Keyword: CVE-1999-0376
6098 Total Search   |   Showing Results : 2201 - 2220
CVE-2014-6277 This remote code execution vulnerability exists in the parsing of function definitions in GNU Bash through 4.3 bash43-026 does not properly parse function. When exploited successfully,
Microsoft Internet Explorer 9 and 10 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory
Microsoft Internet Explorer 8 through 10 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory
CVE-2015-5477 named in ISC BIND 9.x before 9.9.7-P2 and 9.10.x before 9.10.2-P3 allows remote attackers to cause a denial of service (REQUIRE assertion failure and daemon exit) via TKEY queries.
The Yaml::parse function in Symfony 2.0.x before 2.0.22 remote attackers to execute arbitrary PHP code via a PHP file, a different vulnerability than CVE-2013-1397. Apply associated Trend Micro DPI
Adobe Flash Player before 13.0.0.302 and 14.x through 18.x before 18.0.0.203 on Windows and before 11.2.202.481 on Linux allow attackers to cause a denial of service (NULL pointer dereference) or
Adobe Flash Player before 13.0.0.302 and 14.x through 18.x before 18.0.0.203 on Windows and before 11.2.202.481 on Linux allow attackers to cause a denial of service (NULL pointer dereference) or
2013-0604,MS13-111 Heap-based buffer overflow in Adobe Reader and Acrobat 9.x before 9.5.3, 10.x before 10.1.5, and 11.x before 11.0.1 allows attackers to execute arbitrary code via unspecified
2014-0569,apsb14-22 Integer overflow in Adobe Flash Player before 13.0.0.250 and 14.x and 15.x before 15.0.0.189 on Windows and before 11.2.202.411 on Linux allows attackers to execute arbitrary code
2015-0305,APSB 15-01 Adobe Flash Player before 13.0.0.260 and 14.x through 16.x before 16.0.0.257 on Windows and before 11.2.202.429 on Linux allow attackers to execute arbitrary code by leveraging
2015-0093,MS15-021 Adobe Font Driver is prone to a remote code-execution vulnerability. Attackers can exploit this issue by enticing an unsuspecting user to view a specially crafted webpage.
2015-0099,MS15-018 A remote code execution vulnerability exists when Internet Explorer improperly accesses objects in memory. This vulnerability could corrupt memory in such a way that an attacker
2015-1652,MS15-032 A remote code execution vulnerability exists when Internet Explorer improperly accesses objects in memory. This vulnerability could corrupt memory in such a way that an attacker
2015-1657,MS15-032 A vulnerability exists when Internet Explorer improperly accesses objects in memory that have been deleted. This vulnerability could corrupt memory in such a way that an attacker
2015-1659,MS15-032 Remote code execution vulnerability exists when Internet Explorer improperly accesses objects in memory. Successful exploitation could corrupt memory in such a way that an attacker
2015-1660,MS15-032 Remote code execution vulnerability exists when Internet Explorer improperly accesses objects in memory. Successful exploitation could corrupt memory in such a way that an attacker
2015-1661,MS15-032 Remote code execution vulnerability exists when Internet Explorer improperly accesses objects in memory. Successful exploitation could corrupt memory in such a way that an attacker
2015-1665,MS15-032 A remote code execution vulnerability exists when Internet Explorer improperly accesses objects in memory. This vulnerability could corrupt memory in such a way that an attacker
2015-1666,MS15-032 A remote code execution vulnerability exists when Internet Explorer improperly accesses objects in memory. This vulnerability could corrupt memory in such a way that an attacker
2015-1667,MS15-032 A remote code execution vulnerability exists when Internet Explorer improperly accesses objects in memory. This vulnerability could corrupt memory in such a way that an attacker