Keyword: JS_EXPLOIT
10437 Total Search   |   Showing Results : 2541 - 2560
\Temp on Windows Vista and 7.) NOTES: This is the Trend Micro detection for malicious Java Class that attempts to exploit a vulnerability in the Java Runtime Environment component of the following: Java
This malware used a Christmas-themed exploit document to deliver its payload, BKDR_GAMFRIC.A. The backdoor (MagicFire) is rarely seen in the wild possibly because its only use in targeted attacks. To
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It does not have any propagation routine. It does not have any backdoor routine. It does
This Trojan may be hosted on a website and run when a user accesses the said website. It executes the downloaded files. As a result, malicious routines of the downloaded files are exhibited on the
exploit a vulnerability in the Java Runtime Environment component of the following: Java SE 7 Update 2 and earlier Java SE 6 Update 30 and earlier Java SE 5.0 Update 33 and earlier Java SE 1.4.2_35 and
This Trojan arrives as a component bundled with malware/grayware packages. It may be hosted on a website and run when a user accesses the said website. It executes the downloaded files. As a result,
This Trojan arrives as a component bundled with malware/grayware packages. It may be hosted on a website and run when a user accesses the said website. It executes the downloaded files. As a result,
This malware was involved in the Red October campaign, a series of attacks targeting diplomatic and government agencies. It drops malicious files onto the affected system and executes them, causing
This Trojan arrives as a component bundled with malware/grayware packages. It may be hosted on a website and run when a user accesses the said website. It does not have any propagation routine. It
This Trojan may arrive bundled with malware packages as a malware component. It may be hosted on a website and run when a user accesses the said website. It requires its main component to
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It executes the downloaded files. As a result, malicious
This Trojan may be hosted on a website and run when a user accesses the said website. It does not have any propagation routine. It does not have any backdoor routine. It executes the downloaded
This Trojan may arrive bundled with malware packages as a malware component. It may be hosted on a website and run when a user accesses the said website. Arrival Details This Trojan may arrive
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
exploit for the following vulnerability: Unspecified vulnerability in Adobe Flash Player More information on this vulnerability can be found below: Adobe Security Bulletin APSA11-01 NOTES: This is the Trend
Exploits take advantage of vulnerabilities or security holes. Exploits are often incorporated into malware, which are consequently able to propagate into and run intricate routines on vulnerable
Black Hole Exploit Kit. This Trojan downloads a possibly malicious file from a certain URL. The URL where this malware downloads the said file depends on the parameter passed on to it by its components.
component to successfully perform its intended routine. NOTES: This is a Java class file that is used to execute an exploit code. Once successful, it may download a possibly malicious file from a certain URL.
This malware is a component of a malicious Java archive file (.JAR). It takes advantage of a stack-based buffer overflow in a function in Java Runtime Environment (JRE) that allows remote attackers
capability. NOTES: This Trojan contains an embedded malicious .SWF file named as mampo.swf.. It uses the embedded file to successfully exploit the specific vulnerability. The malicious .SWF file is detected by