Keyword: rtf stack buffer overflow vulnerability cve-2010-3333
35 Total Search   |   Showing Results : 21 - 35
This Trojan takes advantage of software vulnerabilities in certain software to drop malicious files.
This Trojan arrives as attachment to mass-mailed email messages. It arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users.It executes the dropped file(s). As a result, malicious routines of the dropped files are exhibited on the affected system.
This Trojan arrives as attachment to mass-mailed email messages.It executes the dropped file(s). As a result, malicious routines of the dropped files are exhibited on the affected system.
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users.It does not have any propagation routine.It executes the dropped file(s). As a result, malicious routines of the dropped files are exhibited ...
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It may be unknowingly downloaded by a user while visiting malicious websites.
Microsoft addresses the following vulnerabilities in its November batch of patches:(MS10-087) Vulnerabilities in Microsoft Office Could Allow Remote Code Execution (2423930)Risk Rating: Critic...
This Microsoft Word Document malware uses social engineering methods to lure users into performing certain actions that may, directly or indirectly, cause malicious routines to be performed. Specifically, it makes use of 2012 Olympics to entice user...
This Trojan opens its dropped file %User Temp%\document.doc in order to hide its malicious routines from the user.This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users.It does not have any propag...
This Microsoft Word document malware uses social engineering methods to lure users into performing certain actions that may, directly or indirectly, cause malicious routines to be performed. Specifically, it makes use of North Korea rocket launch to ...
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.It exec...
PlugX is a remote access tool (RAT) used in targeted attacks aimed toward government-related institutions and key industries. It was utilized in the same way as Poison Ivy, a RAT involved in a campaign dating back to 2008.He...
PlugX is a remote access tool (RAT) used in targeted attacks aimed toward government-related institutions and key industries. It was utilized in the same way as Poison Ivy, a RAT involved in a campaign dating back to 2008.He...
PlugX is a remote access tool (RAT) used in targeted attacks aimed toward government-related institutions and key industries. It was utilized in the same way as Poison Ivy, a RAT involved in a campaign dating back to 2008.He...
This Trojan arrives as an attachment to email messages purportedly promoting Tibetan culture. It drops a file that is a backdoor and is infected by a file infector.To get a one-glance comprehensive view of the behavior of this Trojan, refer to the Th...