Keyword: CVE-1999-0376
6077 Total Search   |   Showing Results : 1481 - 1500
This malware is downloaded by the zero-day exploit leveraging the vulnerability covered under CVE-2014-4114, also known as "Sandworm." To get a one-glance comprehensive view
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It may be hosted on a website and run when a user
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It takes advantage of certain vulnerabilities. Arrival
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It takes advantage of software vulnerabilities in certain software to drop malicious
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It executes the dropped file(s). As a result, malicious routines of the dropped files are
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It does not have any propagation routine. It does not have any backdoor routine. It
CVE-2010-2549,CVE-2010-2743,CVE-2010-2744 This security update addresses vulnerabilities in Windows kernel-mode drivers that could increase in the privilege when an attacker is log on and is running
CVE-2010-2740,CVE-2010-2741 This security update addresses vulnerabilities in the Windows OpenType Font (OTF) format driver that could allow elevation of privilege once a user views content rendered
CVE-2006-2371,CVE-2006-2370,MS06-025 Various vulnerabilities exist in the RRAS RPC API of which the worst would allow an attacker to take control of the system. cve: Buffer overflow in the Routing
CVE-2010-3970 There is a vulnerability found in Windows Graphics Rendering Engine that may lead to execution of arbitrary code once successfully exploited by a malicious remote user. It may also
Microsoft addresses the following vulnerabilities in its May batch of patches: (MS11-035) Vulnerability in WINS Could Allow Remote Code Execution (2524426) Risk Rating: Critical This security update
CVE-2011-3544 Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE JDK and JRE allows remote untrusted Java Web Start applications and untrusted Java applets to
Microsoft addresses the following vulnerabilities in its March batch of patches: (MS11-015) Vulnerabilities in Windows Media Could Allow Remote Code Execution (2510030) Risk Rating: Critical This
CVE-2010-4476 The Double.parseDouble method in Java Runtime Environment (JRE) in Oracle Java SE and Java for Business 6 Update 23 and earlier, 5.0 Update 27 and earlier, and 1.4.2_29 and earlier, as
CVE-2013-1278,CVE-2013-1279,CVE-2013-1280 This patch addresses vulnerabilities in Microsoft Windows, which can allow elevation of privilege once an attacker logs and runs a specially crafted
CVE-2006-2758,CVE-2009-1523 Directory traversal vulnerability in the HTTP server in Mort Bay Jetty 5.1.14, 6.x before 6.1.17, and 7.x through 7.0.0.M2 allows remote attackers to access arbitrary
CVE-2013-0633 Buffer overflow in Adobe Flash Player before 10.3.183.51 and 11.x before 11.5.502.149 on Windows and before 10.3.183.51 and 11.x before 11.2.202.262 on Linux allows remote attackers to
CVE-2013-0638 Adobe Flash Player before 10.3.183.63 and 11.x before 11.6.602.168 on Windows, before 10.3.183.61 and 11.x before 11.6.602.167 on Mac OS X, before 10.3.183.61 and 11.x before
CVE-2013-1285,CVE-2013-1286,CVE-2013-1287 This patch addresses the vulnerabilities found in Microsoft Windows. These vulnerabilities when exploited can allow elevation of privilege once attacker
CVE-2012-1182 The RPC code generator in Samba 3.x before 3.4.16, 3.5.x before 3.5.14, and 3.6.x before 3.6.4 does not implement validation of an array length in a manner consistent with validation of