Keyword: (ms05-051) vulnerabilities in msdtc and com could allow remote code execution (902400)
105228 Total Search   |   Showing Results : 1061 - 1080
vulnerabilities to drop malicious files: Adobe Reader and Acrobat 'newplayer()' JavaScript Method Remote Code Execution Vulnerability It executes the dropped file(s). As a result, malicious routines of the dropped
CVE-2005-1009 Multiple buffer overflows in BakBone NetVault 6.x and 7.x allow (1) remote attackers to execute arbitrary code via a modified computer name and length that leads to a heap-based buffer
Monitoring Rules in this Security Update. Log Inspection Rules: 1011455 - Atlassian Confluence And Data Center Remote Code Execution Vulnerability (CVE-2022-26134)
CVE-2013-0096 This security update resolves a vulnerability in Windows Essentials. The vulnerability could allow information disclosure if a user opens Windows Writer using a maliciously crafted URL.
CVE-2013-1278,CVE-2013-1279,CVE-2013-1280 This patch addresses vulnerabilities in Microsoft Windows, which can allow elevation of privilege once an attacker logs and runs a specially crafted
schemes. Some schemes may include gaining administrator privileges which gives attackers control over the vulnerable system or infecting it with malware. Vulnerabilities are found in all software and OSs and
following copies of itself into the affected system: %Application Data%\MsDtc\dwmc.exe (Note: %Application Data% is the Application Data folder, where it usually is C:\Documents and Settings\{user name}
CVE-2007-5339 Multiple vulnerabilities in Mozilla Firefox before 2.0.0.8, Thunderbird before 2.0.0.8, and SeaMonkey before 1.1.5 allow remote attackers to cause a denial of service (crash) via
CVE-2007-6204 HP OpenView Network Node Manager is prone to multiple stack-based buffer-overflow vulnerabilities. Successfully exploiting these issues allows remote attackers to execute arbitrary code
unpatched systems. It exploits a known vulnerability in Internet Explorer versions 5.01 and 5.5. known as the Automatic Execution of Embedded MIME Type . This vulnerability causes Internet Explorer to
CVE-2011-1968 This security update resolves a privately reported vulnerability in the Remote Desktop Protocol (RDP) . The vulnerability could allow denial of service if an affected system received a
CVE-2006-6184 Multiple stack-based buffer overflows in Allied Telesyn TFTP Server (AT-TFTP) 1.9, and possibly earlier, allow remote attackers to cause a denial of service (crash) or execute arbitrary
CVE-2014-1761 Microsoft Word 2003 SP3, 2007 SP3, 2010 SP1 and SP2, 2013, 2013 RT and Word Viewer allow remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via
CVE-2008-1276 Multiple buffer overflows in the IMAP service (MEIMAPS.EXE) in MailEnable Professional Edition and Enterprise Edition 3.13 and earlier allow remote authenticated attackers to execute
This security update addresses the vulnerability found in Microsoft Windows. Once successfully exploited, it could allow a remote attacker from retrieving passwords stored with Group Policy
5.0.23/5.1.31 - Remote Code Execution D-Link Devices - HNAP SOAPAction-Header Command Execution D-Link DSL-2750B - OS Command Injection Huawei Router HG532 - Arbitrary Command Execution GPON Routers -
Execution Vulnerability (CVE-2021-34473 and CVE-2022-41040) 1011548* - Microsoft Exchange Server Remote Code Execution Vulnerability (CVE-2022-41082) 1011519* - Node.js HTTP Request Smuggling Attack
software vulnerabilities to allow a remote user or malware/grayware to download files. It executes the downloaded files. As a result, malicious routines of the downloaded files are exhibited on the affected
CVE-2006-4777 Heap-based buffer overflow in the DirectAnimation Path Control (DirectAnimation.PathControl) COM object (daxctle.ocx) for Internet Explorer 6.0 SP1, on Chinese and possibly other
* - Microsoft Windows Jet Database Engine Multiple Remote Code Execution Vulnerabilities (May-2019) 1010004 - Oracle Java ActiveX Plugin Uninitialized Window Handle Remote Code Execution Vulnerability