Keyword: JS_EXPLOIT
10409 Total Search   |   Showing Results : 861 - 880
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It executes the downloaded files. As a result, malicious
This Trojan may arrive bundled with malware packages as a malware component. It may be hosted on a website and run when a user accesses the said website. Arrival Details This Trojan may arrive
This Trojan arrives as attachment to mass-mailed email messages. Arrival Details This Trojan arrives as attachment to mass-mailed email messages. Other Details This Trojan does the following:
This Trojan has two embedded .SWF files in its body that it uses to exploit CVE-2011-0611. The two .SWF files are detected as SWF_EXPLOIT.WS. If exploit is successful, it drops files. This Trojan
This Trojan may arrive bundled with malware packages as a malware component. It exports functions used by other malware. Arrival Details This Trojan may arrive bundled with malware packages as a
This is used as a component of other malware. It exploits a vulnerability in several versions of Oracle Java Runtime Environment (JRE) component. It allows this Trojan to execute arbitrary codes on
This Trojan may be hosted on a website and run when a user accesses the said website. Arrival Details This Trojan may be hosted on a website and run when a user accesses the said website. NOTES: This
Settings\{user name}\Local Settings\Temp on Windows 2000, XP, and Server 2003.) NOTES: This is a Java class file that is used to execute an exploit code. Once successful, it downloads and executes a possibly
This is a Java class file that is used to execute an exploit code. Once successful, it may download a possibly malicious file from a certain URL. This Trojan may be hosted on a website and run when a
file. This exploit allows remote arbitrary code to execute on the affected system. Thus, it allows remote malicious users to deliver and execute payload on the affected system. The affected software
users when visiting malicious sites. Other Details This Trojan is a zero-day exploit for the following vulnerability: (MS13-022) Vulnerability in Silverlight Could Allow Remote Code Execution (2814124)
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It may be hosted on a website and run when a user
This Trojan may arrive bundled with malware packages as a malware component. It may be hosted on a website and run when a user accesses the said website. It requires its main component to
This Trojan may be hosted on a website and run when a user accesses the said website. It executes the downloaded files. As a result, malicious routines of the downloaded files are exhibited on the
This Trojan may be hosted on a website and run when a user accesses the said website. It requires its main component to successfully perform its intended routine. It takes advantage of certain
}.111.219/ipaddrs/shell It is a zero-day exploit for the following vulnerability: CVE-2013-5331 Troj/SWFExp-CH (Sophos) ,Trojan horse Exploit_c.YZX (AVG) ,Exploit.Win32.CVE-2013 (Ikarus) ,HEUR:Exploit.SWF.CVE-2013-5331.a
This Trojan arrives as a component bundled with malware/grayware packages. It may be hosted on a website and run when a user accesses the said website. It requires its main component to successfully
This Trojan may be hosted on a website and run when a user accesses the said website. It executes the downloaded files. As a result, malicious routines of the downloaded files are exhibited on the
This Trojan arrives as a component bundled with malware/grayware packages. It may be hosted on a website and run when a user accesses the said website. It executes the downloaded files. As a result,
This Trojan arrives as a component bundled with malware/grayware packages. It may be hosted on a website and run when a user accesses the said website. It executes the downloaded files. As a result,