Keyword: unauthorized file encryption
92244 Total Search   |   Showing Results : 1561 - 1580
Absolute path traversal vulnerability in NFRAgent.exe in Novell File Reporter allows remote attackers to read arbitrary files via a /FSF/CMD request with a full pathname in a PATH element of an SRS
Fastest Cache WordPress plugin is vulnerable to Local File Inclusion vulnerability.An attacker can exploit this issue to run arbitrary PHP code on the target system. Apply associated Trend Micro DPI
Directory traversal vulnerability in DUSAP.php in Novell ZENworks Mobile Management before 2.7.1 allows remote attackers to include and execute arbitrary local files via the language parameter. Apply
Microsoft enables scripts that are embedded in an HTML document or in a Windows Scripting Host file to access COM+ objects. An attacker can create COM+ objects in script code stored in an Extensible
Unrestricted file upload vulnerability in the Gravity forms plugin of Wordpress allows remote attackers to execute arbitrary code by uploading a crafted file with an executable extension. Apply
LANDesk Management Suite is vulnerable to multiple remote file inclusion vulnerabilities. The vulnerabilities are due to insufficient input validation in frm_coremainfrm.aspx, sm_actionfrm.asp and
WordPress Mobile Detector Plugin is prone to an arbitrary file upload vulnerability because it fails to properly sanitise user-supplied input. An attacker may leverage this issue to upload arbitrary
3.0.0,sun openoffice.org 3.0.1,sun openoffice.org 3.1.0,sun openoffice.org 3.1.1 Apply associated Trend Micro DPI Rules. 1004024| 1004024 - OpenOffice.org Microsoft Word File sprmTSetBrc Processing Buffer
when applying appropriate DPI and/or IDF rules. 1001152| 1001152 - Adobe Acrobat Mailto PDF File Command Execution Vulnerability
remote attackers to execute arbitrary code via a large Screen Width value in the Screen Descriptor header of a GIF87a file in an RTSP stream. realnetworks realplayer 11.0,realnetworks realplayer
vulnerabilities. Please refer to the filter number and filter name when applying appropriate DPI and/or IDF rules. 1003313| 1003313 - Microsoft Windows CHM File Processing Buffer Overflow Vulnerability
filter number and filter name when applying appropriate DPI and/or IDF rules. 1000117| 1000117 - Trend Micro ServerProtect Crystal Reports ReportServer File Disclosure
CVE-2009-3135 Stack-based buffer overflow in Microsoft Office Word 2002 SP3 and 2003 SP3, Office 2004 and 2008 for Mac, Open XML File Format Converter for Mac, Office Word Viewer 2003 SP3, and Office
attackers to execute arbitrary code via a crafted SAMI file. Apply associated Trend Micro DPI Rules. 1001249| 1001249 - Microsoft DirectX Parsing SAMI File Code Execution Vulnerability
CVE-2007-0352 Stack-based buffer overflow in Microsoft Help Workshop 4.03.0002 allows user-assisted remote attackers to execute arbitrary code via a crafted .CNT file composed of lines that begin
CVE-2007-0427 Stack-based buffer overflow in Microsoft Help Workshop 4.03.0002 allows user-assisted remote attackers to execute arbitrary code via a help project (.HPJ) file with a long HLP field in
in a (1) Visual Studio Database Project File (.dbp) or (2) Visual Studio Solution (.sln). Microsoft Visual InterDev 6.0,Microsoft Visual Studio 6.0,Microsoft Visual Studio 6.0 SP1,Microsoft Visual
from attacks using these vulnerabilities. Please refer to the filter number and filter name when applying appropriate DPI and/or IDF rules. 1000909| 1000909 - Microsoft Windows Explorer WMF File Denial
applying appropriate DPI and/or IDF rules. 1001252| 1001252 - Microsoft Windows Media Player MP4 File Stack Overflow