Keyword: os2
30 Total Search   |   Showing Results : 1 - 20
   Next  
Alias:Virus.OS2.Rexx.a (Kaspersky), OS2/Rexx.cmp (McAfee), OS2.HLLC.Rexx (Symantec), OS2/Rexx.Cmp (Avira), Mal/Generic-B (Sophos),Description:This is a Trojan horse. It is detected by the latest pattern file.
Description:This is a backdoor malware. It is detected by the latest pattern file.
Description:This is a backdoor malware. It is detected by the latest pattern file.
Unspecified vulnerability in the Oracle Outside In Technology component in Oracle Fusion Middleware 8.4.0 allows context-dependent attackers to affect availability via unknown vectors related to Outside In Maintenance.
Oracle Outside In Technology contains an overflow condition in the OS/2 Metafile Parser (immet2.flt) in the Outside In Filters subcomponent. The issue is triggered as user-supplied input is not properly validated.
A buffer overflow vulnerability exists in Oracle Outside-In, a set of libraries used to decode many file formats. The vulnerability is due to an error while processing OS/2 Metafiles. Oracle Outside-In is embedded in many enterprise applications.
Alias:OS2_First(Symantec),Os2Vir1(Sophos),Virus.OS2.MyName.a(Kaspersky),OS2/MyNameIs2K.B(Avira),OS2/MyNameIs.2000.A (exact)(F-Prot),OS2/DA.OS2First(McAfee)Description:This is a File Infector...
Alias:Os2Vir1(Sophos),Virus.OS2.MyName.b(Kaspersky),OS2/MyNameIs2K.B(Avira),OS2/MyNameIs.2000.B (exact)(F-Prot),OS2/Mynameis.2000.b(McAfee)Description:This is a File Infector virus. It is detected by the latest pattern file.
Alias:Virus.OS2.HLLP.7200 (Kaspersky), OS2/HLL.7200 (McAfee), OS2.HLLP.7200 (Symantec), OS2/HLLP.7200 (Avira),Description:This is a File Infector virus. It is detected by the latest pattern file.
Alias:Virus.OS2.AEP.a (Kaspersky), Arelocs.a (McAfee), OS2.Arelocs (Symantec), WIN/AEA (Avira), OS2/AEP (Sophos), Virus:Win16/AEP.1772 (Microsoft)Description:This is a File Infector virus. It is detected by the latest pattern file.
...BLOCKED}no.com/Coinis/?v=5.0&c={data} http://os2.{BLOCKED}no.com/Coinis/?v=5.0&c={data...twareking.com/MEDIA_YTZ/?v=5.0&c={data} http://os2.{BLOCKED}twareking.com/Aff-AD/?v=5.0&c...
Alias:Backdoor.OS2.Rhs (Kaspersky), BackDoor-KU (McAfee), Backdoor.Trojan (Symantec), BDS/OS2.Rhs.2 (Avira), Troj/Bdoor-KU (Sophos),Description:This is a backdoor malware. It is detected by the latest pattern file.
...codecpackapp.com/?pcrc={value} www.{BLOCKED}tcodecpackapp.com/gb/welcome/?sr=gb&lp=sag&c=1 os2.{BLOCKED}codecpackapp.com/CM/?v={version}&c={value} os-test.{BLOCKED}codecpackapp.com/CM...
...file: http://{C&C server}?user={encoded user and computer name}&id=13&ver=115&os={OS information}&os2={OS Version}&host={boolean}&k={random value}&type={depending on case}It saves the files it downloads using...
...pcrc={value}&v={value} http://os.{BLOCKED}li.org/CM_DS/?v={value}&c={value} http://os2.{BLOCKED}li.org/CM_DS/?v={value}&c={value} http://rp.{BLOCKED}li.org/?pcrc={value...
...following possibly malicious URL: http://os.{BLOCKED}enerapp.com/CM_DS/?v={value}&c={value} http://os2.{BLOCKED}enerapp.com/Aff-AD/?v={value}&c={value} http://rp.{BLOCKED}enerapp.com/?pcrc...
...server}/zukko/?user={encoded user and computer name}&id={number}&ver={number}&os={OS information}&os2={OS version}&host={boolean}&k={random value}&type={111,222,444,555,505,333,777,911,888...
...following possibly malicious URL: http://os.{BLOCKED}efileopen.com/CM_DS/?v={value}&c={value} http://os2.{BLOCKED}efileopen.com/CM_DS/?v={value}&c={value} http://rp.{BLOCKED}deoconverter.com...
...value} http://os-test.{BLOCKED}lzipextractorapp.com/CM_FL_7/?v={value}&c={value} http://os2.{BLOCKED}lzipextractorapp.com/CM_FL_7/?v={value}&c={value} http://rp.{BLOCKED}lzipextractorapp...
...possibly malicious URL: http://os.{BLOCKED}leextractorapp.com/CM_DS/?v=3.0&c=588699595 http://os2.{BLOCKED}leextractorapp.com/CM_DS/?v=3.0&c=588699595 http://rp.{BLOCKED}leextractorapp.com...
30 Total Search   |   Showing Results : 1 - 20
   Next