Keyword: URL
43724 Total Search   |   Showing Results : 961 - 980
This website is a phishing URL for Banco de Oro. Similar to other phishing pages, it displays a fake login page and when users input their credentials, they are redirected to the legitimate banking
CVE-2010-1143 Cross-site scripting (XSS) vulnerability in VMware View (formerly Virtual Desktop Manager or VDM) 3.1.x before 3.1.3 build 252693 allows remote attackers to inject arbitrary web script
and/or IDF rules. 1000585| 1000585 - Microsoft Excel Crafted URL Unicode Buffer Overflow
BKDR_LIFTOH.DLF connects to this URL to send and receive commands from a remote malicious user. It spreads by using two worms, which use multi-protocol instant messaging (IM) apps like Quiet Internet
BKDR_LIFTOH.DLF connects to this URL to send and receive commands from a remote malicious user. It spreads by using two worms, which use multi-protocol instant messaging (IM) apps like Quiet Internet
TROJ_DLDR.HB connects to this URL to download a file and saves it as %System%\hzcompl.dll . This malware is involved in the cyber attacks that targeted specific users in South Korea during March of
TROJ_DLDR.HB connects to this URL to download a file and saves it as %System%\logda.dat . This malware is involved in the cyber attacks that targeted specific users in South Korea during March of
TROJ_DLDR.HB connects to this URL to download a file and saves it as %System%\cutecat.gif . This malware is involved in the cyber attacks that targeted specific users in South Korea during March of
TROJ_DLDR.HB connects to this URL to download a file and saves it as %System%\hinredfh.exe . This malware is involved in the cyber attacks that targeted specific users in South Korea during March of
TROJ_DLDR.HB connects to this URL to download a file and saves it as %System%\sotd.dll . This malware is involved in the cyber attacks that targeted specific users in South Korea during March of
TROJ_DLDR.HB connects to this URL to download a file and saves it as %System%\logdamain.dat . This malware is involved in the cyber attacks that targeted specific users in South Korea during March of
TROJ_DLDR.HB connects to this URL to download a file and saves it as %System%\tefrcft.gif . This malware is involved in the cyber attacks that targeted specific users in South Korea during March of
BKDR_SHOTODOR.A connects to this URL to send and receive commands from a remote malicious user. This malware makes use of “garbage” strings, which in actual hides the malicious code. The said
Symfony 2.0.x before 2.0.20 does not process URL encoded data consistently within the Routing and Security components, which allows remote attackers to bypass intended URI restrictions via a doubly
}ki.livecheck.org - malicious URL blocked already by Trend Micro Compromises system security
TROJ_DLDR.HB connects to this URL to download a file and saves it as %System%\{random file name}.dll . This malware is involved in the cyber attacks that targeted specific users in South Korea during
BKDR_POISON.DOC connects to this URL to send and receive commands from a remote malicious user. These commands include capturing screen, audio and webcam, logging keystrokes, managing passwords, and
JS_OBFUSC.BEB loads a JAR file from this URL and it passes parameters to it if the computer has a particular Java version installed. This malware is related to a spammed message that leverages the
deliberately obfuscated by way of URL shorteners. URL shorter services, such as bit.ly , shorten long URLs in order to make them easier to use in messages that have a limited character capacity. With their
malicious file from a certain URL. The URL where this malware downloads the said file depends on the parameter passed on to it by its components. Other Details This Trojan takes advantage of an unknown