Keyword: rtf stack buffer overflow vulnerability cve-2010-3333
300 Total Search   |   Showing Results : 181 - 200
The (1) ListView, (2) ListView2, (3) TreeView, and (4) TreeView2 ActiveX controls in MSCOMCTL.OCX in the Common Controls in Microsoft Office 2003 SP3, 2007 SP2 and SP3, and 2010 Gold and SP1; Office 2003...
The MFC component in Microsoft Windows 2000 SP4, XP SP2, and 2003 SP1 and Visual Studio .NET 2000, 2002 SP1, 2003, and 2003 SP1 allows user-assisted remote attackers to execute arbitr...
The RichEdit component in Microsoft Windows 2000 SP4, XP SP2, and 2003 SP1; Office 2000 SP3, XP SP3, 2003 SP2, and Office 2004 for Mac; and Learning Essentials for Microsoft Offi...
Once a malware successfully exploits the said vulnerability, it causes certain actions to be done on the system.
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.This is the Trend Micro detection for files that exhibit certain behaviors.
This Trojan executes when a user accesses certain websites where it is hosted.It requires its main component to successfully perform its intended routine.
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users.However, due to errors in its code, it fails to perform its intended routine.
This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.It connects to certain websites to send and receive information.
Microsoft addresses the following vulnerabilities in its May batch of patches: (MS12-029) Vulnerability in Microsoft Word Could Allow Remote Code Execution (2680352) Risk Rating: Critical A vulner...
This adware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
This adware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
This Trojan takes advantage of an unknown vulnerability in a certain software to allow a remote malicious user or malware to download files on the affected machine.
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.It executes the downloaded files. As a result, malicious routines of the downloaded files are exhibited on ...
This is the detection for malware that exploit Microsoft Office Memory Corruption Vulnerability (CVE-2017-11882). This malware usually arrives via malicious spam campaigns as a weaponized Microsoft Office document. The targeted platforms are MS Offic...
 Multiple stack-based buffer overflows in Autonomy (formerly Verity) KeyView Viewer, Filter, and Export SDK before 9.2.0.12, as used by ActivePDF DocConverter, IBM Lotus Notes b...
This Trojan arrives as attachment to mass-mailed email messages.It contains errors in its code. This stops it from performing its routines.
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users.It executes the dropped file(s). As a result, malicious routines of the dropped files are exhibited on the affected system.
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users.It executes the dropped file(s). As a result, malicious routines of the dropped files are exhibited on the affected system.
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.However, due to errors in its code, it fails to perform its intended routine.
This Potentially Unwanted Application arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.