Search
Keyword: ad
This iOS malware modifies the developer ID in the advertisement SDKs used by installed applications.
(MS15-062) Vulnerability in Active Directory Federation Services Could Allow Elevation of Privilege (3062577)

This security update addresses a vulnerability in Microsoft Active Directory Federation Services (AD FS) that could allow elevation of privi...
SQL injection vulnerability in the ad hoc query module in Trend Micro Control Manager (TMCM) before 5.5.0.1823 and 6.0 before 6.0.0.1449 allows remote attackers to execute arbitrary SQL c...
SQL injection vulnerability in the ad hoc query module in Trend Micro Control Manager (TMCM) before 5.5.0.1823 and 6.0 before 6.0.0.1449 allows remote attackers to execute arbitrary SQL c...
This security update resolves a reported vulnerability in Active Directory. The vulnerability, if left unpatched, may allow denial of service if an attacker sends ...
This spammed message entices users to check out the sender's bogus photos. It also invites unsuspecting users to chat with the sender by clicking a link. When they clicked this URL, they are red...
The LDAP service in Microsoft Active Directory, Active Directory Application Mode (ADAM), Active Directory Lightweight Directory Service (AD LDS), and Active Directory Services allows remote attackers ...
This spammed message guises as an online pharmacy ad and informs users that they sell various products that do not require a doctor's prescription. It also has an image attachment, img001.jpg probably to bypass content based spam fil...
This adware may be manually installed by a user.
This Trojan may be hosted on a website and run when a user accesses the said website.It requires its main component to successfully perform its intended routine.
Android
NOTES: This malware is a Potentially-Unwanted Application (PUA) live show payware app with multiple pay SDKS, such as Alipay, Iapppay and Unionpay.
Iappay is a payment service SDK that allows for payments to be made by ...
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
This Trojan connects to the URL:
This Trojan executes when a user accesses certain websites where it is hosted.
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
Social networking is a tool to connect with friends and family. But for cybercriminals, sites like Facebook and Twitter are emerging platforms to target users. Scams continuously lure users to ad track...
This spyware may be manually installed by a user.
Stack consumption vulnerability in the LDAP service in Active Directory on Microsoft Windows 2000 SP4, Server 2003 SP2, and Server 2008 Gold and SP2; Active Directory Application Mode (ADAM) on Windows XP ...
This Trojan may be dropped by other malware. It may be unknowingly downloaded by a user while visiting malicious websites.As of this writing, the said sites are inaccessible.