Keyword: URL
43719 Total Search   |   Showing Results : 41 - 60
This detection is for web threats related to malicious URL redirectors. It is common for web threats to redirect URLs to avoid detection. An example is using meta refresh and HTTP status codes of
"Office Web Components URL Parsing Vulnerability." Microsoft Office Web Components 2000 Apply associated Trend Micro DPI Rules. 1001934| 1001934 - Microsoft Office Web Components URL Parsing Remote
This spammed message contains only a URL that when clicked redirects users to http://{BLOCKED}trax.com . We also spotted another spam sample with the same URL content but with a different subject,
Other Details Based on analysis of the codes, it has the following capabilities: Upon execution, it accesses the URL http://{BLOCKED}e.net/.go/check.html . The said URL may redirect to the following
Other Details Based on analysis of the codes, it has the following capabilities: Upon execution, it accesses the URL http://{BLOCKED}e.net/.go/check.html . The said URL may redirect to the following
malware/grayware or malicious users. NOTES: This Trojan contains possibly malicious URL www.{BLOCKED}obile.com/flash/_notes/cibmno . It only connects to the said URL if the user clicks on the link.
following upon accessing the URL: https://{BLOCKED}toonami.com/ Redirects to the following URL upon clicking the " Continue " button, aimed to gather the user's credit card information : https://{BLOCKED
This Trojan downloads from the URL specified in the parameter fa and executes the downloaded file. This Trojan executes when a user accesses certain websites where it is hosted. Arrival Details This
CVE-2013-0009,CVE-2013-0010 This patch addresses vulnerabilities found in Microsoft System Center Operations Manager. These can be exploited when a user visits a specially crafted URL via clicking a
malware/grayware or malicious users. NOTES: This Trojan may connect to the possibly malicious URL 90jjj.{BLOCKED}o.com . It only connects to the said URL once a specific link is clicked by the user. Infostealer
CVE-2009-0187 Stack-based buffer overflow in Orbit Downloader 2.8.2 and 2.8.3, and possibly other versions before 2.8.5, allows remote attackers to execute arbitrary code via a crafted HTTP URL with
1002749| 1002749 - Apple QuickTime RTSP URL Buffer Overflow
specially-crafted URL to execute script in a victim's Web browser within the security context of the hosting Web site, once the URL is clicked. An attacker could use this vulnerability to steal the victim's
CVE-2007-3040 Stack-based buffer overflow in agentdpv.dll 2.0.0.3425 in Microsoft Agent on Windows 2000 SP4 allows remote attackers to execute arbitrary code via a crafted URL to the Agent
real URL using a formatting tag. Users are advised not to click on links sent over email even though it appears to come from a legitimate source. Opt to type the bank or other services' URL directly.
This spammed email message contains a generic subject and message. It also has a URL after the message . When clicked, the URL redirects users to a fake product site. The fake product site asks for
This Trojan accesses a certain URL to download a JAR file. It then executes the file Inc.class inside the JAR file. The file Inc.class is detected by Trend Micro as JAVA_BLACOLE.BM. This Trojan may
CVE-2008-0016 Stack-based buffer overflow in the URL parsing implementation in Mozilla Firefox before 2.0.0.17 and SeaMonkey before 1.1.12 allows remote attackers to execute arbitrary code via a
following malware/grayware from remote sites: Trojan.SH.MALXMR.UWEJJ Other Details This Trojan does the following: Checks connection to the download URL http://{BLOCKED}.{BLOCKED
This Trojan requires its main component in order to completely perform its intended routines. It may be used to connect to a URL and port specified as parameter. This Trojan is a component of other