Search
Keyword: unauthorized file encryption
This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Ransomware arrives on a system
This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It encrypts files with specific file extensions. It
with spam, which puts you at risk of becoming victim to more menacing threats Conduct unauthorized transactions. Using your passwords, they can now transfer money and purchase items without your consent.
http://www.adobe.com/support/downloads/product.jsp?product=1&platform=Macintosh. 1003833| 1003833 - Adobe Reader And Acrobat U3D File Invalid Array Index Remote Vulnerability
arbitrary JSON-encoded content, aka a "reflected file download vulnerability." Apply associated Trend Micro DPI Rules. 1007518|
It is possible to get content of any arbitrary file from the web server by using ImageMagick's 'label' pseudo protocol. Apply associated Trend Micro DPI Rules. 1007610|
7.71.80.42 Apply associated Trend Micro DPI Rules. 1006140| 1006140 - Apple QuickTime Movie File Ftab Atom Handling Stack Buffer Overflow Vulnerability
8.1.2,Adobe Acrobat Reader 9,Adobe Reader 8.1.1,Adobe Reader 8.1.2 Apply associated Trend Micro DPI Rules. 1003291| 1003291 - Adobe Acrobat And Reader PDF File Handling Remote Code Execution Vulnerability
Trend Micro DPI Rules. 1003731| 1003731 - VLC Media Player 'demux\tta.c' TTA File Handling Buffer Overflow Vulnerability
Control Arbitrary File Overwrite Vulnerability
arbitrary commands, related to insufficient verification of file uploads. Computer Associates Desktop Management Suite 11.1,Computer Associates Desktop Management Suite 11.2,Computer Associates
7.0.3, Symantec Mail Security, and other products, allow remote attackers to execute arbitrary code via a crafted (1) AG file to kpagrdr.dll, (2) AW file to awsr.dll, (3) DLL or (4) EXE file to exesr.dll,
refer to the filter number and filter name when applying appropriate DPI and/or IDF rules. 1000258| 1000258 - Microsoft Office XLW File Array Index Out Of Bounds DOS Vulnerability
CVE-2007-2237 �Microsoft Windows Graphics Device Interface (GDI , GdiPlus.dll) allows context-dependent attackers to cause a denial of service (crash) via an ICO file with an InfoHeader containing a
vulnerabilities. Please refer to the filter number and filter name when applying appropriate DPI and/or IDF rules. 1003541| 1003541 - Multiple Products libxml2 XML File Processing Long Entity Name Buffer Overflow
This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It drops files as ransom note. It avoids encrypting
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It connects to certain websites to send and receive
This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It drops files as ransom note. It avoids encrypting
This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Ransomware arrives on a system
This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It encrypts files with specific file extensions. It