Keyword: MS10-087
56021 Total Search   |   Showing Results : 501 - 520
This backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It executes commands from a remote malicious user,
This worm arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It takes advantage of software vulnerabilities to
system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. NOTES: This malware is the detection for an infected MS Excel file. It checks for open
This backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It executes then deletes itself afterward. It does not
This worm arrives as attachment to mass-mailed email messages. It deletes autostart registry entries associated with the processes it terminates to completely disable applications. It gathers target
This backdoor arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It arrives on a system as a file dropped by other malware or as a file downloaded
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It takes advantage of certain vulnerabilities. Arrival
This Ransomware connects to certain websites to send and receive information. Installation This Ransomware drops the following copies of itself into the affected system and executes them: {Malware
This Trojan may be downloaded by other malware/grayware from remote sites. It may be dropped by other malware. It executes commands from a remote malicious user, effectively compromising the affected
from attacks using these vulnerabilities. MS Bulletin ID Vulnerability ID DPI Rule Number DPI Rule Name Release Date IDF Compatibility CVE-2012-4792 1005297 Microsoft Internet Explorer CDwnBindInfo
Inspection (DPI) rules. Trend Micro customers using OfficeScan with Intrusion Defense Firewall (IDF) plugin are also protected from attacks using these vulnerabilities. MS Bulletin ID Vulnerability ID DPI Rule
CVE-2009-1544 This elevation of privilege vulnerability in the Windows Worstation Service is due to a possible "Double Free" condition occurring in the service. Successful exploitation of this
CVE-2012-0183 A vulnerability exists in the way affected versions of MS Office parse RTF data. An attacker could send a target a specially crafted RTF file to exploit this vulnerability. When
CVE-2012-0018 A vulnerability in the way MS Visio handles specially crafted files could allow an attacker to take control of the vulnerable system. Logged on users that have lesser privileges on the
This spyware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It deletes itself after execution. Arrival Details This
This Trojan arrives via removable drives. It arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This
This backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It modifies registry entries to disable various system
CVE-2014-6319 This security update resolves four privately reported vulnerabilities in Microsoft Exchange Server. The most severe of these vulnerabilities could allow elevation of privilege if a user
CVE-2014-6356 This security update resolves two privately reported vulnerabilities in Microsoft Word and Microsoft Office Web Apps. The vulnerabilities could allow remote code execution if an
CVE-2014-6364 This security update resolves one privately reported vulnerability in Microsoft Office. The vulnerability could allow remote code execution if a specially crafted file is opened in an