Search
Keyword: ms
This backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.It deletes itself after execution.
This Trojan may be downloaded by other malware/grayware from remote sites. It may be dropped by other malware.It executes commands from a remote malicious user, effectively compromising the affected system. It connects to a website to send and recei...
This backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.It modifies registry entries to disable various system services. This action prevents most of the system ...
This Trojan Spy arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
Microsoft Internet Explorer 6, 7, and 8 does not properly handle objects in memory, which allows remote attackers to execute arbitrary code by accessing an object that (1) was not pro...
This update resolves a vulnerability identified in MS Office for Mac that could allow remote code execution when successfully exploited. The vulnerabili...
This backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.It executes commands from a remote malicious user, effectively compromising the affected system.It delete...
This backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.It executes commands from a remote malicious user, effectively compromising the affected system.It delete...
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.It executes then deletes itself afterward.It connects to certain URLs. It may do this to remotely inform a ...
This backdoor arrives as an attachment to email messages spammed by other malware/grayware or malicious users.
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
This backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.It deletes the initially executed copy of itself.
This Potentially Unwanted Application arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.It does not have any propagation routine.It does not have any backdoor routine.It does not have any informa...
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.It executes then deletes itself afterward.It requires being executed with a specific argument/parameter, an...
This backdoor arrives as an attachment to email messages spammed by other malware/grayware or malicious users.It executes commands from a remote malicious user, effectively compromising the affected system.
This backdoor arrives as an attachment to email messages spammed by other malware/grayware or malicious users.It does not have any propagation routine.It executes commands from a remote malicious user, effectively compromising the affected system.It...
Microsoft Internet Explorer 6 does not properly handle objects in memory, which
allows remote attackers to execute arbitrary code by accessing an object that
(1) was not properly initialized or (2...
Microsoft Excel 2003 SP3 and 2007 SP2; Office 2004 and 2008 for Mac; Open XML File Format Converter for Mac; Excel Viewer SP2; and Office Compatibility Pack for Word, Excel, and PowerPoint 2007 File Formats ...
This security update addresses one publicly disclosed and four privately reported vulnerabilities in Internet Explorer versions 6, 7, 8, and 9. The most severe of the vulnerabiliti...