Search
Keyword: usoj_cve20146352.e
300 Total Search |
Showing Results : 1 - 20
This worm arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
This spyware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.It deletes itself after execution.
This worm drops an AUTORUN.INF file to automatically execute the copies it drops when a user accesses the drives of an affected system.
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
This worm arrives by connecting affected removable drives to a system. It arrives by accessing affected shared networks.
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
Multiple buffer overflows in E-Post Mail Server 4.10 and SPA-PRO Mail @Solomon 4.00 allow remote attackers to execute arbitrary code via a long username to the (1) AUTH PLAIN or (2) AUTH LOGIN SMTP com...
SQL injection vulnerability in the Oracle Diagnostics module 2.2 and earlier allows remote attackers to execute arbitrary SQL commands via uknown attack vectors.
Oracle Diagnostics 2.0,Oracle...
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.It displays fake alerts that warn users of infection. It also displays fake scanning results of the affecte...
This backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
From: Your New E-CArd, Your E-CardSubject: A Special Momemnts E-Card from Anonymous, Anonymous has sent you a Personalized E-CardYou have been sent an eCard!It can be picked up at the following address:
http:// {BLOCKED}...
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
This Potentially Unwanted Application arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
This worm arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
Yet Another eCard Spam with Invisible Ink
From: e-Card.comSubject: Susan sent you an e-Card, Iva sent you an e-Card, Florine sent you an e-Card, Todd sent you an e-CardDear {random name},You were sent a eCard!Click here and press Open to view it.
This malware displays a legitimate-looking graphical user interface and fake infection alerts on the affected system. Should the user choose to purchase the fake application, his confidential data will be gathered and sent to malicious users.This Tro...
This worm arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.It deletes itself after execution.