Keyword: (ms05-051) vulnerabilities in msdtc and com could allow remote code execution (902400)
105168 Total Search   |   Showing Results : 501 - 520
* indicates a new version of an existing rule Deep Packet Inspection Rules: DCERPC Services 1008445* - Microsoft Windows Search Remote Code Execution Vulnerability (CVE-2017-8543) MySQL Cluster
CVE-2011-1972,CVE-2011-1979 This security update addresses two vulnerabilities in Microsoft Visio that may allow an attacker to execute arbitrary code if users unwittingly open a specific Visio file.
deleted or has not been properly allocated. The vulnerability may corrupt memory in a way that could allow an attacker to execute arbitrary code. An attacker may host a specially crafted website that is
CVE-2011-0029 This update resolves a vulnerability in Windows Remote Desktop Client, which could allow remote code execution. The exploit works if a user opens a legitimate Remote Desktop
CVE-2013-1313 This patch addresses a vulnerability in Microsoft Windows Object Linking and Embedding (OLE) Automation, which can allow remote code execution when users open a specially crafted file.
CVE-2012-2556,CVE-2012-4786 This patch addresses two vulnerabilities in Microsoft Windows that when exploited could result to remote code execution. It can be exploited via a specially crafted
CVE-2006-6497 Multiple unspecified vulnerabilities in the layout engine for Mozilla Firefox 2.x before 2.0.0.1, 1.5.x before 1.5.0.9, Thunderbird before 1.5.0.9, and SeaMonkey before 1.0.7 allow
Execution Vulnerability Over Network Share (CVE-2011-1961) 1005081* - Vulnerability In Windows Shell Could Allow Remote Code Execution (CVE-2012-0175) 1004797* - Windows Components Insecure Library Loading
code execution vulnerability exists Microsoft Outlook. The vulnerability exists in the way it handles objects in memory. CVE-2018-8539 - Microsoft Word Remote Code Execution Vulnerability Risk Rating:
CVE-2010-3144 This update resolves a vulnerability in the Internet Connection Signup Wizard of Microsoft Windows, which could allow remote code execution. This exploit works if a user opens an .ins
CVE-2010-2736,ms10-089 A cross-site scripting (XSS) vulnerability exists in Forefront Unified Access Gateway (UAG) that could allow specially crafted script code to run under the guise of the server.
CVE-2008-0226 Multiple buffer overflows in yaSSL 1.7.5 and earlier, as used in MySQL and possibly other products, allow remote attackers to execute arbitrary code via (1) the ProcessOldClientHello
(CVE-2020-1150) 1010207* - Microsoft Windows Multiple Type1 Font Parsing Remote Code Execution Vulnerabilities (CVE-2020-1020 and CVE-2020-0938) Web Client Internet Explorer/Edge 1010270 - Microsoft Edge PDF
CVE-2014-0114 The Apache Struts used by the IBM WebSphere Application Server could allow a remote attacker to execute arbitrary code on the system. An attacker could exploit this vulnerability using
CVE-2014-6277 This remote code execution vulnerability exists in the parsing of function definitions in GNU Bash through 4.3 bash43-026 does not properly parse function. When exploited successfully,
ImageMagick Multiple Security Vulnerabilities (Client) - 24 Web Server Common 1007185* - Java Unserialize Remote Code Execution Vulnerability Web Server Miscellaneous 1009265* - Apache Struts OGNL Expression
CVE-2015-1756 This security update addresses a vulnerability in Microsoft Windows, which could allow remote code execution if a user clicks a specially crafted link, or a link to specially crafted
CVE-2010-3000 Multiple integer overflows in the ParseKnownType function in RealNetworks RealPlayer 11.0 through 11.1 and RealPlayer SP 1.0 through 1.1.4 on Windows allow remote attackers to execute
CVE-2010-2552,CVE-2010-2551,CVE-2010-2550 This security update resolves several privately reported vulnerabilities in Microsoft Windows . The most serious of these may allow remote code execution if
CVE-2012-0017,CVE-2012-0144,CVE-2012-0145 This security update resolves three privately reported vulnerabilities in Microsoft SharePoint and Microsoft SharePoint Foundation. These vulnerabilities