Keyword: JS_EXPLOIT
10457 Total Search   |   Showing Results : 1701 - 1720
This Trojan is a Java component of the black hole exploit kit . This Trojan executes when a user accesses certain websites where it is hosted. It executes the downloaded files. As a result, malicious
This is Trend Micro's detection for a Java class that exploits a certain vulnerability in Java Runtime Environment . This malware is part of the Blackhole exploit kit. This Trojan arrives as a
This is Trend Micro's detection for a Java class that exploits a certain vulnerability in Java Runtime Environment . This malware is part of the Blackhole exploit kit. This Trojan arrives as a
checks if the affected system's operating system is Windows. If the said condition is met, it attempts to exploit the said vulnerability. Otherwise, it terminates itself. Once it successfully exploits the
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It arrives on a system as a file dropped by other malware or as a file downloaded
This is the Trend Micro detection for malicious Java Class file used as a component of other malware. Once the user accesses a malicious site, this malicious script is executed. This Trojan may be
This Trojan may arrive bundled with malware packages as a malware component. It may be hosted on a website and run when a user accesses the said website. Arrival Details This Trojan may arrive
file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. NOTES: This Trojan is a java class used to execute an exploit code. This exploit may be used to
This Trojan is capable of downloading files. However, it does not contain the URL where the file can be downloaded. This Trojan arrives on a system as a file dropped by other malware or as a file
This Trojan may arrive bundled with malware packages as a malware component. It may be hosted on a website and run when a user accesses the said website. Arrival Details This Trojan may arrive
This Trojan may arrive bundled with malware packages as a malware component. It arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This is a Java class file that is used to execute an exploit code. Once successful, it may download a possibly malicious file from a certain URL. This Trojan may be hosted on a website and run when a
Once a malware successfully exploits the said vulnerability, it causes certain actions to be done on the system. This Trojan may be hosted on a website and run when a user accesses the said website.
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It may be hosted on a website and run when a user
This worm connects to a random IP address and takes advantage of the vulnerability MS08-067 (Vulnerability in Server Service Could Allow Remote Code Execution). It may also exploit a vulnerability in
This Trojan arrives as an embedded .SWF file in bodies of malicious .DOC/.PDF files which Trend Micro detects as any of the following: TROJ_MDROP.WMP TROJ_PIDIEF.SMDX It aids in helping its main
This malware arrives as an embedded .SWF file in the body of a malicious .DOC file detected by Trend Micro as TROJ_MDROP.SW. This Trojan takes advantage of the following vulnerability in Adobe Flash
This Trojan contains an embedded malicious .SWF file that it uses to successfully exploit the specific vulnerability. The malicious .SWF file is detected by Trend Micro as SWF_EXPLOIT.WMP. It
This Trojan takes advantage of a zero-day exploit in Adobe Flash Player. Several versions of Adobe Flash Player and Adobe Reader and Acrobat are affected, increasing the chances of malware infection