Search
Keyword: ms05-051 vulnerabilities in msdtc and com could allow remote code execution 902400
This malware exploits a vulnerability in Java Runtime Environment to allow a remote user to execute arbitrary commands. It connects to a certain URL to communicate with its remote server. This Trojan
1010107 - rConfig 'devices.inc.php' SQL Injection Vulnerability (CVE-2019-19207) Web Application PHP Based 1009541* - Drupal Core Remote Code Execution Vulnerability (CVE-2019-6340) 1010112 - PHP Type
(MS15-062) Vulnerability in Active Directory Federation Services Could Allow Elevation of Privilege (3062577)
CVE-2015-1757 This security update addresses a vulnerability in Microsoft Active Directory Federation Services (AD FS) that could allow elevation of privilege when an attacker submits a specially
its code into the processes SERVICES.EXE , LSASS.EXE , and CSRSS.EXE . It modifies the following registry entry to enable its automatic execution at system startup: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft
(MS15-064) Vulnerabilities in Microsoft Exchange Server Could Allow Elevation of Privilege (3062157)
CVE-2015-1764,CVE-2015-1771 This update resolves two vulnerabilities that are present in Microsoft Exchange Server. The two vulnerabilities, when exploited, may allow elevation of privilege or
CVE-2010-0492 Use-after-free vulnerability in mstime.dll in Microsoft Internet Explorer 8 allows remote attackers to execute arbitrary code via vectors related to the TIME2 behavior, the CTimeAction
could execute arbitrary code and take control of an affected system. Apply associated Trend Micro DPI Rules. 1007698|
allows remote attackers to execute arbitrary code by placing many Cascading Style Sheets (CSS) values in an array, related to references to external font resources and an inconsistency between 16-bit and
CVE-2013-5065 This security update resolves a publicly disclosed vulnerability in Microsoft Windows. The vulnerability could allow elevation of privilege if an attacker logs on to a system and runs a
This is a type of polymorphic DOS virus that infects COM files found in all directories of the current drive. It uses a complex polymorphic engine to decrypt its code. This virus appends its
CVE-2010-1392 Use-after-free vulnerability in WebKit in Apple Safari before 5.0 on Mac OS X 10.5 through 10.6 and Windows, and before 4.1 on Mac OS X 10.4, allows remote attackers to execute
Parse Server Remote Code Execution Vulnerability (CVE-2022-41879) Web Application Common 1011171* - Apache HTTP Server Directory Traversal Vulnerability (CVE-2021-41773 and CVE-2021-42013) Web Application
CVE-2015-0084 This security update resolves a vulnerability in Microsoft Windows. The vulnerability could allow a user with limited privileges on an affected system to leverage Task Scheduler to
CVE-2013-5042 This security update resolves a privately reported vulnerability in ASP.NET SignalR. The vulnerability could allow elevation of privilege if an attacker reflects specially crafted
CVE-2014-0319 This security update resolves a privately reported vulnerability in Microsoft Silverlight. The vulnerability could allow security feature bypass if an attacker hosts a website that
CVE-2015-0032 This security update resolves a remote code execution vulnerability present in the scripting engine VBScript 5.6, 5.7, and 5.8. Attackers wanting to exploit this vulnerability may set
CVE-2011-0257 Integer signedness error in Apple QuickTime before 7.7 allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via a crafted PnSize opcode in
CVE-2008-0112,ms08-014 Unspecified vulnerability in Microsoft Excel 2000 SP3, and Office for Mac 2004 and 2008 allows user-assisted remote attackers to execute arbitrary code via a crafted .SLK file
CVE-2015-3823 Trend Micro researchers discovered this vulnerability in Android devices that could potentially allow attackers to perform Denial of Service (DoS) attacks once successfully exploited.
CVE-2010-1396 Use-after-free vulnerability in WebKit in Apple Safari before 5.0 on Mac OS X 10.5 through 10.6 and Windows, and before 4.1 on Mac OS X 10.4, allows remote attackers to execute