Search
Keyword: (ms06-047) vulnerability in microsoft visual basic for applications could allow remote code execution
This worm sends copies of itself to target recipients using the instant-messaging (IM) application, MSN Messenger.It executes commands from a remote user to connect to malicious sites to download files or updates of itself, create processes, kill pro...
Microsoft addresses the following vulnerabilities in its August batch of patches:
(MS14-043) Vulnerability in Windows Media Center Could Allow Remote Code Execution (2978742) Risk Rating: Criti...
Microsoft addresses the following vulnerabilities in its June batch of patches:
(MS11-037) Vulnerability in MHTML Could Allow Information Disclosure (2544893)
Risk Rating: Important
This security...
This Worm arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.It executes commands from a remote malicious user, effectively compromising the affected system. It connects ...
This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.It steals certain information from the system and/or the user.However, as of this writing, the said sit...
Microsoft addresses the following vulnerabilities in its May batch of patches for 2015:
(MS15-043) Cumulative Security Update for Internet Explorer (3049563)
Risk Rating: Critical
This security u...
This Hacking Tool arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It may be manually installed by a user.
This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.It connects to certain websites to send and receive information.It encrypts files with specific file ex...
This Hacking Tool arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
This Potentially Unwanted Application arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.