Keyword: (ms05-051) vulnerabilities in msdtc and com could allow remote code execution (902400)
105168 Total Search   |   Showing Results : 921 - 940
CVE-2008-5407 Multiple unspecified vulnerabilities in the Backup Exec remote-agent logon process in Symantec Backup Exec for Windows Servers 11.0 (aka 11d) builds 6235 and 7170, 12.0 build 1364, and
vulnerabilities to allow a remote user or malware/grayware to download files. It executes the downloaded files. As a result, malicious routines of the downloaded files are exhibited on the affected system. It
Multiple cross-site scripting (XSS) vulnerabilities in the Ninja Forms plugin before 2.8.9 for WordPress allow (1) remote attackers to inject arbitrary web script or HTML via the ninja_forms_field_1
A remote code vulnerability exists when Windows fails to validate the authenticity of a module before loading it in run-time. An attacker who successfully exploited the vulnerability could execute
like VAWTRAK , DRIDEX , Gameover , and TROJ_WERDLOD that also targeted Japanese bank users. The increasing number of people using online banking systems in Japan could be one of the factors that made
listens on the following ports: 4899 (default) It executes the following commands from a remote malicious user: Logs user on/off Captures screen changes Transfer files Shut down Mouse and keyboard control
contains the following, which when viewed or executed, may allow a malicious user to take control over an affected system: It takes advantage of the vulnerability in Adobe Acrobat and Reader
Deployment Services TFTP Server Remote Code Execution Vulnerability (CVE-2018-8476) Web Application Common 1005934* - Identified Suspicious Command Injection Attack Web Client Internet Explorer/Edge 1009244* -
vulnerabilities to drop malicious files: Adobe Reader and Acrobat 'newplayer()' JavaScript Method Remote Code Execution Vulnerability This Trojan arrives as an attachment to email messages spammed by other
(CVE-2018-4995) 1008984 - Foxit Reader JPXDecode stream Out-Of-Bounds Write Remote Code Execution Vulnerability 1008742 - IBM Notes Remote Denial Of Service Vulnerability (CVE-2017-1130) 1009088* - Microsoft
Multiple cross-site scripting (XSS) vulnerabilities in Red Hat JBoss Enterprise Portal Platform before 5.2.0 allow remote attackers to inject arbitrary web script or HTML via unspecified vectors.
Remote Code Execution Vulnerability (DogWalk) Over SMB (CVE-2022-34713) MSMQ Service 1011764* - Microsoft Windows Message Queuing Service Remote Code Execution Vulnerability (CVE-2023-21554) SSL/TLS Server
Remote Code Execution Vulnerability (DogWalk) Over SMB (CVE-2022-34713) MSMQ Service 1011764* - Microsoft Windows Message Queuing Service Remote Code Execution Vulnerability (CVE-2023-21554) SSL/TLS Server
that could allow remote code execution once a user views a specially crafted Web page using Internet Explorer . Users with administrative rights are more affected by this vulnerability than those with
CVE-2015-0087,CVE-2015-0089,CVE-2015-0088,CVE-2015-0090,CVE-2015-0091,CVE-2015-0092,CVE-2015-0093 This security update resolves the following vulnerabilities in Windows operating systems: Adobe Font
CVE-2013-1296,MS13-029 The Remote Desktop ActiveX control in mstscax.dll in Microsoft Remote Desktop Connection Client 6.1 and 7.0 does not properly handle objects in memory, which allows remote
CVE-2013-0006,CVE-2013-0007 This patch addresses vulnerabilities found in Microsoft XML Core Services, which can result to remote code execution once successfully exploited. The said vulnerabilities
CVE-2009-1097 Multiple buffer overflows in Java SE Development Kit (JDK) and Java Runtime Environment (JRE) 6 Update 12 and earlier allow remote attackers to access files or execute arbitrary code
to propagate across networks: (MS05-039) Vulnerability in Plug and Play Could Allow Remote Code Execution and Elevation of Privilege (899588) Backdoor Routine This worm connects to any of the following
vulnerabilities could allow elevation of privilege if an attacker logs on to a system and runs a specially crafted application. An attacker must have valid logon credentials and be able to log on locally to exploit