Keyword: JS_EXPLOIT
10610 Total Search   |   Showing Results : 161 - 180
malicious site. It does not exploit any vulnerability. JS/Redirector.NKN trojan (NOD32) Downloaded from the Internet, Hosted on site Connects to URLs/IPs
NOTES: It does not have rootkit capabilities. It does not exploit any vulnerability. TrojanDownloader:JS/Nemucod (Microsoft), Trojan-Downloader.JS.Agent.mgp (Kaspersky), JS.Downloader (Symantec) Spammed
exploit any vulnerability. Trojan.Script.Locky.ebfmwa (NANO-Antivirus); JS/Nemucod.fk (McAfee); JS/Dldr.Locky.LO.1 (Avira); Trojan-Downloader.JS.Agent.jmy (Kaspersky)
Windows Server 2008, and Windows Server 2012.) As of this writing, the said sites are inaccessible. NOTES: It does not have rootkit capabilities. It does not exploit any vulnerability.
said sites are inaccessible. NOTES: It does not have rootkit capabilities. It does not exploit any vulnerability. TrojanDownloader:JS/Nemucod (Microsoft), JS.Downloader (Symantec),
writing, the said sites are inaccessible. NOTES: It does not have rootkit capabilities. It does not exploit any vulnerability. JS:Trojan.JS.Downloader.EY (BitDefender); JS/Nemucod.fk (McAfee); Mal/JSDldr-B
result, malicious routines of the downloaded files are exhibited on the affected system. NOTES: It does not have rootkit capabilities. It does not exploit any vulnerability. Trojan-Downloader.JS.Small.rf
execution. NOTES: It does not have rootkit capabilities. It does not exploit any vulnerability. TrojanDownloader:JS/Nemucod (Microsoft); JS/Nemucod.kz (McAfee); JS/Nemucod.ESE!tr (Fortinet) Spammed via email,
rootkit capabilities. It does not exploit any vulnerability. JS/TrojanDownloader.Nemucod.BUB (ESET-NOD32); Trojan-Downloader.JS.Nemucod (Ikarus); JS.Downloader (Symantec) Spammed via email, Dropped by other
files are exhibited on the affected system. Other Details This Trojan deletes itself after execution. NOTES: It does not have rootkit capabilities. It does not exploit any vulnerability.
download routine. It does not have rootkit capabilities. It does not exploit any vulnerability. TrojanDownloader:JS/Nemucod.HG (Microsoft), Trojan-Downloader.JS.Agent.mrm (Kaspersky), JS.Downloader (Symantec
does the following: Connects to the following websites to download and execute javascript code: https://ping.{BLOCKED}pace.net/jquery.min.js?ver={Random} It does not exploit any vulnerability.
does the following: Connects to the following websites to download and execute JavaScript code: https://{BLOCKED}esourcehost.net/jquery.min.js?ver={Random} It does not exploit any vulnerability.
does the following: Connects to the following websites to download and execute JavaScript code: https://tru{BLOCKED}ourcehost.net/jquery.min.js?ver={Random} It does not exploit any vulnerability.
does the following: Connects to the following websites to download and execute JavaScript code: https://{BLOCKED}esourcehost.net/jquery.min.js?ver={Random} It does not exploit any vulnerability.
It does not exploit any vulnerability. SoftwareBundler:Win32/Dowadmin (MICROSOFT) Downloaded from the Internet, Dropped by other malware Connects to URLs/IPs, Displays graphics/image, Deletes files
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It takes advantage of software vulnerabilities to allow
{variable1} where {variable1} can be any of the following: html htm jpeg png jpg gif js a variant of SWF/Exploit.Agent.HQ (ESET), Script.SWF.C362 (F-Secure)
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. As of this writing, the said sites are inaccessible.
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It may be hosted on a website and run when a user accesses the said website. It inserts an