Keyword: CVE-1999-0376
6085 Total Search   |   Showing Results : 461 - 480
CVE-2010-3939,CVE-2010-3940,CVE-2010-3941,CVE-2010-3942,CVE-2010-3943,CVE-2010-3944 This update resolves vulnerabilities in Microsoft Windows, which could allow elevation of privilege. The exploit
CVE-2010-3971,CVE-2011-0035,CVE-2011-0036,CVE-2011-0038 This security update addresses vulnerabilities in Internet Explorer that could allow remote code execution. The exploit works when a user views
CVE-2011-0602 Adobe Reader and Acrobat 10.x before 10.0.1, 9.x before 9.4.2, and 8.x before 8.2.6 on Windows and Mac OS X allow remote attackers to execute arbitrary code via crafted JP2K record
Microsoft addresses the following vulnerabilities in its November batch of patches: (MS10-087) Vulnerabilities in Microsoft Office Could Allow Remote Code Execution (2423930) Risk Rating: Critical
CVE-2011-2426,CVE-2011-2427,CVE-2011-2428,CVE-2011-2429,CVE-2011-2430,CVE-2011-2444 Adobe�has identified critical vulnerabilities in Adobe Flash Player 10.3.183.7 and earlier versions for Windows,
Microsoft addresses the following vulnerabilities in its October batch of patches: (MS12-064) Vulnerabilities in Microsoft Word Could Allow Remote Code Execution (2742319) Risk Rating: Critical This
CVE-2012-4792 A remote code execution vulnerability exists in the following versions of Internet Explorer: Internet Explorer 6 Internet Explorer 7 Internet Explorer 8 The vulnerability may corrupt
CVE-2010-2731,CVE-2010-2730,CVE-2010-1899 This security update addresses vulnerability in Internet Information Services (IIS) that could allow remote code execution once a sends a specially crafted
Microsoft addresses the following vulnerabilities in its September batch of patches: (MS10-061) Vulnerability in Print Spooler Service Could Allow Remote Code Execution (2347290) Risk Rating:
CVE-2012-0141,CVE-2012-0142,CVE-2012-0143,CVE-2012-0184,CVE-2012-0185,CVE-2012-1847 Several vulnerabilities in some versions of MS Excel are resolved in this particular bulletin. To exploit this
CVE-2009-2526,CVE-2009-2532,CVE-2009-3103 This update resolves three reported vulnerabilities in Server Message Block Version 2 (SMBv2) -- one publicly disclosed and two in private. Successful
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It arrives on a system as a file dropped by other malware or as a file downloaded
This Trojan may arrive bundled with malware packages as a malware component. It may be hosted on a website and run when a user accesses the said website. Arrival Details This Trojan may arrive
EXPLOYT variants may arrive on a system bundled with malware or grayware packages, or hosted on a website and runs when a user accesses said website. EXPLOYT malware takes advantage of certain
Component of Magnitude and Nuclear Exploit Kit exploiting CVE-2016-1019 {(Related thread: RE: [Noteworthy] APSA16-01 (CVE-2016-1019 )} This Trojan executes when a user accesses certain websites where
This Hacking Tool may be dropped by other malware. Arrival Details This Hacking Tool may be dropped by the following malware: Trojan.SH.MALXMR.UWEKB Download Routine This Hacking Tool downloads the
CVE-2015-2363,CVE-2015-2365,CVE-2015-2366,CVE-2015-2367,CVE-2015-2381,CVE-2015-2382 This security update resolves vulnerabilities in Microsoft Windows. The vulnerabilities could allow elevation of
CVE-2014-0235,CVE-2014-1751,CVE-2014-1752,CVE-2014-1753,CVE-2014-1755,CVE-2014-1760 This security update resolves six privately reported vulnerabilities in Internet Explorer. These vulnerabilities
Microsoft addresses the following vulnerabilities in its January batch of patches for 2015: (MS15-001) Vulnerability in Windows Application Compatibility Cache Could Allow Elevation of Privilege
CVE-2015-1695,CVE-2015-1696,CVE-2015-1697,CVE-2015-1698,CVE-2015-1699,CVE-2015-1675 This update resolves several vulnerabilities found in several versions of the Microsoft Windows operating system.