Keyword: CVE-1999-0376
6085 Total Search   |   Showing Results : 681 - 700
CVE-2012-0002,CVE-2012-0152 This security update addresses two privately reported vulnerabilities in the Remote Desktop Protocol, which may result to code execution if an attacker sends specially
CVE-2013-0080,CVE-2013-0083,CVE-2013-0084,CVE-2013-0085 This patch addresses vulnerabilities found in Microsoft SharePoint and Microsoft SharePoint Foundation. When exploited via a malicious URL
CVE-2013-0001,CVE-2013-0002,CVE-2013-0003,CVE-2013-0004 This patch addresses vulnerabilities in the .NET Framework, which when exploited successfully can gain remote attackers the same user rights as
CVE-2013-0641,CVE-2013-0640 Adobe Reader and Acrobat 9.x before 9.5.4, 10.x before 10.1.6, and 11.x before 11.0.02 allow remote attackers to execute arbitrary code or cause a denial of service
CVE-2013-0809 Unspecified vulnerability in the 2D component in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 15 and earlier, 6 Update 41 and earlier, and 5.0 Update 40 and
CVE-2013-4810 HP ProCurve Manager (PCM) 3.20 and 4.0, PCM+ 3.20 and 4.0, Identity Driven Manager (IDM) 4.0, and Application Lifecycle Management allow remote attackers to execute arbitrary code via a
2014-0267,MS14-010 Microsoft Internet Explorer 11 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer
2014-0278,MS14-010 Microsoft Internet Explorer 8 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer
CVE-2012-1885,CVE-2012-1886,CVE-2012-1887,CVE-2012-2543 This patch addresses vulnerabilities existing in Microsoft Office, which could allow remote code execution once users opens a specially crafted
CVE-2009-2521,CVE-2009-3023 This update addresses vulnerabilities found in FTP Service in Microsoft Internet Information Services (IIS) 5.0, Microsoft Internet Information Services (IIS) 5.1,
CVE-2009-1923,CVE-2009-1924 This security update addresses two vulnerabilities in the Windows Internet Name Service (WINS). WINS is not installed on any affected operating system by default. Only
CVE-2011-3402,CVE-2012-0159,CVE-2012-1849,CVE-2012-1858 This update resolves several vulnerabilities found in versions of Microsoft Lync . It corrects vulnerabilities existing in the handling of
Description Name: CVE-2015-0204 - RSA DOWNGRADE OPENSSL Exploit . This is Trend Micro detection for HTTPS network protocol that manifests exploit activities and can be used for Point of Entry or Lateral Movement.The host exhibiting this type of netwo...
Description Name: CVE-2016-6366 - EXTRABACON - SNMP . This is Trend Micro detection for UDP network protocol that manifests exploit activities and can be used for Point of Entry or Lateral Movement.The host exhibiting this type of network behavior is...
Description Name: CVE-2017-7494 - Remote Code Execution - SMB (Request) - Variant 2 . This is Trend Micro detection for HTTP network protocol that manifests exploit activities and can be used for Point of Entry or Lateral Movement.The host exhibiting...
Description Name: CVE-2018-0296 CISCO ASA Path Traversal Exploit - HTTP (Request) . This is Trend Micro detection for HTTP network protocol that manifests exploit activities and can be used for Point of Entry or Lateral Movement.The host exhibiting t...
This is the malicious app revealed to be sold by the Hacking Team to customers in order to compromise targets. Its existence was revealed during the July 2015 data breach of its database. Devices
This detection is a proof of concept (PoC) malware related to the Android vulnerability CVE-2015-3839. To get a one-glance comprehensive view of the behavior of this Others, refer to the Threat
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It arrives on a system as a file dropped by other malware or as a file downloaded
This rootkit takes advantage of certain vulnerabilities. Download Routine After successfully exploiting the said vulnerability, this malware connects to the following URLs to possibly download other