Search
Keyword: CVE-1999-0376
This malware was involved in the Adobe Flash Player zero-day exploit incident reported on February 2014. It would automatically download onto users' systems once the user browsed a compromised
This Trojan may arrive bundled with malware packages as a malware component. It may be hosted on a website and run when a user accesses the said website. It requires its main component to
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This is the detection for the exploit that targets the Adobe zero-day vulnerability covered in CVE-2015-5119. The said vulnerability affects the latest versions of Flash on Windows, Mac, and Linux.
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
Description Name: CAMBIUM RCE Exploit - HTTP (Request) . This is Trend Micro detection for HTTP network protocol that manifests exploit activities and can be used for Point of Entry or Lateral Movement.The host exhibiting this type of network behavio...
Description Name: Possible Malformed Heartbeat SSL Response - Class 1 . This is Trend Micro detection for TCP, SSL and HTTPS network protocol that manifests exploit activities and can be used for Intelligence Gathering.The host exhibiting this type o...
CVE-2012-0158 The (1) ListView, (2) ListView2, (3) TreeView, and (4) TreeView2 ActiveX controls in MSCOMCTL.OCX in the Common Controls in Microsoft Office 2003 SP3, 2007 SP2 and SP3, and 2010 Gold
CVE-2015-0310 This vulnerability exists in the way the Flash Player mitigates memory randomization. It exists in several versions of Adobe Flash Player installed in Windows environments. 1006461
CVE-2015-1649,CVE-2015-1651,CVE-2015-1650 This security update addresses vulnerabilities found existing in Microsoft Office, which could allow remote code execution thus compromising the security of
CVE-2014-0515 Buffer overflow in Adobe Flash Player before 11.7.700.279 and 11.8.x through 13.0.x before 13.0.0.206 on Windows and OS X, and before 11.2.202.356 on Linux, allows remote attackers to
CVE-2015-0069,CVE-2015-0051,CVE-2015-0071 This security update addresses one publicly disclosed and forty privately reported vulnerabilities in Internet Explorer. The most severe of these
CVE-2015-3824 This Android vulnerability known as “Stagefright” can be leveraged by attackers to install a malware on Android devices via a multimedia message (MMS). It affects versions of Android
CVE-2015-3839 Trend Micro researchers discovered this Android vulnerability assigned with CVE-2015-3839 that could allow attackers to put malicious messages in the messaging app, thus causing it to
CVE-2014-0559 Heap-based buffer overflow in Adobe Flash Player before 13.0.0.244 and 14.x and 15.x before 15.0.0.152 on Windows and OS X and before 11.2.202.406 on Linux, Adobe AIR before 15.0.0.249
CVE-2015-5122 This is the a zero-day vulnerability disclosed from the Hacking Team leak. It affects all versions of Flash Player for Windows, Mac, and Linux. The bug is a Use-After-Free vulnerability
CVE-2012-2825 This vulnerability assigned with CVE-2012-2825 is related to the Hacking Team leak, which exposed the RCSAndroid code. The said malicious code could potentially allow surveillance
CVE-2015-3113,CVE-2015-3043 This Adobe update address a critical vulnerability (CVE-2015-3113), and Adobe recommends users update their product installations to the latest versions using the
CVE-2011-3416,MS11-100 The Forms Authentication feature in the ASP.NET subsystem in Microsoft .NET Framework 1.1 SP1, 2.0 SP2, 3.5 SP1, 3.5.1, and 4.0 allows remote authenticated users to obtain
CVE-2013-6632 Integer overflow in Google Chrome before 31.0.1650.57 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors. google