  • Security advisory:
2013-08-20CVE-2013-3187Microsoft Internet Explorer 9 and 10 allows remote attackers to execute arbitrary code or... +
2013-08-20CVE-2013-3188Microsoft Internet Explorer 8 and 9 allows remote attackers to execute arbitrary code or ... +
2013-08-20CVE-2013-3191Microsoft Internet Explorer 9 and 10 allows remote attackers to execute arbitrary code or... +
2013-08-20CVE-2013-3193Microsoft Internet Explorer 9 and 10 allows remote attackers to execute arbitrary code or... +
2013-08-20CVE-2013-3194Microsoft Internet Explorer 9 allows remote attackers to execute arbitrary code or cause ... +
2013-08-20CVE-2013-3199Microsoft Internet Explorer 6 through 10 allows remote attackers to execute arbitrary cod... +
2013-08-15CVE-2013-2465Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java ... +
    avast! detection:
    • Java:CVE-2013-2465-A [Expl]+
    • Java:CVE-2013-2465-B [Expl]
    • Java:CVE-2013-2465-C [Expl]
    • Java:CVE-2013-2465-D [Expl]
    • Java:CVE-2013-2465-E [Expl]
    • Java:CVE-2013-2465-F [Expl]
    • Java:CVE-2013-2465-G [Expl]
    • Java:CVE-2013-2465-H [Expl]
    • Java:CVE-2013-2465-I [Expl]
    • Java:CVE-2013-2465-J [Expl]
    • Java:CVE-2013-2465-K [Expl]
    • Java:CVE-2013-2465-L [Expl]
    • Java:CVE-2013-2465-M [Expl]
    • Java:CVE-2013-2465-N [Expl]
    • Java:CVE-2013-2465-O [Expl]
    • Java:CVE-2013-2465-P [Expl]
    • Java:CVE-2013-2465-Q [Expl]
    • Java:CVE-2013-2465-R [Expl]
    • Java:CVE-2013-2465-S [Expl]
    • Java:CVE-2013-2465-T [Expl]
    • Java:CVE-2013-2465-U [Expl]
    • Java:CVE-2013-2465-V [Expl]
    • Java:CVE-2013-2465-W [Expl]
    • Java:CVE-2013-2465-X [Expl]
    • Java:CVE-2013-2465-Y [Expl]
    • Java:CVE-2013-2465-Z [Trj]
    • Java:CVE-2013-2465-AA [Expl]
    • Java:CVE-2013-2465-AB [Expl]
    • Java:CVE-2013-2465-AC [Expl]
    • Java:CVE-2013-2465-AD [Expl]
    • Java:CVE-2013-2465-AE [Expl]
    • Java:CVE-2013-2465-AF [Expl]
    • Java:CVE-2013-2465-AG [Expl]
    • Java:CVE-2013-2465-AH [Expl]
    • Java:CVE-2013-2465-AI [Expl]
    • Java:CVE-2013-2465-AJ [Expl]
    • Java:CVE-2013-2465-AK [Expl]
    • Java:CVE-2013-2465-AL [Expl]
    • Java:CVE-2013-2465-AM [Expl]
    • Java:CVE-2013-2465-AN [Expl]
    • Java:CVE-2013-2465-AO [Expl]
    • Java:CVE-2013-2465-AP [Expl]
    • Java:CVE-2013-2465-AQ [Expl]
    • Java:CVE-2013-2465-AR [Expl]
    • Java:CVE-2013-2465-AS [Expl]
    • Java:CVE-2013-2465-AT [Expl]
    • Java:CVE-2013-2465-AU [Expl]
    • Java:CVE-2013-2465-AV [Expl]
    • Java:CVE-2013-2465-AW [Expl]
    • Java:CVE-2013-2465-AX [Expl]
    • Java:CVE-2013-2465-AY [Expl]
    • Java:CVE-2013-2465-AZ [Expl]
    • Java:CVE-2013-2465-BA [Expl]
    • Java:CVE-2013-2465-BB [Expl]
    • Java:CVE-2013-2465-BC [Expl]
    • Java:CVE-2013-2465-BD [Expl]
    • Java:CVE-2013-2465-BE [Expl]
    • Java:CVE-2013-2465-BF [Expl]
    • Java:CVE-2013-2465-BG [Expl]
    • Java:CVE-2013-2465-BH [Expl]
    • Java:CVE-2013-2465-BI [Expl]
    • Java:CVE-2013-2465-BJ [Expl]
    • Java:CVE-2013-2465-BK [Expl]
    • Java:CVE-2013-2465-BL [Expl]
    • Java:CVE-2013-2465-BM [Expl]
    • Java:CVE-2013-2465-BN [Expl]
    • Java:CVE-2013-2465-BO [Expl]
    • Java:CVE-2013-2465-BP [Expl]
    • Java:CVE-2013-2465-BQ [Expl]
    • Java:CVE-2013-2465-BR [Expl]
    • Java:CVE-2013-2465-BS [Expl]
    • Java:CVE-2013-2465-BT [Expl]
    • Java:CVE-2013-2465-BU [Expl]
    • Java:CVE-2013-2465-BV [Expl]
    • Java:CVE-2013-2465-BW [Expl]
    • Java:CVE-2013-2465-BX [Expl]
    • Java:CVE-2013-2465-BY [Expl]
    • Java:CVE-2013-2465-BZ [Expl]
    • Java:CVE-2013-2465-CA [Expl]
    • Java:CVE-2013-2465-CB [Expl]
    • Java:CVE-2013-2465-CC [Expl]
    • Java:CVE-2013-2465-CD [Expl]
    • Java:CVE-2013-2465-CE [Expl]
    • Java:CVE-2013-2465-CF [Expl]
    • Java:CVE-2013-2465-CG [Expl]
    • Java:CVE-2013-2465-CH [Expl]
    • Java:CVE-2013-2465-CI [Expl]
    • Java:CVE-2013-2465-CJ [Expl]
    • Java:CVE-2013-2465-CK [Expl]
    • Java:CVE-2013-2465-CL [Expl]
    • Java:CVE-2013-2465-CM [Expl]
    • Java:CVE-2013-2465-CN [Expl]
    • Java:CVE-2013-2465-CO [Expl]
    • Java:CVE-2013-2465-CP [Expl]
    • Java:CVE-2013-2465-CQ [Expl]
    • Java:CVE-2013-2465-CR [Expl]
    • Java:CVE-2013-2465-CS [Expl]
    • Java:CVE-2013-2465-CT [Expl]
    • Java:CVE-2013-2465-CU [Expl]
    • Java:CVE-2013-2465-CV [Expl]
    • Java:CVE-2013-2465-CW [Expl]
    • Java:CVE-2013-2465-CX [Expl]
    • Java:CVE-2013-2465-CY [Expl]
    • Java:CVE-2013-2465-CZ [Expl]
    • Java:CVE-2013-2465-DA [Expl]
    • Java:CVE-2013-2465-DB [Expl]
    • Java:CVE-2013-2465-DC [Expl]
    • Java:CVE-2013-2465-DD [Expl]
    • Java:CVE-2013-2465-DE [Expl]
    • Java:CVE-2013-2465-DF [Expl]
    • Java:CVE-2013-2465-DG [Expl]
    • Java:CVE-2013-2465-DH [Expl]
    • Java:CVE-2013-2465-DI [Expl]
    • Java:CVE-2013-2465-DJ [Expl]
    • Java:CVE-2013-2465-DK [Expl]
    • Java:CVE-2013-2465-DL [Expl]
    • Java:CVE-2013-2465-DM [Expl]
    • Java:CVE-2013-2465-DN [Expl]
    • Java:CVE-2013-2465-DO [Expl]
    • Java:CVE-2013-2465-DP [Expl]
    • Java:CVE-2013-2465-DQ [Expl]
    • Java:CVE-2013-2465-DR [Expl]
    • Java:CVE-2013-2465-DS [Expl]
    • Java:CVE-2013-2465-DT [Expl]
    • Java:CVE-2013-2465-DU [Expl]
    • Java:CVE-2013-2465-DV [Expl]
    • Java:CVE-2013-2465-DX [Expl]
    • Java:CVE-2013-2465-DY [Expl]
    • Java:CVE-2013-2465-DZ [Expl]
    • Java:CVE-2013-2465-EA [Expl]
    • Java:CVE-2013-2465-EB [Expl]
    • Java:CVE-2013-2465-EC [Expl]
    • Java:CVE-2013-2465-ED [Expl]
    • Java:CVE-2013-2465-EE [Expl]
    • Java:CVE-2013-2465-EF [Expl]
    • Java:CVE-2013-2465-EG [Expl]
    • Java:CVE-2013-2465-EH [Expl]
    • Java:CVE-2013-2465-EI [Expl]
    • Java:CVE-2013-2465-EJ [Expl]
  • VPS release: 130816-00
  • Security advisory:
2013-08-15CVE-2013-3665Unspecified vulnerability in Autodesk AutoCAD through 2014, AutoCAD LT through 2014, and ... +
2013-07-15CVE-2013-3143Microsoft Internet Explorer 9 and 10 allows remote attackers to execute arbitrary code or... +
2013-07-15CVE-2013-3144Microsoft Internet Explorer 8 through 10 allows remote attackers to execute arbitrary cod... +
2013-07-15CVE-2013-3146Microsoft Internet Explorer 10 allows remote attackers to execute arbitrary code or cause... +
2013-07-15CVE-2013-3148Microsoft Internet Explorer 6 through 10 allows remote attackers to execute arbitrary cod... +
2013-07-15CVE-2013-3152Microsoft Internet Explorer 10 allows remote attackers to execute arbitrary code or cause... +
2013-07-15CVE-2013-3153Microsoft Internet Explorer 6 through 10 allows remote attackers to execute arbitrary cod... +
2013-07-15CVE-2013-3163Microsoft Internet Explorer 8 through 10 allows remote attackers to execute arbitrary cod... +
2013-07-15CVE-2013-3164Microsoft Internet Explorer 8 allows remote attackers to execute arbitrary code or cause ... +
2013-07-12CVE-2013-3115Microsoft Internet Explorer 7 through 10 allows remote attackers to execute arbitrary cod... +
2013-07-11CVE-2013-4787Android 1.6 Donut through 4.2 Jelly Bean does not properly check cryptographic signatures... +
2013-07-09CVE-2013-2171The vm_map_lookup function in sys/vm/vm_map.c in the mmap implementation in the kernel in... +
2013-06-13CVE-2013-1331Buffer overflow in Microsoft Office 2003 SP3 and Office 2011 for Mac allows remote attack... +
2013-06-13CVE-2013-3110Microsoft Internet Explorer 8 and 9 allows remote attackers to execute arbitrary code or ... +
2013-06-13CVE-2013-3111Microsoft Internet Explorer 8 through 10 allows remote attackers to execute arbitrary cod... +
2013-06-13CVE-2013-3112Microsoft Internet Explorer 6 through 10 allows remote attackers to execute arbitrary cod... +
2013-06-13CVE-2013-3114Microsoft Internet Explorer 9 and 10 allows remote attackers to execute arbitrary code or... +
2013-06-13CVE-2013-3116Microsoft Internet Explorer 7 through 9 allows remote attackers to execute arbitrary code... +
2013-06-13CVE-2013-3117Microsoft Internet Explorer 9 allows remote attackers to execute arbitrary code or cause ... +
2013-06-13CVE-2013-3118Microsoft Internet Explorer 10 allows remote attackers to execute arbitrary code or cause... +
2013-06-13CVE-2013-3119Microsoft Internet Explorer 9 and 10 allows remote attackers to execute arbitrary code or... +
2013-06-13CVE-2013-3120Microsoft Internet Explorer 10 allows remote attackers to execute arbitrary code or cause... +
