Search Results

Showing results for ms.dcerpc.netapi32.buffer.ove

IPS
This indicates an attack attempt to exploit a Use After Free vulnerability in Microsoft Windows.The vulnerability is due to an error when the vulnerable software handles a maliciously crafted file. An...
IPS
This indicates an attempt by the Sasser worm to download worm binaries from a remote FTP shell.Sasser is a worm that installs itself on a victim machine under the System directory as avserve.exe, avserve2.exe...
IPS
This indicates an attack attempt to exploit a Denial of Service vulnerability in Microsoft Windows.The vulnerability is due to an error when the vulnerable software handles a maliciously crafted TrueType...
IPS
This indicates an attack attempt to exploit a Privilege Escalation vulnerability in Microsoft Windows.The vulnerability is caused by an integer overflow issue in win32k.sys. An attacker can exploit this...
IPS
This indicates an attack attempt to exploit a Code Execution vulnerability in Microsoft Office.The vulnerability is due to an error when "EQNEDT32.EXE" handles a maliciously crafted equation. A remote...
IPS
This indicates an attack attempt to exploit an Elevation Of Privilege Vulnerability in Microsoft Win32K.The vulnerability is due to an error in the vulnerable application when handling a maliciously crafted...
IPS
This indicates an attack attempt to exploit a Elevation of Privileges vulnerability in Microsoft Windows.The vulnerability is due to insufficient sanitizing of DLL files being loaded with an application....
IPS
This indicates an attack attempt to exploit an Elevation Of Privilege Vulnerability in Microsoft Win32K.The vulnerability is due to an error in the vulnerable application when handling a maliciously crafted...
IPS
This indicates an attack attempt to exploit an Elevation Of Privilege Vulnerability in Microsoft Win32K.The vulnerability is due to an error in the vulnerable application when handling a maliciously crafted...
IPS
This indicates detection of the Win32 Pikec hyj backdoorBackdoor trojans have the capability to connect remote hosts and perform actions against the compromised system.
  • Added: Jun 14, 2013