Keyword: JS_EXPLOIT
10437 Total Search   |   Showing Results : 2521 - 2540
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It arrives on a system as a file dropped by other malware or as a file downloaded
\Temp on Windows Vista and 7.) NOTES: This is the Trend Micro detection for malicious Java Class that attempts to exploit a vulnerability in the Java Runtime Environment component of the following: Java
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It arrives on a system as a file dropped by other malware or as a file downloaded
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. Arrival Details This Trojan arrives as an attachment to email messages spammed by other
This malware used a Christmas-themed exploit document to deliver its payload, BKDR_GAMFRIC.A. The backdoor (MagicFire) is rarely seen in the wild possibly because its only use in targeted attacks. To
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. Arrival Details This Trojan arrives as an attachment to the following email messages
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It arrives on a system as a file dropped by other malware or as a file downloaded
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It arrives on a system as a file dropped by other malware or as a file downloaded
This Trojan arrives as a component bundled with malware/grayware packages. It may be hosted on a website and run when a user accesses the said website. It executes the downloaded files. As a result,
This Trojan may be hosted on a website and run when a user accesses the said website. It does not have any propagation routine. It does not have any backdoor routine. It executes the downloaded
This Trojan arrives as a component bundled with malware/grayware packages. It may be hosted on a website and run when a user accesses the said website. It does not have any propagation routine. It
This Trojan arrives as a component bundled with malware/grayware packages. It may be hosted on a website and run when a user accesses the said website. It executes the downloaded files. As a result,
This Trojan may arrive bundled with malware packages as a malware component. It may be hosted on a website and run when a user accesses the said website. It requires its main component to
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It executes the downloaded files. As a result, malicious
This Linux backdoor has increased potential for damage, propagation, or both, that it possesses. Specifically, it is capable of carrying brute force attacks or exploit on the D-Link Internet router.
exploit for the following vulnerability: Unspecified vulnerability in Adobe Flash Player More information on this vulnerability can be found below: Adobe Security Bulletin APSA11-01 NOTES: This is the Trend
page. It is capable of affecting the following iOS versions: iPad 4.3 to 4.3.3 iPhone 4.2.6 to 4.3.3 iPod touch 4.3 to 4.3.3 The exploit is triggered once a user visits the abovementioned jailbreak site
capability. NOTES: This Trojan contains an embedded malicious .SWF file named as mampo.swf.. It uses the embedded file to successfully exploit the specific vulnerability. The malicious .SWF file is detected by
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It takes advantage of software vulnerabilities in
Adobe Acrobat collab.collectEmailInfo Buffer Overflow Adobe Acrobat collab.getIcon Buffer Overflow Adobe Acrobat util.printf Buffer Overflow Adobe Reader media.newPlayer Exploit After successfully