Search
Keyword: url
The Google URL Parsing Library (aka google-url or GURL) in Google Chrome before 4.1.249.1064 allows remote attackers to bypass the Same Origin Policy via unspecified vectors.
google ...
This Trojan may be hosted on a website and run when a user accesses the said website.Once a user visits an affected Web page, this HTML script launches a hidden IFRAME that connects to a malicious URL.
This Trojan may be hosted on a website and run when a user accesses the said website.Once a user visits an affected Web page, this HTML script launches a hidden IFRAME that connects to a malicious URL.
This Trojan may be hosted on a website and run when a user accesses the said website.This is the Trend Micro detection for files that contain malicious IFRAME tags. Once a user visits an affected Web page, this HTML script launches a hidden IFRAME t...
This Trojan may be hosted on a website and run when a user accesses the said website.Once a user visits an affected Web page, this HTML script launches a hidden IFRAME that connects to a malicious URL.
This Trojan may be hosted on a website and run when a user accesses the said website.Once a user visits an affected Web page, this HTML script launches a hidden IFRAME that connects to a malicious URL.
This Backdoor may be dropped by other malware.It executes commands from a remote malicious user, effectively compromising the affected system. However, as of this writing, the said sites are inaccessible.
It deletes the created folder.The dropped files contain the data that it writes into the MBR (Master Boot Record). This routine enables it to start even before the operating system is loaded.It creates the following events:- MPMon_6934D571-115B-4830-...
This backdoor may be downloaded by other malware/grayware from remote sites.It uses Windows Task Scheduler to create a scheduled task that executes the dropped copy.
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It may be downloaded by other malware/grayware from remote sites.It connects to certain websites to send a...
This Coinminer arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
This Trojan Spy arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
This Potentially Unwanted Application arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
This hacking tool may be manually installed by a user.
This is the Trend Micro detection for Web pages that were compromised through the insertion of a certain IFRAME tag. Once a user visits an affected Web page, this HTML script launches a hidden IFRAME that connects to a malicious URL.
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.It does not have any propagation routine.It does not have any backdoor routine.
This backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.It deletes the initially executed copy of itself.
This Worm arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.It executes commands from a remote malicious user, effectively compromising the affected system.
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.