Keyword: ms05-051 vulnerabilities in msdtc and com could allow remote code execution 902400
104974 Total Search   |   Showing Results : 1681 - 1700
following copy(ies) of itself in all removable drives: {drive letter}:\\Copy of Shortcut to.lnk {drive letter}:\\~WTR4132.tmp {drive letter}:\\~WTR4141.tmp It exploits the following software vulnerabilities
CVE-2010-1818 The IPersistPropertyBag2::Read function in QTPlugin.ocx in Apple QuickTime 6.x, 7.x before 7.6.8, and other versions allows remote attackers to execute arbitrary code via the
This Trojan takes advantage of certain vulnerabilities. Other Details This Trojan takes advantage of the following vulnerabilities: Oracle Java SE and Java for Business 'MixerSequencer' Remote Code
* indicates a new version of an existing rule Deep Packet Inspection Rules: NFS Server 1011492 - Microsoft Windows Network File System Remote Code Execution Vulnerability (CVE-2022-30136) Sante PACS
* indicates a new version of an existing rule Deep Packet Inspection Rules: Web Client Common 1009307 - Microsoft JET Database Engine Remote Code Execution Vulnerability (ZDI-CAN-6135) Integrity
* indicates a new version of an existing rule Deep Packet Inspection Rules: Web Server Oracle 1009223 - Oracle WebLogic Server WLS Core Components Remote Code Execution Vulnerability (CVE-2018-2893)
* indicates a new version of an existing rule Deep Packet Inspection Rules: Web Application Common 1009728 - Jenkins Stapler Web Framework Remote Code Execution Vulnerability (CVE-2018-1000861)
Remote code execution Capture screenshots Retrieve stored passwords View webcam activity Send system information (IP address, computer name, user name, operating system) Displays Messagebox It connects to
CVE-2007-0515 Unspecified vulnerability in Microsoft Word allows user-assisted remote attackers to execute arbitrary code on Word 2000, and cause a denial of service on Word 2003, via unknown attack
CVE-2006-4847 Multiple buffer overflows in Ipswitch WS_FTP Server 5.05 before Hotfix 1 allow remote authenticated users to execute arbitrary code via long (1) XCRC, (2) XSHA1, or (3) XMD5 commands.
CVE-2010-0167 The browser engine in Mozilla Firefox 3.0.x before 3.0.18, 3.5.x before 3.5.8, and 3.6.x before 3.6.2; Thunderbird before 3.0.2; and SeaMonkey before 2.0.3 allows remote attackers to
CVE-2015-1700 This update resolves a remote code execution vulnerability found in Microsoft Office server. When successfully exploited, an attacker can execute code on the vulnerable computer
vulnerability in a certain software to allow a remote malicious user or malware to download files on the affected machine. Arrival Details This Trojan may be hosted on a website and run when a user accesses the
CVE-2008-4388 The LaunchObj ActiveX control before 5.2.2.865 in launcher.dll in Symantec AppStream Client 5.2.x before 5.2.2 SP3 MP1 does not properly validate downloaded files, which allows remote
CVE-2010-4344 Heap-based buffer overflow in the string_vformat function in string.c in Exim before 4.70 allows remote attackers to execute arbitrary code via an SMTP session that includes two MAIL
Vulnerability (CVE-2022-36097) Web Server SharePoint 1011554* - Microsoft SharePoint Server Remote Code Execution Vulnerability (CVE-2022-38053) 1011678 - Microsoft SharePoint Server Remote Code Execution
* indicates a new version of an existing rule Deep Packet Inspection Rules: H2 Database 1011316* - H2 Database Remote Code Execution Vulnerability (CVE-2022-23221) Web Application PHP Based 1011319 -
This backdoor opens a random port to allow a remote user to connect to the affected system. Once a successful connection is established, the remote user executes commands on the affected system.
7.0.3, Symantec Mail Security, and other products, allow remote attackers to execute arbitrary code via a crafted (1) AG file to kpagrdr.dll, (2) AW file to awsr.dll, (3) DLL or (4) EXE file to exesr.dll,
before copying it to insufficiently sized memory buffers. These issues allow remote, unauthenticated attackers to execute arbitrary machine code in the context of affected servers. This may facilitate the