Keyword: JS_EXPLOIT
10409 Total Search   |   Showing Results : 841 - 860
Just recently, IE has once more become a target of a script exploit that took advantage of the way this browser handled invalid flag references. If left unpatched, IE could allow a remote malicious user
smarter ways to exploit mobile devices with these improved methods. As mobile vulnerabilities continue to surface, patching issues also start to heat up. Software vendors tried to address these concerns by
point to the malicious sites hosting the said exploit code. Trend Micro detects the exploit code as JAVA_BLACOLE.AE . Similar to other black hole exploit-related spam runs, this also leads to a ZeuS
This Trojan arrives as attachment to mass-mailed email messages. Arrival Details This Trojan arrives as attachment to mass-mailed email messages. Other Details This Trojan does the following:
This Trojan has two embedded .SWF files in its body that it uses to exploit CVE-2011-0611. The two .SWF files are detected as SWF_EXPLOIT.WS. If exploit is successful, it drops files. This Trojan
This is used as a component of other malware. It exploits a vulnerability in several versions of Oracle Java Runtime Environment (JRE) component. It allows this Trojan to execute arbitrary codes on
This is a Java class file that is used to execute an exploit code. Once successful, it may download a possibly malicious file from a certain URL. This Trojan may be hosted on a website and run when a
Settings\{user name}\Local Settings\Temp on Windows 2000, XP, and Server 2003.) NOTES: This is a Java class file that is used to execute an exploit code. Once successful, it downloads and executes a possibly
This Trojan may arrive bundled with malware packages as a malware component. It exports functions used by other malware. Arrival Details This Trojan may arrive bundled with malware packages as a
This Trojan may be hosted on a website and run when a user accesses the said website. Arrival Details This Trojan may be hosted on a website and run when a user accesses the said website. NOTES: This
This Trojan may arrive bundled with malware packages as a malware component. It may be hosted on a website and run when a user accesses the said website. It executes the downloaded files. As a
This Trojan may arrive bundled with malware packages as a malware component. It exports functions used by other malware. Arrival Details This Trojan may arrive bundled with malware packages as a
This Trojan may be hosted on a website and run when a user accesses the said website. Arrival Details This Trojan may be hosted on a website and run when a user accesses the said website. Download
This Trojan may arrive bundled with malware packages as a malware component. It may be hosted on a website and run when a user accesses the said website. It requires its main component to
component to successfully perform its intended routine. NOTES: This is a Java class file used to execute an exploit code. Once successful, it may download a possibly malicious file from a certain URL. The URL
This Trojan may arrive bundled with malware packages as a malware component. It may be hosted on a website and run when a user accesses the said website. It requires its main component to
This Trojan may arrive bundled with malware packages as a malware component. It may be hosted on a website and run when a user accesses the said website. It requires its main component to
This Trojan arrives as a component bundled with malware/grayware packages. It may be hosted on a website and run when a user accesses the said website. It requires its main component to successfully
This Trojan may arrive bundled with malware packages as a malware component. It may be hosted on a website and run when a user accesses the said website. Arrival Details This Trojan may arrive
This Trojan arrives as a component bundled with malware/grayware packages. It may be hosted on a website and run when a user accesses the said website. It executes the downloaded files. As a result,