2013-06-13CVE-2013-3121Microsoft Internet Explorer 6 through 10 allows remote attackers to execute arbitrary cod... +
2013-06-13CVE-2013-3123Microsoft Internet Explorer 8 through 10 allows remote attackers to execute arbitrary cod... +
2013-06-13CVE-2013-3139Microsoft Internet Explorer 6 through 10 allows remote attackers to execute arbitrary cod... +
2013-05-15CVE-2013-2729Integer overflow in Adobe Reader and Acrobat 9.x before 9.5.5, 10.x before 10.1.7, and 11... +
2013-05-14CVE-2013-1297Microsoft Internet Explorer 6 through 8 does not properly restrict data access by VBScrip... +
2013-05-14CVE-2013-1307Use-after-free vulnerability in Microsoft Internet Explorer 8 and 9 allows remote attacke... +
2013-05-14CVE-2013-1309Use-after-free vulnerability in Microsoft Internet Explorer 6 through 10 allows remote at... +
2013-05-14CVE-2013-1311Use-after-free vulnerability in Microsoft Internet Explorer 8 allows remote attackers to ... +
2013-05-14CVE-2013-1312Use-after-free vulnerability in Microsoft Internet Explorer 9 and 10 allows remote attack... +
2013-05-14CVE-2013-2551Use-after-free vulnerability in Microsoft Internet Explorer 6 through 10 allows remote at... +
!2013-05-05CVE-2013-1347Microsoft Internet Explorer 8 does not properly handle objects in memory, which allows re... +
2013-04-23CVE-2013-2423Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java ... +
    avast! detection:
    • Java:CVE-2013-2423-A [Expl]+
    • Java:CVE-2013-2423-B [Expl]
    • Java:CVE-2013-2423-C [Expl]
    • Java:CVE-2013-2423-D [Expl]
    • Java:CVE-2013-2423-E [Expl]
    • Java:CVE-2013-2423-F [Expl]
    • Java:CVE-2013-2423-G [Expl]
    • Java:CVE-2013-2423-H [Expl]
    • Java:CVE-2013-2423-I [Expl]
    • Java:CVE-2013-2423-J [Expl]
    • Java:CVE-2013-2423-K [Expl]
    • Java:CVE-2013-2423-L [Expl]
    • Java:CVE-2013-2423-M [Expl]
    • Java:CVE-2013-2423-N [Expl]
    • Java:CVE-2013-2423-O [Expl]
    • Java:CVE-2013-2423-P [Expl]
    • Java:CVE-2013-2423-Q [Expl]
    • Java:CVE-2013-2423-R [Expl]
    • Java:CVE-2013-2423-S [Expl]
    • Java:CVE-2013-2423-T [Expl]
    • Java:CVE-2013-2423-U [Expl]
    • Java:CVE-2013-2423-V [Expl]
    • Java:CVE-2013-2423-W [Expl]
    • Java:CVE-2013-2423-X [Expl]
    • Java:CVE-2013-2423-Y [Expl]
    • Java:CVE-2013-2423-Z [Expl]
    • Java:CVE-2013-2423-AA [Expl]
    • Java:CVE-2013-2423-AB [Expl]
    • Java:CVE-2013-2423-AC [Expl]
    • Java:CVE-2013-2423-AD [Expl]
    • Java:CVE-2013-2423-AE [Expl]
    • Java:CVE-2013-2423-AF [Expl]
    • Java:CVE-2013-2423-AG [Expl]
    • Java:CVE-2013-2423-AH [Expl]
    • Java:CVE-2013-2423-AI [Expl]
    • Java:CVE-2013-2423-AJ [Expl]
    • Java:CVE-2013-2423-AK [Expl]
    • Java:CVE-2013-2423-AL [Expl]
    • Java:CVE-2013-2423-AM [Expl]
    • Java:CVE-2013-2423-AN [Expl]
    • Java:CVE-2013-2423-AO [Expl]
    • Java:CVE-2013-2423-AP [Expl]
    • Java:CVE-2013-2423-AQ [Expl]
    • Java:CVE-2013-2423-AR [Expl]
    • Java:CVE-2013-2423-AS [Expl]
    • Java:CVE-2013-2423-AT [Expl]
    • Java:CVE-2013-2423-AU [Expl]
    • Java:CVE-2013-2423-AV [Expl]
    • Java:CVE-2013-2423-AW [Expl]
    • Java:CVE-2013-2423-AX [Expl]
    • Java:CVE-2013-2423-AY [Expl]
    • Java:CVE-2013-2423-AZ [Expl]
    • Java:CVE-2013-2423-BA [Expl]
    • Java:CVE-2013-2423-BB [Expl]
    • Java:CVE-2013-2423-BC [Expl]
    • Java:CVE-2013-2423-BD [Expl]
    • Java:CVE-2013-2423-BE [Expl]
    • Java:CVE-2013-2423-BF [Expl]
    • Java:CVE-2013-2423-BG [Expl]
    • Java:CVE-2013-2423-BH [Expl]
    • Java:CVE-2013-2423-BI [Expl]
    • Java:CVE-2013-2423-BJ [Expl]
    • Java:CVE-2013-2423-BK [Expl]
    • Java:CVE-2013-2423-BL [Expl]
    • Java:CVE-2013-2423-BM [Expl]
    • Java:CVE-2013-2423-BN [Expl]
    • Java:CVE-2013-2423-BO [Expl]
    • Java:CVE-2013-2423-BP [Expl]
    • Java:CVE-2013-2423-BQ [Expl]
    • Java:CVE-2013-2423-BR [Expl]
    • Java:CVE-2013-2423-BS [Expl]
    • Java:CVE-2013-2423-BT [Expl]
    • Java:CVE-2013-2423-BU [Expl]
    • Java:CVE-2013-2423-BV [Expl]
    • Java:CVE-2013-2423-BW [Expl]
    • Java:CVE-2013-2423-BX [Expl]
    • Java:CVE-2013-2423-BY [Expl]
    • Java:CVE-2013-2423-BZ [Expl]
    • Java:CVE-2013-2423-CA [Expl]
    • Java:CVE-2013-2423-CB [Expl]
    • Java:CVE-2013-2423-CC [Expl]
    • Java:CVE-2013-2423-CD [Expl]
    • Java:CVE-2013-2423-CE [Expl]
    • Java:CVE-2013-2423-CF [Expl]
    • Java:CVE-2013-2423-CG [Expl]
    • Java:CVE-2013-2423-CH [Expl]
    • Java:CVE-2013-2423-CI [Expl]
    • Java:CVE-2013-2423-CJ [Expl]
    • Java:CVE-2013-2423-CK [Expl]
    • Java:CVE-2013-2423-CL [Expl]
    • Java:CVE-2013-2423-CM [Expl]
    • Java:CVE-2013-2423-CN [Expl]
    • Java:CVE-2013-2423-CO [Expl]
    • Java:CVE-2013-2423-CP [Expl]
    • Java:CVE-2013-2423-CQ [Expl]
    • Java:CVE-2013-2423-CR [Expl]
    • Java:CVE-2013-2423-CS [Expl]
    • Java:CVE-2013-2423-CT [Expl]
    • Java:CVE-2013-2423-CU [Expl]
    • Java:CVE-2013-2423-CV [Expl]
    • Java:CVE-2013-2423-CW [Expl]
    • Java:CVE-2013-2423-CX [Expl]
    • Java:CVE-2013-2423-CY [Expl]
    • Java:CVE-2013-2423-CZ [Expl]
    • Java:CVE-2013-2423-DA [Expl]
    • Java:CVE-2013-2423-DB [Expl]
    • XML:CVE-2013-2423-A [Expl]
  • VPS release: 130424-00
  • Security advisory:
2013-04-22CVE-2013-0079Microsoft Visio Viewer 2010 SP1 allows remote attackers to execute arbitrary code via a c... +
2013-04-15CVE-2013-1296The Remote Desktop ActiveX control in mstscax.dll in Microsoft Remote Desktop Connection ... +
2013-03-21CVE-2013-0088Use-after-free vulnerability in Microsoft Internet Explorer 6 through 10 allows remote at... +
2013-03-21CVE-2013-0089Use-after-free vulnerability in Microsoft Internet Explorer 6 through 10 allows remote at... +
2013-03-21CVE-2013-1288Use-after-free vulnerability in Microsoft Internet Explorer 8 allows remote attackers to ... +
2013-03-14CVE-2013-0087Use-after-free vulnerability in Microsoft Internet Explorer 6 through 10 allows remote at... +
2013-03-14CVE-2013-0090Use-after-free vulnerability in Microsoft Internet Explorer 6 through 10 allows remote at... +
2013-03-14CVE-2013-0091Use-after-free vulnerability in Microsoft Internet Explorer 8 allows remote attackers to ... +
2013-03-14CVE-2013-0092Use-after-free vulnerability in Microsoft Internet Explorer 6 through 10 allows remote at... +
2013-03-11CVE-2013-1493The color management functionality in the 2D component in Oracle Java SE 7 Update 15 and ... +
    avast! detection:
    • Java:CVE-2013-1493-A [Expl]+
    • Java:CVE-2013-1493-B [Expl]
    • Java:CVE-2013-1493-C [Expl]
    • Java:CVE-2013-1493-D [Expl]
    • Java:CVE-2013-1493-E [Expl]
    • Java:CVE-2013-1493-F [Expl]
    • Java:CVE-2013-1493-G [Expl]
    • Java:CVE-2013-1493-H [Expl]
    • Java:CVE-2013-1493-I [Expl]
    • Java:CVE-2013-1493-J [Expl]
    • Java:CVE-2013-1493-K [Expl]
    • Java:CVE-2013-1493-L [Expl]
    • Java:CVE-2013-1493-M [Expl]
    • Java:CVE-2013-1493-N [Expl]
    • Java:CVE-2013-1493-O [Expl]
    • Java:CVE-2013-1493-P [Expl]
    • Java:CVE-2013-1493-Q [Expl]
    • Java:CVE-2013-1493-R [Expl]
    • Java:CVE-2013-1493-S [Expl]
    • Java:CVE-2013-1493-T [Expl]
    • Java:CVE-2013-1493-U [Expl]
    • Java:CVE-2013-1493-V [Expl]
    • Java:CVE-2013-1493-W [Trj]
    • Java:CVE-2013-1493-X [Expl]
    • Java:CVE-2013-1493-Y [Expl]
    • Java:CVE-2013-1493-Z [Expl]
    • Java:CVE-2013-1493-AA [Expl]
    • Java:CVE-2013-1493-AB [Expl]
    • Java:CVE-2013-1493-AC [Trj]
    • Java:CVE-2013-1493-AD [Expl]
    • Java:CVE-2013-1493-AE [Expl]
    • Java:CVE-2013-1493-AF [Expl]
    • Java:CVE-2013-1493-AG [Expl]
    • Java:CVE-2013-1493-AH [Expl]
    • Java:CVE-2013-1493-AI [Expl]
    • Java:CVE-2013-1493-AJ [Expl]
    • Java:CVE-2013-1493-AK [Expl]
    • Java:CVE-2013-1493-AL [Expl]
    • Java:CVE-2013-1493-AM [Expl]
    • Java:CVE-2013-1493-AN [Expl]
    • Java:CVE-2013-1493-AO [Expl]
    • Java:CVE-2013-1493-AP [Expl]
    • Java:CVE-2013-1493-AQ [Expl]
    • Java:CVE-2013-1493-AR [Expl]
    • Java:CVE-2013-1493-AS [Expl]
    • Java:CVE-2013-1493-AT [Expl]
    • Java:CVE-2013-1493-AU [Expl]
    • Java:CVE-2013-1493-AV [Expl]
    • Java:CVE-2013-1493-AW [Expl]
    • Java:CVE-2013-1493-AX [Expl]
    • Java:CVE-2013-1493-AY [Expl]
    • Java:CVE-2013-1493-AZ [Expl]
    • Java:CVE-2013-1493-BA [Expl]
    • Java:CVE-2013-1493-BB [Expl]
    • Java:CVE-2013-1493-BC [Expl]
    • Java:CVE-2013-1493-BD [Expl]
