Search
Keyword: (ms05-043) vulnerability in print spooler service could allow remote code execution (896423)
addresses several vulnerabilities found in Internet Explorer. When exploited, it allows remote code execution thus compromising the security of the system. (MS14-038) Vulnerability in Windows Journal Could
Microsoft Edge (3134225) Risk Rating: Critical This security update resolves a vulnerability in Microsoft Edge. The vulnerability could allow remote code execution if a user visits a specially crafted webpage
here . (MS13-068) Vulnerability in Microsoft Outlook Could Allow Remote Code Execution (2756473) Risk Rating: Critical This security update addresses a vulnerability in MS Outlook that may lead to
could allow remote code execution if exploited successfully by an attacker. (MS15-066) Vulnerability in VBScript Scripting Engine Could Allow Remote Code Execution (3072604) Risk Rating: Critical This
Direct2D Could Allow Remote Code Execution (2912390) Risk Rating: Critical This security update resolves a privately reported vulnerability in Microsoft Windows. The vulnerability could allow remote code
1002975* - Server Service Vulnerability (wkssvc) 1004542* - Windows Netlogon Service Denial Of Service (CVE-2010-2742) 1003712* - Windows Vista SMB2.0 Negotiate Protocol Request Remote Code Execution DCERPC
Microsoft addresses the following vulnerabilities in its January batch of patches: (MS14-001) Vulnerabilities in Microsoft Word and Office Web Apps Could Allow Remote Code Execution (2916605) Risk
Microsoft addresses the following vulnerabilities in its July batch of patches: (MS12-043) Vulnerability in Microsoft XML Core Services Could Allow Remote Code Execution (2722479) Risk Rating:
Microsoft addresses the following vulnerabilities in its August batch of patches: (MS10-046) Vulnerability in Windows Shell Could Allow Remote Code Execution (2286198) Risk Rating: Critical This
CVE-2010-2729 The Print Spooler service in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP1 and SP2, Windows Server 2008 Gold, SP2, and R2, and Windows 7, when printer
reported vulnerabilities in Microsoft SharePoint and Microsoft SharePoint Foundation. Read more here. (MS12-012) Vulnerability in Color Control Panel Could Allow Remote Code Execution (2643719) Risk Rating:
Microsoft addresses the following vulnerabilities in its December batch of patches: (MS13-096) Vulnerability in Microsoft Graphics Component Could allow Remote Code Execution (2908005) Risk Rating:
Microsoft addresses the following vulnerabilities in its July batch of patches: (MS10-042) Vulnerability in Help and SupportCenter Could Allow Remote Code Execution (2229593) Risk Rating: Critical
Could Allow Remote Code Execution (MS09-050) Vulnerabilities in SMBv2 Could Allow Remote Code Execution (MS10-061) Vulnerability in Print Spooler Service Could Allow Remote Code Execution It uses the
an affected version of Microsoft Office software. (MS14-082) Vulnerability in Microsoft Office Could Allow Remote Code Execution (3017349) Risk Rating: Important This security update resolves one
the Microsoft Windows Application Compatibility component and execute arbitrary code with elevated privileges. (MS15-002) Vulnerability in Windows Telnet Service Could Allow Remote Code Execution
webpage using Internet Explorer. (MS14-019) Vulnerability in Windows File Handling Component Could Allow Remote Code Execution (2922229) Risk Rating: Important This security update resolves a publicly
Microsoft addresses the following vulnerabilities in its May batch of patches: (MS11-035) Vulnerability in WINS Could Allow Remote Code Execution (2524426) Risk Rating: Critical This security update
vulnerabilities could gain the same user rights as the local user. Read more here. (MS12-005) Vulnerability in Microsoft Windows Could Allow Remote Code Execution (2584146) Risk Rating: Important This vulnerability
Remote Code Execution (2570947) Risk Rating: Important This security update fixes a disclosed vulnerability in Windows , which could allow arbitrary code execution if users open a legitimate .RTF, .TXT, or