Keyword: MS10-087
57572 Total Search   |   Showing Results : 1201 - 1220
plugin are also protected from attacks using these vulnerabilities. MS Bulletin ID Vulnerability ID DPI Rule Number DPI Rule Name Release Date IDF Compatibility MS12-061 CVE-2012-1892 1000552 Generic Cross
attacks and leading to remote access tools (RATs). Additional details of the mentioned vulnerability can be found here: MS Advisory (2757760) Vulnerability in Internet Explorer Could Allow Remote Code
CVE-2009-2526,CVE-2009-2532,CVE-2009-3103 This update resolves three reported vulnerabilities in Server Message Block Version 2 (SMBv2) -- one publicly disclosed and two in private. Successful
This backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It executes commands from a remote malicious user,
does the following: It executes its payload if the following strings are found in its filename: ms app cscdll.dll sens.dll It checks whether its process name is the following: Winlogon.exe svchost.exe It
does the following: It executes its malicious routine once the following strings are found in its file name: ms app cscdll.dll sens.dll It deletes itself after execution. It does not exploit any
This Worm arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It drops an AUTORUN.INF file to automatically execute the
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It deletes itself after execution. Arrival Details This
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It executes the dropped file(s). As a result, malicious routines of the dropped files are
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It executes the dropped file(s). As a result, malicious routines of the dropped files are
This Trojan opens its dropped file %User Profile%\Local Settings\{malware file name} in order to hide its malicious routines from the user. This Trojan arrives as an attachment to email messages
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. Arrival Details This Trojan arrives as an attachment to email messages spammed by other
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It executes the dropped file(s). As a result, malicious routines of the dropped files are
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It executes the dropped file(s). As a result, malicious routines of the dropped files are
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It arrives on a system as a file dropped by other malware or as a file downloaded
This Trojan comes as an attachment to spammed email. It carries with it a backdoor that runs on Mac OS X systems. To get a one-glance comprehensive view of the behavior of this Trojan, refer to the
This specially-crafted .DOC file takes advantage of a vulnerability in certain versions of Microsoft Office to execute a malicious component detected as BKDR_POISON.BJP. As a result, routines of the
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It arrives on a system as a file dropped by other malware or as a file downloaded
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It executes the dropped file(s). As a result, malicious routines of the dropped files are