Keyword: JS_EXPLOIT
10591 Total Search   |   Showing Results : 3041 - 3060
This malware was involved in the Red October campaign, a series of attacks targeting diplomatic and government agencies. It drops malicious files onto the affected system and executes them, causing
This Trojan arrives as a component bundled with malware/grayware packages. It may be hosted on a website and run when a user accesses the said website. It does not have any propagation routine. It
This Trojan may arrive bundled with malware packages as a malware component. It may be hosted on a website and run when a user accesses the said website. It requires its main component to
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It executes the downloaded files. As a result, malicious
This Trojan may be hosted on a website and run when a user accesses the said website. It does not have any propagation routine. It does not have any backdoor routine. It executes the downloaded
This Trojan may arrive bundled with malware packages as a malware component. It may be hosted on a website and run when a user accesses the said website. Arrival Details This Trojan may arrive
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
exploit for the following vulnerability: Unspecified vulnerability in Adobe Flash Player More information on this vulnerability can be found below: Adobe Security Bulletin APSA11-01 NOTES: This is the Trend
Exploits take advantage of vulnerabilities or security holes. Exploits are often incorporated into malware, which are consequently able to propagate into and run intricate routines on vulnerable
Black Hole Exploit Kit. This Trojan downloads a possibly malicious file from a certain URL. The URL where this malware downloads the said file depends on the parameter passed on to it by its components.
component to successfully perform its intended routine. NOTES: This is a Java class file that is used to execute an exploit code. Once successful, it may download a possibly malicious file from a certain URL.
This malware is a component of a malicious Java archive file (.JAR). It takes advantage of a stack-based buffer overflow in a function in Java Runtime Environment (JRE) that allows remote attackers
capability. NOTES: This Trojan contains an embedded malicious .SWF file named as mampo.swf.. It uses the embedded file to successfully exploit the specific vulnerability. The malicious .SWF file is detected by
This worm arrives by connecting affected removable drives to a system. It arrives via peer-to-peer (P2P) shares. It arrives on a system as a file dropped by other malware or as a file downloaded
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It executes the dropped file(s). As a result, malicious routines of the dropped files are
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan may arrive bundled with malware packages as a malware component. It may be hosted on a website and run when a user accesses the said website. Arrival Details This Trojan may arrive
This Trojan may arrive as a file that exports functions used by other malware. It arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting
This Trojan may arrive bundled with malware packages as a malware component. It takes advantage of an unknown vulnerability in a certain software to allow a remote malicious user or malware to
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It takes advantage of certain vulnerabilities. Arrival Details This Trojan arrives as an