    • Java:CVE-2013-1493-BE [Expl]
    • Java:CVE-2013-1493-BF [Expl]
    • Java:CVE-2013-1493-BG [Expl]
    • Java:CVE-2013-1493-BH [Expl]
    • Java:CVE-2013-1493-BI [Expl]
    • Java:CVE-2013-1493-BJ [Expl]
    • Java:CVE-2013-1493-BK [Expl]
    • Java:CVE-2013-1493-BL [Expl]
    • Java:CVE-2013-1493-BM [Expl]
    • Java:CVE-2013-1493-BN [Expl]
    • Java:CVE-2013-1493-BO [Expl]
    • Java:CVE-2013-1493-BP [Expl]
    • Java:CVE-2013-1493-BQ [Expl]
    • Java:CVE-2013-1493-BR [Expl]
    • Java:CVE-2013-1493-BS [Expl]
    • Java:CVE-2013-1493-BT [Expl]
    • Java:CVE-2013-1493-BU [Expl]
    • Java:CVE-2013-1493-BV [Expl]
    • Java:CVE-2013-1493-BW [Expl]
    • Java:CVE-2013-1493-BX [Expl]
    • Java:CVE-2013-1493-BY [Expl]
    • Java:CVE-2013-1493-BZ [Expl]
    • Java:CVE-2013-1493-CA [Expl]
    • Java:CVE-2013-1493-CB [Expl]
    • Java:CVE-2013-1493-CC [Expl]
    • Java:CVE-2013-1493-CD [Expl]
    • Java:CVE-2013-1493-CE [Expl]
    • Java:CVE-2013-1493-CF [Expl]
    • Java:CVE-2013-1493-CG [Expl]
    • Java:CVE-2013-1493-CH [Expl]
    • Java:CVE-2013-1493-CI [Expl]
    • Java:CVE-2013-1493-CJ [Expl]
    • Java:CVE-2013-1493-CK [Expl]
    • Java:CVE-2013-1493-CL [Expl]
    • Java:CVE-2013-1493-CM [Expl]
    • Java:CVE-2013-1493-CN [Expl]
    • Java:CVE-2013-1493-CO [Expl]
    • Java:CVE-2013-1493-CP [Expl]
    • Java:CVE-2013-1493-CQ [Expl]
    • Java:CVE-2013-1493-CR [Expl]
    • Java:CVE-2013-1493-CS [Expl]
    • Java:CVE-2013-1493-CT [Expl]
    • Java:CVE-2013-1493-CU [Expl]
    • Java:CVE-2013-1493-CV [Expl]
    • Java:CVE-2013-1493-CW [Expl]
    • Java:CVE-2013-1493-CX [Expl]
    • Java:CVE-2013-1493-CY [Expl]
    • Java:CVE-2013-1493-CZ [Expl]
    • Java:CVE-2013-1493-DA [Expl]
    • Java:CVE-2013-1493-DB [Expl]
    • Java:CVE-2013-1493-DC [Expl]
    • Java:CVE-2013-1493-DD [Expl]
    • Java:CVE-2013-1493-DE [Expl]
    • Java:CVE-2013-1493-DF [Expl]
    • Java:CVE-2013-1493-DG [Expl]
    • Java:CVE-2013-1493-DH [Expl]
    • Java:CVE-2013-1493-DI [Expl]
    • Java:CVE-2013-1493-DJ [Expl]
    • Java:CVE-2013-1493-DK [Expl]
    • Java:CVE-2013-1493-DL [Expl]
    • Java:CVE-2013-1493-DM [Expl]
    • Java:CVE-2013-1493-DN [Expl]
    • Java:CVE-2013-1493-DO [Expl]
    • Java:CVE-2013-1493-DP [Expl]
    • Java:CVE-2013-1493-DQ [Expl]
    • Java:CVE-2013-1493-DR [Expl]
    • Java:CVE-2013-1493-DS [Expl]
    • Java:CVE-2013-1493-DT [Expl]
    • Java:CVE-2013-1493-DU [Expl]
    • Java:CVE-2013-1493-DV [Expl]
    • Java:CVE-2013-1493-DW [Expl]
    • Java:CVE-2013-1493-DX [Expl]
    • Java:CVE-2013-1493-DY [Expl]
    • Java:CVE-2013-1493-DZ [Expl]
    • Java:CVE-2013-1493-EA [Expl]
    • Java:CVE-2013-1493-EB [Expl]
    • Java:CVE-2013-1493-EC [Expl]
    • Java:CVE-2013-1493-ED [Expl]
    • Java:CVE-2013-1493-EE [Expl]
    • Java:CVE-2013-1493-EF [Expl]
    • Java:CVE-2013-1493-EG [Expl]
    • Java:CVE-2013-1493-EH [Expl]
    • Java:CVE-2013-1493-EI [Expl]
    • Java:CVE-2013-1493-EJ [Expl]
    • Java:CVE-2013-1493-EK [Expl]
    • Java:CVE-2013-1493-EL [Expl]
    • Java:CVE-2013-1493-EM [Expl]
    • Java:CVE-2013-1493-EN [Expl]
    • Java:CVE-2013-1493-EO [Expl]
    • Java:CVE-2013-1493-EP [Expl]
    • Java:CVE-2013-1493-EQ [Expl]
    • Java:CVE-2013-1493-ER [Expl]
    • Java:CVE-2013-1493-ES [Expl]
    • Java:CVE-2013-1493-ET [Expl]
    • Java:CVE-2013-1493-EU [Expl]
    • Java:CVE-2013-1493-EV [Expl]
    • Java:CVE-2013-1493-EW [Expl]
    • Java:CVE-2013-1493-EX [Expl]
    • Java:CVE-2013-1493-EY [Expl]
    • Java:CVE-2013-1493-EZ [Expl]
    • Java:CVE-2013-1493-FA [Expl]
    • Java:CVE-2013-1493-FB [Expl]
    • Java:CVE-2013-1493-FC [Expl]
    • Java:CVE-2013-1493-FD [Expl]
    • Java:CVE-2013-1493-FE [Expl]
    • Java:CVE-2013-1493-FF [Expl]
    • Java:CVE-2013-1493-FG [Expl]
    • Java:CVE-2013-1493-FH [Expl]
    • Java:CVE-2013-1493-FI [Expl]
    • Java:CVE-2013-1493-FL [Expl]
    • Java:CVE-2013-1493-FM [Expl]
    • Java:CVE-2013-1493-FN [Expl]
    • Java:CVE-2013-1493-FO [Expl]
    • Java:CVE-2013-1493-FP [Expl]
    • Java:CVE-2013-1493-FQ [Expl]
    • Java:CVE-2013-1493-FR [Expl]
    • Java:CVE-2013-1493-FS [Expl]
    • Java:CVE-2013-1493-FT [Expl]
    • Java:CVE-2013-1493-FU [Expl]
    • Java:CVE-2013-1493-FV [Expl]
    • Java:CVE-2013-1493-FW [Expl]
    • Java:CVE-2013-1493-FX [Expl]
    • Java:CVE-2013-1493-FY [Expl]
    • Java:CVE-2013-1493-FZ [Expl]
    • Java:CVE-2013-1493-GA [Expl]
    • Java:CVE-2013-1493-GB [Expl]
    • Java:CVE-2013-1493-GC [Expl]
    • Java:CVE-2013-1493-GD [Expl]
    • Java:CVE-2013-1493-GE [Expl]
    • Java:CVE-2013-1493-GF [Expl]
    • Java:CVE-2013-1493-GG [Expl]
    • Java:CVE-2013-1493-GH [Expl]
    • Java:CVE-2013-1493-GI [Expl]
    • Java:CVE-2013-1493-GJ [Expl]
    • Java:CVE-2013-1493-GK [Expl]
    • Java:CVE-2013-1493-GL [Expl]
    • Java:CVE-2013-1493-GM [Expl]
    • Java:CVE-2013-1493-GN [Expl]
    • Java:CVE-2013-1493-GO [Expl]
    • Java:CVE-2013-1493-GP [Expl]
    • Java:CVE-2013-1493-GQ [Expl]
    • Java:CVE-2013-1493-GR [Expl]
  • VPS release: 130312-00
  • Security advisory:
2013-02-28CVE-2013-0648Unspecified vulnerability in the ExternalInterface ActionScript functionality in Adobe Fl... +
2013-02-19CVE-2013-0431Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java ... +
    avast! detection:
    • Java:CVE-2013-0431-A [Expl]+
    • Java:CVE-2013-0431-B [Expl]
    • Java:CVE-2013-0431-C [Expl]
    • Java:CVE-2013-0431-D [Expl]
    • Java:CVE-2013-0431-E [Expl]
    • Java:CVE-2013-0431-F [Expl]
    • Java:CVE-2013-0431-G [Expl]
    • Java:CVE-2013-0431-H [Expl]
    • Java:CVE-2013-0431-I [Expl]
    • Java:CVE-2013-0431-J [Expl]
    • Java:CVE-2013-0431-K [Expl]
    • Java:CVE-2013-0431-L [Expl]
    • Java:CVE-2013-0431-M [Expl]
    • Java:CVE-2013-0431-N [Expl]
    • Java:CVE-2013-0431-O [Expl]
    • Java:CVE-2013-0431-P [Expl]
    • Java:CVE-2013-0431-Q [Expl]
    • Java:CVE-2013-0431-R [Expl]
    • Java:CVE-2013-0431-S [Expl]
    • Java:CVE-2013-0431-T [Expl]
    • Java:CVE-2013-0431-U [Expl]
    • Java:CVE-2013-0431-V [Expl]
    • Java:CVE-2013-0431-W [Expl]
    • Java:CVE-2013-0431-X [Expl]
    • Java:CVE-2013-0431-Y [Expl]
    • Java:CVE-2013-0431-Z [Expl]
    • Java:CVE-2013-0431-AA [Expl]
  • VPS release: 130219-02
  • Security advisory:
2013-02-14CVE-2013-0018Use-after-free vulnerability in Microsoft Internet Explorer 6 through 9 allows remote att... +
2013-02-14CVE-2013-0019Use-after-free vulnerability in Microsoft Internet Explorer 7 through 10 allows remote at... +
2013-02-14CVE-2013-0020Use-after-free vulnerability in Microsoft Internet Explorer 9 allows remote attackers to ... +
2013-02-14CVE-2013-0021Use-after-free vulnerability in Microsoft Internet Explorer 6 through 10 allows remote at... +
2013-02-14CVE-2013-0024Use-after-free vulnerability in Microsoft Internet Explorer 8 and 9 allows remote attacke... +
2013-02-14CVE-2013-0025Use-after-free vulnerability in Microsoft Internet Explorer 8 allows remote attackers to ... +
2013-02-14CVE-2013-0026Use-after-free vulnerability in Microsoft Internet Explorer 9 allows remote attackers to ... +
2013-02-14CVE-2013-0027Use-after-free vulnerability in Microsoft Internet Explorer 6 through 10 allows remote at... +
2013-02-14CVE-2013-0029Use-after-free vulnerability in Microsoft Internet Explorer 6 through 9 allows remote att... +
!2013-02-13CVE-2013-0640Unspecified vulnerability in Adobe Reader version 9, 10 and 11. Currently exploited in th... +
!2013-02-08CVE-2013-0634A vulnerability was identified in Adobe Flash Player before 10.3.183.51 and 11.x before 1... +
2013-02-06CVE-2013-0633Buffer overflow in Adobe Flash Player before 10.3.183.51 and 11.x before 11.5.502.149 on ... +
2013-01-10CVE-2013-0604Heap-based buffer overflow in Adobe Reader and Acrobat 9.x before 9.5.3, 10.x before 10.1... +
2013-01-10CVE-2013-0623Adobe Reader and Acrobat 9.x before 9.5.3, 10.x before 10.1.5, and 11.x before 11.0.1 all... +
!2013-01-05CVE-2013-0422Unspecified vulnerability in Oracle Java 7 Update 10 and earlier allows remote attackers ... +
    avast! detection:
    • Java:Agent-CHM [Expl]+
    • Java:Agent-CHN [Expl]
    • Java:Agent-CHO [Expl]
    • Java:CVE-2013-0422-A [Expl]
    • Java:CVE-2013-0422-B [Expl]
    • Java:CVE-2013-0422-C [Expl]
    • Java:CVE-2013-0422-D [Expl]
    • Java:CVE-2013-0422-E [Expl]
    • Java:CVE-2013-0422-F [Expl]
    • Java:CVE-2013-0422-G [Expl]
