Keyword: (ms05-043) vulnerability in print spooler service could allow remote code execution (896423)
73953 Total Search   |   Showing Results : 301 - 320
CVE-2014-0271 This security update resolves a privately reported vulnerability in the VBScript scripting engine in Microsoft Windows. The vulnerability could allow remote code execution if a user
second application packet in a TCP session on port 20222. nvd: The vulnerability found in CitectSCADA could allow a remote un-authenticated attacker to force an abnormal termination of the vulnerable
Execution More information on this vulnerability can be found below: Vulnerabilities in Microsoft Office Could Allow Remote Code Execution (2587634) (CVE-2011-1980) This specially-crafted .DOC file takes
CVE-2011-1268 There exists a vulnerability in Windows that could allow remote code execution if an attacker sent a malicious SMB response to a user's SMB request. The attacker would need to trick
allow elevation of privilege due to the pathnames used by Windows Defender. An attacker who successfully exploited this vulnerability could execute arbitrary code and take complete control of an affected
This security update resolves several vulnerabilities found existing in Internet Explorer that could allow remote code execution once successfully exploited via a specially crafted webpage.
A heap overflow vulnerability exists in Adobe Flash Player. A remote attacker can exploit this vulnerability by enticing a target user to open a crafted file. A successful attack could result in
vulnerability by uploading a maliciously crafted file to a vulnerable web service. Successful exploitation could result in arbitrary code execution under the security context of the service using ImageMagick.
CVE-2012-0182,CVE-2012-2528 This security update addresses vulnerabilities affecting Microsoft Office. When successfully exploited, it could allow remote code execution via a specially crafted .RTF
crafted file. A successful attack could result in arbitrary code execution in the security context of the target user. Failed exploit attempts will likely result in denial of service states. Apply
A heap overflow vulnerability exists in Adobe Flash Player. A remote attacker can exploit this vulnerability by enticing a target user to open a crafted file. A successful attack could result in
A heap overflow vulnerability exists in Adobe Flash Player. A remote attacker can exploit this vulnerability by enticing a target user to open a crafted file. A successful attack could result in
A type confusion vulnerability was discovered in Microsoft Internet Explorer and Microsoft Edge. A successful exploitation of this issue could allow an attacker to execute arbitrary code on the
remote code execution thus compromising the security of the system. Remote attackers can also have the same user rights as the current user. Windows XP Service Pack 3,Windows XP Professional x64 Edition
CVE-2015-1761 This security update resolves vulnerabilities in Microsoft SQL Server. The most severe vulnerabilities could allow remote code execution if an authenticated attacker runs a specially
CVE-2011-1992,CVE-2011-2019,CVE-2011-3404 This security update resolves three privately reported vulnerabilities in Internet Explorer. The most severe vulnerability could allow remote code execution
can be found below: Vulnerability in Microsoft Word Could Allow Remote Code Execution(2953095) It takes advantage of the following vulnerabilities: Microsoft Word RTF Remote Code Execution Vulnerability
embedded media file, it could lead to remote code execution thus compromising the security of the system. Windows XP Service Pack 3,Windows XP Professional x64 Edition Service Pack 2,Windows Server 2003
CVE-2010-3222 This security update addresses a vulnerability in Microsoft Windows that could allow elevation of privilege if an attacker logs on to an affected system and runs specially crafted code
CVE-2015-1649,CVE-2015-1651,CVE-2015-1650 This security update addresses vulnerabilities found existing in Microsoft Office, which could allow remote code execution thus compromising the security of