Keyword: MS10-087
56022 Total Search   |   Showing Results : 681 - 700
Description Name: CVE-2018-8581 MS Exchange Server NTLM Authentication Bypass HTTP - (Request) . This is Trend Micro detection for HTTP network protocol that manifests exploit activities and can be used for N/A.The host exhibiting this type of networ...
This backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It deletes the initially executed copy of itself.
This Worm does not have any backdoor routine. It executes the dropped file(s). As a result, malicious routines of the dropped files are exhibited on the affected system. Arrival Details This malware
This Worm arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It takes advantage of software vulnerabilities to
This backdoor has received attention from independent media sources and/or other security firms. This backdoor may be downloaded by other malware/grayware/spyware from remote sites. It arrives as a
or C:\Users\{user name}\AppData\Local\Temp on Windows Vista and 7.) NOTES: When a machine is affected with this malware, MS Excel exits and runs again opening the non-malicious .XLS file to trick users
CVE-2013-0080,CVE-2013-0083,CVE-2013-0084,CVE-2013-0085 This patch addresses vulnerabilities found in Microsoft SharePoint and Microsoft SharePoint Foundation. When exploited via a malicious URL
CVE- 2013-0095 This patch addresses a vulnerability existing Microsoft Office for Mac. When exploited via a specially crafted email message it can allow information disclosure. Microsoft Office 2008
CVE-2013-1285,CVE-2013-1286,CVE-2013-1287 This patch addresses the vulnerabilities found in Microsoft Windows. These vulnerabilities when exploited can allow elevation of privilege once attacker
CVE-2013-0079 This patch addresses a vulnerability found in Microsoft Office. It can be exploited once a user opens a specially crafted Visio file thus resulting to remote code execution,
CVE-2014-0301 This security update resolves a privately reported vulnerability in Microsoft Windows. The vulnerability could allow remote code execution if a user opens a specially crafted image
CVE-2014-0297,CVE-2014-0298,CVE-2014-0299,CVE-2014-0302,CVE-2014-0303,CVE-2014-0304,CVE-2014-0305,CVE-2014-0306,CVE-2014-0308,CVE
CVE-2012-1538,CVE-2012-1539,CVE-2012-4775 This patch addresses vulnerabilities in Internet Explorer that could allow remote code execution via a specially crafted web page. When exploited, remote
CVE-2012-1527,CVE-2012-1528 This patch addresses vulnerabilities in Microsoft Windows, which could allow remote code execution via a specially crafted briefcase in Windows Explorer. When exploited,
CVE-2012-1885,CVE-2012-1886,CVE-2012-1887,CVE-2012-2543 This patch addresses vulnerabilities existing in Microsoft Office, which could allow remote code execution once users opens a specially crafted
CVE-2012-0182,CVE-2012-2528 This security update addresses vulnerabilities affecting Microsoft Office. When successfully exploited, it could allow remote code execution via a specially crafted .RTF
CVE-2012-2529 This patch addresses a vulnerability existing in all supported releases of Microsoft Windows with the exception of Windows 8 and Windows Server 2012. This vulnerability may allow
CVE-2012-1895,CVE-2012-1896,CVE-2012-2519,CVE-2012-4776,CVE-2012-4777 This patch addresses vulnerabilities existing in the .NET Framework. It could allow remote code execution once a remote attacker
CVE-2012-2530,CVE-2012-2553,CVE-2012-2897 This patch addresses vulnerabilities affecting Microsoft Windows. These vulnerabilities could allow remote code execution via specially crafted document
CVE-2012-1766,CVE-2012-1767,CVE-2012-1768,CVE-2012-1769,CVE-2012-1770,CVE-2012-1771,CVE-2012-1772,CVE-2012-1773,CVE-2012-3106,CVE-2012-3107,CVE-2012-3108,CVE-2012-3109,CVE-2012-3110 This patch