Search
Keyword: (ms10-073) vulnerabilities in windows kernel-mode drivers could allow elevation of privilege (981957)
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users.It does not have any propagation routine.It does not have any backdoor routine.It executes the dropped file(s). As a result, malicious routin...
This update resolves a vulnerability in the Netlogon RPC Service on affected versions of Windows Server that are configured to serve as domain controllers. I...
This update resolves vulnerabilities in Microsoft Publisher that could allow remote code execution. An attacker can exploit the vulnerability by opening a s...
This security update addresses a vulnerability in the Print Spooler service.
Once successfully exploited, this could result to remote code execution when a...
This security update addresses a vulnerability in the Secure Channel (SChannel) security package in Windows that could allow denial of service if an affected Internet Inform...
This security update addresses vulnerability in MPEG-4 codec that when
exploited could give an attacker user rights as the user.
In addition, this could also lead t...
This security update addresses thirteen vulnerabilities in Microsoft Office. More specifically, it resolves issues that could allow remote code execution if a u...
This security update addresses a vulnerability in Microsoft Windows that could allow remote code execution if a user opened a specially crafted file using...
This security update resolves a vulnerability in Windows Task Scheduler, which could allow elevation of privilege if an attacker is logged on to an affected syste...
This JavaScript has received attention from independent media sources and/or other security firms.To get a one-glance comprehensive view of the behavior of this Trojan, refer to the Threat Diagram shown below.This Trojan may be unknowingly downloade...
This Trojan exploit targets a known vulnerability in <i>Microsoft Office Word</i> with the way it handles specially crafted .RTF document files. In addition, it also uses social engineering techniques. Specifically, it dro...
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users.It executes the dropped file(s). As a result, malicious routines of the dropped files are exhibited on the affected system.
Once a malware successfully exploits the vulnerability, it causes certain actions to be done on the system.This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users.
This Trojan executes when a user accesses certain websites where it is hosted.It executes the downloaded files. As a result, malicious routines of the downloaded files are exhibited on the affected system. As of this writing, the said sites are inac...
(MS10-065) Vulnerabilities in Microsoft Internet Information Services (IIS) Could Allow Remote Code Execution (2267960)

This security update addresses vulnerability in Internet Information Services
(IIS) that could allow remote code execution once a...
This malware exploits a software vulnerability in order to drop a malicious file onto the affected system. It also drops and opens a document file in order to hide its malicious routines.Once a malware successfully exploits the said vulnerability, it...
This Trojan arrives as attachment to mass-mailed email messages. It arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
This security update addresses vulnerabilities in Microsoft Office that could allow remote execution when an unsuspecting user opens a specially crafted .RTF e...
(MS10-091) Vulnerabilities in the OpenType Font (OTF) Driver Could Allow Remote Code Execution (2296199)

This security update resolves several vulnerabilities in the Windows Open Type Font (OTF) driver, which could allow remote users to execute code ...
This specially crafted RTF file takes advantage of a vulnerality in certain versions of Microsoft Office to download another malicious file that Trend Micro detects as BKDR_TURKOJAN.JF. As a result, routines of the downloaded backdoor are also exhibi...