Keyword: usojan.win32.cve20188120.e
81683 Total Search   |   Showing Results : 381 - 400
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. Arrival Details This Trojan arrives as an attachment to the following email messages
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It arrives on a system as a file dropped by other malware or as a file downloaded
This Trojan may arrive bundled with malware packages as a malware component. It arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting
This is a malicious PowerPoint file, whose final payload is slide1.gif, TROJ_TALERET.ZTBJ-A. The payload is a known family of malware used in targeted attacks involving different Taiwanese industries
A local privilege escalation vulnerability was discovered within the Win32k-GDI component of Microsoft Windows. It can be triggered locally by manipulating the graphics properties of a window.
Once a malware successfully exploits the said vulnerability, it causes certain actions to be done on the system. As of this writing, the said sites are inaccessible. This Trojan may be unknowingly
This malware, when manually extracted from its body, drops an .EXE file detected as TROJ_DLLSERV.MC. This Trojan may be dropped by other malware. It may be unknowingly downloaded by a user while
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. However, as of this writing, the said sites are
CVE-2009-3020 A vulnerability exists in Microsoft Windows, which can be exploited to cause a DoS (Denial of Service). The vulnerability is caused due to an error when processing Embedded OpenType
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It arrives on a system as a file dropped by other malware or as a file downloaded
Description Name: CVE-2014-3120 - ElasticSearch Remote Code Execution Exploit - HTTP (Request) . This is Trend Micro detection for HTTP network protocol that manifests exploit activities and can be used for Point of Entry or Lateral Movement.The host...
Description Name: CVE-2014-6287 Rejetto HttpFileServer RCE Exploit - HTTP (Request) . This is Trend Micro detection for HTTP network protocol that manifests exploit activities and can be used for Point of Entry or Lateral Movement.The host exhibiting...
Description Name: CVE-2019-3396 - ATLASSIAN CONFLUENCE - HTTP (Request) . This is Trend Micro detection for HTTP network protocol that manifests exploit activities and can be used for Point of Entry.The host exhibiting this type of network behavior i...
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. However, as of this writing, the said sites are
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It takes advantage of certain vulnerabilities. Arrival Details This Trojan arrives as an
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It executes the dropped file(s). As a result, malicious
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It arrives on a system as a file dropped by other malware or as a file downloaded
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Worm executes the dropped file(s). As a result, malicious routines of the dropped files are exhibited on the affected system. Arrival Details This malware arrives via the following means:
This Worm does not have any backdoor routine. It executes the dropped file(s). As a result, malicious routines of the dropped files are exhibited on the affected system. Arrival Details This malware