    • Java:CVE-2013-0422-H [Expl]
    • Java:CVE-2013-0422-I [Expl]
    • Java:CVE-2013-0422-J [Expl]
    • Java:CVE-2013-0422-K [Expl]
    • Java:CVE-2013-0422-L [Expl]
    • Java:CVE-2013-0422-M [Expl]
    • Java:CVE-2013-0422-N [Expl]
    • Java:CVE-2013-0422-O [Expl]
    • Java:CVE-2013-0422-P [Expl]
    • Java:CVE-2013-0422-Q [Expl]
    • Java:CVE-2013-0422-R [Expl]
    • Java:CVE-2013-0422-S [Expl]
    • Java:CVE-2013-0422-T [Expl]
    • Java:CVE-2013-0422-U [Expl]
    • Java:CVE-2013-0422-V [Expl]
    • Java:CVE-2013-0422-W [Expl]
    • Java:CVE-2013-0422-X [Expl]
    • Java:CVE-2013-0422-Y [Expl]
    • Java:CVE-2013-0422-Z [Expl]
    • Java:CVE-2013-0422-AA [Expl]
    • Java:CVE-2013-0422-AB [Expl]
    • Java:CVE-2013-0422-AC [Expl]
    • Java:CVE-2013-0422-AD [Expl]
    • Java:CVE-2013-0422-AE [Expl]
    • Java:CVE-2013-0422-AF [Expl]
    • Java:CVE-2013-0422-AG [Expl]
    • Java:CVE-2013-0422-AH [Expl]
    • Java:CVE-2013-0422-AI [Expl]
    • Java:CVE-2013-0422-AJ [Expl]
    • Java:CVE-2013-0422-AK [Expl]
    • Java:CVE-2013-0422-AL [Expl]
    • Java:CVE-2013-0422-AM [Expl]
    • Java:CVE-2013-0422-AN [Expl]
    • Java:CVE-2013-0422-AO [Expl]
    • Java:CVE-2013-0422-AP [Expl]
    • Java:CVE-2013-0422-AQ [Expl]
    • Java:CVE-2013-0422-AR [Expl]
    • Java:CVE-2013-0422-AS [Expl]
    • Java:CVE-2013-0422-AT [Expl]
    • Java:CVE-2013-0422-AU [Expl]
    • Java:CVE-2013-0422-AV [Expl]
    • Java:CVE-2013-0422-AW [Expl]
    • Java:CVE-2013-0422-AX [Expl]
    • Java:CVE-2013-0422-AY [Expl]
    • Java:CVE-2013-0422-AZ [Expl]
    • Java:CVE-2013-0422-BA [Expl]
    • Java:CVE-2013-0422-BB [Expl]
    • Java:CVE-2013-0422-BC [Expl]
    • Java:CVE-2013-0422-BD [Expl]
    • Java:CVE-2013-0422-BE [Expl]
    • Java:CVE-2013-0422-BF [Expl]
    • Java:CVE-2013-0422-BG [Expl]
    • Java:CVE-2013-0422-BH [Expl]
    • Java:CVE-2013-0422-BI [Expl]
    • Java:CVE-2013-0422-BJ [Expl]
    • Java:CVE-2013-0422-BK [Expl]
    • Java:CVE-2013-0422-BL [Expl]
    • Java:CVE-2013-0422-BM [Expl]
    • Java:CVE-2013-0422-BN [Expl]
    • Java:CVE-2013-0422-BO [Expl]
    • Java:CVE-2013-0422-BP [Expl]
    • Java:CVE-2013-0422-BQ [Expl]
    • Java:CVE-2013-0422-BR [Expl]
    • Java:CVE-2013-0422-BS [Expl]
    • Java:CVE-2013-0422-BT [Expl]
    • Java:CVE-2013-0422-BU [Expl]
    • Java:CVE-2013-0422-BV [Expl]
    • Java:CVE-2013-0422-BW [Expl]
    • Java:CVE-2013-0422-BX [Expl]
    • Java:CVE-2013-0422-BY [Expl]
    • Java:CVE-2013-0422-BZ [Expl]
    • Java:CVE-2013-0422-CA [Expl]
    • Java:CVE-2013-0422-CB [Expl]
    • Java:CVE-2013-0422-CC [Expl]
    • Java:CVE-2013-0422-CD [Expl]
    • Java:CVE-2013-0422-CE [Expl]
    • Java:CVE-2013-0422-CF [Expl]
    • Java:CVE-2013-0422-CG [Expl]
    • Java:CVE-2013-0422-CH [Expl]
    • Java:CVE-2013-0422-CI [Expl]
    • Java:CVE-2013-0422-CJ [Expl]
    • Java:CVE-2013-0422-CK [Expl]
    • Java:CVE-2013-0422-CL [Expl]
    • Java:CVE-2013-0422-CM [Expl]
    • Java:CVE-2013-0422-CN [Expl]
    • Java:CVE-2013-0422-CO [Expl]
    • Java:CVE-2013-0422-CP [Expl]
    • Java:CVE-2013-0422-CQ [Expl]
    • Java:CVE-2013-0422-CR [Expl]
    • Java:CVE-2013-0422-CS [Expl]
    • Java:CVE-2013-0422-CT [Expl]
    • Java:CVE-2013-0422-CU [Expl]
    • Java:CVE-2013-0422-CV [Expl]
    • Java:CVE-2013-0422-CW [Expl]
    • Java:CVE-2013-0422-CX [Expl]
    • Java:CVE-2013-0422-CY [Expl]
    • Java:CVE-2013-0422-CZ [Expl]
    • Java:CVE-2013-0422-DA [Expl]
    • Java:CVE-2013-0422-DB [Expl]
    • Java:CVE-2013-0422-DC [Expl]
    • Java:CVE-2013-0422-DD [Expl]
    • Java:CVE-2013-0422-DE [Expl]
    • Java:CVE-2013-0422-DF [Expl]
    • Java:CVE-2013-0422-DG [Expl]
    • Java:CVE-2013-0422-DH [Expl]
    • Java:CVE-2013-0422-DI [Expl]
    • Java:CVE-2013-0422-DJ [Expl]
    • Java:CVE-2013-0422-DK [Expl]
    • Java:CVE-2013-0422-DL [Expl]
    • Java:CVE-2013-0422-DM [Expl]
    • Java:CVE-2013-0422-DN [Expl]
    • Java:CVE-2013-0422-DO [Expl]
    • Java:CVE-2013-0422-DP [Expl]
    • Java:CVE-2013-0422-DQ [Expl]
    • Java:CVE-2013-0422-DR [Expl]
    • Java:CVE-2013-0422-DS [Expl]
    • Java:CVE-2013-0422-DT [Expl]
    • Java:CVE-2013-0422-DU [Expl]
    • Java:CVE-2013-0422-DV [Expl]
    • Java:CVE-2013-0422-DW [Expl]
    • Java:CVE-2013-0422-DX [Expl]
    • Java:CVE-2013-0422-DY [Expl]
    • Java:CVE-2013-0422-DZ [Expl]
    • Java:CVE-2013-0422-EA [Expl]
    • Java:CVE-2013-0422-EB [Expl]
    • Java:CVE-2013-0422-EC [Expl]
    • Java:CVE-2013-0422-ED [Expl]
    • Java:CVE-2013-0422-EE [Expl]
    • Java:CVE-2013-0422-EF [Expl]
    • Java:CVE-2013-0422-EG [Expl]
    • Java:CVE-2013-0422-EH [Expl]
    • Java:CVE-2013-0422-EI [Expl]
    • Java:CVE-2013-0422-EJ [Expl]
    • Java:CVE-2013-0422-EK [Expl]
    • Java:CVE-2013-0422-EL [Expl]
    • Java:CVE-2013-0422-EM [Expl]
    • Java:CVE-2013-0422-EN [Expl]
    • Java:CVE-2013-0422-EO [Expl]
    • Java:CVE-2013-0422-EP [Expl]
    • Java:CVE-2013-0422-EQ [Expl]
    • Java:CVE-2013-0422-ER [Expl]
    • Java:CVE-2013-0422-ES [Expl]
    • Java:CVE-2013-0422-ET [Expl]
    • Java:CVE-2013-0422-EU [Expl]
    • Java:CVE-2013-0422-EV [Expl]
    • Java:CVE-2013-0422-EW [Expl]
    • Java:CVE-2013-0422-EX [Expl]
    • Java:CVE-2013-0422-EY [Expl]
    • Java:CVE-2013-0422-EZ [Expl]
    • Java:CVE-2013-0422-FA [Expl]
    • Java:CVE-2013-0422-FB [Expl]
    • Java:CVE-2013-0422-FC [Expl]
    • Java:CVE-2013-0422-FD [Expl]
    • Java:CVE-2013-0422-FE [Expl]
    • Java:CVE-2013-0422-FF [Expl]
    • Java:CVE-2013-0422-FG [Expl]
    • Java:CVE-2013-0422-FH [Expl]
    • Java:CVE-2013-0422-FI [Expl]
    • Java:CVE-2013-0422-FJ [Expl]
    • Java:CVE-2013-0422-FK [Expl]
    • Java:CVE-2013-0422-FL [Expl]
    • Java:CVE-2013-0422-FM [Expl]
    • Java:CVE-2013-0422-FN [Expl]
    • Java:CVE-2013-0422-FO [Expl]
    • Java:CVE-2013-0422-FP [Expl]
    • Java:CVE-2013-0422-FQ [Expl]
    • Java:CVE-2013-0422-FR [Expl]
    • Java:CVE-2013-0422-FS [Expl]
    • Java:CVE-2013-0422-FT [Expl]
    • Java:CVE-2013-0422-FU [Expl]
    • Java:CVE-2013-0422-FV [Expl]
    • Java:CVE-2013-0422-FW [Expl]
    • Java:CVE-2013-0422-FX [Expl]
    • Java:CVE-2013-0422-FY [Expl]
    • Java:CVE-2013-0422-FZ [Expl]
    • Java:CVE-2013-0422-GA [Expl]
    • Java:CVE-2013-0422-GB [Expl]
    • Java:CVE-2013-0422-GC [Expl]
    • Java:CVE-2013-0422-GD [Expl]
    • Java:CVE-2013-0422-GE [Expl]
    • Java:CVE-2013-0422-GF [Expl]
    • Java:CVE-2013-0422-GG [Expl]
    • Java:CVE-2013-0422-GH [Expl]
    • Java:CVE-2013-0422-GI [Expl]
    • Java:CVE-2013-0422-GJ [Expl]
    • Java:CVE-2013-0422-GK [Expl]
    • Java:CVE-2013-0422-GL [Expl]
    • Java:CVE-2013-0422-GM [Expl]
    • Java:CVE-2013-0422-GN [Expl]
    • Java:CVE-2013-0422-GO [Expl]
    • Java:CVE-2013-0422-GP [Expl]
    • Java:CVE-2013-0422-GQ [Expl]
    • Java:CVE-2013-0422-GR [Expl]
    • Java:CVE-2013-0422-GS [Expl]
    • Java:CVE-2013-0422-GT [Expl]
    • Java:CVE-2013-0422-GU [Expl]
    • Java:CVE-2013-0422-GV [Expl]
    • Java:CVE-2013-0422-GW [Expl]
    • Java:CVE-2013-0422-GX [Expl]
    • Java:CVE-2013-0422-GY [Expl]
    • Java:CVE-2013-0422-GZ [Expl]
    • Java:CVE-2013-0422-HA [Expl]
    • Java:CVE-2013-0422-HB [Expl]
    • Java:CVE-2013-0422-HC [Expl]
    • Java:CVE-2013-0422-HD [Expl]
    • Java:CVE-2013-0422-HE [Expl]
    • Java:CVE-2013-0422-HF [Expl]
    • Java:CVE-2013-0422-HG [Expl]
    • Java:CVE-2013-0422-HH [Expl]
    • Java:CVE-2013-0422-HI [Expl]
    • Java:CVE-2013-0422-HJ [Expl]
    • Java:CVE-2013-0422-HK [Expl]
    • Java:CVE-2013-0422-HL [Expl]
    • Java:CVE-2013-0422-HM [Expl]
    • Java:CVE-2013-0422-HN [Expl]
    • Java:CVE-2013-0422-HO [Expl]
    • Java:CVE-2013-0422-HP [Expl]
    • Java:CVE-2013-0422-HQ [Expl]
    • Java:CVE-2013-0422-HR [Expl]
    • Java:CVE-2013-0422-HS [Expl]
    • Java:CVE-2013-0422-HT [Expl]
    • Java:CVE-2013-0422-HU [Expl]
    • Java:CVE-2013-0422-HV [Expl]
    • Java:CVE-2013-0422-HW [Expl]
    • Java:CVE-2013-0422-HX [Expl]
    • Java:CVE-2013-0422-HY [Expl]
    • Java:CVE-2013-0422-HZ [Expl]
    • Java:CVE-2013-0422-IA [Expl]
    • Java:CVE-2013-0422-IB [Expl]
    • Java:CVE-2013-0422-IC [Expl]
    • Java:CVE-2013-0422-ID [Expl]
    • Java:CVE-2013-0422-IE [Expl]
    • Java:CVE-2013-0422-IF [Expl]
    • Java:CVE-2013-0422-IG [Expl]
    • Java:CVE-2013-0422-IH [Expl]
    • Java:CVE-2013-0422-II [Expl]
    • Java:CVE-2013-0422-IJ [Expl]
    • Java:CVE-2013-0422-IK [Expl]
