Keyword: span
26 Total Search   |   Showing Results : 1 - 20
   Next  
arbitrary code via DSO bindings involving (1) an XML Island, (2) XML DSOs, or (3) Tabular Data Control (TDC) in a crafted HTML or XML document, as demonstrated by nested SPAN or MARQUEE elements, and
the combination is not equal to the value found in DATAC of config.ini, it will set the time span for dispensing the bills. It will store the generated time span in DATAB of config.ini. Then, it will
to remotely execute shell commands from the URL specified by malicious remote user Http: - download and execute arbitrary file from a URL specified by the remote user x_ - sleep\idle for a span of time
an online banking Trojan made rounds in the industry because of its capacity to spread at a rapid pace in a short span of time. In May 2014 , VAWTRAK was seen targeting online banking users in Japan.
This file infector arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This file infector arrives on a
This adware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This adware arrives on a system as a
<span style="" 8pt;="" color:="" blue;="" font-family:="" mso-fareast-font-family:="" pmingliu;="" mso-bidi-font-family:="" verdana;="" mso-font-kerning:="" 1.0pt;="" mso-ansi-language:="" en-us;=
The malware related to this URL connects to this URL to download a malicious file. <SPAN style="FONT-FAMILY: 'Times New Roman','serif'; FONT-SIZE: 12pt; mso-fareast-font-family: 'Times New Roman';
This is the malicious URL that hosts the malware TSPY_LEGMIR.JW<SPAN style="FONT-FAMILY: 'Arial','sans-serif'; COLOR: #4a4a4a; FONT-SIZE: 9pt; mso-fareast-font-family: 'Times New Roman';
When accessed, this URL downloads a file detected as <SPAN style="FONT-FAMILY: 'Arial','sans-serif'; COLOR: #4a4a4a; FONT-SIZE: 9pt; mso-fareast-font-family: 'Times New Roman'; mso-ansi-language:
This is the site where TROJ_ZBOT.BYY downloads its configuartion file. This configuration file may contain <SPAN style="WIDOWS: 2; TEXT-TRANSFORM: none; TEXT-INDENT: 0px; BORDER-COLLAPSE: separate;
<SPAN style="FONT-FAMILY: 'Arial','sans-serif'; COLOR: black; FONT-SIZE: 10pt; mso-fareast-font-family: Calibri; mso-fareast-theme-font: minor-latin; mso-ansi-language: EN-US; mso-fareast-language:
This Malicious URL is related to the following malware: WORM_CODBOT.AD <SPAN style="FONT-FAMILY: 'Arial','sans-serif'; FONT-SIZE
<SPAN style="FONT-FAMILY: 'Times New Roman','serif'; FONT
http://SJC1-TE-CMSAP1.sdi.trendnet.org/dumpImages/04320152445.jpeg We have noticed the resurgence of the UPATRE malware family. This is attributed to the new arrival vectors attackers used to infect
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It deletes itself after execution. Arrival Details This
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It modifies files, disabling programs and applications
This spyware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It disables Task Manager, Registry Editor, and Folder