Keyword: URL
300 Total Search   |   Showing Results : 201 - 220
This adware may be dropped by other malware.It modifies the user's Internet Explorer home page into a certain website. This action allows the malware to point to a website which may contain malware, putting the affected computer at greater risk of m...
Multiple cross-site scripting vulnerabilities in IBM Lotus Domino allow remote attackers to inject arbitrary web script or HTML via (1) a URL accessed during use of the Mail template in the WebMail ...
Outlook Web App (OWA) in Microsoft Exchange Server 2013 SP1 and Cumulative Update 6 does not properly validate redirection tokens, which allows remote attackers to redirect users to arb...
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users.
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.It does not have any propagation routine.It does not have any backdoor routine.
This Trojan may be downloaded by other malware/grayware from remote sites.
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.It stea...
This Backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.It does not have any propagation routine.It runs certain commands that it receives remotely from a malici...
This is an updated Bashlite malware designed to add infected internet-of-things devices to a distributed-denial-of-service (DDoS) botnet.This Backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by user...
After the WikiLeaks publication of a confidential document that has created a global stir, spammers are now taking advantage of the event. As with most social engineering attacks, cybercriminals are not too far behind every tim...
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
This Trojan downloads a possibly malicious file from a certain URL. The URL where this malware connects to depends on the parameter hppowndnkgnk passed onto it by its components.This Trojan arrives as a component bundled with malware/grayware packag...
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
Cross-site scripting (XSS) vulnerability in the URLDecoder function in JRE before 1.8, as used in Apache Struts 2.x before 2.3.28, when using a single byte pa...
Apache Tomcat 5 before 5.5.17 allows remote attackers to list directories via a semicolon (;) preceding a filename with a mapped extension, as demonstrated by URLs ending with /;index.jsp and /;help.do. Apache...
This Trojan downloads from the URL specified in the parameter fa and executes the downloaded file.This Trojan executes when a user accesses certain websites where it is hosted.
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users.
This potentially unwanted application arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It may be downloaded from remote sites by other malware.It does not have any pro...
This malware is a backdoor with the primary purpose of stealing information from online transactions. The list of the monitored URLs can also be dynamically updated by a cybercriminal. It also has features to enable it to run on Windows Vista and Win...
Tcpip.sys in the TCP/IP stack in Microsoft Windows 7 Gold and SP1 and Windows Server 2008 R2 and R2 SP1 does not properly implement URL-based QoS, which allows remote attackers to cause a den...