Search
Keyword: (ms05-033) vulnerability in telnet client could allow information disclosure (896428)
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
A vulnerability in the way Windows Partition Manager handles device relation requests could allow an attacker to run code on an affected system. When s...
* indicates a new version of an existing ruleDeep Packet Inspection Rules:Web Application Common1011468* - Horde Groupware Webmail Insecure Deserialization Vulnerability (CVE-2022-30287)1011471* - VanDyke VShell Server Command I...
* indicates a new version of an existing ruleDeep Packet Inspection Rules:GoCD Server1011758* - GoCD Server Directory Traversal Vulnerability (CVE-2021-43287)Parse Server1011608* - Parse Server Remote Code Execution Vulnerabil...
* indicates a new version of an existing ruleDeep Packet Inspection Rules:Pulsar Binary Protocol1010998* - Apache Pulsar JSON Web Token Authentication Bypass Vulnerability Over Pulsar (CVE-2021-22160)Web Application Common10110...
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
This security update addresses a vulnerability in Windows Media Player that could allow remote code execution if Windows Media Player opened specially crafte...
* indicates a new version of an existing ruleDeep Packet Inspection Rules:DCERPC Services1003080* - Server Service Vulnerability (srvsvc)DNS Client1009135* - Microsoft Windows DNSAPI Remote Code Execution Vulnerability (CVE-201...
* indicates a new version of an existing ruleDeep Packet Inspection Rules:IBM WebSphere Application Server1009803 - IBM Websphere Application Server Remote Code Execution Vulnerability (CVE-2019-4279)Jenkins Remoting1009436 - J...
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users.It executes the dropped file(s). As a result, malicious routines of the dropped files are exhibited on the affected system.
* indicates a new version of an existing ruleDeep Packet Inspection Rules:DCERPC Services - Client1010394 - Microsoft Windows LNK Remote Code Execution Vulnerability Over SMB (CVE-2020-1421)DNS Client1010406 - Microsoft Windows...
Microsoft addresses the following vulnerabilities in its May batch of patches:
(MS12-029) Vulnerability in Microsoft Word Could Allow Remote Code Execution (2680352)
Risk Rating: Critical
A vulner...
* indicates a new version of an existing ruleDeep Packet Inspection Rules:HP AutoPass License Server1006811* - HP AutoPass License Server Remote Code Execution Vulnerability (CVE-2013-6221)HP OpenView1003899* - HP OpenView D...
* indicates a new version of an existing ruleDeep Packet Inspection Rules:Apache OpenMeetings1008267* - Apache OpenMeetings ZIP File Path Traversal Vulnerability (CVE-2016-0784)DCERPC Services1008432* - Microsoft Windows SMB In...
This Trojan may be dropped by other malware.It bypasses the Windows firewall. This allows the malware to perform its intended routine without being detected by an installed firewall.
�
Microsoft addresses the following vulnerabilities in its June batch of patches:
(MS10-032) Vulnerabilities in Windows Kernel-Mode Drivers Could Allow Elevation of Privilege (979559) Risk Ra...
This worm arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.It gathers target email addresses from the Windows Address Book (WAB). It takes advantage of software vulnera...
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users.It takes advantage of software vulnerabilities in certain software to drop malicious files.
Microsoft addresses the following vulnerabilities in its April batch of patches:
(MS13-028) Cumulative Security Update for Internet Explorer (2817183)
Risk Rating: Critical
This patch addresse...
Microsoft addresses the following vulnerabilities in its April batch of patches:
(MS11-018) Cumulative Security Update for Internet Explorer (2497640)
Risk Rating: CriticalThis update resolves f...