Keyword: CVE-1999-0376
6086 Total Search   |   Showing Results : 1441 - 1460
This Trojan drops and executes files detected by Trend Micro as BKDR_SKYIPOT.Z It takes advantage of the following software vulnerabilities to drop malicious files: RTF Stack Buffer Overflow
Trend Micro has received multiple samples of this MAC OSX malware from multiple, independent sources, including customer reports and internal sources. These indicate that this malware poses a high
This malicious .DOC file has two embedded .SWF files that it loads to exploit CVE-2011-0611. Once successfully exploited, this malware connects to a specific URL to download another possibly
This Trojan attempts to exploit the "Excel Integer Overrun Vulnerability" (CVE-2011-0097) in certain versions of Microsoft Excel . This Trojan contains a malicious file embedded in its code. This
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It executes the downloaded files. As a result, malicious
This Trojan attempts to exploit the "Excel Integer Overrun Vulnerability" (CVE-2011-0097) in certain versions of Microsoft Excel . This Trojan contains a malicious file embedded in its code. This
This malware downloads the file specified in its first parameter. It saves the downloaded file as %User Temp%\cgs8h{random number}.exe . It then executes the downloaded file by exploiting the
This Trojan may be hosted on a website and run when a user accesses the said website. Arrival Details This Trojan may be hosted on a website and run when a user accesses the said website. NOTES: This
This Trojan may arrive bundled with malware packages as a malware component. It may be hosted on a website and run when a user accesses the said website. It executes the downloaded files. As a
This is the Trend Micro detection for a modified Windows Metafile (.WMF) that takes advantage of certain Windows vulnerabilities. It may also take advantage of an unpatched Windows Graphics Rendering
This Trojan arrives as a component bundled with malware/grayware packages. It may be hosted on a website and run when a user accesses the said website. It executes the downloaded files. As a result,
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It does not have any propagation routine. It does not have any backdoor routine. It does
This Trojan may be hosted on a website and run when a user accesses the said website. It executes the downloaded files. As a result, malicious routines of the downloaded files are exhibited on the
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It executes then deletes itself afterward. It connects
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It arrives on a system as a file dropped by other malware or as a file downloaded
This Trojan may be hosted on a website and run when a user accesses the said website. It executes the downloaded files. As a result, malicious routines of the downloaded files are exhibited on the
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It executes the downloaded files. As a result, malicious
This is a specially crafted PDF which takes advantage of a recent vulnerability in Adobe (CVE-2013-0641) to drop MiniDuke malware. To get a one-glance comprehensive view of the behavior of this
This Trojan executes the downloaded files. As a result, malicious routines of the downloaded files are exhibited on the affected system. It requires its main component to successfully perform its
This Trojan may be hosted on a website and run when a user accesses the said website. Arrival Details This Trojan may be hosted on a website and run when a user accesses the said website. Download