Keyword: JS_EXPLOIT
10457 Total Search   |   Showing Results : 1281 - 1300
This Trojan may arrive bundled with malware packages as a malware component. It may be hosted on a website and run when a user accesses the said website. It executes the downloaded files. As a
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It arrives on a system as a file dropped by other malware or as a file downloaded
This Trojan may arrive bundled with malware packages as a malware component. It may be hosted on a website and run when a user accesses the said website. Arrival Details This Trojan may arrive
that is used to execute an exploit code. Once successful, it may download and execute a possibly malicious file from a certain URL.
component to successfully perform its intended routine. NOTES: This is a Java class file that is used to execute an exploit code. Once successful, it may download a possibly malicious file from a certain URL.
This is the Trend Micro detection for malicious Java Class that attempts to exploit an unknown vulnerability in the Java Runtime Environment component in Oracle Java SE JDK and JRE 7 and 6 Update 27
This malicious HTML file exploits a zero-day vulnerability in Internet Explorer 7, 8, and 9. The exploit leads to the dropping of a PoisonIvy backdoor. PoisonIvy backdoors are known to be widely used
This Trojan may arrive bundled with malware packages as a malware component. It exports functions used by other malware. Arrival Details This Trojan may arrive bundled with malware packages as a
Settings\{user name}\Local Settings\Temp on Windows 2000, XP, and Server 2003.) NOTES: This is a Java class file that is used to execute an exploit code. Once successful, it may download a possibly malicious
This Trojan executes when a user accesses certain websites where it is hosted. It executes the downloaded files. As a result, malicious routines of the downloaded files are exhibited on the affected
This Trojan arrives as a component bundled with malware/grayware packages. It may be hosted on a website and run when a user accesses the said website. It requires its main component to successfully
This is used as a component of other malware. It exploits a vulnerability in several versions of Oracle Java Runtime Environment (JRE) component. It allows this Trojan to execute arbitrary codes on
This is used as a component of other malware. It exploits a vulnerability in several versions of Oracle Java Runtime Environment (JRE) component. It allows this Trojan to execute arbitrary codes on
This Trojan arrives as a component bundled with malware/grayware packages. It may be hosted on a website and run when a user accesses the said website. It executes the downloaded files. As a result,
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It arrives on a system as a file dropped by other malware or as a file downloaded
This Trojan may arrive bundled with malware packages as a malware component. It takes advantage of certain vulnerabilities. Arrival Details This Trojan may arrive bundled with malware packages as a
exploits the said vulnerability, it causes the following actions to be done on the system: Execute arbitrary code on the affected machine such as execution of other malware. It is a zero-day exploit for the
component bundled with malware/grayware packages. Other Details This Trojan requires its main component to successfully perform its intended routine. It is a zero-day exploit for the following vulnerability:
This Trojan may arrive bundled with malware packages as a malware component. It may be hosted on a website and run when a user accesses the said website. It executes the downloaded files. As a
This Trojan may arrive bundled with malware packages as a malware component. It arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting