Search
Keyword: unauthorized file encryption
Microsoft enables scripts that are embedded in an HTML document or in a Windows Scripting Host file to access COM+ objects. An attacker can create COM+ objects in script code stored in an Extensible
Unrestricted file upload vulnerability in the Gravity forms plugin of Wordpress allows remote attackers to execute arbitrary code by uploading a crafted file with an executable extension. Apply
LANDesk Management Suite is vulnerable to multiple remote file inclusion vulnerabilities. The vulnerabilities are due to insufficient input validation in frm_coremainfrm.aspx, sm_actionfrm.asp and
WordPress Mobile Detector Plugin is prone to an arbitrary file upload vulnerability because it fails to properly sanitise user-supplied input. An attacker may leverage this issue to upload arbitrary
3.0.0,sun openoffice.org 3.0.1,sun openoffice.org 3.1.0,sun openoffice.org 3.1.1 Apply associated Trend Micro DPI Rules. 1004024| 1004024 - OpenOffice.org Microsoft Word File sprmTSetBrc Processing Buffer
when applying appropriate DPI and/or IDF rules. 1001152| 1001152 - Adobe Acrobat Mailto PDF File Command Execution Vulnerability
remote attackers to execute arbitrary code via a large Screen Width value in the Screen Descriptor header of a GIF87a file in an RTSP stream. realnetworks realplayer 11.0,realnetworks realplayer
Site File Upload Attack
vulnerabilities. Please refer to the filter number and filter name when applying appropriate DPI and/or IDF rules. 1003313| 1003313 - Microsoft Windows CHM File Processing Buffer Overflow Vulnerability
filter number and filter name when applying appropriate DPI and/or IDF rules. 1000117| 1000117 - Trend Micro ServerProtect Crystal Reports ReportServer File Disclosure
CVE-2009-3135 Stack-based buffer overflow in Microsoft Office Word 2002 SP3 and 2003 SP3, Office 2004 and 2008 for Mac, Open XML File Format Converter for Mac, Office Word Viewer 2003 SP3, and Office
attackers to execute arbitrary code via a crafted SAMI file. Apply associated Trend Micro DPI Rules. 1001249| 1001249 - Microsoft DirectX Parsing SAMI File Code Execution Vulnerability
CVE-2007-0352 Stack-based buffer overflow in Microsoft Help Workshop 4.03.0002 allows user-assisted remote attackers to execute arbitrary code via a crafted .CNT file composed of lines that begin
CVE-2007-0427 Stack-based buffer overflow in Microsoft Help Workshop 4.03.0002 allows user-assisted remote attackers to execute arbitrary code via a help project (.HPJ) file with a long HLP field in
in a (1) Visual Studio Database Project File (.dbp) or (2) Visual Studio Solution (.sln). Microsoft Visual InterDev 6.0,Microsoft Visual Studio 6.0,Microsoft Visual Studio 6.0 SP1,Microsoft Visual
from attacks using these vulnerabilities. Please refer to the filter number and filter name when applying appropriate DPI and/or IDF rules. 1000909| 1000909 - Microsoft Windows Explorer WMF File Denial
applying appropriate DPI and/or IDF rules. 1001252| 1001252 - Microsoft Windows Media Player MP4 File Stack Overflow
applying appropriate DPI and/or IDF rules. 1003864| 1003864 - Adobe Illustrator Encapsulated Postscript File Remote Buffer Overflow
CVE-2007-1658 Windows Mail in Microsoft Windows Vista might allow user-assisted remote attackers to execute certain programs via a link to a (1) local file or (2) UNC share pathname in which there is
vulnerability than CVE-2010-0254 and CVE-2010-0256. microsoft visio 2002,microsoft visio 2003,microsoft visio 2007 Apply associated Trend Micro DPI Rules. 1004145| 1004145 - Microsoft Visio 'DXF' File Insertion