Search
Keyword: possibleotorun2
This Trojan Spy arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan Spy arrives on a system
W3Svc wbengine WdNisSvc WebClient WinDefend WinVNC4 WRSVC Zoolz 2 Service It terminates the following processes if found running in the affected system's memory: mpsevh.exe mpsvc.exe mrf.exe msaccess.exe
Double free vulnerability in Adobe Flash Player before 13.0.0.264 and 14.x through 16.x before 16.0.0.296 on Windows and before 11.2.202.440 on Linux allows attackers to execute arbitrary code via
Double free vulnerability in Adobe Flash Player before 13.0.0.264 and 14.x through 16.x before 16.0.0.296 on Windows and before 11.2.202.440 on Linux allows attackers to execute arbitrary code via
Hidden = "2" (Note: The default value data of the said registry entry is 2 .) HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\ Security Center AntiVirusOverride = "1" HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\ Security
" It modifies the following registry entries: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\ Services\winmgmt Start = "2" (Note: The default value data of the said registry entry is 2 .) Dropping Routine This
This file infector arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This file infector arrives on a
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It deletes itself after execution. Arrival Details This
CVE-2008-2811 The block reflow implementation in Mozilla Firefox before 2.0.0.15, Thunderbird 2.0.0.14 and earlier, and SeaMonkey before 1.1.10 allows remote attackers to execute arbitrary code or
CVE-2001-0247 Buffer overflows in BSD-based FTP servers allows remote attackers to execute arbitrary commands via a long pattern string containing a {} sequence, as seen in (1) g_opendir, (2)
2013-4449 The rwm overlay in OpenLDAP 2.4.23, 2.4.36, and earlier does not properly count references, which allows remote attackers to cause a denial of service (slapd crash) by unbinding immediately
This worm arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This worm arrives on a system as a file
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It deletes itself after execution. Arrival Details This
installations are not affected by the vulnerabilities in this bulletin: Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) Windows Server 2008 for x64-based Systems Service Pack 2
This Potentially Unwanted Application arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It does not have any
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It deletes itself after execution. Arrival Details This
This backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This backdoor arrives on a system as a
"e1" HKEY_LOCAL_MACHINE\SOFTWARE\NaviSearch BuildNumber = "1f67" HKEY_LOCAL_MACHINE\SOFTWARE\NaviSearch TrackingURLCount = "2" HKEY_LOCAL_MACHINE\SOFTWARE\NaviSearch TrackingURLEnable = "1
This Trojan attempts to steal sensitive online banking information, such as user names and passwords. This routine risks the exposure of the user's account information, which may then lead to the
(0x03)_êoj«âæ2÷ª_CHAR(0x1C)__CHAR(0x12)_xâv_CHAR(0x03)_»P)~#ë`_CHAR(0x12)_÷øA_CHAR(0x07)_ÔMv(:4ÉâêÇ_CHAR(0x0E)_ÃêM+M2XbY«22\#ë`_CHAR(0x12)_÷ø
iëîY«2%ÆïûöHR%_CHAR(0x04)_ÌÚ2Mv«Â¦_CHAR(0x05)_Pè