    • Java:CVE-2013-0422-IL [Expl]
    • Java:CVE-2013-0422-IM [Expl]
    • Java:CVE-2013-0422-IN [Expl]
    • Java:CVE-2013-0422-IO [Expl]
    • Java:CVE-2013-0422-IP [Expl]
    • Java:CVE-2013-0422-IQ [Expl]
    • Java:CVE-2013-0422-IR [Expl]
    • Java:CVE-2013-0422-IS [Expl]
    • Java:CVE-2013-0422-IT [Expl]
    • Java:CVE-2013-0422-IU [Expl]
    • Java:CVE-2013-0422-IV [Expl]
    • Java:CVE-2013-0422-IW [Expl]
    • Java:CVE-2013-0422-IX [Expl]
    • Java:CVE-2013-0422-IY [Expl]
    • Java:CVE-2013-0422-IZ [Expl]
    • Java:CVE-2013-0422-JA [Expl]
    • Java:CVE-2013-0422-JB [Expl]
    • Java:CVE-2013-0422-JC [Expl]
    • Java:CVE-2013-0422-JD [Expl]
    • Java:CVE-2013-0422-JE [Expl]
    • Java:CVE-2013-0422-JF [Expl]
    • Java:CVE-2013-0422-JG [Expl]
    • Java:CVE-2013-0422-JH [Expl]
    • Java:CVE-2013-0422-JI [Expl]
    • Java:CVE-2013-0422-JJ [Expl]
    • Java:CVE-2013-0422-JK [Expl]
    • Java:CVE-2013-0422-JL [Expl]
    • Java:CVE-2013-0422-JM [Expl]
    • Java:CVE-2013-0422-JN [Expl]
    • Java:CVE-2013-0422-JO [Expl]
    • Java:CVE-2013-0422-JP [Expl]
    • Java:CVE-2013-0422-JQ [Expl]
    • Java:CVE-2013-0422-JR [Expl]
    • Java:CVE-2013-0422-JS [Expl]
    • Java:CVE-2013-0422-JT [Expl]
    • Java:CVE-2013-0422-JU [Expl]
    • Java:CVE-2013-0422-JV [Expl]
    • Java:CVE-2013-0422-JW [Expl]
    • Java:CVE-2013-0422-JX [Expl]
    • Java:CVE-2013-0422-JY [Expl]
    • Java:CVE-2013-0422-JZ [Expl]
    • Java:CVE-2013-0422-KA [Expl]
    • Java:CVE-2013-0422-KB [Expl]
    • Java:CVE-2013-0422-KC [Expl]
    • Java:CVE-2013-0422-KE [Expl]
    • Java:CVE-2013-0422-KF [Expl]
    • Java:Uttond-A [Expl]
  • VPS release: 130105-00
  • Security advisory:
!2012-12-29CVE-2012-4792A vulnerability exists when Internet Explorer (versions 6, 7, 8) attempts to access an ob... +
    avast! detection:
    • JS:Bogidow-A [Expl]+
    • JS:Bogidow-B [Expl]
    • JS:CVE-2012-4792-A [Expl]
    • JS:CVE-2012-4792-B [Expl]
    • JS:CVE-2012-4792-C [Trj]
    • JS:CVE-2012-4792-D [Trj]
    • JS:CVE-2012-4792-E [Expl]
    • JS:CVE-2012-4792-F [Expl]
    • JS:CVE-2012-4792-G [Expl]
    • JS:CVE-2012-4792-H [Expl]
  • VPS release: 121229-01
  • Security advisory:
2012-12-18CVE-2012-4787Use-after-free vulnerability in Microsoft Internet Explorer 9 and 10 allows remote attack... +
2012-12-10CVE-2012-4786The kernel-mode drivers in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Win... +
2012-11-22CVE-2012-1538Use-after-free vulnerability in Microsoft Internet Explorer 9 allows remote attackers to ... +
2012-11-22CVE-2012-1539Use-after-free vulnerability in Microsoft Internet Explorer 9 allows remote attackers to ... +
2012-11-22CVE-2012-4775Use-after-free vulnerability in Microsoft Internet Explorer 9 allows remote attackers to ... +
2012-11-13CVE-2012-5076Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java ... +
    avast! detection:
    • Java:CVE-2012-5076-A [Expl]+
    • Java:CVE-2012-5076-B [Expl]
    • Java:CVE-2012-5076-C [Expl]
    • Java:CVE-2012-5076-D [Expl]
    • Java:CVE-2012-5076-E [Expl]
    • Java:CVE-2012-5076-F [Expl]
    • Java:CVE-2012-5076-G [Expl]
    • Java:CVE-2012-5076-H [Expl]
    • Java:CVE-2012-5076-I [Expl]
    • Java:CVE-2012-5076-J [Expl]
    • Java:CVE-2012-5076-K [Expl]
    • Java:CVE-2012-5076-L [Expl]
    • Java:CVE-2012-5076-M [Expl]
    • Java:CVE-2012-5076-N [Expl]
    • Java:CVE-2012-5076-O [Expl]
    • Java:CVE-2012-5076-P [Expl]
    • Java:CVE-2012-5076-Q [Expl]
    • Java:CVE-2012-5076-R [Expl]
    • Java:CVE-2012-5076-S [Expl]
    • Java:CVE-2012-5076-T [Expl]
    • Java:CVE-2012-5076-U [Expl]
    • Java:CVE-2012-5076-V [Expl]
    • Java:CVE-2012-5076-W [Expl]
    • Java:CVE-2012-5076-X [Expl]
    • Java:CVE-2012-5076-Y [Expl]
    • Java:CVE-2012-5076-Z [Expl]
    • Java:CVE-2012-5076-AA [Expl]
    • Java:CVE-2012-5076-AB [Expl]
    • Java:CVE-2012-5076-AC [Expl]
    • Java:CVE-2012-5076-AD [Expl]
    • Java:CVE-2012-5076-AE [Expl]
    • Java:CVE-2012-5076-AF [Expl]
    • Java:CVE-2012-5076-AG [Expl]
    • Java:CVE-2012-5076-AH [Expl]
    • Java:CVE-2012-5076-AI [Expl]
    • Java:CVE-2012-5076-AJ [Expl]
    • Java:CVE-2012-5076-AK [Expl]
    • Java:CVE-2012-5076-AL [Expl]
    • Java:CVE-2012-5076-AM [Expl]
    • Java:CVE-2012-5076-AN [Expl]
    • Java:CVE-2012-5076-AO [Expl]
    • Java:CVE-2012-5076-AP [Expl]
    • Java:CVE-2012-5076-AQ [Expl]
    • Java:CVE-2012-5076-AR [Expl]
    • Java:CVE-2012-5076-AS [Expl]
    • Java:CVE-2012-5076-AT [Expl]
    • Java:CVE-2012-5076-AU [Expl]
    • Java:CVE-2012-5076-AV [Expl]
    • Java:CVE-2012-5076-AW [Expl]
    • Java:CVE-2012-5076-AX [Expl]
    • Java:CVE-2012-5076-AY [Expl]
    • Java:CVE-2012-5076-AZ [Expl]
    • Java:CVE-2012-5076-BA [Expl]
    • Java:CVE-2012-5076-BB [Expl]
  • VPS release: 121113-00
  • Security advisory:
2012-11-12CVE-2012-1527Integer underflow in Windows Shell in Microsoft Windows XP SP2 and SP3, Windows Server 20... +
2012-11-12CVE-2012-1528Integer overflow in Windows Shell in Microsoft Windows XP SP2 and SP3, Windows Server 200... +
2012-11-12CVE-2012-2543Stack-based buffer overflow in Microsoft Excel 2007 SP2 and SP3 and 2010 SP1; Office 2011... +
2012-11-12CVE-2012-2897The kernel-mode drivers in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Win... +
2012-11-06CVE-2012-1885Heap-based buffer overflow in Microsoft Excel 2003 SP3, 2007 SP2 and SP3, and 2010 SP1; O... +
2012-11-06CVE-2012-1886Microsoft Excel 2003 SP3, 2007 SP2 and SP3, and 2010 SP1; Excel Viewer; and Office Compat... +
2012-11-06CVE-2012-1887Use-after-free vulnerability in Microsoft Excel 2003 SP3, 2007 SP2 and SP3, and 2010 SP1,... +
2012-10-19CVE-2012-2528Vulnerability in Microsoft Word 2003 SP3, 2007 SP2 and SP3, and 2010 SP1, Word Viewer, Of... +
2012-10-15CVE-2012-0182Microsoft Word 2007 SP2 and SP3 does not properly handle memory during the parsing of Wor... +
2012-10-09CVE-2011-3251Apple QuickTime before 7.7.1 on Windows allows remote attackers to execute arbitrary code... +
2012-09-20CVE-2012-5054Integer overflow in the copyRawDataTo method in the Matrix3D class in Adobe Flash Player ... +
!2012-09-19CVE-2012-4969Vulnerability exists in the CMshtmlEd::Exec function in mshtml.dll in Microsoft Internet ... +
    avast! detection:
    • HTML:CVE-2012-4969-A [Trj]+
    • JS:CVE-2012-4969-A [Expl]
    • JS:CVE-2012-4969-B [Expl]
    • JS:CVE-2012-4969-C [Expl]
    • JS:CVE-2012-4969-D [Expl]
    • JS:CVE-2012-4969-E [Expl]
    • JS:CVE-2012-4969-F [Expl]
    • JS:CVE-2012-4969-G [Expl]
  • VPS release: 120919-00
  • Security advisory:
2012-09-10CVE-2012-4149Adobe Reader and Acrobat 9.x before 9.5.2 and 10.x before 10.1.4 on Windows and Mac OS X ... +
2012-09-10CVE-2012-4155Adobe Reader and Acrobat 9.x before 9.5.2 and 10.x before 10.1.4 on Windows and Mac OS X ... +
2012-09-10CVE-2012-4157Adobe Reader and Acrobat 9.x before 9.5.2 and 10.x before 10.1.4 on Windows and Mac OS X ... +
2012-09-07CVE-2010-2884Adobe Flash Player 10.1.82.76 and earlier on Windows, Mac OS X, Linux, and Solaris and 10... +
!2012-08-29CVE-2012-4681An exploitable bug exists in the Oracle Java 7 Update 6, and possibly other versions. It ... +
    avast! detection:
    • Java:CVE-2012-4681-A [Expl]+
    • Java:CVE-2012-4681-B [Expl]
    • Java:CVE-2012-4681-C [Expl]
    • Java:CVE-2012-4681-D [Expl]
    • Java:CVE-2012-4681-E [Expl]
    • Java:CVE-2012-4681-F [Expl]
    • Java:CVE-2012-4681-G [Expl]
    • Java:CVE-2012-4681-H [Expl]
    • Java:CVE-2012-4681-I [Expl]
    • Java:CVE-2012-4681-J [Expl]
    • Java:CVE-2012-4681-K [Expl]
    • Java:CVE-2012-4681-L [Expl]
    • Java:CVE-2012-4681-M [Expl]
    • Java:CVE-2012-4681-N [Expl]
    • Java:CVE-2012-4681-O [Expl]
    • Java:CVE-2012-4681-P [Expl]
    • Java:CVE-2012-4681-Q [Expl]
    • Java:CVE-2012-4681-R [Expl]
    • Java:CVE-2012-4681-S [Expl]
    • Java:CVE-2012-4681-T [Expl]
    • Java:CVE-2012-4681-U [Expl]
    • Java:CVE-2012-4681-V [Expl]
    • Java:CVE-2012-4681-W [Expl]
    • Java:CVE-2012-4681-X [Expl]
    • Java:CVE-2012-4681-Y [Expl]
    • Java:CVE-2012-4681-Z [Expl]
    • Java:CVE-2012-4681-AA [Expl]
    • Java:CVE-2012-4681-AB [Expl]
    • Java:CVE-2012-4681-AC [Expl]
    • Java:CVE-2012-4681-AD [Expl]
    • Java:CVE-2012-4681-AE [Expl]
    • Java:CVE-2012-4681-AF [Expl]
    • Java:CVE-2012-4681-AG [Expl]
    • Java:CVE-2012-4681-AH [Expl]
    • Java:CVE-2012-4681-AI [Expl]
