Search
Keyword: (ms09-012) vulnerabilities in windows could allow elevation of privilege (959454)
* indicates a new version of an existing ruleDeep Packet Inspection Rules:Web Server Miscellaneous1007603 - Apache Struts Dynamic Method Invocation Remote Code Execution Vulnerability (CVE-2016-3081)1007604 - Identified Apache...
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.Once a ...
Untrusted search path vulnerability in colorcpl.exe 6.0.6000.16386 in the Color Control Panel in Microsoft Windows Server 2008 SP2, R2, and R2 SP1 allows local users to gain p...
This elevation of privilege vulnerability in the Windows Worstation Service is due to a possible "Double Free" condition occurring in the service.
Successful...
* indicates a new version of an existing ruleDeep Packet Inspection Rules:Advanced Message Queuing Protocol (AMQP)1011703 - SolarWinds Network Performance Monitor Insecure Deserialization Vulnerability (CVE-2023-23836)DCERPC S...
This security update resolves one publicly disclosed vulnerability in Microsoft Windows. The vulnerability could allow remote code execution if a user opens a...
Buffer overflow in Microsoft Office 2000 SP3, XP SP3, and other versions and packages, allows user-assisted attackers to execute arbitrary code via a routing slip that is longer than speci...
The MFC component in Microsoft Windows 2000 SP4, XP SP2, and 2003
SP1 and Visual Studio .NET 2000, 2002 SP1, 2003, and 2003 SP1 allows
user-assisted remote attackers to execute arbitr...
This security update resolves three privately reported vulnerabilities in Microsoft Office. The vulnerabilities could allow remote code execution if a user ope...
* indicates a new version of an existing ruleDeep Packet Inspection Rules:Mail Client Miscellaneous1010190 - OpenBSD OpenSMTPD 'mta_io' Out Of Bounds Read Vulnerability (CVE-2020-8794)Suspicious Server Application Activity1010...
This malware has received attention from independent media sources and/or other security firms. It exploits CVE-2009-3129 to drop another malware that then drops a backdoor application. The backdoor then connects to a deceiving URL purportedly relate...
This Trojan comes as an attachment to spammed email. It carries with it a backdoor that runs on Mac OS X systems.To get a one-glance comprehensive view of the behavior of this Trojan, refer to the Threat Diagram shown below.This Trojan arrives as an...
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It may...
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users.It does not have any propagation routine.It does not have any backdoor routine.It takes advantage of software vulnerabilities in certain soft...
The WebDAV extension in Microsoft Internet Information Services (IIS) allows remote attackers to bypass URI-based protection mechanisms, and list folders or read,...
Integer overflow in the Windows Internet Name Service (WINS) component for Microsoft Windows 2000 SP4 allows remote WINS replication partners to execute arbitrary code via crafted data structures in a packet, aka "...
Microsoft addresses the following vulnerabilities in its February batch of patches:
(MS12-008) Vulnerabilities in Windows Kernel-Mode Drivers Could Allow Remote Code Execution (2660465)
Risk Ra...
* indicates a new version of an existing ruleDeep Packet Inspection Rules:CyberPanel1012299 - CyberPanel Remote Code Execution Vulnerability (CVE-2024-53376)DCERPC Services - Client1012183* - Microsoft Windows LNK File UI Misr...
The WebDAV extension in Microsoft Internet Information Services (IIS) allows remote attackers to bypass URI-based protection mechanisms, and list folders or read, create, or modify files.
mic...
Microsoft Internet Explorer 7 does not properly handle errors during attempted access to deleted objects, which allows remote attackers to execute arbitrary code via a crafted HTML document,...