Search
Keyword: (ms05-043) vulnerability in print spooler service could allow remote code execution (896423)
for Microsoft Video Control (3199151) Risk Rating: Critical This security update resolves a vulnerability in Microsoft Windows. The vulnerability could allow remote code execution when Microsoft Video
Microsoft addresses the following vulnerabilities in its November batch of patches: (MS10-087) Vulnerabilities in Microsoft Office Could Allow Remote Code Execution (2423930) Risk Rating: Critical
Microsoft addresses the following vulnerabilities in its July batch of patches: (MS11-053) Vulnerability in Bluetooth Stack Could Allow Remote Code Execution (2566220) Risk Rating: Critical This
CVE-2017-11827 - Microsoft Browser Memory Corruption Vulnerability Risk Rating: Low A remote code execution vulnerability exists in the way that Microsoft browsers access objects in memory. The vulnerability could
CVE-2010-5082 This security update resolves one publicly disclosed vulnerability in Microsoft Windows. The vulnerability could allow remote code execution if a user opens a legitimate file (such as
A vulnerability was discovered in the underlying JavaScript engine for Microsoft Edge that could allow attackers to achieve remote code execution conditions. The underlying issue involves a class
file with one of the affected software. This threat would not allow remote code execution or elevation of user right, however, it could acquire information that could be used in future attacks Microsoft
CVE-2013-3174 This security update resolves a privately reported vulnerability in Microsoft Windows. The vulnerability could allow remote code execution if a user opens a specially crafted image
identifier(s): Vulnerability ID Identifier & Title IDF First Pattern Version IDF First Pattern Release Version CVE-2010-3962 1004496 - Vulnerability in Internet Explorer Could Allow Remote Code Execution
CVE-2010-3964 This update resolves a vulnerability in Microsoft SharePoint, which could allow remote code execution. The vulnerability is exploited if an attacker sends a specially crafted SOAP
overflow vulnerability exists in the Microsoft JET Database Engine that could allow remote code execution on an affected system. An attacker who successfully exploited this vulnerability could take complete
exploited successfully, it could allow remote code execution on the affected system. Note that users with privileges less than that of an administrator are less impacted by the effects of this vulnerability.
CVE-2010-2728 This security update addresses a vulnerability that could allow remote code execution once a user opened a specially crafted email message via an affected version of Microsoft Outlook.
severe vulnerabilities could allow remote code execution if a user opens a specially crafted Publisher file. An attacker who successfully exploited any of these vulnerabilities could take complete control
addresses several vulnerabilities found existing in Internet Explorer. When exploited successfully, it could allow remote code execution thus compromising the security of the affected systems. (MS14-053)
executed More information on this vulnerability can be found below: Vulnerability in Windows Shell Could Allow Remote Code Execution (2286198) 2010 in Review: The Hype and Reality of Stuxnet Exploits a known
Critical This remote code execution vulnerability exists in the improper accessing of objects in memory by VBScript engine. Attackers looking to take advantage of this vulnerability could persuade a user to
CVE-2014-0301 This security update resolves a privately reported vulnerability in Microsoft Windows. The vulnerability could allow remote code execution if a user opens a specially crafted image
CVE-2012-0150 This security update resolves a privately reported vulnerability in Microsoft Windows. The vulnerability could allow remote code execution if a user opens a specially crafted media file
CVE-2013-1301 This security update resolves a vulnerability in Microsoft Office. The vulnerability could allow information disclosure if a user opens a maliciously-crafted Visio file. Note that this