Keyword: ms05-051 vulnerabilities in msdtc and com could allow remote code execution 902400
104976 Total Search   |   Showing Results : 281 - 300
CVE-2014-0294 This security update resolves a privately reported vulnerability in Microsoft Forefront. The vulnerability could allow remote code execution if a specially crafted email message is
vulnerabilities could allow remote code execution on a client system if a user views a specially crafted web page using a web browser that can run XAML Browser Applications (XBAPs) or Silverlight applications.
CVE-2014-1759 This security update resolves a privately reported vulnerability in Microsoft Office. The vulnerability could allow remote code execution if a user opens a specially crafted file in an
CVE-2010-1279 Multiple unspecified vulnerabilities in Adobe Photoshop CS4 11.x before 11.0.1 allow user-assisted remote attackers to execute arbitrary code via a crafted TIFF file. adobe
Details More information on this vulnerability can be found below: Vulnerabilities in Microsoft Office Excel Could Allow Remote Code Execution NOTES: This malware does not have rootkit capabilities. Spammed
malware/grayware to download files: (MS12-043) Vulnerability in Microsoft XML Core Services Could Allow Remote Code Execution (2722479) It then executes the downloaded files. As a result, malicious routines of the
the following pages: Vulnerability in Windows Shell Could Allow Remote Code Execution (2286198) This is the Trend Micro detection for: Shortcut files that attempt to exploit a vulnerablity in Windows
CVE-2014-2778 This security update addresses a vulnerability in Microsoft Office which could also allow remote code execution once successfully exploited via specially crafted Word file. Microsoft
CVE-2013-1335 This security update resolves one vulnerability in Microsoft Office. The vulnerability could allow remote code execution if a user opens a maliciously crafted file or previews a
CVE-2012-0016 This security update resolves one privately reported vulnerability in Microsoft Expression Design . The vulnerability could allow remote code execution if a user opens a legitimate file
propagate across networks: Vulnerability in Server Service Could Allow Remote Code Execution (958644) NOTES: This malware connects to a remote IRC server, once connected, it joins an IRC channel where it
CVE-2008-2639 Stack-based buffer overflow in the ODBC server service in Citect CitectSCADA 6 and 7, and CitectFacilities 7, allows remote attackers to execute arbitrary code via a long string in the
Settings\Temp on Windows 2000, XP, and Server 2003.) It takes advantage of the following software vulnerabilities to drop malicious files: (MS12-027) Vulnerability in Windows Common Controls Could Allow
Windows Common Controls Could Allow Remote Code Execution (2664258) It executes the dropped file(s). As a result, malicious routines of the dropped files are exhibited on the affected system. Via email
CVE-2014-1808 This security update resolves two privately reported vulnerabilities in Microsoft Office. The most severe vulnerability could allow remote code execution if a user opens an Office file
A remote code execution vulnerability exists that is caused when Microsoft Word improperly handles objects in memory while parsing specially crafted Office files. This could corrupt system memory in
A remote code execution vulnerability exists that is caused when Microsoft Word improperly handles objects in memory while parsing specially crafted Office files. This could corrupt system memory in
could allow remote code execution if a user visits a website containing specially crafted content or if a specially crafted application is run locally. An attacker would have no way to force users to
CVE-2010-2573 This update resolves two vulnerabilities in Microsoft Office that could allow a malicious user to execute code remotely when users open a specially crafted PowerPoint file. The said
be found below: (MS11-073) Vulnerabilities in Microsoft Office Could Allow Remote Code Execution (2587634) NOTES: This specially-crafted .DOC file takes advantage of a vulnerability in certain versions