Keyword: ms04-11_microsoft_windows
9 Total Search   |   Showing Results : 1 - 9
  
It takes advantage of certain vulnerabilities.This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
This is a Trend Micro generic detection for JPEG image files that exploit the MS04-028 vulnerability, which is also known as Buffer Overrun in JPEG Processing (GDI+), to allow code execution in the affected system.These JPEG image files may be crafte...
This Trojan may be unknowingly downloaded by a user while visiting malicious websites.It executes the downloaded files. As a result, malicious routines of the downloaded files are exhibited on the affected system.
This worm arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.It takes advantage of software vulnerabilities to propagate across networks.
 cve: Stack-based buffer overflow in certain Active Directory service functions in LSASRV.DLL of the Local Security Authority Subsystem Service (LSASS) in Microsoft Windows NT ...
The WINS service (wins.exe) on Microsoft Windows NT Server 4.0, Windows 2000 Server, and Windows Server 2003 allows remote attackers to write to arbitrary memory locations and possibly...
This is Trend Micros detection for all .EMF graphics files that have been modified to exploit the Microsoft Windows XP Metafile Heap Overflow vulnerability.
This worm arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.It uses a list of user names to gain access to password-protected shares. It uses a list of passwords to gain...
It may be unknowingly downloaded by a user while visiting malicious websites.It may be dropped by other malware.It adds registry entries to enable its automatic execution at every system startup.It connects to Internet Relay Check (IRC) servers.It pr...