Search
Keyword: (ms10-005) vulnerability in microsoft paint could allow remote code execution
This security update resolves six vulnerabilities in Internet Explorer
that were reported privately. The most serious vulnerabilities may allow remote
code execution if a user vi...
This security update addresses a publicly disclosed vulnerability in Windows Shell, which may allow remote code execution once icon of a specially crafted shortcut ...
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users.It executes the downloaded files. As a result, malicious routines of the downloaded files are exhibited on the affected system.
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users.It does not have any propagation routine.It does not have any backdoor routine.It does not have any downloading capability.It does not have a...
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It may be unknowingly downloaded by a user while visiting malicious websites.It takes advantage of an unknown vulnerability in a certain sof...
This Trojan takes advantage of the following software vulnerabilities to drop malicious files: Vulnerabilities in Microsoft Office Could Allow Remote Code Execution (2423930)It also drops files detected as BKDR_WOODINI.A.This Trojan arrives as attac...
This Trojan drops and executes files detected by Trend Micro as BKDR_SKYIPOT.ZIt takes advantage of the following software vulnerabilities to drop malicious files: RTF Stack Buffer Overflow Vulnerability (CVE-2010-3333)This Trojan arrives as an atta...
This malware has a complex and evolving structure and behavior. This .LNK file is used to execute the main component of the malware detected as WORM_TDSS.TX. It exploits a vulnerability in Windows Shell that could allow arbitrary commands to be execu...
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It may be unknowingly downloaded by a user while visiting malicious websites.It executes the dropped file(s). As a result, malicious routine...
This Trojan attempts to drop a malicious file.However, due to errors in its code, it fails to perform its intended routine.This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It may be unknowi...
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.It executes the downloaded files. As a result, malicious routines of the downloaded files are exhibited on ...
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.It take...
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.It cont...
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.It executes downloaded files whose malicious routines are exhibited by the affected system. As of this writ...
Trend Micro has flagged this Trojan as noteworthy due to the increased potential for damage, propagation, or both, that it possesses. To get a one-glance comprehensive view of the behavior of this Trojan, refer to the Threat Diagram shown below.This ...
Once a malware successfully exploits the said vulnerability, it causes certain actions to be done on the system. As of this writing, the said sites are inaccessible.This Trojan may be unknowingly downloaded by a user while visiting malicious website...
Trend Micro has flagged this threat as noteworthy due to the increased potential for damage, propagation, or both, that it possesses.To get a one-glance comprehensive view of the behavior of this Worm, refer to the Threat Diagram shown below.This wor...
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
Microsoft addresses the following vulnerabilities in its January batch of patches:
(MS13-001) Vulnerability in Windows Print Spooler Components Could Allow Remote Code Execution (2769369)
Ris...
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.It executes the files it drops, prompting the affected system to exhibit the malicious routines they contai...