Search
Keyword: unauthorized file encryption
CVE-2010-3232 Microsoft Excel 2003 SP3 and 2007 SP2; Office 2004 and 2008 for Mac; Open XML File Format Converter for Mac; Excel Viewer SP2; and Office Compatibility Pack for Word, Excel, and
?device=disk, a variant of CVE-2008-2810. mozilla firefox 3.0.2,mozilla firefox 3.0.3 Apply associated Trend Micro DPI Rules. 1003041| 1003041 - Mozilla Firefox .url Shortcut File Information Disclosure
Compatibility Pack for Word, Excel, and PowerPoint 2007 File Formats Gold and SP1; Office 2004 and 2008 for Mac; and Open XML File Format Converter for Mac allows remote attackers to execute arbitrary code via a
are also protected from attacks using these vulnerabilities. Please refer to the filter number and filter name when applying appropriate DPI and/or IDF rules. 1002101| 1002101 - Microsoft Excel File
CVE-2008-0112,ms08-014 Unspecified vulnerability in Microsoft Excel 2000 SP3, and Office for Mac 2004 and 2008 allows user-assisted remote attackers to execute arbitrary code via a crafted .SLK file
CVE-2008-0109 Word in Microsoft Office 2000 SP3, XP SP3, Office 2003 SP2, and Office Word Viewer 2003 allows remote attackers to execute arbitrary code via crafted fields within the File Information
.dvd .fcd .flp .img .isz .mdf .mds .nrg .nri .vcd .vhd .snp .bkf .ade .adpb .dic .cch .ctt .dal .ddc .ddcx .dex .dif .dii .itdb .itl .kmz .lcd .lcf .mbx .mdn .odf NOTES: It exempts encryption of files in
It locks the screen after file encryption routine It avoids to encrypt the following files/folders: \WINNT \RECYCLER\ \SYSTEM~1\ \BOOT\ \RECOVERY\ \$RECYCLE.BIN\ \PERFLOGS\ \EFI\ \CONFIG.MSI\ \PROGRA~1
Server Information Disclosure Vulnerability (CVE-2019-1225) Mail Client Miscellaneous 1001206* - IBM Lotus Notes Lotus 1-2-3 Work Sheet File Viewer Buffer Overflows 1001174* - IPSwitch IMail Client MIME
This Trojan may be downloaded by other malware/grayware from remote sites. It downloads a file from a certain URL then renames it before storing it in the affected system. It executes the downloaded
This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It deletes registry entries, causing some
This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It drops files as ransom note. It avoids encrypting
vssadmin.exe It deletes itself as well as its LNK startup after the user chooses to reboot the system It locks the screen after file encryption routine It avoids to encrypt the following files/folders: \WINNT
following: It deletes shadow copies using vssadmin.exe It deletes itself as well as its LNK startup after the user chooses to reboot the system It locks the screen after file encryption routine It avoids to
screen after file encryption routine It avoids to encrypt the following files/folders: \WINNT \RECYCLER\ \SYSTEM~1\ \BOOT\ \RECOVERY\ \$RECYCLE.BIN\ \PERFLOGS\ \EFI\ \CONFIG.MSI\ \PROGRA~1\ \PROGRA~2
This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It deletes registry entries, causing some
Variants also perform web injection—inserting additional HTML forms—to get additional information. Stolen login credentials are used to initiate unauthorized transactions like online fund transfers. The
Variants also perform web injection—inserting additional HTML forms—to get additional information. Stolen login credentials are used to initiate unauthorized transactions like online fund transfers. The
Variants also perform web injection—inserting additional HTML forms—to get additional information. Stolen login credentials are used to initiate unauthorized transactions like online fund transfers. The
.XWP .XY3 .XYP .XYW .YAL .YBK .YML .YSP .YUV .Z3D .ZABW .ZDB .ZDC .ZIF .ZIP .ZIPX It does the following: It deletes shadow copies using vssadmin.exe It locks the screen after file encryption routine It