Keyword: graphics rendering engine 918547 ms06026
4325 Total Search   |   Showing Results : 81 - 100
remote code execution. An attacker who successfully exploits these vulnerabilities could gain the same user rights as the current user. (MS16-097) Security Update for Microsoft Graphics Component (3177393)
A use after free vulnerability exists when the Windows graphics sub component fails to properly handle objects in the memory. Successful exploitation of this vulnerability could lead to remote code
A remote code execution vulnerability exists in Microsoft Windows Graphics Component when software fails to properly handle objects in memory. An attacker who successfully exploited the vulnerability
A remote code execution vulnerability exists in Microsoft Windows Graphics Component when it's improperly handles specially crafted EMF files. An attacker who successfully exploited this
A remote code execution vulnerability exists in Microsoft Windows Graphics Component when it improperly handles specially crafted EMF files. An attacker who successfully exploited this vulnerability
A remote code execution vulnerability exists in Microsoft Windows Graphics Component when it improperly handles specially crafted EMF files. An attacker who successfully exploited this vulnerability
A use after free vulnerability exists in Microsoft Windows graphics sub component when surface objects are improperly handled in memory. Successful exploitation of this vulnerability via a crafted
Type Boundary Variable Buffer Overflow 1004314* - Identified LNK/PIF File Over SMTP 1000207* - Mozilla Thunderbird WYSIWYG Engine Filtering IFRAME JavaScript Execution Mail Client Outlook 1000482* -
A local privilege escalation vulnerability was discovered within the Win32k-GDI component of Microsoft Windows. It can be triggered locally by manipulating the graphics properties of a window.
convince a user to execute a specially crafted file. CVE-2019-1003 - Chakra Scripting Engine Memory Corruption Vulnerability Risk Rating: Critical This remote code execution vulnerability exists in the
Microsoft addresses vulnerabilities in its May security bulletin. Trend Micro Deep Security covers the following: CVE-2018-8174 - Windows VBScript Engine Remote Code Execution Vulnerability Risk
Microsoft Edge Chakra Scripting Engine Memory Corruption Vulnerability (CVE-2019-1024) 1009788 - Microsoft Edge Chakra Scripting Engine Memory Corruption Vulnerability (CVE-2019-1051) 1009792 - Microsoft Edge
CVE-2010-3947 Heap-based buffer overflow in the TIFF image converter in the graphics filters in Microsoft Office XP SP3, Office Converter Pack, and Works 9 allows remote attackers to execute
enable its automatic execution at every system startup: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\ Windows\CurrentVersion\Run Intel(R) HD Graphics = "%System%\install\rcg.exe" HKEY_CURRENT_USER\Software
CVE-2010-3949 Buffer overflow in the TIFF image converter in the graphics filters in Microsoft Office XP SP3 and Office Converter Pack allows remote attackers to execute arbitrary code via a crafted
Microsoft addresses vulnerabilities in its February security bulletin. Trend Micro Deep Security covers the following: CVE-2019-0593 - Scripting Engine Memory Corruption Vulnerability Risk Rating:
kernel mode. The update addresses this vulnerability by correcting how Win32k handles objects in memory. CVE-2017-8634 | Scripting Engine Memory Corruption Vulnerability Risk Rating: Critical This security
CVE-2010-3946,MS10-105 Integer overflow in the PICT image converter in the graphics filters in Microsoft Office XP SP3, Office 2003 SP3, and Office Converter Pack allows remote attackers to execute
An information disclosure vulnerability exists in the way that the Windows Graphics Device Interface (GDI) handles objects in memory, allowing an attacker to retrieve information from a targeted
An information disclosure vulnerability exists in the way that the Windows Graphics Device Interface (GDI) handles objects in memory, allowing an attacker to retrieve information from a targeted