Search
Keyword: adobe tiff file vulnerability
CVE-2009-4195 Adobe Illustrator is prone to a remote buffer-overflow vulnerability because it fails to perform adequate boundary checks on user-supplied data. An attacker can exploit this issue by
accesses the following websites to download files: {BLOCKED}.{BLOCKED}.31.214/img/xslu.exe Trend Micro detects the dowloaded file as: TROJ_SMALL.WJX Other Details It exploits a zero-day vulnerability in:
Out-Of-Bounds Write Vulnerability (CVE-2016-5399) Web Client Common 1008740* - Adobe Acrobat And Reader Multiple Security Vulnerabilities (APSB17-36) - 7 1008883* - Adobe Acrobat And Reader Multiple Security
Micro Mobile Security Server 1011746 - Trend Micro Mobile Security Server File Deletion Vulnerability (CVE-2023-32521 and CVE-2023-32522) 1011742 - Trend Micro Mobile Security Server Information
This specially crafted .DOC file takes advantage of a vulnerability in certain versions of Adobe Flash Player to drop an embedded .SWF file detected by Trend Micro as SWF_DROPPER.A. This Trojan
SQL Injection Vulnerability (CVE-2023-5591) 1012014 - WordPress 'LayerSlider' Plugin SQL Injection Vulnerability (CVE-2024-2879) Web Server Adobe ColdFusion 1012011 - Adobe ColdFusion Improper Access
2 1010153 - Adobe Flash Player Type Confusion Vulnerability (CVE-2020-3757) 1010147 - Fuji Electric V-Server Heap-based Buffer Overflow Vulnerability (CVE-2019-18240) Web Client HTTPS 1010132* -
1007695* - Adobe Flash Player DLL Hijacking Vulnerability Over Network Share (CVE-2016-4140) 1006994* - Executable File Download On Network Share Detected 1005857* - Kingsoft Office Path Subversion
(CVE-2017-5812) HP OpenView 1004786* - HP Data Protector Client EXEC_CMD Perl Remote Code Execution Vulnerability Mail Client Windows 1001190* - Microsoft Windows Explorer WMF File Denial Of Service. 1001269* -
This malware arrives as an embedded .SWF file in the body of a malicious .DOC file detected by Trend Micro as TROJ_MDROP.SW. This Trojan takes advantage of the following vulnerability in Adobe Flash
for Word, Excel, and PowerPoint 2007 File Formats SP1 and SP2, Expression Web, Expression Web 2, Groove 2007 Gold and SP1, Works 8.5, SQL Server 2000 Reporting Services SP2, SQL Server 2005 SP2 and SP3,
CVE-2007-5020 Unspecified vulnerability in Adobe Acrobat and Reader 8.1 on Windows allows remote attackers to execute arbitrary code via a crafted PDF file, related to the mailto: option and Internet
Vulnerability Risk Rating: Important This remote code execution vulnerability exists in the improper handling of the specially-crafted multi-master font Adobe Type 1 PostSCript format by the Windows Adobe Type
http://www.adobe.com/support/security/advisories/apsa10-01.html It does the following: This trojan takes advantage of the vulnerability in certain versions of Adobe Acrobat and Reader. It also has an embeded SWF file that takes advantage of the vulnerability in
This Trojan is noteworthy due to the increased potential for damage, propagation, or both, that it possesses. Specifically, it exploits a zero-day vulnerability in Adobe Flash Player in order to drop
* indicates a new version of an existing rule Deep Packet Inspection Rules: Adobe FrameMaker Publishing Server 1011929* - Adobe FrameMaker Publishing Server Authentication Bypass Vulnerability
This malicious Adobe Flash file is related to the Adobe zero-day vulnerability, <i><a href
Scripting Vulnerability (CVE-2024-47525) 1012157 - SPIP 'BigUp' Plugin Remote Code Execution Vulnerability (CVE-2024-8517) Web Server Adobe ColdFusion 1012140* - Adobe ColdFusion Deserialization Of Untrusted
This Trojan takes advantage of the following software vulnerability to drop malicious files: Adobe and Acrobat .PDF Vulnerability This Trojan arrives as an attachment to email messages spammed by
Execution Vulnerability (CVE-2019-1181) 1009961 - Microsoft Windows RDP Remote Code Execution Vulnerability (CVE-2019-1182) Web Server Adobe ColdFusion 1009897 - Adobe ColdFusion CFFILE Upload Action