Search Results

Showing results for ms.dcerpc.netapi32.buffer.ove

Web Filter

Category: Newly Observed Domain

Description:


IPS
This indicates an attack attempt to exploit an elevation of privilege vulnerability in Microsoft Windows kernel-mode driver.The vulnerability is caused by a call graph flaw. An attacker who successfully...
IPS
This indicates an attack attempt to exploit an Information Disclosure vulnerability in Microsoft Windows.This vulnerability is due to an error when the affected application handles maliciously crafted...
IPS
This indicates an attack attempt against an Information Disclosure vulnerability in Microsoft Word and Wordpad .The vulnerability is due to improper validation of a system call when handling a crafted...
IPS
This indicates a possible attack against a Privilege Elevation vulnerability in Microsoft Windows.The vulnerability is caused by an error when manipulating crafted .EXE. An attacker can exploit this leverage...
IPS
This indicates an attack attempt against a buffer-overflow vulnerability in Apple QuickTime. The vulnerability is caused by an error when the vulnerable software parses a crafted tag. It allows a remote...
IPS
This indicates an attempt to exploit a stack-based buffer overflow vulnerability in VLC media player.This issue is caused by an error when the vulnerable software is handling overlong "smb://" uri in...
IPS
This indicates an information leak vulnerability in Cart32 program.Cart32 is a Shopping Cart system software designed for Windows environment. An attacker can send a specially-crafted request to the program...
IPS
Microsoft Windows GDI library (gdi32.dll) has a denial of service vulnerability. A remote attacker could cause an application crash via a crafted WMF file. It will cause Explorer to crash even if the victim...
IPS
This indicates an attack attempt to exploit a Privilege Escalation vulnerability in Microsoft Windows.The vulnerability is due to an error when vulnerable software handles a crafted application. A remote...
IPS
This indicates an attack attempt to exploit a Memory Corruption Vulnerability in Microsoft Office.The vulnerability is due to an error when the vulnerable software handles a maliciously crafted RTF file....