Keyword: CVE-1999-0376
6085 Total Search   |   Showing Results : 501 - 520
* indicates a new version of an existing rule Deep Packet Inspection Rules: HP Intelligent Management Center (IMC) 1011940* - Apache OFBiz Authentication Bypass Vulnerability (CVE-2023-51467)
* indicates a new version of an existing rule Deep Packet Inspection Rules: JetBrains TeamCity 1011877 - JetBrains TeamCity Cross-Site Scripting Vulnerability (CVE-2023-41249) NFS Server 1011740* -
* indicates a new version of an existing rule Deep Packet Inspection Rules: JetBrains TeamCity 1011815 - JetBrains TeamCity Cross-Site Scripting Vulnerability (CVE-2023-34220) PaperCut 1011855 -
* indicates a new version of an existing rule Deep Packet Inspection Rules: Ivanti Avalanche 1011871 - Ivanti Avalanche XML External Entity Processing Vulnerability (CVE-2023-32567) Port Mapper
* indicates a new version of an existing rule Deep Packet Inspection Rules: Ivanti Avalanche 1011863* - Ivanti Avalanche Authentication Bypass Vulnerability (CVE-2021-22962 & CVE-2023-32566)
* indicates a new version of an existing rule Deep Packet Inspection Rules: Ivanti Avalanche 1011759* - Ivanti Avalanche Multiple Arbitrary File Upload Vulnerabilities 1011955* - Ivanti Avalanche XML
Both malware are related to the modified Enfal variants, which were reported to have infected 874 systems in 33 countries. To get a one-glance comprehensive view of the behavior of this Trojan, refer
This malware exploits a vulnerability found in Microsoft Office known as CVE-2017-0199. There are reports that exploits using the said vulnerability are in the wild. A security patch for the
(RE: [Noteworthy] Flash 0day(CVE-2016-4117)) According to the report, Separately, Adobe officials warned that a newly discovered Flash vulnerability also gives attackers the ability to remotely
This malware is related to the Whitehole Exploit Kit attacks during February 2012. It takes advantage of certain vulnerabilities in Java to download and execute backdoor malware onto the affected
This is the Trend Micro detection for a hacking tool that can be used to launch a denial of service attack by exploiting the Remote Desktop Protocol Vulnerability (CVE-2012-0002) . This malware is a
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It executes the downloaded files. As a result, malicious
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It may be downloaded by other malware/grayware from
TROJ_ETERNALROM.A is a hacking tool released by a hacking group called Shadow Brokers. It contains several exploits that target system and server vulnerabilities. This hacking tool also targets
CVE-2010-2559 Microsoft Internet Explorer 8 does not properly handle objects in memory, which allows remote attackers to execute arbitrary code by accessing an object that (1) was not properly
CVE-2010-4084 dirapi.dll in Adobe Shockwave Player before 11.5.9.615 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different
CVE-2010-3956,CVE-2010-3957,CVE-2010-3959 This security update resolves several vulnerabilities in the Windows Open Type Font (OTF) driver, which could allow remote users to execute code remotely on
CVE-2011-0086,CVE-2011-0087,CVE-2011-0088,CVE-2011-0089,CVE-2011-0090 This security update addresses vulnerabilities in Microsoft Windows, which could allow elevation of privilege if an attacker
originally assigned CVE-2009-4054, but Microsoft assigned a duplicate identifier of CVE-2009-3672. CVE consumers should use this identifier instead of CVE-2009-4054. Microsoft Internet Explorer 7,Microsoft
CVE-2010-1280,CVE-2010-1281,CVE-2010-1284,CVE-2010-1282,CVE-2010-1283 Adobe Shockwave Trend Micro Deep Security shields networks through Deep Packet Inspection (DPI) rules. Trend Micro customers