Keyword: (ms05-051) vulnerabilities in msdtc and com could allow remote code execution (902400)
105228 Total Search   |   Showing Results : 1661 - 1680
Server (IDS) 10.x before 10.00.TC9 and 11.x before 11.10.TC3, allow remote attackers to execute arbitrary code via a crafted parameter size. IBM Informix Dynamic Server 10.0,IBM Informix Dynamic Server
drives. It drops an AUTORUN.INF file to automatically execute the copies it drops when a user accesses the drives of an affected system. It opens a random port to allow a remote user to connect to the
CVE-2010-0197 Adobe Reader and Acrobat 9.x before 9.3.2, and 8.x before 8.2.2 on Windows and Mac OS X, allow attackers to cause a denial of service (memory corruption) or execute arbitrary code via
advantage of the following software vulnerabilities to download possibly malicious files: CVE-2017-0199 | Microsoft Office Remote Code Execution Vulnerability It then executes the downloaded files. As a
Incoming 1009798* - Microsoft Windows DHCP Client Remote Code Execution Vulnerability (CVE-2019-0698) Web Application Common 1009711* - GraphicsMagick Heap Buffer Overflow Vulnerability (CVE-2019-11505) - 1
CVE-2007-2219 Unspecified vulnerability in the Win32 API on Microsoft Windows 2000, XP SP2, and Server 2003 SP1 and SP2 allows remote attackers to execute arbitrary code via certain parameters to an
NOTES: This is a backdoor remote access tool (RAT) builder written in Java. It is capable of creating a client .JAR file to allow attackers to control a system. It may execute the following commands to an
This backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It opens a random port to allow a remote user to
CVE-2007-3854 Multiple unspecified vulnerabilities in Oracle Database 9.0.1.5 , 9.2.0.7, and 10.1.0.5 allow remote authenticated users to have unknown impact via (1) SYS.DBMS_PRVTAQIS in the Advanced
This malware exploits a vulnerability in Java Runtime Environment to allow a remote user to execute arbitrary commands. It connects to a certain URL to communicate with its remote server. This Trojan
is Trend Micro's detection for Trojanized Android applications. While the legitimate software runs, it silently executes malicious code in the background. Upon execution of the affected application,
its code into the processes SERVICES.EXE , LSASS.EXE , and CSRSS.EXE . It modifies the following registry entry to enable its automatic execution at system startup: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft
This Trojan takes advantage of an unknown vulnerability in a certain software to allow a remote malicious user or malware to download files on the affected machine. It takes advantage of certain
This Trojan takes advantage of an unknown vulnerability in a certain software to allow a remote malicious user or malware to download files on the affected machine. It takes advantage of certain
that could lead to unsecured library loading behavior. An attacker who successfully exploited the vulnerability could run arbitrary code with elevated system privileges. Apply associated Trend Micro DPI
CVE-2013-3204,CVE-2013-3205,CVE-2013-3209,CVE-2013-3201,CVE-2013-3202,CVE-2013-3203,CVE-2013-3206,CVE-2013-3207,CVE-2013-3208,CVE-2013-3845 This bulletin addresses 10 vulnerabilities found in several
CVE-2009-2477 js/src/jstracer.cpp in the Just-in-time (JIT) JavaScript compiler (aka TraceMonkey) in Mozilla Firefox 3.5 before 3.5.1 allows remote attackers to execute arbitrary code via certain use
This Trojan takes advantage of an unknown vulnerability in a certain software to allow a remote malicious user or malware to download files on the affected machine. Other Details Based on analysis of
CVE-2009-4324 Use-after-free vulnerability in the Doc.media.newPlayer method in Multimedia.api in Adobe Reader and Acrobat 9.x before 9.3, and 8.x before 8.2 on Windows and Mac OS X, allows remote