Keyword: possible
495 Total Search   |   Showing Results : 461 - 480
There is an observed increase in the number of spammed email using Better Business Bureau 's name in May 2012. This particular spammed message, however, contains an attachment. The said attachment is
From: Fione, Sandy Subject: Here you have Hello: This is The Document I told you about,you can find it Here. http://www.{BLOCKED}ocuments.com/library/PDF_Document21.025542010.pdf Please check it and
Trend Micro has received multiple samples of this worm from multiple, independent sources, including customer reports and internal sources. These indicate that this worm poses a high risk to users
This Trojan may be dropped by other malware. It arrives as a component bundled with malware/grayware/spyware packages. It displays fake alerts that warn users of infection. It also displays fake
Trend Micro has received multiple samples of this worm from multiple, independent sources, including customer reports and internal sources. These indicate that this worm poses a high risk to users
This Trojan may be hosted on a website and run when a user accesses the said website. It accesses websites to download files. This action allows this malware to possibly add other malware on the
This file infector arrives via removable drives. It arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It infects by
This file infector arrives via removable drives. It arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It infects by
This file infector arrives via removable drives. It arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It infects by
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It may arrive bundled with malware packages as a malware component. It does not have any
This is a Fast SYN Scanner that uses libnet and libpcap , which require root level access. It scans a given netblock on a specified port, using the specified interface with some type of speed setting
This Trojan Spy arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It may be downloaded by other malware/grayware/spyware from remote sites. It connects
The MegaCortex ransomware first appeared in January 2019 with few interesting attributes, including the use of a signed executable as part of the payload. It also appeared to offer security
This File infector arrives via removable drives. It arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It infects by
This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It drops files as ransom note. Arrival Details This
This proof of concept attempts to exploit a vulnerability known as Spectre. If successful, it allows exploitation of said vulnerability in Windows systems. Exploitation of the vulnerability is
The malware uses similar techniques as those of PlugX, like process injection and use of blob file. The malware directly loads the backdoor file located in its command-and-control
CVE-2007-2885 Microsoft Visual Database Tools Database Designer ActiveX Control is prone to a buffer-overflow vulnerability because the application fails to handle overly long user-supplied strings.
CVE-2006-5633 Firefox 1.5.0.7 and 2.0, and Seamonkey 1.1b, allows remote attackers to cause a denial of service (crash) by creating a range object using createRange, calling selectNode on a DocType
This vulnerability allows SYSDBA access to the Oracle database by utilising a user who has the BECOME USER system privilege, execute privileges on KUPP$PROC.CHANGE_USER and CREATE SESSION. A user