Search
Keyword: (ms05-043) vulnerability in print spooler service could allow remote code execution (896423)
CVE-2015-0079 This security update resolves a vulnerability in Microsoft Windows. The vulnerability could allow denial of service if an attacker creates multiple Remote Desktop Protocol (RDP)
CVE-2015-2387 This security update resolves a vulnerability in Microsoft Windows. The vulnerability could allow elevation of privilege if an attacker logs on to a target system and runs a specially
A remote code execution vulnerability exists in Internet Explorer scripting engine when it improperly accesses an object in memory. This vulnerability may corrupt memory in such a way that an
A remote code execution vulnerability exists in Internet Explorer scripting engine when it improperly accesses an object in memory. This vulnerability may corrupt memory in such a way that an
A remote code execution vulnerability exists in Internet Explorer scripting engine when it improperly accesses an object in memory. This vulnerability may corrupt memory in such a way that an
A remote code execution vulnerability exists in ImageMagick when software fails to parse the crafted image file properly. An attacker who successfully exploited the vulnerability could run arbitrary
CVE-2010-2567 This security update addresses a vulnerability in Microsoft Windows. When successfully exploited, it could execute arbitrary code and take full control of an affected system. Windows
A remote code execution vulnerability exists in Microsoft Windows Graphics Component when it's improperly handles specially crafted EMF files. An attacker who successfully exploited this
CVE-2013-0030 This patch addresses a vulnerability found in Microsoft implementation of Vector Markup Language (VML). It can allow remote code execution once users view a webpage via Internet
(MS10-001) Vulnerability in the Embedded OpenType Font Engine Could Allow Remote Code Execution (972270)
![](/vinfo/imgFiles/newwindow.jpg)
CVE-2010-0018 This security update resolves a vulnerability in certain versions of Microsoft Windows. This vulnerabilty could allow for arbitrary code to be executed on a system if a user views
malicious files: (MS12-027) Vulnerability in Windows Common Controls Could Allow Remote Code Execution (2664258) Exploit:Win32/CVE-2012-0158 (Microsoft), Trojan.Mdropper (Symantec), Exp/20120158-A (Sophos)
(MS13-019) Vulnerability in Windows Client/Server Run-time Subsystem (CSRSS) Could Allow Elevation of Privilege (2790113)
![](/vinfo/imgFiles/newwindow.jpg)
CVE-2013-0076 This patch addresses a vulnerability found in Microsoft Windows, which could allow elevation of privilege once a remote attacker logs and runs a specially crafted application on the
A remote code execution vulnerability exists in Microsoft Office software that is caused when the Office software improperly handles objects in memory while parsing specially crafted Office files. An
A remote code execution vulnerability exists in Microsoft Office software that is caused when the Office software improperly handles objects in memory while parsing specially crafted Office files. An
A remote code execution vulnerability exists in ImageMagick and GraphicsMagick when software fails to parse the crafted image file properly. An attacker who successfully exploited the vulnerability
CVE-2010-1900,CVE-2010-1901,CVE-2010-1902,CVE-2010-1903 This security update addresses four Microsoft Office vulnerabilities that could allow remote code execution once a user opens a specially
The said vulnerabilities when exploited could allow remote code execution via a specially crafted webpage thus compromising the security of the affected systems. These also affect Internet Explorer
A remote code execution vulnerability exists in the way that Microsoft Windows MSXML improperly processes crafted xml files. An attacker who successfully exploited the vulnerability could run
There exists a remote code execution vulnerability in the way that Internet Explorer accesses an object in memory that has been deleted. This vulnerability may corrupt memory in such a way that an
It takes advantage of the vulnerabilities in Microsoft Office that could allow remote code execution (MS10-087). Once it successfully exploits the said vulnerability, it drops a file detected as