Keyword: MS10-087
256 Total Search   |   Showing Results : 1 - 20
   Next  
Untrusted search path vulnerability in Microsoft Office 2007 SP2 and 2010 allows local users to gain privileges via a Trojan horse DLL in the current working directory, aka "Insecure Library Load...
Microsoft addresses the following vulnerabilities in its November batch of patches:(MS10-087) Vulnerabilities in Microsoft Office Could Allow Remote Code Execution (2423930)Risk Rating: Critic...
This Trojan takes advantage of the following vulnerability:RTF Stack Buffer Overflow vulnerabilityMore information about this vulnerability can be found in the following Web page:Microsoft Security Bulletin MS10-087
Once this Trojan successfully exploits the said vulnerability, it attempts to drop and execute a malicious file.This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious s...
It takes advantage of the vulnerabilities in Microsoft Office that could allow remote code execution (MS10-087). Once it successfully exploits the said vulnerability, it drops a file detected as TROJ_DROPR.VTG.Once a malware successfully exploits the...
This Trojan may be unknowingly downloaded by a user while visiting malicious websites.Once a malware successfully exploits the said vulnerability, it causes certain actions to be done on the system.
It takes advantage of vulnerabilities in Microsoft Office that could allow remote code execution (MS10-087). After successfully exploiting the said vulnerability, it drops a file detected as BKDR_AGENT.U.Upon execution, it opens a .DOC file in order ...
This malware takes advantage of a vulnerability in Microsoft Word with the way it handles specially crafted email messages in RTF format.To get a one-glance comprehensive view of the behavior of this Trojan, refer to the Threat Diagram shown below.Th...
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users.It does not have any propagation routine.It does not have any backdoor routine.It executes the dropped file(s). As a result, malicious routin...
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users.It takes advantage of software vulnerabilities in certain software to drop malicious files.
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users.It executes the dropped file(s). As a result, malicious routines of the dropped files are exhibited on the affected system.
Once a malware successfully exploits the vulnerability, it causes certain actions to be done on the system.This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users.
This malware exploits a software vulnerability in order to drop a malicious file onto the affected system. It also drops and opens a document file in order to hide its malicious routines.Once a malware successfully exploits the said vulnerability, it...
This Trojan arrives as attachment to mass-mailed email messages. It arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
This security update addresses vulnerabilities in Microsoft Office that could allow remote execution when an unsuspecting user opens a specially crafted .RTF e...
This Trojan takes advantage of an unknown vulnerability in a certain software to allow a remote malicious user or malware to download files on the affected machine.
This Trojan arrives as an attachment to email messages purportedly promoting Tibetan culture. It drops a file that is a backdoor and is infected by a file infector.To get a one-glance comprehensive view of the behavior of this Trojan, refer to the Th...
Untrusted search path vulnerability in Microsoft Office 2007 SP2 and 2010 allows local users to gain privileges via a Trojan horse DLL in the current working directory, aka "Ins...
This update resolves vulnerabilities in Microsoft Office, which could allow remote code execution. When users view a specially crafted imag...
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.It take...