Search Results

Showing results for ms.dcerpc.netapi32.buffer.ove

IPS
This indicates an attack attempt to exploit a Memory Corruption Vulnerability in Microsoft Edge Scripting Engine.The vulnerability is due to an error when the vulnerable software handles a maliciously...
IPS
This indicates an attack attempt to exploit a Memory Corruption vulnerability in Microsoft Jet DB Engine.The vulnerability is due to improper handling of a certain component when the vulnerable software...
IPS
This indicates an attack attempt to exploit a Memory Corruption vulnerability in Microsoft Remote Desktop Client.The vulnerability is caused by an error when RDP client handles a malicious PDU from server....
IPS
This indicates an attack attempt to exploit a Remote Code Execution vulnerability in Microsoft Internet Explorer.The vulnerability is due to an error when the vulnerable software attempts to handle a maliciously...
Endpoint Vulnerability
An elevation of privilege vulnerability exists in Windows when the Windows kernel-mode driver fails to properly handle objects in memory. An attacker who successfully exploited this vulnerability could...
Endpoint Vulnerability
An elevation of privilege vulnerability exists in Windows when the Windows kernel-mode driver fails to properly handle objects in memory. An attacker who successfully exploited this vulnerability could...
Endpoint Vulnerability
An information disclosure vulnerability exists when the win32k component improperly provides kernel information. An attacker who successfully exploited the vulnerability could obtain information to further...
Endpoint Vulnerability
An information disclosure vulnerability exists when the Windows kernel improperly initializes objects in memory.
Endpoint Vulnerability
An elevation of privilege vulnerability exists in Windows when the Win32k component fails to properly handle objects in memory. An attacker who successfully exploited this vulnerability could run arbitrary...
Endpoint Vulnerability
An elevation of privilege vulnerability exists in Windows when the Win32k component fails to properly handle objects in memory. An attacker who successfully exploited this vulnerability could run arbitrary...

Please try the search tool if you are trying to find a specific item.