Keyword: CVE-1999-0376
300 Total Search   |   Showing Results : 1 - 20
   Next  
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It may be downloaded by other malware/grayware/spyware from remote sites.
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It may be downloaded by other malware/grayware/spyware from remote sites.It deletes the initially executed...
Heap-based buffer overflow in a DLL file in RealNetworks RealPlayer 10, RealPlayer 10.5 6.0.12.1040 through 6.0.12.1741, RealPlayer 11 11.0.0 through 11.0.4, RealPlayer Enterprise...
Microsoft Internet Explorer 8 does not properly allocate and access memory, which allows remote attackers to execute arbitrary code via vectors involving a "dereferenced memory addres...
A Windows NT user or administrator account has a default, null, blank, or missing password. Microsoft Windows 2000 a,Microsoft Windows NT 1005448 - SMB Null Session De...
The Remote Data Service (RDS) DataFactory component of Microsoft Data Access Components (MDAC) in IIS 3.x and 4.x exposes unsafe methods, which allows remote attacke...
This update resolves eight privately reported vulnerabilities in Internet Explorer. The most severe vulnerabilities could allow remote code execution if a user views a specially cr...
Backdoor Valv net A hacker utility, back door, or Trojan Horse is installed on a system, e.g. NetBus, Back Orifice, Rootkit, etc. CVE-1999-0660 Apply associated Trend Micro DPI Rules.
Anonymous FTP is enabled. If FTP services are present, allowing only anonymous access prevents valid user-password pairs from being passed across the network. Anonymous FTP is an unsecured protocol for Interne...
The Squid package in Red Hat Linux 5.2 and 6.0, and other distributions, installs cachemgr.cgi in a public web directory, which allows remote attackers to use it as an intermediary to connect t...
Buffer overflow in IIS 4.0 allows remote attackers to cause a denial of service via a malformed request for files with .HTR, .IDC, or .STM extensions. Microsoft IIS 4.0,Microsoft Win...
The internal DNS server in Samba 4.x before 4.0.18 does not check the QR field in the header section of an incoming DNS message before sending a response, which allows remote attack...
Buffer overflow in War FTP allows remote execution of commands. Jgaa WarFTPd 1.66 1000914 - FTP Argument Check CVE-1999-0256 Trend Micro Deep Security shields networks through Deep Packet Inspection (DPI) rules. Trend M...
 The viewcode.asp sample file in IIS and Site Server allows remote attackers to read arbitrary files. Microsoft IIS 4.0 1000581 - Vulnerability in View Code.asp IIS file. CVE-1999-0737 Trend Micro Deep Secur...
 Buffer overflow in fpcount.exe in IIS 4.0 with FrontPage Server Extensions allows remote attackers to execute arbitrary commands. Microsoft IIS 4.0 1000442 - IIS fpcount.exe Buffer Overflo...
IIS 1.0 allows users to execute arbitrary commands using .bat or .cmd files. Microsoft IIS 1.0 1000390 - CVE-1999-0233 Trend Micro Deep Security shields networks t...
 The showcode.asp sample file in IIS and Site Server allows remote attackers to read arbitrary files. Microsoft IIS 4.0 1000580 - IIS and SiteServer Showcode.asp sample file ...
The ExAir sample site in IIS 4 allows remote attackers to cause a denial of service (CPU consumption) via a direct request to the (1) advsearch.asp, (2) query.asp, or (3) search.asp scripts. Microsoft IIS 4.0 100078...
 In IIS, remote attackers can obtain source code for ASP files by appending "::$DATA" to the URL. Microsoft IIS 3.0,Microsoft IIS 4.0,Microsoft Windows NT 4.0 1000444 - IIS...
 By default, IIS 4.0 has a virtual directory /IISADMPWD which contains files that can be used as proxies for brute force password attacks, or to identify valid users on the system. Microsoft IIS 4....