Keyword: JS_EXPLOIT
10591 Total Search   |   Showing Results : 3161 - 3180
This Trojan may be hosted on a website and run when a user accesses the said website. It requires its main component to successfully perform its intended routine. Arrival Details This Trojan may be
This Trojan may be hosted on a website and run when a user accesses the said website. It requires its main component to successfully perform its intended routine. Arrival Details This Trojan may be
This Trojan may be hosted on a website and run when a user accesses the said website. It requires its main component to successfully perform its intended routine. It takes advantage of certain
This is the detection for the second stage malware related to the new Java zero-day exploit which was used in the targeted attack campaign, Operation Pawn Storm. In the second stage of the attack, it
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It requires its main component to successfully perform
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It arrives on a system as a file dropped by other malware or as a file downloaded
NOTES: This is the Trend Micro detection for malicious network packets that may manifest any of the following actions: Remote command execution If your Trend Micro product detects malicious network
This is Trend Micros detection for all .EMF graphics files that have been modified to exploit the Microsoft Windows XP Metafile Heap Overflow vulnerability. NOTES: This is Trend Micros detection for
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It arrives on a system as a file dropped by other malware or as a file downloaded
This Trojan may be hosted on a website and run when a user accesses the said website. Arrival Details This Trojan may be hosted on a website and run when a user accesses the said website. Download
This malware uses the exploit targeting (MS13-022) Vulnerability in Silverlight Could Allow Remote Code Execution (2814124) vulnerability. The said exploit was found to be the payload of a series of
files: http://{BLOCKED}.bedircati.com/web/anyway.gif Other Details This Trojan is a zero-day exploit for the following vulnerability: CVE-2014-1776 Exploit.SWF.Agent.ig (Kaspersky),
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It arrives on a system as a file dropped by other malware or as a file downloaded
This Trojan may arrive bundled with malware packages as a malware component. It may be hosted on a website and run when a user accesses the said website. It does not have any propagation routine. It
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan may be hosted on a website and run when a user accesses the said website. It executes the downloaded files. As a result, malicious routines of the downloaded files are exhibited on the
This Trojan may be hosted on a website and run when a user accesses the said website. It executes the downloaded files. As a result, malicious routines of the downloaded files are exhibited on the
This Trojan may be hosted on a website and run when a user accesses the said website. It requires its main component to successfully perform its intended routine. Arrival Details This Trojan may be
Internet by attempting to send the exploit code to random Internet addresses. It generates a set of URLs containing 250 random sites per day based on the UTC time standard. It blocks access to websites that
This Trojan may arrive bundled with malware packages as a malware component. It may be hosted on a website and run when a user accesses the said website. It requires its main component to