Keyword: JS_EXPLOIT
10437 Total Search   |   Showing Results : 2501 - 2520
to an exploit site, which prompts the download of a malicious file, before finally leading to a fake pharmacy site. The downloaded file, ABOUT.EXE. is detected as TROJ_INJECT.BXV. All related URLs have
infection routine like? The PlugX infection routine goes as follows: The user receives the spearphishing email in his inbox, containing the malicious attachment. The attachment may exploit certain
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It executes the dropped file(s). As a result, malicious
Adobe Acrobat collab.collectEmailInfo Buffer Overflow Adobe Acrobat collab.getIcon Buffer Overflow Adobe Acrobat util.printf Buffer Overflow Adobe Reader media.newPlayer Exploit After successfully
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It takes advantage of software vulnerabilities in
page. It is capable of affecting the following iOS versions: iPad 4.3 to 4.3.3 iPhone 4.2.6 to 4.3.3 iPod touch 4.3 to 4.3.3 The exploit is triggered once a user visits the abovementioned jailbreak site
Server 2003.) NOTES: This is a Java class file that is used to execute an exploit code. Once successful, it may download a possibly malicious file from a certain URL. The URL where this malware downloads
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan takes advantage of the following software vulnerabilities to download possibly malicious files: CVE-2010-0840 More information on this vulnerability can be found below:
correct index value for mPartMinors array. It then attempts to exploit the addresses within the .GOT range and uses a NetLink socket to send the malicious message that contains the exploit allowing users to
This Trojan may be downloaded by other malware/grayware from remote sites. It may be hosted on a website and run when a user accesses the said website. However, as of this writing, the said sites are
This Trojan arrives as a component bundled with malware/grayware packages. It may be hosted on a website and run when a user accesses the said website. Arrival Details This Trojan arrives as a
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It executes the dropped file(s). As a result, malicious
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It executes the files it drops, prompting the affected
Settings\{user name}\Local Settings\Temp on Windows 2000, XP, and Server 2003.) NOTES: This is a Java class file that is used to execute an exploit code. Once successful, it may download a possibly malicious
This Trojan may be hosted on a website and run when a user accesses the said website. Arrival Details This Trojan may be hosted on a website and run when a user accesses the said website. NOTES: This
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It arrives as a component bundled with malware/grayware
Settings\{user name}\Local Settings\Temp on Windows 2000, XP, and Server 2003.) NOTES: This is a Java class file that is used to execute an exploit code. Once successful, it may download a possibly malicious
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It exploits software vulnerabilities to automatically execute attachments once a user
This Trojan may arrive bundled with malware packages as a malware component. It may be hosted on a website and run when a user accesses the said website. It executes the downloaded files. As a