Search
Keyword: URL
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.It deletes itself after execution.
When a Firefox user visits a site with a url that might be deceptive, Firefox will stop the load and confirm with the user that they are really visiting the site they expected to visit. How...
The MPC::HexToNum function in helpctr.exe in Microsoft Windows Help and Support Center in Windows XP and Windows Server 2003 does not properly handle malformed escape sequences, w...
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users.
IBM WebSphere Application Server is vulnerable to cross-site scripting, caused by improper validation of user-supplied input. A remote attacker could exploit this vul...
This spammed message pretends as a notification from social networking site, LinkedIn. It informs users that they have a pending message to trick them into clicking the malicous URL. The said URL points...
This spammed message purports to come from a woman who is looking for romance. It informs recipients about the sender's preferences and descriptions. To further rouse the recipients’ interest, the spammed message has a ...
This spammed message contains only a URL that when clicked redirects users to http://{BLOCKED}trax.com.
We also spotted another spam sample with the same URL content but with a different subject, Has so...
This Trojan may be unknowingly downloaded by a user while visiting malicious websites.
This adware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It may be manually installed by a user.It executes downloaded files whose malicious routines are exhibited...
This Coinminer arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It may be downloaded from remote sites by other malware.It uses the system's central processing unit (C...
This Trojan may be dropped by other malware.It executes commands from a remote malicious user, effectively compromising the affected system.It gathers information and reports it to its servers.
This backdoor may be dropped by other malware.It executes commands from a remote malicious user, effectively compromising the affected system.It gathers information and reports it to its servers.
This Coinminer arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
This Trojan arrives as attachment to mass-mailed email messages.
This Trojan may be hosted on a website and run when a user accesses the said website.
(MS13-003) Vulnerabilities in System Center Operations Manager Could Allow Elevation of Privilege (2748552)

This patch addresses vulnerabilities found in Microsoft System Center Operations Manager. These can be exploited when a user visits a speciall...
The jar protocol handler in Mozilla Firefox before 2.0.0.10 and SeaMonkey before 1.1.7 retrieves the inner URL regardless of its MIME type, and considers HTML documents within a jar archive to have the sam...
This spammed message claims to come from the Bank of America notifying of a fund transfer request. It displays a link to the bank's site which redirects to a phishing site when clicked. It hides i...
This Trojan may be downloaded by other malware/grayware from remote sites.It deletes itself after execution.