Search
Keyword: (ms05-051) vulnerabilities in msdtc and com could allow remote code execution (902400)
* indicates a new version of an existing rule Deep Packet Inspection Rules: H2 Database 1011316 - H2 Database Remote Code Execution Vulnerability (CVE-2022-23221) Trend Micro ServerProtect EarthAgent
CVE-2014-1705 A memory corruption vulnerability exists in Google Chrome. The vulnerability is due to an error while processing JavaScript code by the V8 JavaScript Engine. A remote attacker could
CVE-2009-3758,CVE-2009-3759,CVE-2009-3760,CVE-2009-3757 Citrix XenCenterWeb is vulnerable to cross-site scripting, caused by improper validation of user-supplied input. A remote attacker could
The vulnerability lies in the way Windows Journal parses a specially crafted Journal (.JST) file. An attacker who successfully exploits said vulnerabilities may execute code remotely on the vulnerable
(MS11-088) Vulnerability in Microsoft Office IME (Chinese) Could Allow Elevation of Privilege (2652016)
CVE-2011-2010 This security update resolves a privately reported vulnerability in Microsoft Office IME (Chinese). The vulnerability could allow elevation of privilege if a logged-on user performed
vulnerabilities to allow a remote user or malware/grayware to download files. Arrival Details This Trojan may be downloaded by other malware/grayware/spyware from remote sites. It may be unknowingly downloaded by a
CVE-2014-9295 Multiple stack-based buffer overflows in ntpd in NTP before 4.2.8 allow remote attackers to execute arbitrary code via a crafted packet, related to (1) the crypto_recv function when the
Windows Vista does not properly "instantiate certain COM objects as ActiveX controls", which allows remote attackers to execute arbitrary code via a crafted COM object. Microsoft Internet Explorer 5.0.1
Download Routine It takes advantage of the following software vulnerabilities to allow a remote user or malware/grayware/spyware to download files: Vulnerability in the Adobe Acrobat and Reader
Apache httpd 'mod_cache_socache' Denial Of Service Vulnerability (CVE-2018-1303) Web Server HTTPS 1008857* - Trend Micro Control Manager Multiple SQL Injection Remote Code Execution Vulnerability
Multiple Security Vulnerabilities (Server) - 8 1008953* - ImageMagick Multiple Security Vulnerabilities (Server) - 9 1009151* - Pivotal Spring PATCH Requests Remote Code Execution (CVE-2017-8046) Web
CVE-2010-3961 This update resolves a vulnerability in the Consent User Interface (UI), which could allow elevation of privilege. An attacker with valid logon credentials and the
CVE-2014-4068,CVE-2014-4070,CVE-2014-4071 This update resolves three vulnerabilities found in Microsoft Lync Server. When successfully exploited, two of the three vulnerabilities could lead to denial
Office 1.0, 1.1, and 1.5 allows user-assisted remote attackers to execute arbitrary code via a malformed OLE object in an RTF file, which triggers memory corruption. Microsoft Learning Essentials
CVE-2005-2379 Multiple cross-site scripting (XSS) vulnerabilities in Oracle Reports 9.0.2 allow remote attackers to inject arbitrary web script or HTML via the (1) debug parameter to showenv, (2)
CVE-2012-2871 This vulnerability is related to the Hacking Team leak, which exposed the RCSAndroid code. The said malicious code could potentially allow surveillance operations for cybercriminals.
CVE-2010-2770,CVE-2010-2752 Mozilla Firefox before 3.5.12 and 3.6.x before 3.6.9, Thunderbird before 3.0.7 and 3.1.x before 3.1.3, and SeaMonkey before 2.0.7 on Mac OS X allow remote attackers to
(MS10-089) Vulnerabilities in Forefront Unified Access Gateway (UAG) Could Allow Elevation of Privilege (2316074)
CVE-2010-2733,CVE-2010-2734,CVE-2010-2736 This security update resolves four vulnerabilities in Forefront Unified Access Gateway (UAG). Of the four vulnerabilities, the most critical vulnerability
CVE-2015-1643,CVE-2015-1644 This update resolves two vulnerabilities that exist in several Windows operating systems. Both vulnerabilities, when exploited, could allow elevation of privilege of the
A remote code execution vulnerability exists when Microsoft Windows OLE fails to properly validate user input. An attacker who successfully exploited the vulnerability could run arbitrary code. Apply