Keyword: CVE-1999-0376
6075 Total Search   |   Showing Results : 821 - 840
CVE-2015-4641 The Samsung Swiftkey vulnerability could allow execution of malicious code on the affected Samsung devices via man-in-the-middle attacks. These man-in-the-middle attacks occur when a
2013-2551 Use-after-free vulnerability in Microsoft Internet Explorer 6 through 10 allows remote attackers to execute arbitrary code via a crafted web site that triggers access to a deleted object,
CVE-2013-2729 Integer overflow in Adobe Reader and Acrobat 9.x before 9.5.5, 10.x before 10.1.7, and 11.x before 11.0.03 allows attackers to execute arbitrary code via unspecified vectors, a
Microsoft Internet Explorer 11 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption
CVE-2009-3758,CVE-2009-3759,CVE-2009-3760,CVE-2009-3757 Citrix XenCenterWeb is vulnerable to cross-site scripting, caused by improper validation of user-supplied input. A remote attacker could
Microsoft addresses the following vulnerabilities in its January batch of patches: (MS17-003) Security Update for Adobe Flash Player (3214628) Risk Rating: Critical This security update resolves
CVE-2015-0077,CVE-2015-0078,CVE-2015-0094,CVE-2015-0095 This security update resolves several vulnerabilities in certain Windows operating systems. The vulnerabilities, when exploited successfully,
CVE-2011-1995,MS11-081 Microsoft Internet Explorer 6 through 9 does not properly handle objects in memory, which allows remote attackers to execute arbitrary code by accessing an object that was not
Microsoft Internet Explorer 11 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption
CVE-2013-1292,CVE-2013-1283,CVE-2013-1291,CVE-2013-1293 This security update resolves a reported vulnerability in Microsoft Office. The vulnerability, if left unpatched, may allow elevation of
Microsoft addresses the following vulnerabilities in its April batch of patches: (MS13-028) Cumulative Security Update for Internet Explorer (2817183) Risk Rating: Critical This patch addresses two
CVE-2012-1526,CVE-2012-2521,CVE-2012-2522,CVE-2012-2523 This bulletin patches four identified vulnerabilities that exist in version 6-9 of the Internet Explorer browser. Attackers looking to exploit
CVE-2012-1850,CVE-2012-1851,CVE-2012-1852,CVE-2012-1853 This bulletin resolves four vulnerabilities that exist in the Windows networking components and print spooler. Exploitation of these
CVE-2010-1900,CVE-2010-1901,CVE-2010-1902,CVE-2010-1903 This security update addresses four Microsoft Office vulnerabilities that could allow remote code execution once a user opens a specially
CVE-2012-0010,CVE-2012-0011,CVE-2012-0012,CVE-2012-0155 This security update resolves four privately reported vulnerabilities in Internet Explorer . The most severe vulnerabilities could allow remote
CVE-2011-1985,CVE-2011-2002,CVE-2011-2003,CVE-2011-2011 This update resolves four privately reported vulnerabilities in Microsoft Windows. The most severe of these vulnerabilities could allow remote
CVE-2011-1508,CVE-2011-3410,CVE-2011-3411,CVE-2011-3412 This security update resolves one publicly disclosed vulnerability and three privately reported vulnerabilities in Microsoft Office . The most
Description Name: CVE-2019-10758 - MONGODB RCE EXPLOIT - HTTP (REQUEST) . This is Trend Micro detection for HTTP network protocol that manifests exploit activities and can be used for Point of Entry or Lateral Movement.The host exhibiting this type ...
Description Name: CVE-2019-20224 - Pandora FMS 7.0NG Authenticated Remote Code Execution Exploit - HTTP (Request) . This is Trend Micro detection for HTTP network protocol that manifests exploit activities and can be used for Point of Entry or Latera...
Description Name: CVE-2020-0601 Spoofed Certificate Attempt - TLS (Response) . This is Trend Micro detection for HTTP network protocol that manifests exploit activities and can be used for Point of Entry or Lateral Movement.The host exhibiting this t...