Keyword: ms07-067 vulnerability in macrovision driver could allow local elevation of privilege 944653
109 Total Search   |   Showing Results : 61 - 80
Microsoft addresses the following vulnerabilities in its September batch of patches: (MS13-067) Vulnerabilities in Microsoft SharePoint Server Could Allow Remote Code Execution (2834052) ...
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users.
This Trojan takes advantage of the following software vulnerability to drop malicious files: CVE-2009-3129This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users.
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users.It executes the dropped file(s). As a result, malicious routines of the dropped files are exhibited on the affected system.
This worm arrives via removable drives. It arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.It drops an AUTORUN.INF file to automatically execute the copies it drops wh...
This worm arrives via removable drives. It arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.It drops an AUTORUN.INF file to automatically execute the copies it drops wh...
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users.It does not have any propagation routine.It does not have any backdoor routine.It executes the dropped file(s). As a result, malicious routin...
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users.It does not have any propagation routine.It does not have any backdoor routine.It does not have any downloading capability.It does not have a...
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users.It does not have any propagation routine.It does not have any backdoor routine.It executes the dropped file(s). As a result, malicious routin...
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users.It executes the dropped file(s). As a result, malicious routines of the dropped files are exhibited on the affected system.
What is STUXNET?STUXNET is a worm that initially made news in July due to its use of certain vulnerabilities to propagate and execute its routines. The media, as well as the security industry, have taken interest...
Microsoft addresses the following vulnerabilities in its August batch of patches: (MS11-057) Cumulative Security Update for Internet Explorer (2559049) Risk Rating: Critical This security up...
This worm arrives by connecting affected removable drives to a system. It arrives by accessing affected shared networks. It may be dropped by other malware.It drops an AUTORUN.INF file to automatically execute the copies it drops when a user accesse...
This worm arrives via removable drives. It arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.It drops copies of itself into network drives. It drops an AUTORUN.INF file ...
The first variant of the CONFICKER malware family was seen propagating via the MS08-067 Server service vulnerability back in 2008. Other variants after the first CONFICKER worm spread to other machines by dropping copies of itself in removable drives...
This worm arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.It takes advantage of software vulnerabilities to propagate across networks.
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.However, as of this writing, the said sites are inaccessible.
This worm arrives via removable drives.It drops an AUTORUN.INF file to automatically execute the copies it drops when a user accesses the drives of an affected system.It connects to Internet Relay Chat (IRC) servers.It takes advantage of certain vul...
This worm arrives via removable drives. It arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.It takes advantage of software vulnerabilities to propagate across networks....
This worm attempts to get a list of previous connections from an infected machine. It then checks the port of the remote server where the infected machine tries to connect. If the port is 1433, it launches an SQL Server attack. If the port is 445, it...