Keyword: (ms05-043) vulnerability in print spooler service could allow remote code execution (896423)
73953 Total Search   |   Showing Results : 241 - 260
CVE-2010-2731,CVE-2010-2730,CVE-2010-1899 This security update addresses vulnerability in Internet Information Services (IIS) that could allow remote code execution once a sends a specially crafted
CVE-2015-2509 A vulnerability exists in Windows Media Center that could allow remote code execution if Windows Media Center opens a specially crafted Media Center link (.mcl) file that references
CVE-2011-0029 This update resolves a vulnerability in Windows Remote Desktop Client, which could allow remote code execution. The exploit works if a user opens a legitimate Remote Desktop
CVE-2007-2954 Multiple stack-based buffer overflows in the Spooler service (nwspool.dll) in Novell Client 4.91 SP2 through SP4 for Windows allow remote attackers to execute arbitrary code via certain
CVE-2012-4791 This patch addresses vulnerabilities in Microsoft Exchange Server, which could allow remote code execution on the transcoding service on the Exchange server via a specially crafted file
vulnerabilities could allow remote code execution on a client system if a user views a specially crafted web page using a web browser that can run XAML Browser Applications (XBAPs) or Silverlight applications.
CVE-2010-3945,CVE-2010-3946,CVE-2010-3949,CVE-2010-3950,CVE-2010-3951,CVE-2010-3952 This update resolves vulnerabilities in Microsoft Office, which could allow remote code execution. When users view
CVE-2010-3970 This security update addresses a vulnerability in the Windows Shell graphics processor, which could allow remote code execution if a user views a specially crafted thumbnail image. A
Based 1011708 - WordPress 'WP Statistics' Plugin SQL Injection Vulnerability (CVE-2022-4230) Web Client Common 1010907* - Microsoft Print 3D And 3D Builder Remote Code Execution Vulnerability (ZDI-21-405
A remote code execution vulnerability exists that is caused when Microsoft Word improperly handles objects in memory while parsing specially crafted Office files. This could corrupt system memory in
A remote code execution vulnerability exists that is caused when Microsoft Word improperly handles objects in memory while parsing specially crafted Office files. This could corrupt system memory in
of these vulnerabilities could allow remote code execution if a user visits an affected website using a specially crafted URL. However, an attacker would have no way to force users to visit such a
vulnerabilities in Microsoft Office. The vulnerabilities could allow remote code execution if a user opens a maliciously crafted Publisher file with an affected version of Microsoft Publisher. An attacker who
CVE-2014-0322 A remote code execution vulnerability exists in the way Internet Explorer 9 and 10 handles an object that has been deleted in memory. When successfully exploited, it may allow a remote
CVE-2012-0173 A vulnerability in the Remote Desktop Protocol (RDP) exists in the way that it accesses an object in memory that changed or is deleted. When successfully exploited, an attacker could
CVE-2010-3148 This bulletin addresses a publicly disclosed vulnerability in Microsoft Visio , which could lead to arbitrary code execution if a remote user opens a legitimate Visio file located in
Microsoft addresses the following vulnerability in its January batch of patches: (MS10-001) Vulnerability in the Embedded OpenType Font Engine Could Allow Remote Code Execution (972270) This security
CVE-2012-2539 This patch addresses a vulnerability in Microsoft Office that could result in remote code execution when successfully exploited via a specially crafted .RTF file. Accordingly, users who
CVE-2011-1966,CVE-2011-1970 This security update resolves two privately reported vulnerabilities in Windows DNS server . The more severe of these vulnerabilities could allow remote code execution if
CVE-2011-0661 This security update resolves a privately reported vulnerability in Microsoft Windows. The vulnerability could allow remote code execution if an attacker created a specially crafted SMB