Keyword: MAL_VUNDO-4
68453 Total Search   |   Showing Results : 441 - 460
Server 2005 Express Edition with Advanced Services Service Pack 4 (Microsoft SQL Server 2000),Microsoft SQL Server 2005 for x64-based Systems Service Pack 4 (Microsoft SQL Server 2000),Microsoft SQL Server
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It requires its main component to successfully perform
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It may be dropped by other malware. It executes the
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It may be dropped by other malware. It executes the
entry is 0 .) It modifies registry entries to disable the following system services: HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\ Services\BITS Start = "4" (Note: The default value data of the said
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
disclosure. Windows Server 2003 Service Pack 2,Microsoft .NET Framework 3.0 Service Pack 2 (Windows Server 2003 Service Pack 2),Microsoft .NET Framework 4 (Windows Server 2003 Service Pack 2),Windows Server
\ Wow6432Node\CLSID\{11347ACA-6019-BD37-83C6-A3C16253F96A} NHmoOnuxYPLxe = "k~\LuJ`" HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\ Licenses {IEE1F7440C4EA354A} = "4\x00\x00\x00" HKEY_LOCAL_MACHINE\SOFTWARE\Classes
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This spyware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This spyware arrives on a system as a
modifies the following registry entries: HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\ Services\ERSvc Start = "4" (Note: The default value data of the said registry entry is 2 .) HKEY_LOCAL_MACHINE\SYSTEM
This Potentially Unwanted Application arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This
"false" HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\ Services\TSKNF501.SYS Start = "4" HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\ Services\KmxFile Start = "4" HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\ Services
Explorer\SYSTEM.INI.EXE %User Temp%\Microsoft .NET Framework 4 Setup_4.0.30319\Microsoft .NET Framework 4 Setup_4.0.30319.EXE %User Temp%\Microsoft .NET Framework 4 Setup_4.0.30319\SYSTEM.INI %User Temp%
CVE-2009-1386 ssl/s3_pkt.c in OpenSSL before 0.9.8i allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via a DTLS ChangeCipherSpec packet that occurs
CVE-2009-1378 Multiple memory leaks in the dtls1_process_out_of_seq_message function in ssl/d1_both.c in OpenSSL 0.9.8k and earlier 0.9.8 versions allow remote attackers to cause a denial of service
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It disables Task Manager, Registry Editor, and Folder