Search
Keyword: (ms05-051) vulnerabilities in msdtc and com could allow remote code execution (902400)
JetBrains TeamCity Cross-Site Scripting Vulnerability (CVE-2023-34220) PaperCut 1011855* - PaperCut NG Remote Code Execution Vulnerability (CVE-2023-39469) Parse Server 1011868 - Parse Server Remote Code
CVE-2009-3674,MS09-072 �Microsoft Internet Explorer 8 does not properly handle objects in memory, which allows remote attackers to execute arbitrary code by accessing an object that (1) was not
ERP And CRM Stored Cross-Site Scripting Vulnerability (CVE-2021-33618) Web Application PHP Based 1011252 - WordPress 'Catch Themes Demo Import' Plugin Remote Code Execution Vulnerability (CVE-2021-39352
can force the system to connect to a user-specified URL or open a user-specified TCP port on a system and waits for commands from a remote user. It allows a remote user to remotely execute shell code on
CVE-2013-7260 Multiple stack-based buffer overflows in RealNetworks RealPlayer before 17.0.4.61 on Windows, and Mac RealPlayer before 12.0.1.1738, allow remote attackers to execute arbitrary code via
CVE-2009-3762 Microsoft Internet Explorer 6 and 7 does not properly handle objects in memory that (1) were not properly initialized or (2) are deleted, which allows remote attackers to execute
Vulnerabilities (June-2019) 1009778 - Microsoft Windows Speech API Remote Code Execution Vulnerability (CVE-2019-0985) Web Client Internet Explorer/Edge 1009785 - Microsoft Edge Chakra Scripting Engine Memory
CVE-2014-6278 This remote code execution vulnerability exists in the way the Bash shell handles functions. When successfully exploited, remote attackers may execute commands on the vulnerable system.
This Backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It executes commands from a remote malicious user,
5.0.30, 5.5.0 through 5.5.24, and 6.0.0 through 6.0.13 allow remote attackers to inject arbitrary web script or HTML via the portion of the URI after the ';' character, as demonstrated by a URI containing a
(MS15-062) Vulnerability in Active Directory Federation Services Could Allow Elevation of Privilege (3062577)
CVE-2015-1757 This security update addresses a vulnerability in Microsoft Active Directory Federation Services (AD FS) that could allow elevation of privilege when an attacker submits a specially
CVE-2007-2867 Multiple vulnerabilities in the layout engine for Mozilla Firefox 1.5.x before 1.5.0.12 and 2.x before 2.0.0.4, Thunderbird 1.5.x before 1.5.0.12 and 2.x before 2.0.0.4, and SeaMonkey
code via a count value associated with an "undocumented structure" and the tSAC chunk in a Director movie. adobe shockwave_player 1.0,adobe shockwave_player 10.0.0.210,adobe shockwave_player
Adobe Flash Player is prone to an unspecified type confusion remote code execution vulnerability. An attacker can exploit this issue to execute arbitrary code in the context of the user running the
Adobe Flash Player is prone to an unspecified type confusion remote code execution vulnerability. An attacker can exploit this issue to execute arbitrary code in the context of the user running the
CVE-2006-1359 Microsoft Internet Explorer 6 and 7 Beta 2 allows remote attackers to cause a denial of service and possibly execute arbitrary code via a certain createTextRange call on a checkbox
CVE-2007-2218 Unspecified vulnerability in the Windows Schannel Security Package for Microsoft Windows 2000 SP4, XP SP2, and Server 2003 SP1 and SP2, allows remote servers to execute arbitrary code
CVE-2006-6561,MS07-014 Unspecified vulnerability in Microsoft Word 2000, 2002, and Word Viewer 2003 allows user-assisted remote attackers to execute arbitrary code via a crafted DOC file that
CVE-2013-5065 This security update resolves a publicly disclosed vulnerability in Microsoft Windows. The vulnerability could allow elevation of privilege if an attacker logs on to a system and runs a
CVE-2002-0029 Buffer overflows in the DNS stub resolver library in ISC BIND 4.9.2 through 4.9.10, and other derived libraries such as BSD libc and GNU glibc, allow remote attackers to execute