Search
Keyword: gold_bug
CVE-2008-3704,MS08-070 Heap-based buffer overflow in the MaskedEdit ActiveX control in Msmask32.ocx 6.0.81.69, and possibly other versions before 6.0.84.18, in Microsoft Visual Studio 6.0, Visual
into confirming an unsafe action, such as remote file execution, by using a timer to change the window focus, aka the "dialog refocus bug" or "ffclick2". Mozilla Firefox 2.0.0.11 Apply associated Trend
long arguments to the (1) RpcAddPrinterDriver, (2) RpcGetPrinterDriverDirectory, and other unspecified RPC requests, aka Novell bug 300870, a different vulnerability than CVE-2006-5854. Novell Novell
Microsoft addresses the following vulnerabilities in its July batch of patches: (MS11-053) Vulnerability in Bluetooth Stack Could Allow Remote Code Execution (2566220) Risk Rating: Critical This
Microsoft addresses the following vulnerabilities in its April batch of patches: (MS11-018) Cumulative Security Update for Internet Explorer (2497640) Risk Rating: Critical This update resolves four
Microsoft addresses the following vulnerabilities in its June batch of patches: (MS11-037) Vulnerability in MHTML Could Allow Information Disclosure (2544893) Risk Rating: Important This security
affected system with WINS service. However, an attacker needs a valid logon credentials before exploiting this software bug locally. Read more here. (MS11-071) Vulnerability in Windows Components Could Allow
these may lead to elevation of privilege if a potential attacker sends a maliciously crafted web request to the target. Successfully exploiting this system bug could also lead to execution of arbitrary
arbitrary code via a crafted RPC request, aka Novell bug 353138, a different vulnerability than CVE-2006-5854. NOTE: this issue exists because of an incomplete fix for CVE-2007-6701. Novell Novell client 4.91
CVE-2008-4066 Mozilla Firefox 2.0.0.14, and other versions before 2.0.0.17, allows remote attackers to bypass cross-site scripting (XSS) protection mechanisms and conduct XSS attacks via HTML-escaped
and SDK and JRE 1.4.x before 1.4.2_24 allows remote attackers to execute arbitrary code via a long file: URL in an argument, aka Bug Id 6854303. sun jdk 1.5.0,sun jdk 1.6.0,sun jre 1.3.1_01,sun jre
device and the system will reboot. New Android Bug Causes “Bricked” Devices
ELF_BASHLITE.A Bash Bug Vulnerability (Shellshock) If your Trend Micro product detects malicious network packets, your system may have malware that sends the network packets. Scan your system with your Trend Micro
contacts. Attackers need to trick users into installing a malicious app in order to download the said bug on their devices.
CVE-2015-5122 This is the a zero-day vulnerability disclosed from the Hacking Team leak. It affects all versions of Flash Player for Windows, Mac, and Linux. The bug is a Use-After-Free vulnerability
CVE-2015-3840 Trend Micro researchers discovered this Android vulnerability that can modify MMS/SMS when exploited successfully. This bug came from “MessageStatusReceiver” service found in
It affects Android versions to 5.1.1 Lollipop . Attackers need to trick users into installing a malicious app or go to a malicious website in order to download the said bug on their devices.
execute arbitrary code on vulnerable systems. The bug is a texbook example of classic simple stack-based buffer overflow vulnerabilities of the 1990s that can be exploited by overwriting the return address
A heap overflow vulnerability exists in Adobe Flash Player. The vulnerability is due to an unspecified bug. A remote attacker can exploit this vulnerability by enticing a target user to open a
CVE-2014-0160 The (1) TLS and (2) DTLS implementations in OpenSSL 1.0.1 before 1.0.1g do not properly handle Heartbeat Extension packets, which allow remote attackers to obtain sensitive information