Keyword: ms05-051 vulnerabilities in msdtc and com could allow remote code execution 902400
104976 Total Search   |   Showing Results : 261 - 280
CVE-2010-1900,CVE-2010-1901,CVE-2010-1902,CVE-2010-1903 This security update addresses four Microsoft Office vulnerabilities that could allow remote code execution once a user opens a specially
file with one of the affected software. This threat would not allow remote code execution or elevation of user right, however, it could acquire information that could be used in future attacks Microsoft
This security update addresses one publicly disclosed and five privately reported vulnerabilities found in Microsoft Windows. The most severe of the vulnerabilities could allow remote code execution
Other Details More information on this vulnerability can be found below: Vulnerabilities in Microsoft Office Could Allow Remote Code Execution (2587634) (CVE-2011-1980) NOTES: This specially-crafted .DOC
Microsoft Office file. The security feature bypass by itself does not allow arbitrary code execution. However, an attacker could use this security feature bypass vulnerability in conjunction with another
CVE-2015-1761 This security update resolves vulnerabilities in Microsoft SQL Server. The most severe vulnerabilities could allow remote code execution if an authenticated attacker runs a specially
CVE-2009-1545,MS09-038 A remote code execution vulnerability exists in the way Microsoft Windows handles specially crafted AVI format files. This vulnerability could allow code execution if a user
CVE-2014-4122,CVE-2014-4073,CVE-2014-4121 This bulletin resolves several vulnerabilities in the .NET Framework. Some of these vulnerabilities can allow remote code execution when successfully
Rating: Critical This remote code execution vulnerability exists in the improper accessing of objects in memory by Internet Explorer. Attackers looking to take advantage of this vulnerability could persuade
target user to open a crafted file. A successful attack could result in the execution of arbitrary code in the security context of the target user. Apply associated Trend Micro DPI Rules. 1007119|
target user to open a crafted file. A successful attack could result in the execution of arbitrary code in the security context of the target user. Apply associated Trend Micro DPI Rules. 1007119|
serious vulnerabilities may allow remote code execution if a user views a specially crafted Web site via Internet Explorer . Users whose accounts with fewer user rights on the system could be less impacted
Bulletin MS10-087 - Critical: Vulnerabilities in Microsoft Office Could Allow Remote Code Execution (2423930) NOTES: It opens the file %User Temp%\{malware file and extension name} in Microsoft Word to hide
CVE-2013-1331 This security update resolves one reported vulnerability in Microsoft Office. The vulnerability could allow remote code execution if a user opens a maliciously-crafted Office document
CVE-2015-1635 This security update resolves a vulnerability in Microsoft Windows. The vulnerability could allow remote code execution if an attacker sends a specially crafted HTTP request to an
CVE-2014-2815 This security update resolves a privately reported vulnerability in Microsoft OneNote. The vulnerability could allow remote code execution if a specially crafted file is opened in an
(MS12-027) Vulnerability in Windows Common Controls Could Allow Remote Code Execution (2664258) It executes the dropped file(s). As a result, malicious routines of the dropped files are exhibited on
malicious files: (MS12-027) Vulnerability in Windows Common Controls Could Allow Remote Code Execution (2664258) It executes the dropped file(s). As a result, malicious routines of the dropped files are
CVE-2015-2509 A vulnerability exists in Windows Media Center that could allow remote code execution if Windows Media Center opens a specially crafted Media Center link (.mcl) file that references
CVE-2010-3138 This security update resolves one publicly disclosed vulnerability in Microsoft Windows. The vulnerability could allow remote code execution if a user opens a legitimate file (such as