Search
Keyword: (ms05-051) vulnerabilities in msdtc and com could allow remote code execution (902400)
CVE-2010-2161,CVE-2010-2162,CVE-2010-2163,CVE-2010-2164,CVE-2010-2165,CVE-2010-2166,CVE-2010-2167,CVE-2010-2170,CVE-2010-2171 Adobe Flash Player is prone to remote code execution vulnerabilities.
CVE-2014-2778 This security update addresses a vulnerability in Microsoft Office which could also allow remote code execution once successfully exploited via specially crafted Word file. Microsoft
Adobe has released security updates for Adobe Flash Player for Windows, Macintosh and Linux. These updates address vulnerabilities that could potentially allow an attacker to take control of the
malicious files: (MS12-027) Vulnerability in Windows Common Controls Could Allow Remote Code Execution (2664258) It executes the dropped file(s). As a result, malicious routines of the dropped files are
(MS12-027) Vulnerability in Windows Common Controls Could Allow Remote Code Execution (2664258) It executes the dropped file(s). As a result, malicious routines of the dropped files are exhibited on
serious vulnerabilities may allow remote code execution if a user views a specially crafted Web site via Internet Explorer . Users whose accounts with fewer user rights on the system could be less impacted
Could Allow Remote Code Execution (2286198) 2010 in Review: The Hype and Reality of Stuxnet
CVE-2012-0016 This security update resolves one privately reported vulnerability in Microsoft Expression Design . The vulnerability could allow remote code execution if a user opens a legitimate file
target user to open a crafted file. A successful attack could result in the execution of arbitrary code in the security context of the target user. Apply associated Trend Micro DPI Rules. 1007119|
target user to open a crafted file. A successful attack could result in the execution of arbitrary code in the security context of the target user. Apply associated Trend Micro DPI Rules. 1007119|
malware/grayware to download files: (MS12-043) Vulnerability in Microsoft XML Core Services Could Allow Remote Code Execution (2722479) It then executes the downloaded files. As a result, malicious routines of the
(MS11-024) Vulnerability in Windows Fax Cover Page Editor Could Allow Remote Code Execution (2527308)
CVE-2010-3974,CVE-2010-4701 This security update addresses two vulnerabilities in Microsoft Windows, which could allow remote code execution. A remote malicious user could gain the same user rights
CVE-2015-2509 A vulnerability exists in Windows Media Center that could allow remote code execution if Windows Media Center opens a specially crafted Media Center link (.mcl) file that references
Microsoft addresses several vulnerabilities in its December batch of patches, several of which addresses remote code execution vulnerabilities. CVE-2017-11885 - Windows RRAS Service Remote Code
Other Details More information on this vulnerability can be found below: Vulnerabilities in Microsoft Office Could Allow Remote Code Execution (2587634) (CVE-2011-1980) NOTES: This specially-crafted .DOC
A type confusion vulnerability was discovered in Microsoft Internet Explorer and Microsoft Edge. A successful exploitation of this issue could allow an attacker to execute arbitrary code on the
the following pages: Vulnerability in Windows Shell Could Allow Remote Code Execution (2286198) This is the Trend Micro detection for: Shortcut files that attempt to exploit a vulnerablity in Windows
(MS13-057) Vulnerability in Windows Media Format Runtime Could Allow Remote Code Execution (2847883)
CVE-2013-3127 This security update resolves a privately reported vulnerability in Microsoft Windows. The vulnerability could allow remote code execution if a user opens a specially crafted media
Rating: Critical This remote code execution vulnerability exists in the improper accessing of objects in memory by Internet Explorer. Attackers looking to take advantage of this vulnerability could persuade
CVE-2014-1808 This security update resolves two privately reported vulnerabilities in Microsoft Office. The most severe vulnerability could allow remote code execution if a user opens an Office file