Keyword: JS_EXPLOIT
10437 Total Search   |   Showing Results : 2561 - 2580
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It arrives as a component bundled with malware/grayware
This Trojan takes advantage of the following software vulnerabilities to download possibly malicious files: CVE-2010-0840 More information on this vulnerability can be found below:
This worm arrives by connecting affected removable drives to a system. It arrives via peer-to-peer (P2P) shares. It arrives on a system as a file dropped by other malware or as a file downloaded
Details This Trojan is a zero-day exploit for the following vulnerability: CVE-2011-0609 More information on this vulnerability can be found below: Adobe Security Bulletin APSA11-01 It does the following:
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It takes advantage of certain vulnerabilities. Arrival Details This Trojan arrives as an
This Trojan may arrive bundled with malware packages as a malware component. It takes advantage of an unknown vulnerability in a certain software to allow a remote malicious user or malware to
user accesses certain websites where it is hosted. Other Details More information on this vulnerability can be found below: CVE-2009-3867 This is the Trend Micro detection for: Java applets that exploit
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. This is the Trend Micro detection for files that contain
NOTES: This is the Trend Micro detection for malicious network packets that may manifest any of the following actions: Downloading of files Hacking Attempt If your Trend Micro product detects
accesses the said website. Installation This Trojan is a component of other malware. NOTES: This JAR file is used as a component of an Exploit Kit. Users who visit a compromised server hosting the Exploit
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Once a malware successfully exploits the said
This Trojan may arrive bundled with malware packages as a malware component. It arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It may be hosted on a website and run when a user
This Trojan may arrive bundled with malware packages as a malware component. It may be downloaded by other malware/grayware from remote sites. It may be hosted on a website and run when a user
This Trojan may be hosted on a website and run when a user accesses the said website. It executes the downloaded files. As a result, malicious routines of the downloaded files are exhibited on the
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It may be hosted on a website and run when a user
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It may be hosted on a website and run when a user
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It may be hosted on a website and run when a user