    • Java:CVE-2012-4681-AJ [Expl]
    • Java:CVE-2012-4681-AK [Expl]
    • Java:CVE-2012-4681-AL [Expl]
    • Java:CVE-2012-4681-AM [Expl]
    • Java:CVE-2012-4681-AN [Expl]
    • Java:CVE-2012-4681-AO [Expl]
    • Java:CVE-2012-4681-AP [Expl]
    • Java:CVE-2012-4681-AQ [Expl]
    • Java:CVE-2012-4681-AR [Expl]
    • Java:CVE-2012-4681-AS [Expl]
    • Java:CVE-2012-4681-AT [Expl]
    • Java:CVE-2012-4681-AU [Expl]
    • Java:CVE-2012-4681-AV [Expl]
    • Java:CVE-2012-4681-AW [Expl]
    • Java:CVE-2012-4681-AX [Expl]
    • Java:CVE-2012-4681-AY [Expl]
    • Java:CVE-2012-4681-AZ [Expl]
    • Java:CVE-2012-4681-BA [Expl]
    • Java:CVE-2012-4681-BB [Expl]
    • Java:CVE-2012-4681-BC [Expl]
    • Java:CVE-2012-4681-BD [Expl]
    • Java:CVE-2012-4681-BE [Expl]
    • Java:CVE-2012-4681-BF [Expl]
    • Java:CVE-2012-4681-BG [Expl]
    • Java:CVE-2012-4681-BH [Expl]
    • Java:CVE-2012-4681-BI [Expl]
    • Java:CVE-2012-4681-BJ [Expl]
    • Java:CVE-2012-4681-BK [Expl]
    • Java:CVE-2012-4681-BL [Expl]
    • Java:CVE-2012-4681-BM [Expl]
    • Java:CVE-2012-4681-BN [Expl]
    • Java:CVE-2012-4681-BO [Expl]
    • Java:CVE-2012-4681-BP [Expl]
    • Java:CVE-2012-4681-BQ [Expl]
    • Java:CVE-2012-4681-BR [Expl]
    • Java:CVE-2012-4681-BS [Expl]
    • Java:CVE-2012-4681-BT [Expl]
    • Java:CVE-2012-4681-BU [Expl]
    • Java:CVE-2012-4681-BV [Expl]
    • Java:CVE-2012-4681-BW [Expl]
    • Java:CVE-2012-4681-BX [Expl]
    • Java:CVE-2012-4681-BY [Expl]
    • Java:CVE-2012-4681-BZ [Expl]
    • Java:CVE-2012-4681-CA [Expl]
    • Java:CVE-2012-4681-CB [Expl]
    • Java:CVE-2012-4681-CC [Expl]
    • Java:CVE-2012-4681-CD [Expl]
    • Java:CVE-2012-4681-CE [Expl]
    • Java:CVE-2012-4681-CF [Expl]
    • Java:CVE-2012-4681-CG [Expl]
    • Java:CVE-2012-4681-CH [Expl]
    • Java:CVE-2012-4681-CI [Expl]
    • Java:CVE-2012-4681-CJ [Expl]
    • Java:CVE-2012-4681-CK [Expl]
    • Java:CVE-2012-4681-CL [Expl]
    • Java:CVE-2012-4681-CM [Expl]
    • Java:CVE-2012-4681-CN [Expl]
    • Java:CVE-2012-4681-CO [Expl]
    • Java:CVE-2012-4681-CP [Expl]
    • Java:CVE-2012-4681-CQ [Expl]
    • Java:CVE-2012-4681-CR [Expl]
    • Java:CVE-2012-4681-CS [Expl]
    • Java:CVE-2012-4681-CT [Expl]
    • Java:CVE-2012-4681-CU [Expl]
    • Java:CVE-2012-4681-CV [Expl]
    • Java:CVE-2012-4681-CW [Expl]
    • Java:CVE-2012-4681-CX [Expl]
    • Java:CVE-2012-4681-CY [Expl]
    • Java:CVE-2012-4681-CZ [Expl]
    • Java:CVE-2012-4681-DA [Expl]
    • Java:CVE-2012-4681-DB [Expl]
    • Java:CVE-2012-4681-DC [Expl]
    • Java:CVE-2012-4681-DD [Expl]
    • Java:CVE-2012-4681-DE [Expl]
    • Java:CVE-2012-4681-DF [Expl]
    • Java:CVE-2012-4681-DG [Expl]
    • Java:CVE-2012-4681-DH [Expl]
    • Java:CVE-2012-4681-DI [Expl]
    • Java:CVE-2012-4681-DJ [Expl]
    • Java:CVE-2012-4681-DK [Expl]
    • Java:CVE-2012-4681-DL [Expl]
    • Java:CVE-2012-4681-DM [Expl]
    • Java:CVE-2012-4681-DN [Expl]
    • Java:CVE-2012-4681-DO [Expl]
    • Java:CVE-2012-4681-DP [Expl]
    • Java:CVE-2012-4681-DQ [Expl]
    • Java:CVE-2012-4681-DR [Expl]
    • Java:CVE-2012-4681-DS [Expl]
    • Java:CVE-2012-4681-DT [Expl]
    • Java:CVE-2012-4681-DU [Expl]
    • Java:CVE-2012-4681-DV [Expl]
    • Java:CVE-2012-4681-DW [Expl]
    • Java:CVE-2012-4681-DX [Expl]
    • Java:CVE-2012-4681-DY [Expl]
    • Java:CVE-2012-4681-DZ [Expl]
    • Java:CVE-2012-4681-EA [Expl]
    • Java:CVE-2012-4681-EB [Expl]
    • Java:CVE-2012-4681-EC [Expl]
    • Java:CVE-2012-4681-ED [Expl]
    • Java:CVE-2012-4681-EE [Expl]
    • Java:CVE-2012-4681-EF [Expl]
    • Java:CVE-2012-4681-EG [Expl]
    • Java:CVE-2012-4681-EH [Expl]
    • Java:CVE-2012-4681-EI [Expl]
    • Java:CVE-2012-4681-EJ [Expl]
    • Java:CVE-2012-4681-EK [Expl]
    • Java:CVE-2012-4681-EL [Expl]
    • Java:CVE-2012-4681-EM [Expl]
    • Java:CVE-2012-4681-EN [Expl]
    • Java:CVE-2012-4681-EO [Expl]
    • Java:CVE-2012-4681-EP [Expl]
    • Java:CVE-2012-4681-EQ [Expl]
    • Java:CVE-2012-4681-ER [Expl]
    • Java:CVE-2012-4681-ES [Expl]
    • Java:CVE-2012-4681-ET [Expl]
    • Java:CVE-2012-4681-EU [Expl]
    • Java:CVE-2012-4681-EV [Expl]
    • Java:CVE-2012-4681-EW [Expl]
    • Java:CVE-2012-4681-EX [Expl]
    • Java:CVE-2012-4681-EY [Expl]
    • Java:CVE-2012-4681-EZ [Expl]
    • Java:CVE-2012-4681-FA [Expl]
    • Java:CVE-2012-4681-FB [Expl]
    • Java:CVE-2012-4681-FC [Expl]
    • Java:CVE-2012-4681-FD [Expl]
    • Java:CVE-2012-4681-FE [Expl]
    • Java:CVE-2012-4681-FF [Expl]
    • Java:CVE-2012-4681-FG [Expl]
    • Java:CVE-2012-4681-FH [Expl]
    • Java:CVE-2012-4681-FI [Expl]
    • Java:CVE-2012-4681-FJ [Expl]
    • Java:CVE-2012-4681-FK [Expl]
    • Java:CVE-2012-4681-FL [Expl]
    • Java:CVE-2012-4681-FM [Expl]
    • Java:CVE-2012-4681-FN [Expl]
    • Java:CVE-2012-4681-FO [Expl]
    • Java:CVE-2012-4681-FP [Expl]
    • Java:CVE-2012-4681-FQ [Expl]
    • Java:CVE-2012-4681-FR [Expl]
    • Java:CVE-2012-4681-FS [Expl]
    • Java:CVE-2012-4681-FT [Expl]
    • Java:CVE-2012-4681-FU [Expl]
    • Java:CVE-2012-4681-FV [Expl]
    • Java:CVE-2012-4681-FW [Expl]
    • Java:CVE-2012-4681-FX [Expl]
    • Java:CVE-2012-4681-FY [Expl]
    • Java:CVE-2012-4681-FZ [Expl]
    • Java:CVE-2012-4681-GA [Expl]
    • Java:CVE-2012-4681-GB [Expl]
    • Java:CVE-2012-4681-GC [Expl]
    • Java:CVE-2012-4681-GD [Expl]
    • Java:CVE-2012-4681-GE [Expl]
    • Java:CVE-2012-4681-GF [Expl]
    • Java:CVE-2012-4681-GG [Expl]
    • Java:CVE-2012-4681-GH [Expl]
    • Java:CVE-2012-4681-GI [Expl]
    • Java:CVE-2012-4681-GJ [Expl]
    • Java:CVE-2012-4681-GK [Expl]
    • Java:CVE-2012-4681-GL [Expl]
    • Java:CVE-2012-4681-GM [Expl]
    • Java:CVE-2012-4681-GN [Expl]
    • Java:CVE-2012-4681-GO [Expl]
    • Java:CVE-2012-4681-GP [Expl]
    • Java:CVE-2012-4681-GQ [Expl]
    • Java:CVE-2012-4681-GR [Expl]
    • Java:CVE-2012-4681-GS [Expl]
    • Java:CVE-2012-4681-GT [Expl]
    • Java:CVE-2012-4681-GU [Expl]
    • Java:CVE-2012-4681-GV [Expl]
    • Java:CVE-2012-4681-GW [Expl]
    • Java:CVE-2012-4681-GX [Expl]
    • Java:CVE-2012-4681-GY [Expl]
    • Java:CVE-2012-4681-GZ [Expl]
    • Java:CVE-2012-4681-HA [Expl]
    • Java:CVE-2012-4681-HB [Expl]
    • Java:CVE-2012-4681-HC [Expl]
    • Java:CVE-2012-4681-HD [Expl]
    • Java:CVE-2012-4681-HE [Expl]
    • Java:CVE-2012-4681-HF [Expl]
    • Java:CVE-2012-4681-HG [Expl]
    • Java:CVE-2012-4681-HH [Expl]
    • Java:CVE-2012-4681-HI [Expl]
    • Java:CVE-2012-4681-HJ [Expl]
    • Java:CVE-2012-4681-HK [Expl]
    • Java:CVE-2012-4681-HL [Expl]
    • Java:CVE-2012-4681-HM [Expl]
    • Java:CVE-2012-4681-HN [Expl]
    • Java:CVE-2012-4681-HO [Expl]
    • Java:CVE-2012-4681-HP [Expl]
    • Java:CVE-2012-4681-HQ [Expl]
    • Java:CVE-2012-4681-HR [Expl]
    • Java:CVE-2012-4681-HS [Expl]
    • Java:CVE-2012-4681-HT [Expl]
    • Java:CVE-2012-4681-HU [Expl]
    • Java:CVE-2012-4681-HV [Expl]
    • Java:CVE-2012-4681-HW [Expl]
    • Java:CVE-2012-4681-HX [Expl]
    • Java:CVE-2012-4681-HY [Expl]
    • Java:CVE-2012-4681-HZ [Expl]
    • Java:CVE-2012-4681-IA [Expl]
    • Java:CVE-2012-4681-IB [Expl]
    • Java:CVE-2012-4681-IC [Expl]
    • Java:CVE-2012-4681-ID [Expl]
    • Java:CVE-2012-4681-IE [Expl]
    • Java:CVE-2012-4681-IF [Expl]
    • Java:CVE-2012-4681-IG [Expl]
    • Java:CVE-2012-4681-IH [Expl]
    • Java:CVE-2012-4681-II [Expl]
    • Java:CVE-2012-4681-IJ [Expl]
    • Java:CVE-2012-4681-IK [Expl]
    • Java:CVE-2012-4681-IL [Expl]
    • Java:CVE-2012-4681-IM [Expl]
    • Java:CVE-2012-4681-IN [Expl]
    • Java:CVE-2012-4681-IO [Expl]
    • Java:CVE-2012-4681-IP [Expl]
    • Java:CVE-2012-4681-IQ [Expl]
    • Java:CVE-2012-4681-IR [Expl]
    • Java:CVE-2012-4681-IS [Expl]
    • Java:CVE-2012-4681-IT [Expl]
    • Java:CVE-2012-4681-IU [Expl]
    • Java:CVE-2012-4681-IV [Expl]
    • Java:CVE-2012-4681-IW [Expl]
    • Java:CVE-2012-4681-IX [Expl]
    • Java:CVE-2012-4681-IY [Expl]
    • Java:CVE-2012-4681-IZ [Expl]
    • Java:CVE-2012-4681-JA [Expl]
    • Java:CVE-2012-4681-JB [Expl]
    • Java:CVE-2012-4681-JC [Expl]
    • Java:CVE-2012-4681-JD [Expl]
    • Java:CVE-2012-4681-JE [Expl]
    • Java:CVE-2012-4681-JF [Expl]
    • Java:CVE-2012-4681-JG [Expl]
    • Java:CVE-2012-4681-JH [Expl]
    • Java:CVE-2012-4681-JI [Expl]
    • Java:CVE-2012-4681-JJ [Expl]
    • Java:CVE-2012-4681-JK [Expl]
    • Java:CVE-2012-4681-JL [Expl]
    • Java:CVE-2012-4681-JM [Expl]
