Keyword: (ms05-051) vulnerabilities in msdtc and com could allow remote code execution (902400)
105168 Total Search   |   Showing Results : 1201 - 1220
CVE-2006-4691 Stack-based buffer overflow in the NetpManageIPCConnect function in the Workstation service (wkssvc.dll) in Microsoft Windows 2000 SP4 and XP SP2 allows remote attackers to execute
CVE-2017-8570 | Microsoft Office Remote Code Execution Vulnerability Trojan:Win32/Dynamer!rfn [non_writable_container] (MICROSOFT); Trojan.Gen.NPE (NORTON); HEUR:Trojan.Win32.Generic (KASPERSKY) Dropped by other
CVE-2013-1284,CVE-2013-1294 This security update resolves two reported vulnerabilities in all versions Microsoft Windows. The vulnerabilities, if left unpatched, may allow elevation of privilege if
TypeConverter Deserialization of Untrusted Data Remote Code Execution Vulnerability (CVE-2020-0932) Integrity Monitoring Rules: There are no new or updated Integrity Monitoring Rules in this Security Update. Log
It takes advantage of software vulnerabilities to allow a remote user or malware/grayware to download files. This Trojan arrives as an attachment to email messages spammed by other malware/grayware
CVE-2007-0219 Microsoft Internet Explorer 5.01, 6, and 7 uses certain COM objects from (1) Msb1fren.dll, (2) Htmlmm.ocx, and (3) Blnmgrps.dll as ActiveX controls, which allows remote attackers to
office_2003,microsoft office_snapshot_viewer_activex office_xp Apply associated Trend Micro DPI Rules. 1002621| 1002621 - Microsoft Office Snapshot Viewer ActiveX Control Remote Code Execution
CVE-2006-1148 Multiple stack-based buffer overflows in the procConnectArgs function in servmgr.cpp in PeerCast before 0.1217 allow remote attackers to execute arbitrary code via an HTTP GET request
Java Code Download Attempt Over LDAP Web Application Common 1011103* - PHPUnit Remote Code Execution Vulnerability (CVE-2017-9841) Web Application PHP Based 1011278* - October CMS Security Bypass
CVE-2007-3925 Multiple buffer overflows in the IMAP service (imapd32.exe) in Ipswitch IMail Server 2006 before 2006.21 allow remote authenticated users to execute arbitrary code via the Search
CVE-2005-1812 Multiple stack-based buffer overflows in FutureSoft TFTP Server Evaluation Version 1.0.0.1 allow remote attackers to execute arbitrary code via a long (1) filename or (2) transfer mode
CVE-2012-1888 Microsoft issues a patch for a remote code execution vulnerability that exists in the way certain versions of MS Visio parses specially crafted files. Attackers looking to exploit this
is enabled, allows remote attackers to execute arbitrary code via a crafted SOAP request to TCP port 8082, aka "Malformed Request Code Execution Vulnerability." nvd: Additional information from
desktop sharing, remote administration, to even out-of-office production. Cybercriminals use RATs with malicious code mainly as payloads for their malware in order to steal sensitive user information and
unknowingly by users when visiting malicious sites. It takes advantage of software vulnerabilities to allow a remote user or malware/grayware to download files. However, as of this writing, the said sites are
CVE-2008-2928 Multiple buffer overflows in the adminutil library in CGI applications in Red Hat Directory Server 7.1 before SP7 allow remote attackers to cause a denial of service (daemon crash) or
to download possibly malicious files: Microsoft Internet Explorer Invalid Pointer Reference Remote Code Execution It then executes the downloaded files. As a result, malicious routines of the
CVE-2009-3846 Multiple heap-based buffer overflows in ovlogin.exe in HP OpenView Network Node Manager (OV NNM) 7.01, 7.51, and 7.53 allow remote attackers to execute arbitrary code via a long (1)
CVE-2008-1435,MS08-038 Windows Explorer in Microsoft Windows Vista up to SP1, and Server 2008, allows user-assisted remote attackers to execute arbitrary code via crafted saved-search (.search-ms)
CVE-2008-2234 Multiple buffer overflows in Openwsman 1.2.0 and 2.0.0 allow remote attackers to execute arbitrary code via a crafted "Authorization: Basic" HTTP header. openwsman openwsman