Keyword: ms
3244 Total Search   |   Showing Results : 61 - 80
protected from attacks using these vulnerabilities. Please refer to the filter number and filter name when applying appropriate DPI and/or IDF rules. 1000748| 1000748 - MS Frontpage htimage.exe Path Leak
CVE-2013-3870 This update resolves a vulnerability in MS Outlook 2007 and 2010. When exploited, the vulnerability allows remote code execution on the affected computer. An attacker successfully
startup folder of MS Excel (by default c:\Program Files\Microsoft Office\Office\XlStart ), so that it can run when Microsoft Excel 97 is restarted. Downloaded from the Internet
protected from attacks using these vulnerabilities. Please refer to the filter number and filter name when applying appropriate DPI and/or IDF rules. 1000567| 1000567 - MS Index Server '%20' ASP Source
Trend Micro DPI Rules. 1004470| 1004470 - MS Excel File Format Parsing Vulnerability
CVE-2013-0082,CVE-2013-1324,CVE-2013-1325 This update addresses three vulnerabilities found in MS Office programs. The vulnerabilities exist in the way the programs interprets specially crafted
potential targets to open a specially crafted MS Office file. Currently logged on users who have lesser administrator privileges are less impacted by effects of an exploit. Microsoft Office 2003 Service Pack
TROJ_AGENT.JAAK. It drops a non-malicious .DOC file. When the said file is opened, it executes an instance of Microsoft Word. MS Word then loads the file as a normal .DOC file. This Trojan bears the file icons of
\SOFTWARE\Microsoft\ Windows\CurrentVersion\Run MS Svasta Pomalo v2 = "%User Profile%\Application Data\odjebiav2.exe" HKEY_CURRENT_USER\Software\Microsoft\ Windows\CurrentVersion\Run MS Svasta Pomalo v2 = "
the affected system. As of this writing, the said sites are inaccessible. Other Details More information on this vulnerability can be found below: MS Advisory (2896666) Vulnerability in Microsoft
Description Name: CVE-2018-1149 NUUO NVRMini2 BufferOverflow - HTTP (Request) . This is Trend Micro detection for HTTP network protocol that manifests exploit activities and can be used for N/A.The host exhibiting this type of network behavior is lik...
Description Name: CVE-2014-9118 ZHONE RCE EXPLOIT - HTTP (Request) . This is Trend Micro detection for HTTP network protocol that manifests exploit activities and can be used for N/A.The host exhibiting this type of network behavior is likely comprom...
Description Name: CVE-2016-3088 ACTIVEMQ - HTTP (Request) . This is Trend Micro detection for HTTP network protocol that manifests exploit activities and can be used for N/A.The host exhibiting this type of network behavior is likely compromised by m...
filter name when applying appropriate DPI and/or IDF rules. 1003924| 1003924 - MS IE Uninitialized Memory Corruption Vulnerability
CVE-2012-0183 A vulnerability exists in the way affected versions of MS Office parse RTF data. An attacker could send a target a specially crafted RTF file to exploit this vulnerability. When
CVE-2012-0018 A vulnerability in the way MS Visio handles specially crafted files could allow an attacker to take control of the vulnerable system. Logged on users that have lesser privileges on the
Description Name: CVE-2016-0800 - RSA DOWNGRADE OPENSSL Exploit . This is Trend Micro detection for HTTP network protocol that manifests exploit activities and can be used for N/A.The host exhibiting this type of network behavior is likely compromise...
Description Name: CVE-2014-2206 - HTTP (Response) . This is Trend Micro detection for HTTP network protocol that manifests exploit activities and can be used for N/A.The host exhibiting this type of network behavior is likely compromised by malware, ...
certificate file for printing. The mail contains an MS Excel file. Upon opening the attachment, it executes a macro that downloads other files. This malicious macro is blocked and detected by Trend Micro
Description Name: CVE-2019-6703 WordPress Total Donations Unauthentication Exploit - HTTP (Request) . This is Trend Micro detection for HTTP network protocol that manifests exploit activities and can be used for N/A.The host exhibiting this type of n...