    • Java:CVE-2012-4681-JN [Expl]
    • Java:CVE-2012-4681-JO [Expl]
    • Java:CVE-2012-4681-JP [Expl]
    • Java:CVE-2012-4681-JQ [Expl]
    • Java:CVE-2012-4681-JR [Expl]
    • Java:CVE-2012-4681-JS [Expl]
    • Java:CVE-2012-4681-JT [Expl]
    • Java:CVE-2012-4681-JU [Expl]
    • Java:CVE-2012-4681-JV [Expl]
    • Java:CVE-2012-4681-JW [Expl]
    • Java:CVE-2012-4681-JX [Expl]
    • Java:CVE-2012-4681-JY [Expl]
    • Java:CVE-2012-4681-JZ [Expl]
    • Java:CVE-2012-4681-KA [Expl]
    • Java:CVE-2012-4681-KB [Expl]
    • Java:CVE-2012-4681-KC [Expl]
    • Java:CVE-2012-4681-KD [Expl]
    • Java:CVE-2012-4681-KE [Expl]
    • Java:CVE-2012-4681-KF [Expl]
    • Java:CVE-2012-4681-KG [Expl]
    • Java:CVE-2012-4681-KH [Expl]
    • Java:CVE-2012-4681-KI [Expl]
    • Java:CVE-2012-4681-KJ [Expl]
    • Java:CVE-2012-4681-KK [Expl]
    • Java:CVE-2012-4681-KL [Expl]
    • Java:CVE-2012-4681-KM [Expl]
    • Java:CVE-2012-4681-KN [Expl]
    • Java:CVE-2012-4681-KO [Expl]
    • Java:CVE-2012-4681-KP [Expl]
    • Java:CVE-2012-4681-KQ [Expl]
    • Java:CVE-2012-4681-KR [Expl]
    • Java:CVE-2012-4681-KS [Expl]
    • Java:CVE-2012-4681-KT [Expl]
    • Java:CVE-2012-4681-KU [Expl]
    • Java:CVE-2012-4681-KV [Expl]
    • Java:CVE-2012-4681-KW [Expl]
    • Java:CVE-2012-4681-KX [Expl]
    • Java:CVE-2012-4681-KY [Expl]
    • Java:CVE-2012-4681-KZ [Expl]
    • Java:CVE-2012-4681-LA [Expl]
    • Java:CVE-2012-4681-LB [Expl]
    • Java:CVE-2012-4681-LC [Expl]
    • Java:CVE-2012-4681-LD [Expl]
    • Java:CVE-2012-4681-LE [Expl]
    • Java:CVE-2012-4681-LF [Expl]
    • Java:CVE-2012-4681-LG [Expl]
    • Java:CVE-2012-4681-LH [Expl]
    • Java:CVE-2012-4681-LI [Expl]
    • Java:CVE-2012-4681-LJ [Expl]
    • Java:CVE-2012-4681-LK [Expl]
    • Java:CVE-2012-4681-LL [Expl]
    • Java:CVE-2012-4681-LM [Expl]
    • Java:CVE-2012-4681-LN [Expl]
    • Java:CVE-2012-4681-LO [Expl]
    • Java:CVE-2012-4681-LP [Expl]
    • Java:CVE-2012-4681-LQ [Expl]
    • Java:CVE-2012-4681-LR [Expl]
    • Java:CVE-2012-4681-LS [Expl]
    • Java:CVE-2012-4681-LT [Expl]
    • Java:CVE-2012-4681-LU [Expl]
    • Java:CVE-2012-4681-LV [Expl]
    • Java:CVE-2012-4681-LW [Expl]
    • Java:CVE-2012-4681-LX [Expl]
    • Java:CVE-2012-4681-LY [Expl]
    • Java:CVE-2012-4681-MB [Expl]
    • Java:Dong-E [Expl]
  • VPS release: 120829-00
  • Security advisory:
2012-08-20CVE-2012-1856The TabStrip ActiveX control in the Common Controls in MSCOMCTL.OCX in Microsoft Office 2... +
2012-08-17CVE-2012-1525Heap-based buffer overflow in Adobe Reader and Acrobat 9.x before 9.5.2 and 10.x before 1... +
2012-08-17CVE-2012-1888Buffer overflow in Microsoft Visio 2010 SP1 and Visio Viewer 2010 SP1 allows remote attac... +
2012-08-17CVE-2012-2049Stack-based buffer overflow in Adobe Reader and Acrobat 9.x before 9.5.2 and 10.x before ... +
2012-08-17CVE-2012-4147Adobe Reader and Acrobat 9.x before 9.5.2 and 10.x before 10.1.4 on Windows and Mac OS X ... +
2012-08-16CVE-2009-1869Integer overflow in the ActionScript Virtual Machine 2 (AVM2) abcFile parser in Adobe Fla... +
2012-08-16CVE-2010-3970Stack-based buffer overflow in the CreateSizedDIBSECTION function in shimgvw.dll in the W... +
2012-08-16CVE-2011-0619Adobe Flash Player before 10.3.181.14 on Windows, Mac OS X, Linux, and Solaris and before... +
2012-08-16CVE-2011-0658Integer underflow in the OLE Automation protocol implementation in VBScript.dll in Micros... +
2012-08-16CVE-2011-2094Buffer overflow in Adobe Reader and Acrobat 8.x before 8.3, 9.x before 9.4.5, and 10.x be... +
2012-08-16CVE-2011-2095Buffer overflow in Adobe Reader and Acrobat 8.x before 8.3, 9.x before 9.4.5, and 10.x be... +
2012-08-16CVE-2011-2096Heap-based buffer overflow in Adobe Reader and Acrobat 8.x before 8.3, 9.x before 9.4.5, ... +
2012-08-16CVE-2011-2097Buffer overflow in Adobe Reader and Acrobat 8.x before 8.3, 9.x before 9.4.5, and 10.x be... +
2012-08-16CVE-2011-2101Adobe Reader and Acrobat 8.x before 8.3, 9.x before 9.4.5, and 10.x before 10.1 on Window... +
2012-08-16CVE-2011-2105Adobe Reader and Acrobat 8.x before 8.3, 9.x before 9.4.5, and 10.x before 10.1 on Window... +
2012-08-16CVE-2011-2414Buffer overflow in Adobe Flash Player before 10.3.183.5 on Windows, Mac OS X, Linux, and ... +
2012-08-16CVE-2011-2417Adobe Flash Player before 10.3.183.5 on Windows, Mac OS X, Linux, and Solaris and before ... +
2012-08-16CVE-2011-2425Adobe Flash Player before 10.3.183.5 on Windows, Mac OS X, Linux, and Solaris and before ... +
2012-08-16CVE-2012-1535Unspecified vulnerability in Adobe Flash Player before 11.3.300.271 on Windows and Mac OS... +
2012-08-16CVE-2012-4148Adobe Reader and Acrobat 9.x before 9.5.2 and 10.x before 10.1.4 on Windows and Mac OS X ... +
2012-08-16CVE-2012-4151Adobe Reader and Acrobat 9.x before 9.5.2 and 10.x before 10.1.4 on Windows and Mac OS X ... +
2012-08-15CVE-2011-1723Cross-site scripting (XSS) vulnerability in app/views/layouts/base.rhtml in Redmine 1.0.1... +
2012-08-15CVE-2012-1526Microsoft Internet Explorer 6 and 7 does not properly handle objects in memory, which all... +
2012-08-15CVE-2012-2521Microsoft Internet Explorer 6 through 9 does not properly handle objects in memory, which... +
2012-08-15CVE-2012-2522Microsoft Internet Explorer 6 through 9 does not properly handle objects in memory, which... +
2012-08-02CVE-2012-1753Unspecified vulnerability in the PeopleSoft Enterprise PeopleTools component in Oracle Pe... +
2012-07-20CVE-2008-4841The WordPad Text Converter for Word 97 files in Microsoft Windows 2000 SP4, XP SP2, and S... +
2012-07-20CVE-2011-1982Microsoft Office 2007 SP2, and 2010 Gold and SP1, does not initialize an unspecified obje... +
2012-07-18CVE-2011-2110Adobe Flash Player before 10.3.181.26 on Windows, Mac OS X, Linux, and Solaris, and 10.3.... +
2012-07-17CVE-2008-5353The Java Runtime Environment (JRE) for Sun JDK and JRE 6 Update 10 and earlier; JDK and J... +
    avast! detection:
    • Java:CVE-2008-5353-A [Expl]+
    • Java:CVE-2008-5353-B [Expl]
    • Java:CVE-2008-5353-C [Expl]
    • Java:CVE-2008-5353-D [Expl]
    • Java:CVE-2008-5353-E [Expl]
    • Java:CVE-2008-5353-F [Expl]
    • Java:CVE-2008-5353-G [Expl]
    • Java:CVE-2008-5353-H [Expl]
    • Java:CVE-2008-5353-I [Expl]
    • Java:CVE-2008-5353-J [Expl]
    • Java:CVE-2008-5353-K [Expl]
    • Java:CVE-2008-5353-L [Expl]
    • Java:CVE-2008-5353-M [Expl]
    • Java:CVE-2008-5353-N [Expl]
    • Java:CVE-2008-5353-O [Expl]
    • Java:CVE-2008-5353-P [Expl]
    • Java:CVE-2008-5353-Q [Expl]
    • Java:CVE-2008-5353-R [Expl]
    • Java:CVE-2008-5353-S [Expl]
    • Java:CVE-2008-5353-T [Expl]
    • Java:CVE-2008-5353-U [Expl]
    • Java:CVE-2008-5353-V [Expl]
    • Java:CVE-2008-5353-W [Expl]
    • Java:CVE-2008-5353-X [Expl]
    • Java:CVE-2008-5353-Y [Expl]
    • Java:CVE-2008-5353-Z [Expl]
    • Java:CVE-2008-5353-AA [Expl]
    • Java:CVE-2008-5353-AB [Expl]
    • Java:CVE-2008-5353-AC [Expl]
    • Java:CVE-2008-5353-AD [Expl]
    • Java:CVE-2008-5353-AE [Expl]
    • Java:CVE-2008-5353-AF [Expl]
    • Java:CVE-2008-5353-AG [Expl]
    • Java:CVE-2008-5353-AH [Expl]
    • Java:CVE-2008-5353-AI [Expl]
    • Java:CVE-2008-5353-AJ [Expl]
    • Java:CVE-2008-5353-AK [Expl]
    • Java:CVE-2008-5353-AL [Expl]
  • VPS release: 120717-01
  • Security advisory:
2012-07-13CVE-2012-0506Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java ... +
2012-07-12CVE-2012-1723Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java ... +
    avast! detection:
    • Java:CVE-2012-1723-A [Expl]+
    • Java:CVE-2012-1723-B [Expl]
    • Java:CVE-2012-1723-C [Expl]
    • Java:CVE-2012-1723-D [Expl]
    • Java:CVE-2012-1723-E [Expl]
    • Java:CVE-2012-1723-F [Expl]
    • Java:CVE-2012-1723-G [Expl]
    • Java:CVE-2012-1723-H [Expl]
    • Java:CVE-2012-1723-I [Expl]
    • Java:CVE-2012-1723-J [Expl]
    • Java:CVE-2012-1723-K [Expl]
    • Java:CVE-2012-1723-L [Expl]
    • Java:CVE-2012-1723-M [Expl]
    • Java:CVE-2012-1723-N [Expl]
    • Java:CVE-2012-1723-O [Expl]
    • Java:CVE-2012-1723-P [Expl]
    • Java:CVE-2012-1723-Q [Expl]
    • Java:CVE-2012-1723-R [Expl]
    • Java:CVE-2012-1723-S [Expl]
    • Java:CVE-2012-1723-T [Expl]
    • Java:CVE-2012-1723-U [Expl]
    • Java:CVE-2012-1723-V [Expl]
    • Java:CVE-2012-1723-W [Expl]
    • Java:CVE-2012-1723-X [Expl]
    • Java:CVE-2012-1723-Y [Expl]
