Keyword: (ms05-051) vulnerabilities in msdtc and com could allow remote code execution (902400)
104948 Total Search   |   Showing Results : 221 - 240
CVE-2010-1900,CVE-2010-1901,CVE-2010-1902,CVE-2010-1903 This security update addresses four Microsoft Office vulnerabilities that could allow remote code execution once a user opens a specially
CVE-2014-4122,CVE-2014-4073,CVE-2014-4121 This bulletin resolves several vulnerabilities in the .NET Framework. Some of these vulnerabilities can allow remote code execution when successfully
CVE-2008-4064 Multiple unspecified vulnerabilities in Mozilla Firefox 3.x before 3.0.2 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly
operate with administrative user rights. The vulnerability could also allow remote code execution on a server system running IIS, if that server allows processing ASP.NET pages and an attacker succeeds in
The said vulnerabilities when exploited could allow remote code execution via a specially crafted webpage thus compromising the security of the affected systems. These also affect Internet Explorer
CVE-2013-1331 This security update resolves one reported vulnerability in Microsoft Office. The vulnerability could allow remote code execution if a user opens a maliciously-crafted Office document
CVE-2010-0019,CVE-2010-1898 This security update addresses two vulnerabilities in Microsoft .NET Framework and Microsoft Silverlight. The said vulnerabilities could allow remote code execution
A remote code execution vulnerability was discovered in Microsoft Windows Graphics component. A successful exploitation of this issue could allow an attacker to execute arbitrary code on the remote
Microsoft addresses several vulnerabilities in its June security bulletin. Trend Micro Deep Security covers the following: CVE-2020-1213 - VBScript Remote Code Execution Vulnerability Risk Rating:
Rating: Critical This remote code execution vulnerability exists in the scripting engine of Internet explorer in the way it handles objects in memory. Attackers looking to exploit this vulnerability could
CVE-2013-1296 This security update resolves a reported vulnerability in Windows Remote Desktop Client. The vulnerability, if left unpatched, may allow remote code execution once a user views a
Buffer Overflow Vulnerability (CVE-2010-3333) (MS10-087) Vulnerabilities in Microsoft Office Could Allow Remote Code Execution (2423930) It executes the dropped file(s). As a result, malicious routines of
files: (MS12-027) Vulnerability in Windows Common Controls Could Allow Remote Code Execution (2664258) NOTES: It replaces itself with a non-malicious file, and then opens the non-malicious file. It does
CVE-2015-4640 The Samsung Swiftkey vulnerability could allow execution of malicious code on the affected Samsung devices via man-in-the-middle attacks. These man-in-the-middle attacks occur when a
CVE-2015-4641 The Samsung Swiftkey vulnerability could allow execution of malicious code on the affected Samsung devices via man-in-the-middle attacks. These man-in-the-middle attacks occur when a
Microsoft Office Could Allow Remote Code Execution It executes the dropped file(s). As a result, malicious routines of the dropped files are exhibited on the affected system. Trojan.Mdropper (Symantec)
download possibly malicious files: (MS12-027) Vulnerability in Windows Common Controls Could Allow Remote Code Execution (2664258) It saves the files it downloads using the following names: %User Temp%\s -
CVE-2011-2009 This update resolves a publicly disclosed vulnerability in Windows Media Center. The vulnerability could allow remote code execution if an attacker convinces a user to open a legitimate
CVE-2014-6364 This security update resolves one privately reported vulnerability in Microsoft Office. The vulnerability could allow remote code execution if a specially crafted file is opened in an
vulnerabilities in Microsoft Windows. The most severe vulnerability could allow remote code execution if a user views shared content that embeds TrueType font files. An attacker who successfully exploited this