Search
Keyword: (ms05-051) vulnerabilities in msdtc and com could allow remote code execution (902400)
remote user or malware/grayware/spyware to download files. Download Routine This Trojan takes advantage of the following software vulnerabilities to allow a remote user or malware/grayware/spyware to
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Apple QuickTime. User interaction is required to exploit this vulnerability in that the target must
JPEG image files that exploit the MS04-028 vulnerability, which is also known as Buffer Overrun in JPEG Processing (GDI+), to allow remote code execution of Load Modules/Plugin on the affected system.
and Acrobat 'newplayer()' JavaScript Method Remote Code Execution Vulnerability Adobe Acrobat and Reader Collab 'getIcon()' JavaScript Method Remote Code Execution Vulnerability After successfully
in Trend Micro Deep Security protects user systems from threats that may leverage this vulnerability with the following DPI rule: 1006111 - Adobe Flash Player Remote Code Execution Vulnerability
CVE-2010-0034 A remote code execution vulnerability exists in the way that Microsoft Office PowerPoint Viewer handles specially crafted PowerPoint files. An attacker who successfully exploited this
CVE-2012-0141,CVE-2012-0142,CVE-2012-0143,CVE-2012-0184,CVE-2012-0185,CVE-2012-1847 Several vulnerabilities in some versions of MS Excel are resolved in this particular bulletin. To exploit this
website and run when a user accesses the said website. It takes advantage of software vulnerabilities to allow a remote user or malware/grayware to download files. As of this writing, the said sites are
(CVE-2014-2217) Web Client Common 1009349 - Microsoft Windows Data Sharing Service Arbitrary File Delete Vulnerability 1009333* - Microsoft Windows Theme API Remote Code Execution Vulnerability (CVE-2018-8413) Web
Proof-of-Concept (PoC) code for exploiting MS12-020. While the said Remote Desktop Protocol vulnerability could allow remote access to target machines, this PoC is only designed to perform denial of service (DoS) to
(EDB-ID-7927) 1010546* - GNUBoard Local/Remote File Inclusion Vulnerability (CVE-2009-0290) 1010547* - GNUBoard Remote Code Execution Vulnerability (KVE-2018-0449 and KVE-2018-0441) 1010544* - GNUBoard SQL
Remote Code Execution Vulnerability (CVE-2024-38023 and CVE-2024-38094) Windows Services RPC Client DCERPC 1012178 - Identified Windows DCERPC AUTH LEVEL CONNECT Windows Remote Registry Request Integrity
SQL injection vulnerability exists in Huge-IT Slideshow Extension. The vulnerability could allow a remote user to perform SQL injection attacks potentially allowing them access to database content
SQL injection vulnerability exists in Huge-IT Video Gallery Extension. The vulnerability could allow a remote user to perform SQL injection attacks potentially allowing them access to database
CVE-2011-3544 Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE JDK and JRE allows remote untrusted Java Web Start applications and untrusted Java applets to
CVE-2006-0663 Multiple cross-site scripting (XSS) vulnerabilities in Lotus Domino iNotes Client 6.5.4 and 7.0 allow remote attackers to inject arbitrary web script or HTML via (1) an email subject;
CVE-2006-1314 Two vulnerabilities have been reported in Microsoft Windows, which can be exploited by malicious people to expose sensitive information and compromise a vulnerable system. 1) A boundary
CVE-2014-0497 Several versions of Adobe Flash Player were found to have an integer underflow vulnerability. When successfully exploited, the vulnerability can allow execution of arbitrary code on the
Microsoft calls as defense-in-depth updates , a multi-layered approach of defense. The following vulnerabilities are solved by this update: Print Feature Remote Code Execution Vulnerability - CVE-2012-0168
A buffer overrun vulnerability was discovered in Microsoft Windows while handling malformed EMF file which will lead to a heap corruption. Successful exploitation of this issue could allow attackers