Search
Keyword: rtf stack buffer overflow vulnerability cve-2010-3333
This is a Trend Micro heuristic detection for Rich Text Files (RTF) with malformed format. If your Trend Micro product detects a file under this detection name, do not execute the file. Delete it immediately especially if it came from an untrusted or...
This adware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.It is capable of encrypting files in the affected system.It encrypts files with specific file extension...
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.It executes the files it drops, prompting the affected system to exhibit the malicious routines they contai...
Microsoft addresses several vulnerabilities in its April batch of patches:
CVE-2017-0160 | .NET Remote Code Execution Vulnerability
Risk Rating: Critical
This vulnerability exists in several .NET Fra...
This spyware arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It ma...
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.It modifies the Internet Explorer Zone Settings.It connects to certain websites to send and receive informa...
PlugX is a remote access tool (RAT) used in targeted attacks aimed toward government-related institutions and key industries. It was utilized in the same way as Poison Ivy, a RAT involved in a campaign dating back to 2008.He...
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
This description is based on a compiled analysis of several variants of TROJ_ARTIEF. Note that specific data such as file names and registry values may vary for each variant.This Trojan arrives as an attachment to email messages spammed by other mal...
This malware is involved in socially-engineered attacks that feature a popular celebrity. It is also part of the LURID malware campaign.To get a one-glance comprehensive view of the behavior of this Trojan, refer to the Threat Diagram shown below.Thi...
This adware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
This Trojan takes advantage of software vulnerabilities in certain software to drop malicious files.
This Trojan exploit targets a known vulnerability in <i>Microsoft Office Word</i> with the way it handles specially crafted .RTF document files. In addition, it also uses social engineering techniques. Specifically, it dro...
This spyware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users.It executes the dropped file(s). As a result, malicious routines of the dropped files are exhibited on the affected system.
This Trojan arrives as attachment to mass-mailed email messages.It executes the dropped file(s). As a result, malicious routines of the dropped files are exhibited on the affected system.