Keyword: (ms05-051) vulnerabilities in msdtc and com could allow remote code execution (902400)
104948 Total Search   |   Showing Results : 101 - 120
CVE-2014-6333,CVE-2014-6334,CVE-2014-6335 This security update resolves three privately reported vulnerabilities in Microsoft Office. The vulnerabilities could allow remote code execution if a
Vulnerability in Server Service Could Allow Remote Code Execution (958644) CVE-2010-2729 - Vulnerability in Print Spooler Service Could Allow Remote Code Execution (2347290) CVE-2014-6324 - Vulnerability in
CVE-2014-6356 This security update resolves two privately reported vulnerabilities in Microsoft Word and Microsoft Office Web Apps. The vulnerabilities could allow remote code execution if an
CVE-2011-0092,CVE-2011-0093 This security update addresses two vulnerabilities in Microsoft Visio, could allow remote code execution if a user opens a specially crafted Visio file. An attacker who
CVE-2013-1303,CVE-2013-1304,CVE-2013-1338 This security update resolves two reported vulnerabilities in Internet Explorer. These vulnerabilities, if left unpatched, could allow remote code execution
CVE-2011-0977,CVE-2011-0107 This security update addresses two vulnerabilities in Microsoft Office, which could allow remote code execution. A remote malicious user could gain the same user rights as
vulnerabilities in Microsoft .NET Framework and Microsoft Silverlight. The most severe of these vulnerabilities could allow remote code execution if a trusted application uses a particular pattern of code. An
vulnerabilities in Microsoft Office. The vulnerabilities could allow remote code execution if a user opens a maliciously crafted Publisher file with an affected version of Microsoft Publisher. An attacker who
CVE-2011-3396 This security update resolves two privately reported vulnerabilities in Microsoft Office . The vulnerabilities could allow remote code execution if a user opens a specially crafted
by itself does not allow arbitrary code execution. However, an attacker could use this ASLR bypass vulnerability in conjunction with another vulnerability, such as a remote code execution vulnerability
XP, and Server 2003.) It takes advantage of the following software vulnerabilities to drop malicious files: Vulnerability in Windows Common Controls Could Allow Remote Code Execution It executes the
attacks and leading to remote access tools (RATs). Additional details of the mentioned vulnerability can be found here: MS Advisory (2757760) Vulnerability in Internet Explorer Could Allow Remote Code
vulnerabilities in several versions of Internet Explorer installed on various Windows operating systems. The vulnerabilities could allow remote code execution if exploited successfully by an attacker. In addition,
XP, and Server 2003.) It takes advantage of the following software vulnerabilities to drop malicious files: Vulnerability in Windows Common Controls Could Allow Remote Code Execution It executes the
and Server 2003.) It takes advantage of the following software vulnerabilities to drop malicious files: Vulnerability in Windows Common Controls Could Allow Remote Code Execution It executes the dropped
exist in the WebReady Document Viewing and Data Loss Prevention features of Microsoft Exchange Server. These vulnerabilities could allow remote code execution in the security context of the LocalService
CVE-2011-3403 This security update resolves a privately reported vulnerability in Microsoft Office . The vulnerability could allow remote code execution if a user opens a specially crafted Excel
CVE-2013-3155,CVE-2013-3156,CVE-2013-3157 This security update resolves three privately reported vulnerabilities in Microsoft Office. The vulnerabilities could allow remote code execution if a user
CVE-2015-1770,CVE-2015-1760,CVE-2015-1759 This security update addresses vulnerabilities found in Microsoft Office that could allow remote code execution once a user opens a specially crafted
addresses vulnerabilities existing in Microsoft FAST Search Server 2010 for SharePoint. When exploited, it could allow remote code execution in the security context (user accounts) with a token. Note that