Keyword: CVE-1999-0376
6075 Total Search   |   Showing Results : 501 - 520
* indicates a new version of an existing rule Deep Packet Inspection Rules: Ivanti Avalanche 1011871 - Ivanti Avalanche XML External Entity Processing Vulnerability (CVE-2023-32567) Port Mapper
* indicates a new version of an existing rule Deep Packet Inspection Rules: Ivanti Avalanche 1011863* - Ivanti Avalanche Authentication Bypass Vulnerability (CVE-2021-22962 & CVE-2023-32566)
* indicates a new version of an existing rule Deep Packet Inspection Rules: Ivanti Avalanche 1011759* - Ivanti Avalanche Multiple Arbitrary File Upload Vulnerabilities 1011955* - Ivanti Avalanche XML
Both malware are related to the modified Enfal variants, which were reported to have infected 874 systems in 33 countries. To get a one-glance comprehensive view of the behavior of this Trojan, refer
This malware exploits a vulnerability found in Microsoft Office known as CVE-2017-0199. There are reports that exploits using the said vulnerability are in the wild. A security patch for the
(RE: [Noteworthy] Flash 0day(CVE-2016-4117)) According to the report, Separately, Adobe officials warned that a newly discovered Flash vulnerability also gives attackers the ability to remotely
This malware is related to the Whitehole Exploit Kit attacks during February 2012. It takes advantage of certain vulnerabilities in Java to download and execute backdoor malware onto the affected
This is the Trend Micro detection for a hacking tool that can be used to launch a denial of service attack by exploiting the Remote Desktop Protocol Vulnerability (CVE-2012-0002) . This malware is a
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It takes advantage of software vulnerabilities to allow
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It may be downloaded by other malware/grayware from
TROJ_ETERNALROM.A is a hacking tool released by a hacking group called Shadow Brokers. It contains several exploits that target system and server vulnerabilities. This hacking tool also targets
Microsoft addresses the following vulnerabilities in its February batch of patches: (MS11-003) Cumulative Security Update for Internet Explorer (2482017) Risk Rating: Critical This security update
Microsoft addresses the following vulnerabilities in its September batch of patches: (MS11-070) Vulnerability in WINS Could Allow Elevation of Privilege (2571621) Risk Rating: Important This security
Microsoft addresses the following vulnerabilities in its December batch of patches: (MS12-077) Cumulative Security Update for Internet Explorer (2761465) Risk Rating: Critical This patch addresses
originally assigned CVE-2009-4054, but Microsoft assigned a duplicate identifier of CVE-2009-3672. CVE consumers should use this identifier instead of CVE-2009-4054. Microsoft Internet Explorer 7,Microsoft
CVE-2010-1280,CVE-2010-1281,CVE-2010-1284,CVE-2010-1282,CVE-2010-1283 Adobe Shockwave Trend Micro Deep Security shields networks through Deep Packet Inspection (DPI) rules. Trend Micro customers
CVE-2010-1292,CVE-2010-1291,CVE-2010-1290,CVE-2010-1288,CVE-2010-1289 Adobe Shockwave Trend Micro Deep Security shields networks through Deep Packet Inspection (DPI) rules. Trend Micro customers
Oracle, it is not clear whether this issue is related to other CVE identifiers such as CVE-2007-2126, CVE-2007-2127, or CVE-2007-2128. Oracle E-Business Suite Trend Micro Deep Security shields networks
CVE-2010-2559 Microsoft Internet Explorer 8 does not properly handle objects in memory, which allows remote attackers to execute arbitrary code by accessing an object that (1) was not properly
CVE-2010-4084 dirapi.dll in Adobe Shockwave Player before 11.5.9.615 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different