Search
Keyword: (ms10-005) vulnerability in microsoft paint could allow remote code execution
Nowadays, cybercriminals are prone to using zero-day vulnerabilities as part of their typical attack pattern. The software of known IT companies such as Microsoft and Adobe are likely targe...
This Trojan arrives as attachment to mass-mailed email messages.It does not have any propagation routine.It does not have any backdoor routine.It executes the dropped file(s). As a result, malicious routines of the dropped files are exhibited on the...
This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
Software vulnerabilities, like the malware, have serious security implications. We recently reported about a Chinese high school Web page that exploited a vulnerability in Microsoft XML Core ...
This update resolves several vulnerabilities in various versions of Internet
Explorer. Some of the vulnerabilities, when exploited successfully, may allow
remote code execution.
...
This worm arrives via removable drives.It drops an AUTORUN.INF file to automatically execute the copies it drops when a user accesses the drives of an affected system.It connects to Internet Relay Chat (IRC) servers.It takes advantage of certain vul...
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.It connects to certain websites to send and receive information. It gathers information and reports it to i...
A remote code execution vulnerability exists in Microsoft Internet
Explorer. The vulnerability exists as an invalid pointer reference
within Internet Explorer. It is p...
This is the Trend Micro detection for files that propagate via vulnerablity in Windows Shell that could allow arbitrary commands to be executed.This Worm drops file(s)/component(s) detected as RTKT_STUXNET.A. It also drops non-malicious files. It dro...
This worm may be unknowingly downloaded by a user while visiting malicious websites.It exploits software vulnerabilities to propagate to other computers across a network.It deletes the initially executed copy of itself.
This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.It steals certain information from the system and/or the user.However, as of this writing, the said sit...
This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.It encrypts files with specific file extensions.
Microsoft addresses several vulnerabilities in its June batch of patches:
MS08-067 | Vulnerability in Server Service Could Allow Remote Code Execution (958644)
Risk Rating: Critical
This security u...
This Hacking Tool arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It may be manually installed by a user.
This Hacking Tool arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.It connects to certain websites to send and receive information.It encrypts files with specific file ex...
This Potentially Unwanted Application arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
This Hacking Tool arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.