Keyword: ms05-051 vulnerabilities in msdtc and com could allow remote code execution 902400
104974 Total Search   |   Showing Results : 1661 - 1680
* indicates a new version of an existing rule Deep Packet Inspection Rules: Web Server Oracle 1009707* - Oracle Weblogic Server Remote Code Execution Vulnerability (CVE-2019-2725) Integrity
new or updated Integrity Monitoring Rules in this Security Update. Log Inspection Rules: 1011241* - Apache Log4j Remote Code Execution Vulnerability (CVE-2021-44228)
new or updated Integrity Monitoring Rules in this Security Update. Log Inspection Rules: 1011241* - Apache Log4j Remote Code Execution Vulnerability (CVE-2021-44228)
* indicates a new version of an existing rule Deep Packet Inspection Rules: Web Server Miscellaneous 1011933 - Apache Struts2 Remote Code Execution Vulnerability (CVE-2023-50164) Integrity Monitoring
* indicates a new version of an existing rule Deep Packet Inspection Rules: Web Server Miscellaneous 1011933 - Apache Struts2 Remote Code Execution Vulnerability (CVE-2023-50164) Integrity Monitoring
* indicates a new version of an existing rule Deep Packet Inspection Rules: Unix CUPS Client 1012160 - CUPS Remote Code Execution Vulnerability (CVE-2024-47076) Integrity Monitoring Rules: There are
CVE-2006-6561,MS07-014 Unspecified vulnerability in Microsoft Word 2000, 2002, and Word Viewer 2003 allows user-assisted remote attackers to execute arbitrary code via a crafted DOC file that
specific number and remote servers in the background. To get a one-glance comprehensive view of the behavior of this Spyware, refer to the Threat Diagram shown below. This spyware is an application that
This backdoor opens a random port to allow a remote user to connect to the affected system. Once a successful connection is established, the remote user executes commands on the affected system.
to Windows operating systems. The vulnerability could allow a man-in-the-middle (MiTM) attacker to force the downgrading of the key length of an RSA key to EXPORT-grade length in a TLS connection. Any
CVE-2012-0141,CVE-2012-0142,CVE-2012-0143,CVE-2012-0184,CVE-2012-0185,CVE-2012-1847 Several vulnerabilities in some versions of MS Excel are resolved in this particular bulletin. To exploit this
CVE-2011-0096 This security update resolves a publicly disclosed vulnerability in the MHTML protocol handler in Microsoft Windows. The vulnerability could allow information disclosure if a user
This Trojan may be downloaded from remote sites by other malware. It takes advantage of unknown vulnerabilities in certain software to download malicious files. It executes the downloaded files. As a
An elevation of privilege vulnerability exists when the Windows Graphics Component improperly handles objects in memory. An attacker who successfully exploits this vulnerability could run arbitrary
498897 Broken functionality on pages that have a Link: HTTP header when an add-on was installed which implemented a Content Policy in JavaScript, such as AdBlock Plus or NoScript could allow
execution at every system startup: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\ Windows\CurrentVersion\Run msmsgs = %WINDOWS%\msmsgs.exe Backdoor Routine This backdoor opens a random port to allow a remote user to
set global autotuning=disabled Propagates by taking advantage of a vulnerability discovered in certain Microsoft operating systems that could allow remote code execution if an affected system received a
drives. It drops an AUTORUN.INF file to automatically execute the copies it drops when a user accesses the drives of an affected system. It opens a random port to allow a remote user to connect to the
IBM Java is prone to multiple vulnerabilities in Java Runtime Environment. An attacker can exploit these issues to execute arbitrary code in the context of the process. Apply associated Trend Micro
a Chinese, Japanese, or Korean system. In addition, a remote attacker who successfully exploited this vulnerability could do the following: install programs, view and change data among others. Windows