Keyword: VBS_SMALL
4608 Total Search   |   Showing Results : 2661 - 2680
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It deletes itself after execution. Arrival Details This
This malware is involved in the cyber attacks that targeted specific users in South Korea during March of 2013. It enters systems through a spammed mail purporting to come from a major banking
What is a cookie? Cookies are small text files that are created on a user’s system whenever they visit a web site. It’s a way for that website to remember its visitors and all that they do on it, so
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
outage) via a series of TCP sessions that have pending data and a (1) small or (2) zero receive window size, and remain in the FIN-WAIT-1 or FIN-WAIT-2 state indefinitely, aka "TCP/IP Orphaned Connections
2003 Web Components SP3, Office 2003 Web Components SP1 for the 2007 Microsoft Office System, Internet Security and Acceleration (ISA) Server 2004 SP3 and 2006 Gold and SP1, and Office Small Business
2003 Web Components SP1 for the 2007 Microsoft Office System, Internet Security and Acceleration (ISA) Server 2004 SP3 and 2006 SP1, and Office Small Business Accounting 2006 allows remote attackers to
the 2007 Microsoft Office System, Internet Security and Acceleration (ISA) Server 2004 SP3 and 2006 SP1, and Office Small Business Accounting 2006 does not properly allocate memory, which allows remote
Components SP3, Office 2003 Web Components SP1 for the 2007 Microsoft Office System, Internet Security and Acceleration (ISA) Server 2004 SP3 and 2006 Gold and SP1, and Office Small Business Accounting 2006,
Desktop Protocol (RDP) request with a small length field. rdesktop rdesktop 1.5.0 Trend Micro Deep Security shields networks through Deep Packet Inspection (DPI) rules. Trend Micro customers using
allows attackers to spoof HMAC-based signatures and bypass authentication by specifying a truncation length with a small number of bits. ibm websphere_application_server 6.0,ibm
Encoded (RLE) data containing a small image and a large row count. Apple CUPS 1.3,Apple CUPS 1.3.8,Apple CUPS 1.3.7,Apple CUPS 1.3.6,Apple CUPS 1.3.5,Apple CUPS 1.3.4,Apple CUPS 1.3.3,Apple CUPS 1.3.2,Apple
Description Name: TROJAN - HTTP (Request) . This is Trend Micro detection for packets passing through HTTP network protocols that can be used as Command and Control Communication. This also indicates a malware infection. Below are some indicators of ...
Description Name: TROJSMALL HTTP Request . This is Trend Micro detection for packets passing through HTTP network protocols that can be used as Command and Control Communication. This also indicates a malware infection. Below are some indicators of a...
This Potentially Unwanted Application arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It may be manually installed
This Trojan Spy arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It arrives on a system as a file dropped by other malware or as a file downloaded
This spyware attempts to steal sensitive online banking information, such as user names and passwords. This routine risks the exposure of the user's account information, which may then lead to the
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It disables Task Manager, Registry Editor, and Folder
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It deletes itself after execution. Arrival Details This
This spyware attempts to steal information, such as user names and passwords, used when logging into certain banking or finance-related websites. Arrival Details This spyware may be unknowingly