Keyword: JS_EXPLOIT
10432 Total Search   |   Showing Results : 841 - 860
This Adware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Adware arrives on a system as a
\qs_6c1829d0\dialogs %User Temp%\qs_6c1829d0\dialogs\library %User Temp%\qs_6c1829d0\dialogs\library\css %User Temp%\qs_6c1829d0\dialogs\library\images %User Temp%\qs_6c1829d0\dialogs\library\js %User Temp%
This spyware attempts to steal information, such as user names and passwords, used when logging into certain banking or finance-related websites. Arrival Details This spyware may be unknowingly
come from CNN and takes advantage of the US presidential election. The said spammed message bore the subject, CNN Breaking NEws - Mitt Romney Almost President and leads to blackhole exploit kit. Similar
Just recently, IE has once more become a target of a script exploit that took advantage of the way this browser handled invalid flag references. If left unpatched, IE could allow a remote malicious user
smarter ways to exploit mobile devices with these improved methods. As mobile vulnerabilities continue to surface, patching issues also start to heat up. Software vendors tried to address these concerns by
point to the malicious sites hosting the said exploit code. Trend Micro detects the exploit code as JAVA_BLACOLE.AE . Similar to other black hole exploit-related spam runs, this also leads to a ZeuS
This Trojan may arrive bundled with malware packages as a malware component. It exports functions used by other malware. Arrival Details This Trojan may arrive bundled with malware packages as a
This Trojan may arrive bundled with malware packages as a malware component. It may be hosted on a website and run when a user accesses the said website. It executes the downloaded files. As a
component to successfully perform its intended routine. NOTES: This is a Java class file used to execute an exploit code. Once successful, it may download a possibly malicious file from a certain URL. The URL
This Trojan may be hosted on a website and run when a user accesses the said website. It executes the downloaded files. As a result, malicious routines of the downloaded files are exhibited on the
This Trojan may arrive bundled with malware packages as a malware component. It may be hosted on a website and run when a user accesses the said website. Arrival Details This Trojan may arrive
This Trojan arrives as a component bundled with malware/grayware packages. It may be hosted on a website and run when a user accesses the said website. It requires its main component to successfully
This Trojan may arrive bundled with malware packages as a malware component. It may be hosted on a website and run when a user accesses the said website. It requires its main component to
This Trojan arrives as a component bundled with malware/grayware packages. It may be hosted on a website and run when a user accesses the said website. It executes the downloaded files. As a result,
This Trojan may arrive bundled with malware packages as a malware component. It may be hosted on a website and run when a user accesses the said website. It executes the downloaded files. As a
This Trojan may arrive bundled with malware packages as a malware component. It may be hosted on a website and run when a user accesses the said website. It requires its main component to
This Trojan may arrive bundled with malware packages as a malware component. It may be hosted on a website and run when a user accesses the said website. It requires its main component to
This Trojan may be hosted on a website and run when a user accesses the said website. Arrival Details This Trojan may be hosted on a website and run when a user accesses the said website. Download
components: val prime Information Theft This Trojan does not have any information-stealing capability. NOTES: This Trojan does not have rootkit capabilities. It does not exploit any vulnerability.