Keyword: JS_EXPLOIT
10410 Total Search   |   Showing Results : 1701 - 1720
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It arrives on a system as a file dropped by other malware or as a file downloaded
This Trojan overwrites itself with the contents of the dropped file %User Temp%\AAAA . It then reopens itself in Hancom Hangul . This Trojan arrives as attachment to mass-mailed email messages. It
This worm connects to a random IP address and takes advantage of the vulnerability MS08-067 (Vulnerability in Server Service Could Allow Remote Code Execution). It may also exploit a vulnerability in
This Trojan is capable of downloading files. However, it does not contain the URL where the file can be downloaded. This Trojan arrives on a system as a file dropped by other malware or as a file
exploit the system in the background: From the decompiled code, the binary named gingerbreak also comes from a faked png file named gingerbreak.png , the same trick as the three png files we mentioned
This is Trend Micro's detection for a Java class that exploits a certain vulnerability in Java Runtime Environment . This malware is part of the Blackhole exploit kit. This Trojan arrives as a
This is the Trend Micro detection for malicious Java Class file used as a component of other malware. Once the user accesses a malicious site, this malicious script is executed. This Trojan may be
This Trojan may arrive bundled with malware packages as a malware component. It may be hosted on a website and run when a user accesses the said website. Arrival Details This Trojan may arrive
file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. NOTES: This Trojan is a java class used to execute an exploit code. This exploit may be used to
This malware arrives as an embedded .SWF file in the body of a malicious .DOC file detected by Trend Micro as TROJ_MDROP.SW. This Trojan takes advantage of the following vulnerability in Adobe Flash
This Trojan arrives as an embedded .SWF file in bodies of malicious .DOC/.PDF files which Trend Micro detects as any of the following: TROJ_MDROP.WMP TROJ_PIDIEF.SMDX It aids in helping its main
This Trojan takes advantage of a zero-day exploit in Adobe Flash Player. Several versions of Adobe Flash Player and Adobe Reader and Acrobat are affected, increasing the chances of malware infection
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It may be hosted on a website and run when a user
This malware may be hosted on a website and run when a user accesses the said website. It takes advantage of an unknown vulnerability in a certain software to allow a remote malicious user or malware
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It may be hosted on a website and run when a user
This Trojan may be hosted on a website and run when a user accesses the said website. It executes the downloaded files. As a result, malicious routines of the downloaded files are exhibited on the
This Trojan may arrive bundled with malware packages as a malware component. It may be hosted on a website and run when a user accesses the said website. Arrival Details This Trojan may arrive
This Trojan may arrive bundled with malware packages as a malware component. It may be hosted on a website and run when a user accesses the said website. It requires its main component to
This Trojan may be hosted on a website and run when a user accesses the said website. It requires its main component to successfully perform its intended routine. Arrival Details This Trojan may be
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It arrives on a system as a file dropped by other malware or as a file downloaded