Keyword: url
43686 Total Search   |   Showing Results : 1 - 20
   Next  
CVE-2010-0027 The URL validation functionality in Microsoft Internet Explorer 5.01, 6, 6 SP1, 7 and 8, and the ShellExecute API function in Windows 2000 SP4, XP SP2 and SP3, and Server 2003 SP2, does
}l8r1bihsjwuj1n4zf.casaeclectica.com.mx/kafecodes/kholdq/zwen.php It creates an iframe or redirects to certain URLs depending on the parameter it receives. It may redirect to the following URL: {malware’s host}/{malware’s URL path}/blondonn.php The iframe consists
Tomcat URL Information Disclosure
CVE-2006-1148 Multiple stack-based buffer overflows in the procConnectArgs function in servmgr.cpp in PeerCast before 0.1217 allow remote attackers to execute arbitrary code via an HTTP GET request
2.0.0.4,mozilla thunderbird 2.0.0.5,mozilla thunderbird 2.0.0.6,mozilla thunderbird 2.0.0.9 Apply associated Trend Micro DPI Rules. 1003156| 1003156 - Mozilla Firefox URL Parsing Vulnerability
ActiveX Kill Bits (2900986) NOTES: It creates an iframe or redirects to certain URLs depending on the parameter it receives. It may redirect to the following URL: {malware’s host}/{malware’s URL path
The added .JOB files (scheduled tasks) attempt to access a URL. The said URL only displays a nonmalicious image when accessed. It may require additional parameters to download other possibly
This Trojan is a specially crafted Advanced Streaming Format (ASF) file which, when opened in Windows Media Player , accesses a URL. The URL visited redirects the user to another URL that steals user
The URL is currently being blocked as malicious by WRS - URL Filtering Service. It is the download URL of malware with file detection of: TROJ_ZBOT.BRJ.
This Trojan accesses a certain URL to obtain the link where to download a file and its file name. It then executes the downloaded file. However, as of this writing, the said URL is no longer
This Trojan connects to a certain URL using the Internet browser to display an animation. It does this to hide its malicious routine. It sets a URL as the automatic configuration script address of
This malicious URL redirects to another URL that downloads a file detected as TROJ_SMALL.NSZ.
The malware related to this URL connects to this URL to download a malicious file.
The malware related to this URL connects to this URL to download a malicious file.
This trojan is a specially crafted Advanced Streaming Format (ASF) file which when opened in Windows Media Player connects to certain URLs. The URL visited will then redirect the user to another URL
version. It then generates a random string based on the version. The random string in appended to the URL http://{BLOCKED}z.cn/vid/?id=. As a result, the appended URL appears as http://[BLOCKED}z.cn/vid/?id=
This URL is related to the malware detected as HTML_MALSCRIP.AU. When accessed, the URL is detected as MAL_HIFRM.
Trend Micro engineers spotted a spammed fake Facebook friend notification that leads to malware. The message uses URL cloaking technique, in which the URL redirects to a malicious website and
URL used in a spam run disguised as a webmail update. In reality, however, the URL leads to a phishing website.
BKDR_VAWTRAK.DOKR connects to this URL to send and receive commands from a remote malicious user. The URL is categorized as C&C server.