Keyword: JS_EXPLOIT
10434 Total Search   |   Showing Results : 1701 - 1720
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan is a Java component of the black hole exploit kit . This Trojan executes when a user accesses certain websites where it is hosted. It executes the downloaded files. As a result, malicious
This Trojan arrives as a component bundled with malware/grayware packages. It may be hosted on a website and run when a user accesses the said website. However, as of this writing, the said sites are
This Trojan may arrive bundled with malware packages as a malware component. It may be hosted on a website and run when a user accesses the said website. Arrival Details This Trojan may arrive
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It arrives as a component bundled with malware/grayware
This Trojan may arrive bundled with malware packages as a malware component. It executes when a user accesses certain websites where it is hosted. Arrival Details This Trojan may arrive bundled with
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It arrives on a system as a file dropped by other malware or as a file downloaded
This Trojan overwrites itself with the contents of the dropped file %User Temp%\AAAA . It then reopens itself in Hancom Hangul . This Trojan arrives as attachment to mass-mailed email messages. It
This worm connects to a random IP address and takes advantage of the vulnerability MS08-067 (Vulnerability in Server Service Could Allow Remote Code Execution). It may also exploit a vulnerability in
This Trojan is capable of downloading files. However, it does not contain the URL where the file can be downloaded. This Trojan arrives on a system as a file dropped by other malware or as a file
exploit the system in the background: From the decompiled code, the binary named gingerbreak also comes from a faked png file named gingerbreak.png , the same trick as the three png files we mentioned
This is Trend Micro's detection for a Java class that exploits a certain vulnerability in Java Runtime Environment . This malware is part of the Blackhole exploit kit. This Trojan arrives as a
This is the Trend Micro detection for malicious Java Class file used as a component of other malware. Once the user accesses a malicious site, this malicious script is executed. This Trojan may be
This Trojan may arrive bundled with malware packages as a malware component. It may be hosted on a website and run when a user accesses the said website. Arrival Details This Trojan may arrive
file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. NOTES: This Trojan is a java class used to execute an exploit code. This exploit may be used to
This malware arrives as an embedded .SWF file in the body of a malicious .DOC file detected by Trend Micro as TROJ_MDROP.SW. This Trojan takes advantage of the following vulnerability in Adobe Flash
This Trojan arrives as an embedded .SWF file in bodies of malicious .DOC/.PDF files which Trend Micro detects as any of the following: TROJ_MDROP.WMP TROJ_PIDIEF.SMDX It aids in helping its main
This Trojan takes advantage of a zero-day exploit in Adobe Flash Player. Several versions of Adobe Flash Player and Adobe Reader and Acrobat are affected, increasing the chances of malware infection
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It may be hosted on a website and run when a user
This malware may be hosted on a website and run when a user accesses the said website. It takes advantage of an unknown vulnerability in a certain software to allow a remote malicious user or malware