Keyword: CVE-1999-0376
6205 Total Search   |   Showing Results : 1761 - 1780
CVE-2014-4979 Apple QuickTime allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a malformed version number and flags in an mvhd atom. apple
CVE-2014-1705 A memory corruption vulnerability exists in Google Chrome. The vulnerability is due to an error while processing JavaScript code by the V8 JavaScript Engine. A remote attacker could
CVE-2014-0322 Use-after-free vulnerability in Microsoft Internet Explorer 9 and 10 allows remote attackers to execute arbitrary code via vectors involving crafted JavaScript code, CMarkup, and the
CVE-2014-1776 Use-after-free vulnerability in Microsoft Internet Explorer 6 through 11 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via vectors
CVE-2014-4068,CVE-2014-4070,CVE-2014-4071 This update resolves three vulnerabilities found in Microsoft Lync Server. When successfully exploited, two of the three vulnerabilities could lead to denial
CVE-2014-6271 This vulnerability, which is found existing in certain versions of GNU Bourne Again Shell (Bash) can allow an attacker to execute commands on an affected system. It allows for remote
CVE-2014-4122,CVE-2014-4073,CVE-2014-4121 This bulletin resolves several vulnerabilities in the .NET Framework. Some of these vulnerabilities can allow remote code execution when successfully
CVE-2014-6333,CVE-2014-6334,CVE-2014-6335 This security update resolves three privately reported vulnerabilities in Microsoft Office. The vulnerabilities could allow remote code execution if a
Use-after-free vulnerability in Microsoft Internet Explorer 6 through 10 allows remote attackers to execute arbitrary code via a crafted web site that triggers access to a deleted object, aka
Microsoft Internet Explorer 8 and 9 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption
Cross site scripting may occur when a web application does not properly validate or escape user input. If user input is echoed back to the browser without escaping it properly or used without proper
CVE-2014-0098 The log_cookie function in mod_log_config.c in the mod_log_config module in the Apache HTTP Server before 2.4.8 allows remote attackers to cause a denial of service (segmentation fault
CVE-2013-0634 Adobe Flash Player before 10.3.183.51 and 11.x before 11.5.502.149 on Windows and before 10.3.183.51 and 11.x before 11.2.202.262 on Linux allows remote attackers to execute arbitrary
CVE-2013-4286 Apache Tomcat before 6.0.39, 7.x before 7.0.47, and 8.x before 8.0.0-RC3, when an HTTP connector or AJP connector is used, does not properly handle certain inconsistent HTTP request
CVE-2014-8439,APSB14-26,APSB14-22 Adobe Flash Player is prone to an unspecified remote code-execution vulnerability. Attackers can exploit this issue to execute arbitrary code in the context of the
CVE-2014-0509,apsb14-09 Cross-site scripting (XSS) vulnerability in Adobe Flash Player before 11.7.700.275 and 11.8.x through 13.0.x before 13.0.0.182 on Windows and before 11.2.202.350 on Linux
CVE-2010-1515,CVE-2011-1514,CVE-2011-1865 Multiple vulnerabilities have been found in HP Data Protector that could allow a remote attacker to execute arbitrary code and lead to denial of service
CVE-2013-5331,CVE-2013-5332,apsb13-28 Adobe Flash Player on Windows and Linux allow remote attackers to execute arbitrary code via crafted content that leverages an unspecified "type confusion", as
CVE-2015-3842 This vulnerability assigned with CVE-2015-3842, affects the AudioEffect component found in the mediaserver program. Attackers can run arbitrary code on the device when successfully
CVE-2015-0313,APSA15-02,apsb15-04 Use-after-free vulnerability in Adobe Flash Player before 13.0.0.269 and 14.x through 16.x before 16.0.0.305 on Windows and before 11.2.202.442 on Linux allows