Keyword: CVE-1999-0376
6205 Total Search   |   Showing Results : 521 - 540
This is the Trend Micro detection for a hacking tool that can be used to launch a denial of service attack by exploiting the Remote Desktop Protocol Vulnerability (CVE-2012-0002) . This malware is a
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It takes advantage of software vulnerabilities to allow
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It may be downloaded by other malware/grayware from
TROJ_ETERNALROM.A is a hacking tool released by a hacking group called Shadow Brokers. It contains several exploits that target system and server vulnerabilities. This hacking tool also targets
Microsoft addresses the following vulnerabilities in its February batch of patches: (MS11-003) Cumulative Security Update for Internet Explorer (2482017) Risk Rating: Critical This security update
Microsoft addresses the following vulnerabilities in its September batch of patches: (MS11-070) Vulnerability in WINS Could Allow Elevation of Privilege (2571621) Risk Rating: Important This security
Microsoft addresses the following vulnerabilities in its December batch of patches: (MS12-077) Cumulative Security Update for Internet Explorer (2761465) Risk Rating: Critical This patch addresses
originally assigned CVE-2009-4054, but Microsoft assigned a duplicate identifier of CVE-2009-3672. CVE consumers should use this identifier instead of CVE-2009-4054. Microsoft Internet Explorer 7,Microsoft
CVE-2010-1280,CVE-2010-1281,CVE-2010-1284,CVE-2010-1282,CVE-2010-1283 Adobe Shockwave Trend Micro Deep Security shields networks through Deep Packet Inspection (DPI) rules. Trend Micro customers
CVE-2010-1292,CVE-2010-1291,CVE-2010-1290,CVE-2010-1288,CVE-2010-1289 Adobe Shockwave Trend Micro Deep Security shields networks through Deep Packet Inspection (DPI) rules. Trend Micro customers
Oracle, it is not clear whether this issue is related to other CVE identifiers such as CVE-2007-2126, CVE-2007-2127, or CVE-2007-2128. Oracle E-Business Suite Trend Micro Deep Security shields networks
CVE-2010-2559 Microsoft Internet Explorer 8 does not properly handle objects in memory, which allows remote attackers to execute arbitrary code by accessing an object that (1) was not properly
CVE-2010-4084 dirapi.dll in Adobe Shockwave Player before 11.5.9.615 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different
CVE-2010-3956,CVE-2010-3957,CVE-2010-3959 This security update resolves several vulnerabilities in the Windows Open Type Font (OTF) driver, which could allow remote users to execute code remotely on
CVE-2011-0086,CVE-2011-0087,CVE-2011-0088,CVE-2011-0089,CVE-2011-0090 This security update addresses vulnerabilities in Microsoft Windows, which could allow elevation of privilege if an attacker
CVE-2011-0036 Microsoft Internet Explorer 6, 7, and 8 does not properly handle objects in memory, which allows remote attackers to execute arbitrary code by accessing an object that (1) was not
CVE-2011-3402 A vulnerability in a Microsoft Windows component that may allow an attacker to execute code on the vulnerable machine. The vulnerability exists in the Win32k TrueType font parsing
CVE-2011-2462 A critical vulnerability has been identified in the 10.1.1 version of Adobe Reader X and earlier versions for Windows and Macintosh , Adobe Reader 9.4.6 and earlier 9.x versions for
CVE-2012-1895,CVE-2012-1896,CVE-2012-2519,CVE-2012-4776,CVE-2012-4777 This patch addresses vulnerabilities existing in the .NET Framework. It could allow remote code execution once a remote attacker
CVE-2012-1864,CVE-2012-1865,CVE-2012-1866,CVE-2012-1867,CVE-2012-1868 This update resolves five vulnerabilities in Windows, all of which allows elevation of privilege when successfully exploited. The