Keyword: Deep
1636 Total Search   |   Showing Results : 21 - 40
CVE-1999-0233 IIS 1.0 allows users to execute arbitrary commands using .bat or .cmd files. Microsoft IIS 1.0 Trend Micro Deep Security shields networks through Deep Packet Inspection (DPI) rules.
users are protected from this targeted attack via the following solutions: Custom Defense Trend Micro Deep Discovery provides the network-wide visibility and intelligence that is the cornerstone of the
CVE-2006-6121 Acer Notebook LunchApp.APlunch ActiveX control allows remote attackers to execute arbitrary commands by calling the Run method. Acer LunchApp.APlunch Trend Micro Deep Security shields
unknown vectors. oracle secure_backup 10.1.0.3 Trend Micro Deep Security shields networks through Deep Packet Inspection (DPI) rules. Trend Micro customers using OfficeScan with Intrusion Defense Firewall
unknown vectors. oracle secure_backup 10.2.0.2 Trend Micro Deep Security shields networks through Deep Packet Inspection (DPI) rules. Trend Micro customers using OfficeScan with Intrusion Defense Firewall
CVE-2005-1015 Buffer overflow in MailEnable Imapd (MEIMAP.exe) allows remote attackers to execute arbitrary code via a long LOGIN command. MailEnable Imapd Trend Micro Deep Security shields networks
CVE-1999-1376 Buffer overflow in fpcount.exe in IIS 4.0 with FrontPage Server Extensions allows remote attackers to execute arbitrary commands. Microsoft IIS 4.0 Trend Micro Deep Security shields
CVE-1999-0737 The viewcode.asp sample file in IIS and Site Server allows remote attackers to read arbitrary files. Microsoft IIS 4.0 Trend Micro Deep Security shields networks through Deep Packet
CVE-2000-0832 Htgrep CGI program allows remote attackers to read arbitrary files by specifying the full pathname in the hdr parameter. Oscar Nierstrasz Htgrep 3.0 Trend Micro Deep Security shields
7.6.00.22,SAP-DB SAP-DB Trend Micro Deep Security shields networks through Deep Packet Inspection (DPI) rules. Trend Micro customers using OfficeScan with Intrusion Defense Firewall (IDF) plugin are also protected
image_pan_tilt property value. axis axis_camera_control 2.40.0.0 Trend Micro Deep Security shields networks through Deep Packet Inspection (DPI) rules. Trend Micro customers using OfficeScan with Intrusion Defense
3.0,GlobalSCAPE Secure FTP Server 3.0.2 Trend Micro Deep Security shields networks through Deep Packet Inspection (DPI) rules. Trend Micro customers using OfficeScan with Intrusion Defense Firewall (IDF) plugin are
CVE-2008-4478,CVE-2008-4479 An unspecified error exists in the processing of HTTP Accept-Language headers, which can be exploited to cause a crash. Novell eDirectory Trend Micro Deep Security shields
SecurityGateway 1.0.1 Trend Micro Deep Security shields networks through Deep Packet Inspection (DPI) rules. Trend Micro customers using OfficeScan with Intrusion Defense Firewall (IDF) plugin are also protected
CVE-1999-0736 The showcode.asp sample file in IIS and Site Server allows remote attackers to read arbitrary files. Microsoft IIS 4.0 Trend Micro Deep Security shields networks through Deep Packet
CVE-2004-1520 Stack-based buffer overflow in IPSwitch IMail 8.13 allows remote authenticated users to execute arbitrary code via a long IMAP DELETE command. Ipswitch IMail 8.13 Trend Micro Deep
Micro Deep Security shields networks through Deep Packet Inspection (DPI) rules. Trend Micro customers using OfficeScan with Intrusion Defense Firewall (IDF) plugin are also protected from attacks using
CVE-2008-4449 Stack-based buffer overflow in mIRC 6.34 allows remote attackers to execute arbitrary code via a long hostname in a PRIVMSG message. mirc mirc 6.34 Trend Micro Deep Security shields
CVE-2005-1323 cve: Buffer overflow in NetFtpd for NetTerm 5.1.1 and earlier allows remote attackers to execute arbitrary code via a long USER command. InterSoft NetTerm 4.2.2 Trend Micro Deep
Overflow." Microsoft Office 2004,Microsoft Office XP Trend Micro Deep Security shields networks through Deep Packet Inspection (DPI) rules. Trend Micro customers using OfficeScan with Intrusion Defense