Keyword: CVE-1999-0376
6075 Total Search   |   Showing Results : 521 - 540
CVE-2010-3956,CVE-2010-3957,CVE-2010-3959 This security update resolves several vulnerabilities in the Windows Open Type Font (OTF) driver, which could allow remote users to execute code remotely on
CVE-2011-0086,CVE-2011-0087,CVE-2011-0088,CVE-2011-0089,CVE-2011-0090 This security update addresses vulnerabilities in Microsoft Windows, which could allow elevation of privilege if an attacker
CVE-2011-0036 Microsoft Internet Explorer 6, 7, and 8 does not properly handle objects in memory, which allows remote attackers to execute arbitrary code by accessing an object that (1) was not
CVE-2011-3402 A vulnerability in a Microsoft Windows component that may allow an attacker to execute code on the vulnerable machine. The vulnerability exists in the Win32k TrueType font parsing
CVE-2011-2462 A critical vulnerability has been identified in the 10.1.1 version of Adobe Reader X and earlier versions for Windows and Macintosh , Adobe Reader 9.4.6 and earlier 9.x versions for
CVE-2012-1895,CVE-2012-1896,CVE-2012-2519,CVE-2012-4776,CVE-2012-4777 This patch addresses vulnerabilities existing in the .NET Framework. It could allow remote code execution once a remote attacker
CVE-2012-1864,CVE-2012-1865,CVE-2012-1866,CVE-2012-1867,CVE-2012-1868 This update resolves five vulnerabilities in Windows, all of which allows elevation of privilege when successfully exploited. The
CVE-2013-3902,CVE-2013-3903,CVE-2013-3907,CVE-2013-3899,CVE-2013-5058 This security update resolves five privately reported vulnerabilities in Microsoft Windows. The more severe of these
Description Name: CVE-2016-0128 - Windows Downgrade Vulnerability - DCE-RPC . This is Trend Micro detection for SMB2 and DCE-RPC network protocol that manifests exploit activities and can be used for Point of Entry or Lateral Movement.The host exhibi...
Description Name: CVE-2016-0128 - Unencrypted Authentication Level - SAMR (Request) . This is Trend Micro detection for SMB2 and DCE-RPC network protocol that manifests exploit activities and can be used for Point of Entry or Lateral Movement.The hos...
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It executes the downloaded files. As a result, malicious
Microsoft addresses the following vulnerabilities in its May batch of patches: (MS14-021) Security Update for Internet Explorer (2965111) Risk Rating: Critical This security update resolves a
CVE-2015-0085,CVE-2015-0086,CVE-2015-0097,CVE-2015-1633,CVE-2015-1636 This security update resolves several vulnerabilities in found in various Microsoft Office components. These vulnerabilities may
CVE-2015-1719,CVE-2015-1720,CVE-2015-1721,CVE-2015-1722,CVE-2015-1723 This security update addresses vulnerabilities in Microsoft Windows that could allow elevation of privilege once an attacker logs
CVE-2015-1628,CVE-2015-1629,CVE-2015-1630,CVE-2015-1631,CVE-2015-1632 This security update resolves vulnerabilities in Microsoft Exchange Server. The most severe of the vulnerabilities could allow
CVE-2010-2183,CVE-2010-2184,CVE-2010-2185,CVE-2010-2186,CVE-2010-2187 Adobe Flash Player is prone to remote code execution vulnerabilities. This could allow an attacker to possibly take complete
CVE-2009-2535,CVE-2009-2536,CVE-2009-2540,CVE-2009-2542 Opera, possibly 9.64 and earlier, allows remote attackers to cause a denial of service (memory consumption) via a large integer value for the
Adobe Flash Player before 13.0.0.302 and 14.x through 18.x before 18.0.0.203 on Windows and before 11.2.202.481 on Linux allow remote attackers to bypass the Same Origin Policy via unspecified
Adobe Flash Player before 13.0.0.302 and 14.x through 18.x before 18.0.0.203 on Windows and before 11.2.202.481 on Linux allow attackers to execute arbitrary code by leveraging an unspecified "type
CVE-2013-3179,CVE-2013-3180,CVE-2013-1315,CVE-2013-1330,CVE-2013-0081 This bulletin addresses 10 vulnerabilities found in several components of the following Microsoft software: SharePoint Portal