Search Results
Showing results for HTML/ScrInject.B!tr
Antispam
Your signature is not on the blocklist
This indicates a possible W32/Bropia.A-tr worm passing through the network on TCP port 11178 using the MSNFTP protocol.When this worm is executed it drops a copy of itself in the root directory usi...
This indicates an attack attempt against a Stack Buffer Overflow vulnerability in WECON LeviStudio.The vulnerability is due to an error when the vulnerable software handles a crafted LeviStudio pro...
This indicates a possible W32/Bropia.A-tr worm passing through the network on TCP port 11178 using the MSNFTP protocol.When this worm is executed it drops a copy of itself in the root directory usi...
This indicates a possible W32/Bropia.A-tr worm passing through the network on TCP port 11178 using the MSNFTP protocol.When this worm is executed it drops a copy of itself in the root directory usi...
This indicates a possible W32/Bropia.A-tr worm passing through the network on TCP port 11178 using the MSNFTP protocol.When this worm is executed it drops a copy of itself in the root directory usi...
This IGMP attack is a denial-of-service attack that affects Windows systems.Fragmentation is the process of breaking down an IP datagram into smaller packets to be transmitted over a network and th...
This IGMP attack is a denial-of-service attack that affects Windows systems.Fragmentation is the process of breaking down an IP datagram into smaller packets to be transmitted over a network and th...
This indicates an attack attempt against a format string vulnerability in Sun Microsystems MySQL database server.The vulnerability is caused by an error when the vulnerable software handles a speci...
This IGMP attack is a denial-of-service attack that affects Windows systems.Fragmentation is the process of breaking down an IP datagram into smaller packets to be transmitted over a network and th...
This indicates an attack attempt to exploit a vulnerability in Adobe Flash Player.This signature detects malicious obfuscated SWF files. Flash exploits can be and are often highly obfuscated with s...