7:39 AM | Posted in
Latest Threats & Risks
Accurate and up-to-date information on the latest threats and security risks.

View all Threats View all Risks

Severity
Name
Type
Protected*

Bloodhound.Exploit.231
Trojan, Virus, Worm
04/07/2009

Packed.Generic.218
Trojan, Virus, Worm
04/07/2009

W32.Woospi!inf
Trojan, Worm
04/06/2009

W32.Woospi
Worm
04/06/2009

Adware.Hotbar
Adware
Trojan.Adgunbe!inf
Trojan
04/04/2009
Trojan.Iphougo
Trojan
04/04/2009

W32.Relnek.A
Virus, Worm
04/03/2009

Trojan.PPDropper.H
Trojan
04/03/2009

W32.Unruy.A
Virus
04/03/2009*For continued protection, make sure that your Symantec
subscription and/or license are up to date.
Vulnerabilities
Vulnerabilities
A Vulnerability is a state in a computing system (or set of systems) which either (a) allows an attacker to execute commands as another user, (b) allows an attacker to access data that is contrary to the specified access restrictions for that data, (c) allows an attacker to pose as another entity, or (d) allows an attacker to conduct a denial of service.

View all Vulnerabilities

Name
Discovered

Microsoft Windows SChannel Authentication Spoofing Vulnerability
March 10, 2009
Microsoft Windows Kernel GDI EMF/WMF Remote Code Execution Vulnerability
March 10, 2009
Microsoft Windows DNS Server WPAD Access Validation Vulnerability
March 10, 2009
Microsoft Excel Invalid Object Remote Code Execution Vulnerability
February 23, 2009
Adobe Acrobat and Reader PDF File Handling Remote Code Execution Vulnerability
February 19, 2009
Microsoft Internet Explorer CSS Memory Corruption Remote Code Execution Vulne...
February 10, 2009
Microsoft Internet Explorer Uninitialized Memory Remote Code Execution Vulner...
February 10, 2009
Microsoft Exchange Server TNEF Decoding Remote Code Execution Vulnerability
February 10, 2009
Microsoft Windows SMB Remote Code Execution Vulnerability
January 13, 2009
Microsoft Windows SMB Buffer Overflow Vulnerability
January 13, 2009
Category:
��

Comments