Keyword: JS_EXPLOIT
10404 Total Search   |   Showing Results : 261 - 280
{BLOCKED}/{BLOCKED}i_image/{BLOCKED}i_image.php?id={Random String} However, as of this writing, the said sites are inaccessible. It does not exploit any vulnerability. Trojan:JS/Agent.AG!MSR (MICROSOFT)
does the following: Connects to the following websites to download and execute javascript code: https://ping.{BLOCKED}pace.net/jquery.min.js?ver={random} It does not exploit any vulnerability. Downloaded
does the following: Connects to the following websites to download and execute JavaScript code: https://{BLOCKED}ncard.com/phpmyadmin/doc/html/_images/_images.php?id={random} It does not exploit any
does the following: Connects to the following websites to download and execute javascript code: https://www.{BLOCKED}shetra.com/www.wordskshetra.com.php?id={Random} It does not exploit any vulnerability.
?id={Random String} It does not exploit any vulnerability. Trojan:JS/Agent.AG!MSR (MICROSOFT) Downloaded from the Internet, Dropped by other malware Downloads files, Executes files
does not exploit any vulnerability. Trojan:JS/Agent.AG!MSR (MICROSOFT) Downloaded from the Internet, Dropped by other malware Connects to URLs/IPs, Executes codes
}me-kyoto.jp/about/files/img/index/main_img/main_img.php?id={random string} It does not exploit any vulnerability. Trojan:JS/Agent.AG!MSR (MICROSOFT) Downloaded from the Internet, Dropped by other malware Connects to URLs/IPs, Executes codes
https://techevon.com/app/code/community/Phoenix/Moneybookers/Block/Block.php?id={Random} --> It does not exploit any vulnerability. Trojan.GenericKD.62703462 (BITDEFENDER); Trojan.JS.Cryxos (IKARUS) Downloaded from the Internet, Dropped by other malware Connects to URLs/IPs,
}aindustry.com/ammoniaenergy.org/wp-admin/css/colors/blue/blue.php?id={Random String} However, as of this writing, the said sites are inaccessible. It does not exploit any vulnerability. Trojan:JS/Agent.AG!MSR (MICROSOFT) Downloaded from the Internet, Dropped by
}aland.co.id/360/mustika-village-sukamulya/lib/cursors/cursors.php?id={Random Characters} However, as of this writing, the said sites are inaccessible. It does not exploit any vulnerability. Trojan:JS/Agent.AG!MSR [non_writable_container] (MICROSOFT) Downloaded
}rd.com/Measurement/assets/img/customization/monogram/monogram.php?id={Random Characters} However, as of this writing, the said sites are inaccessible. It does not exploit any vulnerability. Trojan:JS/Agent.AG!MSR (MICROSOFT) Downloaded from the Internet, Dropped
This Trojan may be downloaded from remote sites by other malware. Arrival Details This Trojan may be downloaded from the following remote site(s): http://{BLOCKED}8.{BLOCKED
This Trojan may arrive bundled with malware packages as a malware component. It executes when a user accesses certain websites where it is hosted. Arrival Details This Trojan may arrive bundled with
hosted on a website and run when a user accesses the said website. NOTES: Other Details This is the Trend Micro detection for: An exploit that takes advantage of the DHTML Editing Component ActiveX Control
Details Based on analysis of the codes, it has the following capabilities: This is the Trend Micro detection for PDF files that exploit an unknown vulnerability in Adobe Acrobat. Exploit:Win32/Pdfjsc.JP
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It takes advantage of software vulnerabilities to allow
This crypto-ransomware is one of the malware payloads of Fiesta exploit kit. Typically, exploit kits are used to deliver or spread threats. To get a one-glance comprehensive view of the behavior of
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It arrives on a system as a file dropped by other malware or as a file downloaded
This malware is related to a mass compromise that leads to a series of redirections that ultimately point users to the Blackhole Exploit kit exploiting vulnerabilities cited in CVE-2010-0188 and
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. This is the Trend Micro detection for Web pages that