Keyword: JS_EXPLOIT
10460 Total Search   |   Showing Results : 2541 - 2560
Adobe Acrobat collab.collectEmailInfo Buffer Overflow Adobe Acrobat collab.getIcon Buffer Overflow Adobe Acrobat util.printf Buffer Overflow Adobe Reader media.newPlayer Exploit After successfully
correct index value for mPartMinors array. It then attempts to exploit the addresses within the .GOT range and uses a NetLink socket to send the malicious message that contains the exploit allowing users to
This Trojan may be downloaded by other malware/grayware from remote sites. It may be hosted on a website and run when a user accesses the said website. However, as of this writing, the said sites are
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan may arrive as a file that exports functions used by other malware. It arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting
Settings\{user name}\Local Settings\Temp on Windows 2000, XP, and Server 2003.) NOTES: This is a Java class file that is used to execute an exploit code. Once successful, it may download a possibly malicious
Exploits take advantage of vulnerabilities or security holes. Exploits are often incorporated into malware, which are consequently able to propagate into and run intricate routines on vulnerable
Settings\{user name}\Local Settings\Temp on Windows 2000, XP, and Server 2003.) NOTES: This is a Java class file that is used to execute an exploit code. Once successful, it may download a possibly malicious
Black Hole Exploit Kit. This Trojan downloads a possibly malicious file from a certain URL. The URL where this malware downloads the said file depends on the parameter passed on to it by its components.
component to successfully perform its intended routine. NOTES: This is a Java class file that is used to execute an exploit code. Once successful, it may download a possibly malicious file from a certain URL.
This Trojan arrives as a component bundled with malware/grayware packages. It may be hosted on a website and run when a user accesses the said website. Arrival Details This Trojan arrives as a
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It executes the dropped file(s). As a result, malicious routines of the dropped files are
This Trojan may be hosted on a website and run when a user accesses the said website. Arrival Details This Trojan may be hosted on a website and run when a user accesses the said website. NOTES: This
Server 2003.) NOTES: This is a Java class file that is used to execute an exploit code. Once successful, it may download a possibly malicious file from a certain URL. The URL where this malware downloads
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It executes the files it drops, prompting the affected
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It executes the dropped file(s). As a result, malicious
This malware is a component of a malicious Java archive file (.JAR). It takes advantage of a stack-based buffer overflow in a function in Java Runtime Environment (JRE) that allows remote attackers
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It executes the dropped file(s). As a result, malicious
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a