Keyword: expl_cplnk.sm
1602 Total Search   |   Showing Results : 61 - 80
This is the Trend Micro detection for files that exhibit certain behaviors. This Trojan may be hosted on a website and run when a user accesses the said website. Arrival Details This Trojan may be
This is a Trend Micro generic detection for specially crafted Microsoft Office Excel documents that exploits CVE-2006-1306 to allow remote attackers to execute arbitrary commands in the affected
This is a Trend Micro generic detection for specially crafted Microsoft Office documents that exploits CVE-2006-0009 to allow remote attackers to execute arbitrary commands in the affected system.
This is a Trend Micro generic detection for specially crafted Microsoft Office Excel documents that exploits CVE-2006-1304 to allow remote attackers to execute arbitrary commands in the affected
This specially crafted RTF file takes advantage of a vulnerality in certain versions of Microsoft Office to download another malicious file that Trend Micro detects as BKDR_TURKOJAN.JF. As a result,
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It may be unknowingly downloaded by a user while visiting malicious websites. Arrival
This Trojan takes advantage of certain vulnerabilities. Other Details This Trojan takes advantage of the following vulnerabilities: Oracle Java SE and Java for Business 'MixerSequencer' Remote Code
This is a Trend Micro generic detection for specially crafted Microsoft Office Excel documents that exploits CVE-2012-0158 to allow remote attackers to execute arbitrary commands in the affected
This is the Trend Micro generic detection for files that targets a Microsoft Excel vulnerability. This vulnerability allows execution of arbitrary code with currently logged-on user privileges via a
This is a Trend Micro generic detection for JPEG image files that exploit the MS04-028 vulnerability, which is also known as Buffer Overrun in JPEG Processing (GDI+), to allow code execution in the
EXPL_DOCTIFF.GEN is the Trend Micro detection for files that exploit a vulnerability addressed in CVE-2013-3906.
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. This is the Trend Micro detection for files that exhibit
This file infector searches for files in %System%\dllcache and %System% . Once found, it infects the said files using Entry Point Obscuring (EPO) technique. Before proceeding with its payload, it
This is a Trend Micro heuristic detection for suspicious JavaScript files and embedded JavaScripts that perform memory manipulations to possibly exploit vulnerabilities. If your Trend Micro product
This is the Trend Micro generic detection for Flash files with ActionsScript that exploits CVE-2007-0071 to enable remote attackers to execute arbitrary commands on the affected system. Visit the
This is the Trend Micro generic detection for Flash files with ActionsScript that exploit CVE-2009-1862 to enable remote attackers to execute arbitrary commands on the affected system. Visit the
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It arrives as a component bundled with malware/grayware
This backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This backdoor arrives on a system as a
This backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This backdoor arrives on a system as a