Keyword: JS_EXPLOIT
10610 Total Search   |   Showing Results : 441 - 460
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It requires being executed with a specific
Other Details This Trojan does not exploit any vulnerability. NOTES: The document contains the following message details luring users to enable macro content: SNH:Script [Dropper] (AVAST);
does the following: Creates the following named pipe and connects to it: MSSE-{Random number}-server It does not exploit any vulnerability. Backdoor:Win64/CobaltStrike.NP!dha (MICROSOFT) ;
https://{BLOCKED}ha-rugby.com/rim/mula2.js However, as of this writing, the said sites are inaccessible. It does not exploit any vulnerability. HTML/Phishing.Gen trojan (NOD32) Downloaded from the Internet,
lure the user in clicking "Open" and opening the attached .hta file: It does not exploit any vulnerability. TrojanDownloader:JS/Qakbot.AA!MTB (MICROSOFT) Downloaded from the Internet, Dropped by other
This Backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It requires being executed with a specific
information-stealing capability. Other Details This Backdoor does the following: It receives the arbitrary code from the attacker through HTTP request or the session attribute "payload". It does not exploit any
}.msftauth.net/shared/1.0/content/images/microsoft_logo_ee5c8d9fb6248c938fd0dc19370e90bd.svg It does not exploit any vulnerability. Trojan:HTML/Phish!MSR (MICROSOFT) Downloaded from the Internet, Dropped by other malware Connects to URLs/IPs, Displays windows, Steals information
=5409083&clickid=323343383487590551&tracker=56193&uid=821b39fa08414ca1877d04eaabc3102b It does not exploit any vulnerability. JS:Redirector-CDB [Trj] (AVAST) Downloaded from the Internet, Dropped by other malware
only encrypts the "c:\" local drive. It does not exploit any vulnerability. Ransomware Routine This Ransomware encrypts files with the following extensions: .jpg .jpeg .bmp .gif .png .svg .psd .raw .tiff
}g.com/vi/txoshp-BqGE/maxresdefault.jpg It does not exploit any vulnerability. JS:Trojan.HTML.Phishing.CBB (BITDEFENDER) Downloaded from the Internet, Dropped by other malware Connects to URLs/IPs, Displays fake login console, Steals
Rating: Critical This remote code execution vulnerability exists in the improper handling of text-to-speech input in Microsoft Speech API. Attackers looking to exploit this vulnerability must find a way to
Critical This remote code execution vulnerability exists in the handling of objects in memory in Internet Explorer. Attackers looking to exploit this vulnerability may host a specially crafted website that
Critical This remote code execution vulnerability exists in the handling of objects in memory in the scripting engine of Microsoft Edge. Attackers looking to exploit this vulnerability may host a specially
Rating: Critical This remote code execution vulnerability exists in the handling of objects in memory by the Chakra scripting engine in Microsoft Edge. Attackers looking to exploit this vulnerability may
page that exploited a vulnerability in Microsoft XML Core Services . Users who visited the Web page were at risk of downloading malware. This incident, along with the slew of Blackhole exploit kit spam
Critical This memory corruption vulnerability exists in the improper handling of objects in memory by the scripting engine in Microsoft browsers. Attackers looking to exploit this vulnerability must find a
versions 6, 7, 8, and 9. The following article is an in-depth look into the zero-day exploit and discusses its several repercussions. What is MS12-063 all about? MS12-063 is an out-of-band security bulletin
Risk Rating: Critical This remote code execution vulnerability exists in Microsoft Edge's Chakra scripting engine in respect to handling objects in memory. Attackers looking to exploit this vulnerability
a user to click on a link that will lead to a specially crafted website that hosts an exploit to this vulnerability. CVE-2020-1060 - VBScript Remote Code Execution Vulnerability Risk Rating: Important