Home / malwarePDF  

Exploit:Win32/Senglot.E


First posted on 15 February 2019.
Source: Microsoft

Aliases :

There are no other names known for Exploit:Win32/Senglot.E.

Explanation :

Exploit:Win32/Senglot.E is a generic detection for malicious code, often hosted in HTML files, that attempts to download and execute arbitrary files by exploiting an application vulnerability. In the wild, files detected as Exploit:Win32/Senglot.E are known to exploit a vulnerability in Adobe Shockwave Player versions 11.5.8.612 and earlier. Adobe has released an advisory detailing the vulnerability.  Analysis by Marian Radu

Last update 15 February 2019

 

TOP