Keyword: ms05-051 vulnerabilities in msdtc and com could allow remote code execution 902400
104974 Total Search   |   Showing Results : 201 - 220
commands using elevated privileges on vulnerable systems It takes advantage of the following vulnerabilities: (MS14-058) Vulnerabilities in Kernel-Mode Driver Could Allow Remote Code Execution (3000061)
vulnerabilities to drop malicious files: Vulnerabilities in Microsoft Office Excel Could Allow Remote Code Execution It executes the dropped file(s). As a result, malicious routines of the dropped files are
CVE-2012-0182,CVE-2012-2528 This security update addresses vulnerabilities affecting Microsoft Office. When successfully exploited, it could allow remote code execution via a specially crafted .RTF
Rating: Critical This remote code execution vulnerability exists in the improper accessing of objects in memory by Internet Explorer. Attackers looking to take advantage of this vulnerability could persuade
Other Details This Trojan is a zero-day exploit for the following vulnerability: (MS14-058) Vulnerabilities in Kernel-Mode Driver Could Allow Remote Code Execution (3000061) NOTES: This malware can
CVE-2012-1895,CVE-2012-1896,CVE-2012-2519,CVE-2012-4776,CVE-2012-4777 This patch addresses vulnerabilities existing in the .NET Framework. It could allow remote code execution once a remote attacker
malicious files: (MS12-027) Vulnerability in Windows Common Controls Could Allow Remote Code Execution (2664258) NOTES: Upon execution, this Trojan drops and opens a document file to hide its malicious
A remote code execution vulnerability exists in Microsoft Office that could be exploited when a user opens a file containing a malformed graphics image or when a user inserts a malformed graphics
vulnerability can be found below: Vulnerability in Windows Shell Could Allow Remote Code Execution This is the Trend Micro detection for: Shortcut files that execute a possibly malicious script named DEKSTOP.INI
could allow remote code execution if a user views a specially crafted Web page that instantiates a specific ActiveX control with Internet Explorer. Users whose accounts are configured to have fewer user
following software vulnerabilities to drop malicious files: (MS10-087) Vulnerabilities in Microsoft Office Could Allow Remote Code Execution Other Details Once a malware successfully exploits the said
CVE-2011-1253 This update resolves a privately reported vulnerability in Microsoft .NET Framework and Microsoft Silverlight. The vulnerability could allow remote code execution on a client system if
CVE-2010-2569,CVE-2010-2570,CVE-2010-2571,CVE-2010-3954,CVE-2010-3955 This update resolves vulnerabilities in Microsoft Publisher that could allow remote code execution. An attacker can exploit the
Microsoft addresses several vulnerabilities in its June security bulletin. Trend Micro Deep Security covers the following: CVE-2020-1213 - VBScript Remote Code Execution Vulnerability Risk Rating:
exploitation of this vulnerability could allow the attacker to execute arbitrary code in the context of the web server user and remotely compromise the target web application. Apply associated Trend Micro DPI
takes advantage of the following software vulnerabilities to drop malicious files: (MS10-087) Vulnerabilities in Microsoft Office Could Allow Remote Code Execution (2423930) Other Details Once a malware
CVE-2010-0028 A remote code execution vulnerability exists in the way that Microsoft Paint decodes JPEG images. The vulnerability could allow remote code execution if a user opens a specially crafted
Rating: Critical This remote code execution vulnerability exists in the scripting engine of Internet explorer in the way it handles objects in memory. Attackers looking to exploit this vulnerability could
The said vulnerabilities when exploited could allow remote code execution via a specially crafted webpage thus compromising the security of the affected systems. These also affect Internet Explorer
Microsoft Office Could Allow Remote Code Execution It executes the dropped file(s). As a result, malicious routines of the dropped files are exhibited on the affected system. Trojan.Mdropper (Symantec)