Keyword: CVE-1999-0376
6098 Total Search   |   Showing Results : 2341 - 2360
This Trojan executes the files it drops, prompting the affected system to exhibit the malicious routines they contain. Dropping Routine This Trojan drops the following files: %User Profile%
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It may be unknowingly downloaded by a user while visiting malicious websites. As of this
Trend Micro has flagged this malware as noteworthy due to the increased potential for damage, propagation, or both, that it possesses. Specifically, it exploits an unknown vulnerability in Adobe
This Trojan arrives as attachment to mass-mailed email messages. It may be unknowingly downloaded by a user while visiting malicious websites. Arrival Details This Trojan arrives as attachment to
However, as of this writing, the said sites are inaccessible. It accesses websites to download files. This action allows this malware to possibly add other malware on the affected computer. It
However, as of this writing, the said sites are inaccessible. It executes the downloaded files. As a result, malicious routines of the downloaded files are exhibited on the affected system. Arrival
When executed, it takes advantage of a vulnerability in the Java Runtime Environment component in Oracle Java SE and Java for Business that allows remote attackers to execute arbitrary code via an
This specially crafted RTF file takes advantage of a vulnerality in certain versions of Microsoft Office to download another malicious file that Trend Micro detects as BKDR_TURKOJAN.JF. As a result,
This Trojan may be downloaded by other malware/grayware/spyware from remote sites. It may be unknowingly downloaded by a user while visiting malicious websites. It takes advantage of software
This is a component of a malicious Java archive file (.JAR). When executed, it may connect to remote sites to download possibly malicious files. However, it requires other components in order to run
This Trojan takes advantage of unknown vulnerabilities in certain software to download malicious files. It executes the downloaded files. As a result, malicious routines of the downloaded files are
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It may be unknowingly downloaded by a user while visiting malicious websites. Arrival
Propagation As of this writing, there is no available patch for this vulnerability. However, workarounds are provided in: $$DATA$$ Other Details This Trojan is a zero-day exploit for the following
Dropping Routine This Trojan takes advantage of the following software vulnerabilities to drop malicious files: Adobe Reader 9.3.4 and earlier versions for Windows, Macintosh and UNIX (CVE-2010-2883)
This exploit was included in the Magnitude Exploit Kit, which allowed attackers to spread crypto-ransomware into their target systems in the US, Canada, and the UK. To get a one-glance comprehensive
This Trojan arrives as a component bundled with malware/grayware packages. Arrival Details This Trojan arrives as a component bundled with malware/grayware packages. Other Details This Trojan is a
This Trojan arrives as a component bundled with malware/grayware packages. Arrival Details This Trojan arrives as a component bundled with malware/grayware packages. Other Details This Trojan is a
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Once a malware successfully exploits the said
This malware is involved in the Bash Vulnerability Exploit attack of September 2014. It is capable of compromising an affected system's security by carrying out commands made by a malicious remote
This malware is involved in the Bash Vulnerability Exploit attack of September 2014. It is capable of compromising an affected system's security by carrying out commands made by a malicious remote