Keyword: glossary.asp
2324 Total Search   |   Showing Results : 461 - 480
This adware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This adware arrives on a system as a
{random folder}\extensions\extension@linkeyproject.com %Program Files%\ASP %Program Files%\Assets Manager %Program Files%\Linkey %Program Files%\RCP %TEMP%\ns{random value} %TEMP%\ns{random value}.tmp
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This backdoor may be downloaded by other malware/grayware from remote sites. It uses Windows Task Scheduler to create a scheduled task that executes the dropped copy. Arrival Details This backdoor
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. As of this writing, the said sites are inaccessible.
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
\is-DFBSL.tmp %User Temp%\is-OU7M1.tmp %User Temp%\is-OU7M1.tmp\_isetup %User Profile%\Application Data\ASP %User Temp%\is-VJ2VR.tmp %User Temp%\is-7SPQH.tmp %User Temp%\is-7SPQH.tmp\_isetup (Note: %User Temp% is
This Backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It does not drop any other file. It requires being
This Backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It may be hosted on a website and run when a user
This Potentially Unwanted Application arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It may be manually installed
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It creates folders where it drops its files. It
CVE-1999-0449 The ExAir sample site in IIS 4 allows remote attackers to cause a denial of service (CPU consumption) via a direct request to the (1) advsearch.asp, (2) query.asp, or (3) search.asp
CVE-1999-0736 The showcode.asp sample file in IIS and Site Server allows remote attackers to read arbitrary files. Microsoft IIS 4.0 Trend Micro Deep Security shields networks through Deep Packet
CVE-1999-0737 The viewcode.asp sample file in IIS and Site Server allows remote attackers to read arbitrary files. Microsoft IIS 4.0 Trend Micro Deep Security shields networks through Deep Packet
CVE-2008-1547 Open redirect vulnerability in exchweb/bin/redir.asp in Microsoft Outlook Web Access (OWA) for Exchange Server 2003 SP2 (aka build 6.5.7638) allows remote attackers to redirect users to
CVE-2006-1300 Microsoft .NET framework 2.0 (ASP.NET) in Microsoft Windows 2000 SP4, XP SP1 and SP2, and Server 2003 up to SP1 allows remote attackers to bypass access restrictions via unspecified
CVE-2009-4444,CVE-2009-4445 Microsoft IIS is prone to a security-bypass vulnerability. This vulnerability may result in IIS interpreting unexpected files as CGI applications. Attackers may be able to