    • Java:CVE-2012-1723-Z [Expl]
    • Java:CVE-2012-1723-AA [Expl]
    • Java:CVE-2012-1723-AB [Expl]
    • Java:CVE-2012-1723-AC [Expl]
    • Java:CVE-2012-1723-AD [Expl]
    • Java:CVE-2012-1723-AE [Expl]
    • Java:CVE-2012-1723-AF [Expl]
    • Java:CVE-2012-1723-AG [Expl]
    • Java:CVE-2012-1723-AH [Expl]
    • Java:CVE-2012-1723-AJ [Expl]
    • Java:CVE-2012-1723-AK [Expl]
    • Java:CVE-2012-1723-AL [Expl]
    • Java:CVE-2012-1723-AM [Expl]
    • Java:CVE-2012-1723-AN [Expl]
    • Java:CVE-2012-1723-AO [Expl]
    • Java:CVE-2012-1723-AP [Expl]
    • Java:CVE-2012-1723-AQ [Expl]
    • Java:CVE-2012-1723-AR [Expl]
    • Java:CVE-2012-1723-AS [Expl]
    • Java:CVE-2012-1723-AT [Expl]
    • Java:CVE-2012-1723-AU [Expl]
    • Java:CVE-2012-1723-AV [Expl]
    • Java:CVE-2012-1723-AW [Expl]
    • Java:CVE-2012-1723-AX [Expl]
    • Java:CVE-2012-1723-AY [Expl]
    • Java:CVE-2012-1723-AZ [Expl]
    • Java:CVE-2012-1723-BA [Expl]
    • Java:CVE-2012-1723-BB [Expl]
    • Java:CVE-2012-1723-BC [Expl]
    • Java:CVE-2012-1723-BD [Expl]
    • Java:CVE-2012-1723-BE [Expl]
    • Java:CVE-2012-1723-BF [Expl]
    • Java:CVE-2012-1723-BG [Expl]
    • Java:CVE-2012-1723-BH [Expl]
    • Java:CVE-2012-1723-BI [Expl]
    • Java:CVE-2012-1723-BJ [Expl]
    • Java:CVE-2012-1723-BK [Expl]
    • Java:CVE-2012-1723-BL [Expl]
    • Java:CVE-2012-1723-BM [Expl]
    • Java:CVE-2012-1723-BN [Expl]
    • Java:CVE-2012-1723-BP [Expl]
    • Java:CVE-2012-1723-BQ [Expl]
    • Java:CVE-2012-1723-BR [Expl]
    • Java:CVE-2012-1723-BS [Expl]
    • Java:CVE-2012-1723-BT [Expl]
    • Java:CVE-2012-1723-BU [Expl]
    • Java:CVE-2012-1723-BV [Trj]
    • Java:CVE-2012-1723-BW [Trj]
    • Java:CVE-2012-1723-BX [Trj]
    • Java:CVE-2012-1723-BY [Trj]
    • Java:CVE-2012-1723-BZ [Expl]
    • Java:CVE-2012-1723-CA [Expl]
    • Java:CVE-2012-1723-CB [Expl]
    • Java:CVE-2012-1723-CC [Expl]
    • Java:CVE-2012-1723-CD [Expl]
    • Java:CVE-2012-1723-CE [Expl]
    • Java:CVE-2012-1723-CF [Expl]
    • Java:CVE-2012-1723-CG [Expl]
    • Java:CVE-2012-1723-CH [Expl]
    • Java:CVE-2012-1723-CI [Expl]
    • Java:CVE-2012-1723-CJ [Expl]
    • Java:CVE-2012-1723-CK [Expl]
    • Java:CVE-2012-1723-CL [Expl]
    • Java:CVE-2012-1723-CN [Expl]
    • Java:CVE-2012-1723-CO [Expl]
    • Java:CVE-2012-1723-CP [Expl]
    • Java:CVE-2012-1723-CQ [Expl]
    • Java:CVE-2012-1723-CR [Expl]
    • Java:CVE-2012-1723-CS [Expl]
    • Java:CVE-2012-1723-CT [Expl]
    • Java:CVE-2012-1723-CU [Expl]
    • Java:CVE-2012-1723-CV [Expl]
    • Java:CVE-2012-1723-CW [Expl]
    • Java:CVE-2012-1723-CX [Expl]
    • Java:CVE-2012-1723-CY [Expl]
    • Java:CVE-2012-1723-CZ [Expl]
    • Java:CVE-2012-1723-DA [Expl]
    • Java:CVE-2012-1723-DB [Expl]
    • Java:CVE-2012-1723-DC [Expl]
    • Java:CVE-2012-1723-DD [Expl]
    • Java:CVE-2012-1723-DE [Expl]
    • Java:CVE-2012-1723-DF [Expl]
    • Java:CVE-2012-1723-DG [Expl]
    • Java:CVE-2012-1723-DH [Expl]
    • Java:CVE-2012-1723-DI [Expl]
    • Java:CVE-2012-1723-DJ [Expl]
    • Java:CVE-2012-1723-DK [Expl]
    • Java:CVE-2012-1723-DL [Expl]
    • Java:CVE-2012-1723-DM [Expl]
    • Java:CVE-2012-1723-DN [Expl]
    • Java:CVE-2012-1723-DO [Expl]
    • Java:CVE-2012-1723-DP [Expl]
    • Java:CVE-2012-1723-DQ [Expl]
    • Java:CVE-2012-1723-DR [Expl]
    • Java:CVE-2012-1723-DS [Expl]
    • Java:CVE-2012-1723-DT [Expl]
    • Java:CVE-2012-1723-DU [Expl]
    • Java:CVE-2012-1723-DV [Expl]
    • Java:CVE-2012-1723-DW [Expl]
    • Java:CVE-2012-1723-DX [Expl]
    • Java:CVE-2012-1723-DY [Expl]
    • Java:CVE-2012-1723-DZ [Expl]
    • Java:CVE-2012-1723-EA [Expl]
    • Java:CVE-2012-1723-EB [Expl]
    • Java:CVE-2012-1723-EC [Expl]
    • Java:CVE-2012-1723-ED [Expl]
    • Java:CVE-2012-1723-EE [Expl]
    • Java:CVE-2012-1723-EF [Expl]
    • Java:CVE-2012-1723-EH [Expl]
    • Java:CVE-2012-1723-EI [Expl]
    • Java:CVE-2012-1723-EJ [Expl]
    • Java:CVE-2012-1723-EK [Expl]
    • Java:CVE-2012-1723-EL [Expl]
    • Java:CVE-2012-1723-EM [Expl]
    • Java:CVE-2012-1723-EN [Expl]
    • Java:CVE-2012-1723-EO [Expl]
    • Java:CVE-2012-1723-EP [Expl]
    • Java:CVE-2012-1723-EQ [Expl]
    • Java:CVE-2012-1723-ER [Expl]
    • Java:CVE-2012-1723-ES [Expl]
    • Java:CVE-2012-1723-ET [Expl]
    • Java:CVE-2012-1723-EU [Expl]
    • Java:CVE-2012-1723-EV [Expl]
    • Java:CVE-2012-1723-EW [Expl]
    • Java:CVE-2012-1723-EX [Expl]
    • Java:CVE-2012-1723-EY [Expl]
    • Java:CVE-2012-1723-EZ [Expl]
    • Java:CVE-2012-1723-FA [Expl]
    • Java:CVE-2012-1723-FB [Expl]
    • Java:CVE-2012-1723-FC [Expl]
    • Java:CVE-2012-1723-FD [Expl]
    • Java:CVE-2012-1723-FE [Expl]
    • Java:CVE-2012-1723-FF [Expl]
    • Java:CVE-2012-1723-FG [Expl]
    • Java:CVE-2012-1723-FH [Expl]
    • Java:CVE-2012-1723-FI [Expl]
    • Java:CVE-2012-1723-FJ [Expl]
    • Java:CVE-2012-1723-FK [Expl]
    • Java:CVE-2012-1723-FL [Expl]
    • Java:CVE-2012-1723-FM [Expl]
    • Java:CVE-2012-1723-FN [Expl]
    • Java:CVE-2012-1723-FO [Expl]
    • Java:CVE-2012-1723-FP [Expl]
    • Java:CVE-2012-1723-FQ [Expl]
    • Java:CVE-2012-1723-FR [Expl]
    • Java:CVE-2012-1723-FS [Expl]
    • Java:CVE-2012-1723-FT [Expl]
    • Java:CVE-2012-1723-FU [Expl]
    • Java:CVE-2012-1723-FV [Expl]
    • Java:CVE-2012-1723-FW [Expl]
    • Java:CVE-2012-1723-FX [Expl]
    • Java:CVE-2012-1723-FY [Expl]
    • Java:CVE-2012-1723-FZ [Expl]
    • Java:CVE-2012-1723-GA [Expl]
    • Java:CVE-2012-1723-GB [Expl]
    • Java:CVE-2012-1723-GC [Expl]
    • Java:CVE-2012-1723-GD [Expl]
    • Java:CVE-2012-1723-GE [Expl]
    • Java:CVE-2012-1723-GF [Expl]
    • Java:CVE-2012-1723-GG [Expl]
    • Java:CVE-2012-1723-GH [Expl]
    • Java:CVE-2012-1723-GI [Expl]
    • Java:CVE-2012-1723-GJ [Expl]
    • Java:CVE-2012-1723-GK [Expl]
    • Java:CVE-2012-1723-GL [Expl]
    • Java:CVE-2012-1723-GM [Expl]
    • Java:CVE-2012-1723-GN [Expl]
    • Java:CVE-2012-1723-GO [Expl]
    • Java:CVE-2012-1723-GP [Expl]
    • Java:CVE-2012-1723-GQ [Expl]
    • Java:CVE-2012-1723-GR [Expl]
    • Java:CVE-2012-1723-GS [Expl]
    • Java:CVE-2012-1723-GT [Expl]
    • Java:CVE-2012-1723-GU [Expl]
    • Java:CVE-2012-1723-GV [Expl]
    • Java:CVE-2012-1723-GW [Expl]
    • Java:CVE-2012-1723-GX [Expl]
    • Java:CVE-2012-1723-GY [Expl]
    • Java:CVE-2012-1723-GZ [Expl]
    • Java:CVE-2012-1723-HA [Expl]
    • Java:CVE-2012-1723-HB [Expl]
    • Java:CVE-2012-1723-HC [Expl]
    • Java:CVE-2012-1723-HD [Expl]
    • Java:CVE-2012-1723-HE [Expl]
    • Java:CVE-2012-1723-HF [Expl]
    • Java:CVE-2012-1723-HG [Expl]
    • Java:CVE-2012-1723-HH [Expl]
    • Java:CVE-2012-1723-HI [Expl]
    • Java:CVE-2012-1723-HJ [Expl]
    • Java:CVE-2012-1723-HK [Expl]
    • Java:CVE-2012-1723-HL [Expl]
    • Java:CVE-2012-1723-HM [Expl]
    • Java:CVE-2012-1723-HN [Expl]
    • Java:CVE-2012-1723-HO [Expl]
    • Java:CVE-2012-1723-HP [Expl]
    • Java:CVE-2012-1723-HQ [Expl]
    • Java:CVE-2012-1723-HR [Expl]
    • Java:CVE-2012-1723-HS [Expl]
    • Java:CVE-2012-1723-HT [Expl]
    • Java:CVE-2012-1723-HU [Expl]
    • Java:CVE-2012-1723-HV [Expl]
    • Java:CVE-2012-1723-HW [Expl]
    • Java:CVE-2012-1723-HX [Expl]
    • Java:CVE-2012-1723-HY [Expl]
    • Java:CVE-2012-1723-HZ [Expl]
    • Java:CVE-2012-1723-IA [Expl]
    • Java:CVE-2012-1723-IB [Expl]
    • Java:CVE-2012-1723-IC [Expl]
    • Java:CVE-2012-1723-ID [Expl]
    • Java:CVE-2012-1723-IE [Expl]
    • Java:CVE-2012-1723-IF [Expl]
    • Java:CVE-2012-1723-IG [Expl]
    • Java:CVE-2012-1723-IH [Expl]
    • Java:CVE-2012-1723-II [Expl]
    • Java:CVE-2012-1723-IJ [Expl]
    • Java:CVE-2012-1723-IK [Expl]
    • Java:CVE-2012-1723-IL [Expl]
    • Java:CVE-2012-1723-IM [Expl]
    • Java:CVE-2012-1723-IN [Expl]
    • Java:CVE-2012-1723-IO [Expl]
    • Java:CVE-2012-1723-IP [Expl]
    • Java:CVE-2012-1723-IQ [Expl]
    • Java:CVE-2012-1723-IR [Expl]
    • Java:CVE-2012-1723-IS [Expl]
    • Java:CVE-2012-1723-IT [Expl]
    • Java:CVE-2012-1723-IU [Expl]
    • Java:CVE-2012-1723-IV [Expl]
    • Java:CVE-2012-1723-IW [Expl]
    • Java:CVE-2012-1723-IX [Expl]
    • Java:CVE-2012-1723-IY [Expl]
    • Java:CVE-2012-1723-IZ [Expl]
    • Java:CVE-2012-1723-JA [Expl]
    • Java:CVE-2012-1723-JB [Expl]
    • Java:CVE-2012-1723-JC [Expl]
    • Java:CVE-2012-1723-JD [Expl]
    • Java:CVE-2012-1723-JE [Expl]
    • Java:CVE-2012-1723-JF [Expl]
    • Java:CVE-2012-1723-JG [Expl]