Keyword: ms05-051 vulnerabilities in msdtc and com could allow remote code execution 902400
104974 Total Search   |   Showing Results : 101 - 120
CVE-2014-6360 This security update resolves two privately reported vulnerabilities in Microsoft Excel. The vulnerabilities could allow remote code execution if an attacker convinces a user to open or
CVE-2014-6333,CVE-2014-6334,CVE-2014-6335 This security update resolves three privately reported vulnerabilities in Microsoft Office. The vulnerabilities could allow remote code execution if a
CVE-2011-0092,CVE-2011-0093 This security update addresses two vulnerabilities in Microsoft Visio, could allow remote code execution if a user opens a specially crafted Visio file. An attacker who
CVE-2014-6356 This security update resolves two privately reported vulnerabilities in Microsoft Word and Microsoft Office Web Apps. The vulnerabilities could allow remote code execution if an
CVE-2013-1303,CVE-2013-1304,CVE-2013-1338 This security update resolves two reported vulnerabilities in Internet Explorer. These vulnerabilities, if left unpatched, could allow remote code execution
CVE-2011-3396 This security update resolves two privately reported vulnerabilities in Microsoft Office . The vulnerabilities could allow remote code execution if a user opens a specially crafted
XP, and Server 2003.) It takes advantage of the following software vulnerabilities to drop malicious files: Vulnerability in Windows Common Controls Could Allow Remote Code Execution It executes the
and Server 2003.) It takes advantage of the following software vulnerabilities to drop malicious files: Vulnerability in Windows Common Controls Could Allow Remote Code Execution It executes the dropped
XP, and Server 2003.) It takes advantage of the following software vulnerabilities to drop malicious files: Vulnerability in Windows Common Controls Could Allow Remote Code Execution It executes the
vulnerabilities in Microsoft Office. The vulnerabilities could allow remote code execution if a user opens a maliciously crafted Publisher file with an affected version of Microsoft Publisher. An attacker who
attacks and leading to remote access tools (RATs). Additional details of the mentioned vulnerability can be found here: MS Advisory (2757760) Vulnerability in Internet Explorer Could Allow Remote Code
vulnerabilities in Microsoft .NET Framework and Microsoft Silverlight. The most severe of these vulnerabilities could allow remote code execution if a trusted application uses a particular pattern of code. An
vulnerabilities in several versions of Internet Explorer installed on various Windows operating systems. The vulnerabilities could allow remote code execution if exploited successfully by an attacker. In addition,
by itself does not allow arbitrary code execution. However, an attacker could use this ASLR bypass vulnerability in conjunction with another vulnerability, such as a remote code execution vulnerability
CVE-2010-2183,CVE-2010-2184,CVE-2010-2185,CVE-2010-2186,CVE-2010-2187 Adobe Flash Player is prone to remote code execution vulnerabilities. This could allow an attacker to possibly take complete
This could allow an attacker to possibly take complete control of an affected system. Adobe Flash Player Apply associated Trend Micro DPI Rules. 1004228| 1004228 - Adobe Flash Player Remote Code
exist in the WebReady Document Viewing and Data Loss Prevention features of Microsoft Exchange Server. These vulnerabilities could allow remote code execution in the security context of the LocalService
(ASLR).The most severe of the vulnerabilities could allow remote code execution if an attacker sends specially crafted packets to a Microsoft Server Message Block 1.0 (SMBv1) server. The security update
CVE-2011-3403 This security update resolves a privately reported vulnerability in Microsoft Office . The vulnerability could allow remote code execution if a user opens a specially crafted Excel
vulnerability exists in the Microsoft JET Database Engine that could allow remote code execution on an affected system. An attacker who successfully exploited this vulnerability could take control of an affected