McAfee AVDCDE-AA-AA User Guide - Page 291
Extensible Markup Language files. Although
View all McAfee AVDCDE-AA-AA manuals
Add to My Manuals
Save this manual to your list of manuals |
Page 291 highlights
Default Vulnerable and Compressed File Extensions Table 9-1. Vulnerable file name extensions Extension .SYS File Type Program .TAR .VBS Archive Script .VS? .VXD .WBK .WPD .XL? Macro Program Macro Macro Macro .XML Script/macro .ZIP Archive File Description DOS or Windows system files and device drivers. These executable files frequently start along with or as part of program execution. UNIX tape archive files. Visual Basic script files and VBScript files. VBScript is an implementation of the Microsoft Visual Basic programming language. It powers special features on many web pages, and can directly manipulate many functions inside Microsoft Outlook and other software. Visio drawing and related files. Later Visio versions include infectable scripting extensions. Windows virtual device drivers. These are executable fiels that often reside in memory. Microsoft Word backup files Corel WordPerfect document files. Microsoft Excel worksheet, add-in, toolbar, chart, dialog box, backup, macro, workspace, Visual Basic module, and template files. These files can contain infectable Visual Basic for Applications macros. Extensible Markup Language files. Although they are nominally plain text, these files can contain powerful scripting functions that act through browser software. WinZip and PKZip compressed archive files. User's Guide 291