Keyword: CVE-1999-0376
6075 Total Search   |   Showing Results : 681 - 700
CVE-2010-0127,CVE-2010-0128,CVE-2010-0129,CVE-2010-0130 Adobe Shockwave Trend Micro Deep Security shields networks through Deep Packet Inspection (DPI) rules. Trend Micro customers using OfficeScan
CVE-2008-3308,CVE-2008-3305,CVE-2008-3306,CVE-2008-3307 Some vulnerabilities have been discovered in YouTube Blog, which can be exploited by malicious people to conduct cross-site scripting and SQL
CVE-2007-0515 Unspecified vulnerability in Microsoft Word allows user-assisted remote attackers to execute arbitrary code on Word 2000, and cause a denial of service on Word 2003, via unknown attack
CVE-2010-2883 Stack-based buffer overflow in CoolType.dll in Adobe Reader and Acrobat 9.x before 9.4, and 8.x before 8.2.5 on Windows and Mac OS X, allows remote attackers to execute arbitrary code
CVE-2006-3738 Buffer overflow in the SSL_get_shared_ciphers function in OpenSSL has unspecified impact and remote attack vectors involving a long list of ciphers. Note: The detection logic for a DPI
CVE-2010-1200,CVE-2010-1201,CVE-2010-1202,CVE-2010-1203 No desc yet... Mozilla Firefox Apply associated Trend Micro DPI Rules. 1004257| 1004257 - Mozilla Firefox Denial Of Service Vulnerability
CVE-2010-3324 The toStaticHTML function in Microsoft Internet Explorer 8, and the SafeHTML function in Microsoft Windows SharePoint Services 3.0 SP2, SharePoint Foundation 2010, Office SharePoint
CVE-2013-0641,CVE-2013-0640 Adobe Reader and Acrobat 9.x before 9.5.4, 10.x before 10.1.6, and 11.x before 11.0.02 allow remote attackers to execute arbitrary code or cause a denial of service
CVE-2013-0809 Unspecified vulnerability in the 2D component in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 15 and earlier, 6 Update 41 and earlier, and 5.0 Update 40 and
CVE-2013-4810 HP ProCurve Manager (PCM) 3.20 and 4.0, PCM+ 3.20 and 4.0, Identity Driven Manager (IDM) 4.0, and Application Lifecycle Management allow remote attackers to execute arbitrary code via a
2014-0267,MS14-010 Microsoft Internet Explorer 11 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer
2014-0278,MS14-010 Microsoft Internet Explorer 8 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer
CVE-2012-1885,CVE-2012-1886,CVE-2012-1887,CVE-2012-2543 This patch addresses vulnerabilities existing in Microsoft Office, which could allow remote code execution once users opens a specially crafted
CVE-2009-2521,CVE-2009-3023 This update addresses vulnerabilities found in FTP Service in Microsoft Internet Information Services (IIS) 5.0, Microsoft Internet Information Services (IIS) 5.1,
CVE-2009-1923,CVE-2009-1924 This security update addresses two vulnerabilities in the Windows Internet Name Service (WINS). WINS is not installed on any affected operating system by default. Only
CVE-2011-3402,CVE-2012-0159,CVE-2012-1849,CVE-2012-1858 This update resolves several vulnerabilities found in versions of Microsoft Lync . It corrects vulnerabilities existing in the handling of
Description Name: CVE-2010-3563 - Sun Java Web Start BasicServiceImpl Code Execution Exploit . This is Trend Micro detection for HTTP network protocol that manifests exploit activities and can be used for Point of Entry or Lateral Movement.The host e...
Description Name: CVE-2014-7169 - Shellshock HTTP Request . This is Trend Micro detection for HTTP network protocol that manifests exploit activities and can be used for Point of Entry or Lateral Movement.The host exhibiting this type of network beha...
Description Name: CVE-2017-8543 - Remote Code Execution - SMB (Request) . This is Trend Micro detection for SMB network protocol that manifests exploit activities and can be used for Point of Entry or Lateral Movement.The host exhibiting this type of...
Description Name: CVE-2015-0235 - GHOST SMTP Exploit . This is Trend Micro detection for SMTP network protocol that manifests exploit activities and can be used for Point of Entry or Lateral Movement.The host exhibiting this type of network behavior ...