Keyword: CVE-1999-0376
6075 Total Search   |   Showing Results : 461 - 480
CVE-2012-4792 A remote code execution vulnerability exists in the following versions of Internet Explorer: Internet Explorer 6 Internet Explorer 7 Internet Explorer 8 The vulnerability may corrupt
CVE-2010-2731,CVE-2010-2730,CVE-2010-1899 This security update addresses vulnerability in Internet Information Services (IIS) that could allow remote code execution once a sends a specially crafted
Microsoft addresses the following vulnerabilities in its September batch of patches: (MS10-061) Vulnerability in Print Spooler Service Could Allow Remote Code Execution (2347290) Risk Rating:
CVE-2010-3971,CVE-2011-0035,CVE-2011-0036,CVE-2011-0038 This security update addresses vulnerabilities in Internet Explorer that could allow remote code execution. The exploit works when a user views
CVE-2011-0602 Adobe Reader and Acrobat 10.x before 10.0.1, 9.x before 9.4.2, and 8.x before 8.2.6 on Windows and Mac OS X allow remote attackers to execute arbitrary code via crafted JP2K record
CVE-2010-2733,CVE-2010-2734,CVE-2010-2736 This security update resolves four vulnerabilities in Forefront Unified Access Gateway (UAG). Of the four vulnerabilities, the most critical vulnerability
CVE-2010-3939,CVE-2010-3940,CVE-2010-3941,CVE-2010-3942,CVE-2010-3943,CVE-2010-3944 This update resolves vulnerabilities in Microsoft Windows, which could allow elevation of privilege. The exploit
CVE-2012-0141,CVE-2012-0142,CVE-2012-0143,CVE-2012-0184,CVE-2012-0185,CVE-2012-1847 Several vulnerabilities in some versions of MS Excel are resolved in this particular bulletin. To exploit this
CVE-2009-2526,CVE-2009-2532,CVE-2009-3103 This update resolves three reported vulnerabilities in Server Message Block Version 2 (SMBv2) -- one publicly disclosed and two in private. Successful
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It arrives on a system as a file dropped by other malware or as a file downloaded
This Trojan may arrive bundled with malware packages as a malware component. It may be hosted on a website and run when a user accesses the said website. Arrival Details This Trojan may arrive
Component of Magnitude and Nuclear Exploit Kit exploiting CVE-2016-1019 {(Related thread: RE: [Noteworthy] APSA16-01 (CVE-2016-1019 )} This Trojan executes when a user accesses certain websites where
CVE-2015-2363,CVE-2015-2365,CVE-2015-2366,CVE-2015-2367,CVE-2015-2381,CVE-2015-2382 This security update resolves vulnerabilities in Microsoft Windows. The vulnerabilities could allow elevation of
CVE-2014-0235,CVE-2014-1751,CVE-2014-1752,CVE-2014-1753,CVE-2014-1755,CVE-2014-1760 This security update resolves six privately reported vulnerabilities in Internet Explorer. These vulnerabilities
Microsoft addresses the following vulnerabilities in its January batch of patches for 2015: (MS15-001) Vulnerability in Windows Application Compatibility Cache Could Allow Elevation of Privilege
CVE-2015-1695,CVE-2015-1696,CVE-2015-1697,CVE-2015-1698,CVE-2015-1699,CVE-2015-1675 This update resolves several vulnerabilities found in several versions of the Microsoft Windows operating system.
Adobe Flash Player before 13.0.0.302 and 14.x through 18.x before 18.0.0.203 on Windows and before 11.2.202.481 on Linux, allow attackers to execute arbitrary code or cause a denial of service
Adobe Flash Player before 13.0.0.302 and 14.x through 18.x before 18.0.0.203 on Windows and before 11.2.202.481 on Linux allow attackers to execute arbitrary code or cause a denial of service (memory
Adobe Flash Player before 13.0.0.302 and 14.x through 18.x before 18.0.0.203 on Windows and before 11.2.202.481 on Linux, allow attackers to execute arbitrary code or cause a denial of service
CVE-2012-1858,CVE-2012-1859,CVE-2012-1860,CVE-2012-1861,CVE-2012-1862,CVE-2012-1863 This update resolves several vulnerabilities affecting InfoPath , SharePoint Server , SharePoint Services ,