Search
Keyword: unauthorized file encryption
into confirming an unsafe action, such as remote file execution, by using a timer to change the window focus, aka the "dialog refocus bug" or "ffclick2". Mozilla Firefox 2.0.0.11 Apply associated Trend
CVE-2008-0108 Stack-based buffer overflow in wkcvqd01.dll in Microsoft Works 6 File Converter, as used in Office 2003 SP2 and SP3, Works 8.0, and Works Suite 2005, allows remote attackers to execute
DPI and/or IDF rules. 1003238| 1003238 - MPlayer demux_open_vqf TwinVQ File Handling Buffer Overflow
then lead to the unauthorized use of the stolen data. It checks for the presence of the following processes which are related to Outpost Personal Firewall and ZoneLabs Firewall Client . It terminates if
screen after file encryption routine It avoids to encrypt the following files/folders: \WINNT \RECYCLER\ \SYSTEM~1\ \BOOT\ \RECOVERY\ \$RECYCLE.BIN\ \PERFLOGS\ \EFI\ \CONFIG.MSI\ \PROGRA~1\ \PROGRA~2
screen after file encryption routine It avoids to encrypt the following files/folders: \WINNT \RECYCLER\ \SYSTEM~1\ \BOOT\ \RECOVERY\ \$RECYCLE.BIN\ \PERFLOGS\ \EFI\ \CONFIG.MSI\ \PROGRA~1\ \PROGRA~2
screen after file encryption routine It avoids to encrypt the following files/folders: \WINNT \RECYCLER\ \SYSTEM~1\ \BOOT\ \RECOVERY\ \$RECYCLE.BIN\ \PERFLOGS\ \EFI\ \CONFIG.MSI\ \PROGRA~1\ \PROGRA~2
can wreak upon unsuspecting, unprotected users. These allow cyber criminals to send commands to an infected system, pushing it to perform unauthorized actions. It then follows that eagle-eyed
arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It uses the Windows Task Scheduler to add a scheduled task that executes
the user’s account information, which may then lead to the unauthorized use of the stolen data. Who are at risk? Users with ZBOT-infected systems who log in to any of the targeted sites are at risk of
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It connects to certain websites to send and receive
This worm arrives via removable drives. It arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It drops an AUTORUN.INF
VideoLAN VLC Media Player RealText File Buffer Overflow
filter name when applying appropriate DPI and/or IDF rules. 1001020| 1001020 - Sun Microsystems Java GIF File Parsing Memory Corruption
6.0,Oracle Oracle Reports 6i,Oracle Oracle Reports 9i Apply associated Trend Micro DPI Rules. 1000147| 1000147 - Oracle Application Server Reports desname Arbitrary File Overwriting
.wri, or (3) .rtf Word 97 file that triggers memory corruption, as exploited in the wild in December 2008, as demonstrated by 2008-crash.doc.rar, and a similar issue to CVE-2008-4841. OpenOffice
these vulnerabilities. Please refer to the filter number and filter name when applying appropriate DPI and/or IDF rules. 1000413| 1000413 - Oracle Database Server Extproc File Path Environment overflow
Absolute path traversal vulnerability in NFRAgent.exe in Novell File Reporter allows remote attackers to read arbitrary files via a /FSF/CMD request with a full pathname in a PATH element of an SRS
Fastest Cache WordPress plugin is vulnerable to Local File Inclusion vulnerability.An attacker can exploit this issue to run arbitrary PHP code on the target system. Apply associated Trend Micro DPI
Directory traversal vulnerability in DUSAP.php in Novell ZENworks Mobile Management before 2.7.1 allows remote attackers to include and execute arbitrary local files via the language parameter. Apply