Search
Keyword: default5.asp
This spyware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
Unspecified vulnerability in Microsoft Internet Information Services (IIS) 5.1 on Windows XP SP3, when directory-based Basic Authentication is enabled, allows remote attack...
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
ASP.NET in Microsoft .NET Framework 2.0 SP1 and SP2 and 3.5 Gold and SP1, when ASP 2.0 is used in integrated mode on IIS 7.0, does not properly manage request scheduling, which allows ...
From: Facebook AdvertisingSubject: FaceBook message: Girls Dancing on facebook Video (Last rated by {random name})Message from Your Friends on Faceboo, March 11, 2009
You have 1 Personal Message:Video titl...
This backdoor may be hosted on a website and run when a user accesses the said website.
cve: IIS 5.0 allows remote attackers to obtain source code for .ASP files and other scripts via an HTTP GET request with a "Translate: f" header, aka the "Specialized Header" vulnerability.
Microsoft IIS 5.0...
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
This spyware may be dropped by other malware. It may be unknowingly downloaded by a user while visiting malicious websites.It creates folders where it drops its files.It modifies the Internet Explorer Zone Settings.It attempts to steal sensitive onl...
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
This spyware attempts to access a Web site to download a file which contains information where the Trojan can download an updated copy of itself, and where to send its stolen data. This configuration file also contains a list of targeted bank-related...
This spyware may be dropped by other malware. It may be unknowingly downloaded by a user while visiting malicious websites.It creates folders where it drops its files.It modifies the Internet Explorer Zone Settings.It attempts to steal sensitive onl...
Once users access any of the monitored sites, it starts logging keystrokes. It attempts to steal information, such as user names and passwords, used when logging into certain banking or finance-related websites.
The shtml.exe program in the FrontPage extensions package of IIS 4.0 and 5.0 allows remote attackers to determine the physical path of HTML, HTM, ASP, and SHTML files by requesting a file that does ...
It executes commands from a remote malicious user, effectively compromising the affected system.This backdoor may be dropped by other malware.
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
This spyware attempts to steal information, such as user names and passwords, used when logging into certain banking or finance-related websites.
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
This backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.