Keyword: MS10-087
57572 Total Search   |   Showing Results : 1241 - 1260
This is a Trend Micro generic detection for specially crafted Microsoft Office documents that exploits CVE-2006-1540 to allow remote attackers to execute arbitrary commands in the affected system.
This hacking tool is a command-line program that may be used to sniff certain information and save them into a file. This hacking tool arrives on a system as a file dropped by other malware or as a
}e.pl/meeting/su.exe - legitimate Microsoft calc.exe file It takes advantage of the following software vulnerabilities to allow a remote user or malware/grayware to download files: MS Advisory (2719615) - Vulnerability
files on MS Vista. Usage: {malware name} {absolute path to license file} Returns: 0 - success, 1 - failure
This is a Trend Micro generic detection for specially crafted Microsoft Office Excel documents that exploits CVE-2006-1308 to allow remote attackers to execute arbitrary commands in the affected
This is a Trend Micro generic detection for specially crafted Microsoft Office Excel documents that exploits CVE-2006-1309 to allow remote attackers to execute arbitrary commands in the affected
This is a Trend Micro generic detection for specially crafted Microsoft Office Word documents that exploits CVE-2006-2492 to allow remote attackers to execute arbitrary commands in the affected
This malware exploits the vulnerability in Microsoft XML Core Services, which prompted Microsoft to release a fix tool. To get a one-glance comprehensive view of the behavior of this Trojan, refer to
This Trojan executes when a user accesses certain websites where it is hosted. Arrival Details This Trojan executes when a user accesses certain websites where it is hosted. NOTES: It downloads the
This description is based is a compiled analysis of several variants of JS_IFRAME. Note that specific data such as file names and registry values may vary for each variant. This Trojan may be hosted
Both malware are related to the modified Enfal variants, which were reported to have infected 874 systems in 33 countries. To get a one-glance comprehensive view of the behavior of this Trojan, refer
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It does not have any propagation routine. It does not have any backdoor routine. It
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It arrives on a system as a file dropped by other malware or as a file downloaded
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It deletes itself after execution. Arrival Details This
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It deletes itself after execution. Arrival Details This
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It deletes itself after execution. Arrival Details This
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It deletes itself after execution. Arrival Details This