Search
Keyword: JS_EXPLOIT
Rating: Critical This remote code execution vulnerability exists in the improper handling of objects in memory by Microsoft Edge. Attackers looking to exploit this vulnerability must find a way to convince
Important This remote code execution vulnerability exists in the validating of user input in Microsoft Windows OLE. Attackers looking to exploit this vulnerability must find a way to convince a user to
service providers use Plesk to enable their customers to host and manage their websites and servers. In June 2013, we received a report regarding a zero-day exploit that targets Plesk. The exploit code
This description is based on compiled analysis of several variants of JAVA_EXPLOIT. This is a Java class file that is used to execute an exploit code. Once successful, it is capable of downloading
This worm arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This worm arrives on a system as a file
an information disclosure vulnerability when Microsoft Edge does not properly handle objects in memory. Attackers who successfuly exploit the vulnerability can obtain information to further compromise
Risk Rating: Important This remote code execution vulnerability exists in the Windows Jet Database engine in respect to handling objects in memory. Attackers looking to exploit this vulnerability must
its intended routine. It is a zero-day exploit for the following vulnerability: Adobe Flash Player Remote Code Execution Vulnerability (CVE-2015-0336) NOTES: Once a compromised website is visited, the
click on a link that will lead to a specially crafted website that hosts an exploit to this vulnerability. CVE-2020-1214 - VBScript Remote Code Execution Vulnerability Risk Rating: Important This remote
\node_modules\bluebird\js\browser %AppDataLocal%\Programs\safe-watch\resources\app\node_modules\sax %AppDataLocal%\Programs\safe-watch\resources\app\node_modules\scss-tokenizer\lib %AppDataLocal%\Programs
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
reader dc\Reader\webresources\resource0\static\js\plugins\app-center\css\main-selector.css %Program Files%\Adobe\acrobat reader dc\Resource\typesupport\Unicode\Mappings\win\CP1258.TXT %Program Files%\Adobe
%Windows%\winsxs\amd64_prnso002.inf_31bf3856ad364e35_6.1.7600.16385_none_419ce09d71f61ee8\Amd64 %Program Files%\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\js\viewer
%Program Files%\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\core\dev\nls\de-de\ui-strings.js %Program Files%\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\themes
This adware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This adware arrives on a system as a
This potentially unwanted application arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This
Tools\help\wwhelp\wwhimpl\js\images\spc_tabm.gif %System Root%\Program Files\VMware\VMware Tools\help\wwhelp\wwhimpl\common\html\init3.htm %System Root%\Program Files\Java\jre1.8.0_144\lib\images\cursors
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Adware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Adware arrives on a system as a
\OES\orishttp\docsroot\js %Program Files%\Openfind\OES\orishttp\docsroot\js\jquery %Program Files%\Openfind\OES\orishttp\docsroot\js\mochiKit %Program Files%\Openfind\OES\orishttp\docsroot\js\plotkit