Search
Keyword: (ms05-043) vulnerability in print spooler service could allow remote code execution (896423)
Remote code execution vulnerabilities exist when Windows fails to validate the authenticity of a module before loading it in run-time. An attacker who successfully exploited the vulnerability could
Remote code execution vulnerabilities exist when Windows fails to validate the authenticity of a module before loading it in run-time. An attacker who successfully exploited the vulnerability could
A use after free vulnerability was discovered within Microsoft Office. A successful exploitation of this issue could allow an attacker to execute arbitrary code on the remote system. Apply associated
CVE-2024-36104) PaperCut 1012082* - PaperCut NG and MF Remote Code Execution Vulnerability (CVE-2024-1882) Progress WhatsUp Gold WCF service 1012117 - Progress WhatsUp Gold Directory Traversal Vulnerability
DNSAPI Remote Code Execution Vulnerability (CVE-2018-8225) EMC Data Protector Advisor 1008814* - EMC Data Protection Advisor Application Service Static Credentials Authentication Bypass Vulnerability
CVE-2014-0114 The Apache Struts used by the IBM WebSphere Application Server could allow a remote attacker to execute arbitrary code on the system. An attacker could exploit this vulnerability using
parameter in a hypercall from an existing running virtual machine to the hypervisor. The vulnerability could also allow denial of service for the Hyper-V host. Windows 8 for x64-based Systems (Pro and
An integer overflow vulnerability exists in PHP. The vulnerability is due to an error in reading zip files, causing a heap buffer overflow. A remote attacker can exploit the vulnerability by sending
A use after free vulnerability was discovered within Microsoft Office word. A successful exploitation of this issue could allow an attacker to execute arbitrary code on the remote system. Apply
GoCD Server Directory Traversal Vulnerability (CVE-2021-43287) MSMQ Service 1011764 - Microsoft Windows Message Queuing Service Remote Code Execution Vulnerability (CVE-2023-21554) Web Application Common
A remote code execution vulnerability exists in the Windows Animation Manager. An attacker who successfully exploited this vulnerability could install programs and view, change and delete data or
CVE-2014-6360 This security update resolves two privately reported vulnerabilities in Microsoft Excel. The vulnerabilities could allow remote code execution if an attacker convinces a user to open or
This patch addresses vulnerabilities found in Microsoft Exchange Server. One of the vulnerabilities, which exists in Microsoft Exchange Server WebReady Document Viewing can allow remote code
CVE-2012-2551 This patch addresses a vulnerability existing in Microsoft Windows. It could allow denial of service attacks when a remote attacker sends a specially crafted request to the Kerberos
Injection Vulnerability (CNVD-2019-38290) 1010038* - Apache Solr DataImportHandler Remote Code Execution Vulnerability (CVE-2019-0193) Trend Micro OfficeScan 1010041* - Trend Micro ApexOne And OfficeScan
(MS10-060) Vulnerabilities in the Microsoft .NET Common Language Runtime and in Microsoft Silverlight Could Allow Remote Code Execution (2265906)
![](/vinfo/imgFiles/newwindow.jpg)
CVE-2010-0019,CVE-2010-1898 This security update addresses two vulnerabilities in Microsoft .NET Framework and Microsoft Silverlight. The said vulnerabilities could allow remote code execution
affected system and runs a specially crafted application. An attacker who successfully exploited the vulnerability could run arbitrary code in the security context of the account of another user who is
vulnerabilities to drop malicious files: (MS12-027) Vulnerability in Windows Common Controls Could Allow Remote Code Execution (2664258) It executes the dropped file(s). As a result, malicious routines of the
download possibly malicious files: (MS12-027) Vulnerability in Windows Common Controls Could Allow Remote Code Execution (2664258) It saves the files it downloads using the following names: %User Temp%\s -
website. Download Routine This Trojan takes advantage of the following software vulnerabilities to allow a remote user or malware/grayware to download files: Vulnerability in Internet Explorer Could Allow