Keyword: JS_EXPLOIT
10404 Total Search   |   Showing Results : 261 - 280
{BLOCKED}/{BLOCKED}i_image/{BLOCKED}i_image.php?id={Random String} However, as of this writing, the said sites are inaccessible. It does not exploit any vulnerability. Trojan:JS/Agent.AG!MSR (MICROSOFT)
does the following: Connects to the following websites to download and execute javascript code: https://ping.{BLOCKED}pace.net/jquery.min.js?ver={random} It does not exploit any vulnerability. Downloaded
does the following: Connects to the following websites to download and execute JavaScript code: https://{BLOCKED}ncard.com/phpmyadmin/doc/html/_images/_images.php?id={random} It does not exploit any
does the following: Connects to the following websites to download and execute javascript code: https://www.{BLOCKED}shetra.com/www.wordskshetra.com.php?id={Random} It does not exploit any vulnerability.
?id={Random String} It does not exploit any vulnerability. Trojan:JS/Agent.AG!MSR (MICROSOFT) Downloaded from the Internet, Dropped by other malware Downloads files, Executes files
does not exploit any vulnerability. Trojan:JS/Agent.AG!MSR (MICROSOFT) Downloaded from the Internet, Dropped by other malware Connects to URLs/IPs, Executes codes
}me-kyoto.jp/about/files/img/index/main_img/main_img.php?id={random string} It does not exploit any vulnerability. Trojan:JS/Agent.AG!MSR (MICROSOFT) Downloaded from the Internet, Dropped by other malware Connects to URLs/IPs, Executes codes
https://techevon.com/app/code/community/Phoenix/Moneybookers/Block/Block.php?id={Random} --> It does not exploit any vulnerability. Trojan.GenericKD.62703462 (BITDEFENDER); Trojan.JS.Cryxos (IKARUS) Downloaded from the Internet, Dropped by other malware Connects to URLs/IPs,
}aindustry.com/ammoniaenergy.org/wp-admin/css/colors/blue/blue.php?id={Random String} However, as of this writing, the said sites are inaccessible. It does not exploit any vulnerability. Trojan:JS/Agent.AG!MSR (MICROSOFT) Downloaded from the Internet, Dropped by
}aland.co.id/360/mustika-village-sukamulya/lib/cursors/cursors.php?id={Random Characters} However, as of this writing, the said sites are inaccessible. It does not exploit any vulnerability. Trojan:JS/Agent.AG!MSR [non_writable_container] (MICROSOFT) Downloaded
}rd.com/Measurement/assets/img/customization/monogram/monogram.php?id={Random Characters} However, as of this writing, the said sites are inaccessible. It does not exploit any vulnerability. Trojan:JS/Agent.AG!MSR (MICROSOFT) Downloaded from the Internet, Dropped
hosted on a website and run when a user accesses the said website. NOTES: Other Details This is the Trend Micro detection for: An exploit that takes advantage of the DHTML Editing Component ActiveX Control
This Trojan may arrive bundled with malware packages as a malware component. It executes when a user accesses certain websites where it is hosted. Arrival Details This Trojan may arrive bundled with
This Trojan may be downloaded from remote sites by other malware. Arrival Details This Trojan may be downloaded from the following remote site(s): http://{BLOCKED}8.{BLOCKED
Details Based on analysis of the codes, it has the following capabilities: This is the Trend Micro detection for PDF files that exploit an unknown vulnerability in Adobe Acrobat. Exploit:Win32/Pdfjsc.JP
This crypto-ransomware is one of the malware payloads of Fiesta exploit kit. Typically, exploit kits are used to deliver or spread threats. To get a one-glance comprehensive view of the behavior of
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It arrives on a system as a file dropped by other malware or as a file downloaded
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It takes advantage of software vulnerabilities to allow
?yqAFwbPCLno=5257533130&ioidSagKPlS=x&wSaZlXDijTvPq=30 2g572f5352572i572f333357312h522j2h2g562f2j&wiZCFhFFDxy=2d2b2d2b2d2b2d It does not have rootkit capabilities. It does not exploit any vulnerability.
}iknepjet.ru:8080/forum/showthread.php?page=5fa58bce769e5c2c However, as of this writing, the said sites are inaccessible. NOTES: It does not have rootkit capabilities. It does not exploit any vulnerability. Downloaded from the Internet