Search
Keyword: ms10-087
Microsoft Office XP SP3, Office 2003 SP3, Office 2007 SP2, Office 2010, Office 2004 and 2008 for Mac, Office for Mac 2011, and Open XML File Format Converter for Mac allow remote attackers to e...
Once a malware successfully exploits the said vulnerability, it causes certain actions to be done on the system.
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users.However, due to errors in its code, it fails to perform its intended routine.
This Trojan exploit targets a known vulnerability in <i>Microsoft Office Word</i> with the way it handles specially crafted .RTF document files. In addition, it also uses social engineering techniques. Specifically, it dro...
This Trojan arrives as attachment to mass-mailed email messages.It contains errors in its code. This stops it from performing its routines.
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.However, due to errors in its code, it fails to perform its intended routine.
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It may be unknowingly downloaded by a user while visiting malicious websites.
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.It does not have any propagation routine.It does not have any downloading capability.It does not have any i...
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users.It executes the dropped file(s). As a result, malicious routines of the dropped files are exhibited on the affected system.
This malware takes advantage of certain vulnerabilities to propagate.This Trojan arrives as attachment to mass-mailed email messages.It executes the dropped file(s). As a result, malicious routines of the dropped files are exhibited on the affected ...
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It may be unknowingly downloaded by a user while visiting malicious websites.
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.It cont...
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users.It executes the downloaded files. As a result, malicious routines of the downloaded files are exhibited on the affected system.
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users.It does not have any propagation routine.It does not have any backdoor routine.It does not have any downloading capability.It does not have a...
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It may be unknowingly downloaded by a user while visiting malicious websites.It takes advantage of an unknown vulnerability in a certain sof...
This Trojan takes advantage of the following software vulnerabilities to drop malicious files: Vulnerabilities in Microsoft Office Could Allow Remote Code Execution (2423930)It also drops files detected as BKDR_WOODINI.A.This Trojan arrives as attac...
This Trojan drops and executes files detected by Trend Micro as BKDR_SKYIPOT.ZIt takes advantage of the following software vulnerabilities to drop malicious files: RTF Stack Buffer Overflow Vulnerability (CVE-2010-3333)This Trojan arrives as an atta...
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It may be unknowingly downloaded by a user while visiting malicious websites.It executes the dropped file(s). As a result, malicious routine...
This Trojan attempts to drop a malicious file.However, due to errors in its code, it fails to perform its intended routine.This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It may be unknowi...
This specially crafted RTF file takes advantage of a vulnerality in certain versions of Microsoft Office to download another malicious file that Trend Micro detects as BKDR_TURKOJAN.JF. As a result, routines of the downloaded backdoor are also exhibi...