Search
Keyword: trojagent3
This spyware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This spyware arrives on a system as a
WWWISIS is prone to a cross-site scripting vulnerability because the application fails to properly sanitize user-supplied input. An attacker may leverage this issue to execute arbitrary script code
CVE-2006-4364 Alt-N MDaemon POP3 Server is susceptible to multiple remote buffer-overflow vulnerabilities. The issues are due to the application's failure to properly bounds-check user-supplied input
CVE-2009-0772 The layout engine in Mozilla Firefox 2 and 3 before 3.0.7, Thunderbird before 2.0.0.21, and SeaMonkey 1.1.15 allows remote attackers to cause a denial of service (crash) and possibly
CVE-2008-5012 Mozilla Firefox 2.x before 2.0.0.18, Thunderbird 2.x before 2.0.0.18, and SeaMonkey 1.x before 1.1.13 do not properly change the source URI when processing a canvas element and an HTTP
),Microsoft .NET Framework 1.0 Service Pack 3 (Windows XP Service Pack 3),Microsoft .NET Framework 1.1 Service Pack 1 (Windows XP Service Pack 3)
This spyware attempts to steal information, such as user names and passwords, used when logging into certain banking or finance-related websites. It checks for the presence of the following processes
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This spyware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This spyware arrives on a system as a
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This adware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This adware arrives on a system as a
This malware disguises itself as FIFA 14-CrackV5. A World Cup-related search can lead users to a supposed key generator for the game FIFA 14. To get a one-glance comprehensive view of the behavior of
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It terminates itself if it detects it is being run in a
This Ransom arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Ransom arrives on a system as a
This Trojan Spy arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan Spy arrives on a system
This Potentially Unwanted Application arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This
{DD2C0C94-16A1-40A7-9122-A21C3E1B8A95} AppPath = "%Program Files%\xoxWAJcuxIE" HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\ Microsoft\Internet Explorer\Low Rights\ ElevationPolicy\{DD2C0C94-16A1-40A7-9122-A21C3E1B8A95} Policy = "3
" HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\ services\nosku Start = "3" HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\ INCAInternet\nProtect Online Security\V1.0 starterterminatedsafely = "1" HKEY_LOCAL_MACHINE\SYSTEM
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan Spy arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It deletes itself after execution. Arrival Details