Search
Keyword: CVE-1999-0376
Format string vulnerability in AnswerBook2 (AB2) web server dwhttpd 3.1a4 allows remote attackers to cause a denial of service and possibly execute arbitrary commands via encoded % characters in an HTT...
rpc.ypupdated (NIS) allows remote users to execute arbitrary
commands.
IBM AIX 3.2,IBM AIX 4.1,NEC EWS-UX/V,NEC UP_UX_V,NEC UX_4800,SGI IRIX 3,SGI IRIX 4,SGI IRIX 5.0,SGI IRIX 5.1,SGI IRIX 5....
Microsoft Exchange 5.5 allows a remote attacker to relay email (i.e. spam) using encapsulated SMTP addresses, even if the anti-relaying features are enabled.
Microsoft Exchange 5.5,Microsoft Exchange 5.5S...
When IIS 2 or 3 is upgraded to IIS 4, ism.dll is inadvertently left in /scripts/iisadmin, which does not restrict access to the local machine and allows an unauthorized user to gain access to sens...
Microsoft addresses the following vulnerabilities in its October batch of patches:
(MS11-075) Vulnerability in Microsoft Active Accessibility Could Allow Remote Code Execution (2623699)
Risk Ra...
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It may be hosted on a website and run when a user accesses the said website.It does not have any propagati...
This worm arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.It connects to certain websites to send and receive information. It terminates itself if it detects it is b...
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.It executes then deletes itself afterward.As of this writing, the said sites are inaccessible.It steals cer...
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.It connects to certain websites to send and receive information.
This Backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It may be downloaded by other malware/grayware/spyware from remote sites.It executes commands from a rem...
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.It injects its dropped file/component to specific processes.It does not have any propagation routine.It doe...
This Trojan may be dropped by other malware.It takes advantage of certain vulnerabilities.
This update resolves vulnerabilities found in the following versions of the Internet Explorer browser:
Internet Explorer 6
Internet Explorer 7
Internet Explorer 8
Internet Explor...
* indicates a new version of an existing ruleDeep Packet Inspection Rules:DCERPC Services1007699* - Oracle Job Scheduler Named Pipe Command Execution VulnerabilityDirectory Server LDAP1007460* - OpenLDAP ber_get_next Denial Of ...
This security update resolves several vulnerabilities in several versions of Internet Explorer installed on various Windows operating systems. The vulnerabilities could allow remote code exec...
* indicates a new version of an existing ruleDeep Packet Inspection Rules:DCERPC Services1008224 - Microsoft Windows SMB Remote Code Execution Vulnerabilities (CVE-2017-0144 and CVE-2017-0146)1008225 - Microsoft Windows SMB Re...
* indicates a new version of an existing ruleDeep Packet Inspection Rules:DCERPC Services1007596* - Identified Possible Ransomware File Extension Rename Activity Over Network ShareJetBrains TeamCity1012199* - JetBrains TeamCity ...
* indicates a new version of an existing ruleDeep Packet Inspection Rules:Ivanti Avalanche1012298* - Ivanti Avalanche Authentication Bypass Vulnerability (CVE-2024-13181)Ivanti Endpoint Manager1012207* - Ivanti Endpoint Manager ...