Keyword: trendmicro deep security 20.0
105228 Total Search   |   Showing Results : 81 - 100
�Oracle Database Buffer overflow vulnerability in public procedure DBMS_XMLSCHEMA.GENERATESCHEMA http://www.frsirt.com/exploits/20060126.xmlschema.php Trend Micro Deep Security shields networks
CVE-1999-0233 IIS 1.0 allows users to execute arbitrary commands using .bat or .cmd files. Microsoft IIS 1.0 Trend Micro Deep Security shields networks through Deep Packet Inspection (DPI) rules.
Application Server 6.0.x,IBM WebSphere Application Server 6.1.x Trend Micro Deep Security shields networks through Deep Packet Inspection (DPI) rules. Trend Micro customers using OfficeScan with Intrusion
setting. mozilla firefox 3.6,mozilla firefox 3.6.1 Trend Micro Deep Security shields networks through Deep Packet Inspection (DPI) rules. Trend Micro customers using OfficeScan with Intrusion Defense
Edition Service Pack 2,Windows Vista Service Pack 1 and Windows Vista Service Pack 2,Windows Vista x64 Edition Service Pack 1 and Windows Vista x64 Edition Service Pack 2 Trend Micro Deep Security shields
CVE-2006-6121 Acer Notebook LunchApp.APlunch ActiveX control allows remote attackers to execute arbitrary commands by calling the Run method. Acer LunchApp.APlunch Trend Micro Deep Security shields
unknown vectors. oracle secure_backup 10.1.0.3 Trend Micro Deep Security shields networks through Deep Packet Inspection (DPI) rules. Trend Micro customers using OfficeScan with Intrusion Defense Firewall
unknown vectors. oracle secure_backup 10.2.0.2 Trend Micro Deep Security shields networks through Deep Packet Inspection (DPI) rules. Trend Micro customers using OfficeScan with Intrusion Defense Firewall
CVE-2005-1015 Buffer overflow in MailEnable Imapd (MEIMAP.exe) allows remote attackers to execute arbitrary code via a long LOGIN command. MailEnable Imapd Trend Micro Deep Security shields networks
CVE-1999-1376 Buffer overflow in fpcount.exe in IIS 4.0 with FrontPage Server Extensions allows remote attackers to execute arbitrary commands. Microsoft IIS 4.0 Trend Micro Deep Security shields
CVE-1999-0737 The viewcode.asp sample file in IIS and Site Server allows remote attackers to read arbitrary files. Microsoft IIS 4.0 Trend Micro Deep Security shields networks through Deep Packet
CVE-2000-0832 Htgrep CGI program allows remote attackers to read arbitrary files by specifying the full pathname in the hdr parameter. Oscar Nierstrasz Htgrep 3.0 Trend Micro Deep Security shields
7.6.00.22,SAP-DB SAP-DB Trend Micro Deep Security shields networks through Deep Packet Inspection (DPI) rules. Trend Micro customers using OfficeScan with Intrusion Defense Firewall (IDF) plugin are also protected
image_pan_tilt property value. axis axis_camera_control 2.40.0.0 Trend Micro Deep Security shields networks through Deep Packet Inspection (DPI) rules. Trend Micro customers using OfficeScan with Intrusion Defense
3.0,GlobalSCAPE Secure FTP Server 3.0.2 Trend Micro Deep Security shields networks through Deep Packet Inspection (DPI) rules. Trend Micro customers using OfficeScan with Intrusion Defense Firewall (IDF) plugin are
%ProgramFiles%\Trend Micro\Deep Security Agent\" If it exists, it will add a firewall rule to blocked the following program: {rule name}= dsa {program to be blocked}= "%ProgramFiles%\Trend Micro\Deep Security
CVE-2008-4478,CVE-2008-4479 An unspecified error exists in the processing of HTTP Accept-Language headers, which can be exploited to cause a crash. Novell eDirectory Trend Micro Deep Security shields
SecurityGateway 1.0.1 Trend Micro Deep Security shields networks through Deep Packet Inspection (DPI) rules. Trend Micro customers using OfficeScan with Intrusion Defense Firewall (IDF) plugin are also protected
CVE-1999-0736 The showcode.asp sample file in IIS and Site Server allows remote attackers to read arbitrary files. Microsoft IIS 4.0 Trend Micro Deep Security shields networks through Deep Packet
Security shields networks through Deep Packet Inspection (DPI) rules. Trend Micro customers using OfficeScan with Intrusion Defense Firewall (IDF) plugin are also protected from attacks using these