Skip to main content
Skip to main content
Microsoft Security Intelligence
500 entries found. Displaying page 1 of 25.
Updated on Jul 14, 2011

Java/CVE-2010-0094 is a family of malicious Java applets stored within a Java Archive (.JAR) that attempts to exploit a vulnerability in the Java Runtime Environment (JRE) up to and including version 6 update 18. The vulnerability allows an unsigned Java applet to gain elevated privileges and potentially have unrestricted access to a host system outside its "sandbox" environment. It is discussed in CVE-2010-0094.

Alert level: severe
Updated on May 24, 2011

Exploit:HTML/CVE-2010-4452.A is the detection for an HTML file that exploits a vulnerability in Java described in CVE-2010-4452.

Alert level: severe
Updated on May 20, 2011

Exploit:Java/CVE-2010-4452 is the detection for an HTML file that exploits a vulnerability in Java described in CVE-2010-4452.

Alert level: severe
Updated on Jun 17, 2011
Alert level: severe
Updated on Dec 05, 2011
Alert level: severe
Updated on May 27, 2011
Alert level: severe
Updated on May 19, 2014
Alert level: severe
Updated on Jun 09, 2011

TrojanDownloader:Java/OpenStream.AY is the detection for an obfuscated Java applet that attempts to download and execute files from a remote website. It often works in conjunction with Exploit:Java/CVE-2010-4452, which exploits a vulnerability in the Java Runtime Environment (JRE).

Alert level: severe
Updated on Aug 11, 2011

TrojanDownloader:Java/OpenStream.BA is the detection for an obfuscated Java applet that attempts to download and execute files from a remote website. It often works in conjunction with Exploit:Java/CVE-2010-4452, which exploits a vulnerability in the Java Runtime Environment (JRE).

Alert level: severe
Updated on Jul 18, 2011

Exploit:Java/CVE-2010-0840.ED is the detection for a trojan Java applet that exploits a vulnerability described in CVE-2010-0840. Successful exploitation may lead to the downloading and execution of arbitrary files under the user's security context.

Alert level: severe
Updated on Jul 06, 2011
Exploit:Java/CVE-2010-0840.BL is a detection for a malicious Java applet trojan that exploits a vulnerability described in CVE-2010-0840. Successful exploitation may lead to the downloading and execution of arbitrary files under the user's security context.
Alert level: severe
Updated on Apr 25, 2012

Java/CVE-2010-0094 is a family of malicious Java applets stored within a Java Archive (.JAR) that attempts to exploit a vulnerability in the Java Runtime Environment (JRE) up to and including version 6 update 18. The vulnerability allows an unsigned Java applet to gain elevated privileges and potentially have unrestricted access to a host system outside its "sandbox" environment. It is discussed in CVE-2010-0094.

Alert level: severe
Updated on Feb 29, 2012

Exploit:Java/CVE-2010-0840.OS is a detection for a family of malicious Java applet trojans that exploit a vulnerability described in CVE-2010-0840.OS. The exploit is triggered when a user visits a website, containing the malicious applet, from a computer that is running a vulnerable version of Java.

Alert level: severe
Updated on Sep 28, 2011

Exploit:Java/CVE-2010-0840.LE is a variant of Exploit:Java/CVE-2010-0840 - a detection for malicious Java applets that exploit the vulnerability described in CVE-2010-0840. Successful exploitation may lead to remote code execution.

Alert level: severe
Updated on Feb 27, 2012
Exploit:Java/CVE-2010-0840.OG is an obfuscated Java class that exploits a vulnerability described in CVE-2010-0840. Successful exploitation may lead to the download and execution of arbitrary files within the user's security context. When a user visits a website that contains this malicious Java class using a computer that has a vulnerable version of Sun Java, security checks may be bypassed, which could allow arbitrary code execution.
Alert level: severe
Updated on Apr 25, 2011
Exploit:Java/CVE-2010-0840.CE is a detection for an obfuscated malicious Java class applet component that exploits the vulnerability described in CVE-2010-0840. Successful exploitation may lead to the downloading and execution of arbitrary files under the user's security context.
Alert level: severe
Updated on Apr 11, 2011
Exploit:Win32/CVE-2010-3620 is a detection for malformed PDF files that attempt to exploit a vulnerability in certain Adobe Acrobat and Adobe Reader versions. The vulnerability allows an attacker to execute arbitrary code via a specially-crafted image.
Alert level: severe
Updated on Apr 11, 2011
Exploit:Win32/CVE-2010-3962.A is a detection for a specially-crafted HTML script that is designed to attempt to exploit the reported vulnerability described by Microsoft Security Advisory 2458511. The vulnerability affects Internet Explorer 6, Internet Explorer 7 and Internet Explorer 8. By exploiting this vulnerability, an attacker may be able to execute arbitrary code on a vulnerable computer.
Alert level: severe
Updated on Apr 27, 2011
Exploit:Java/CVE-2010-0842.A is a detection for Java malware that exploits a vulnerability discussed in CVE-2010-0842. Successful exploitation of the vulnerability could lead to the execution of arbitrary code.
Alert level: severe
Updated on Apr 11, 2011
Exploit:Win32/CVE-2010-3654.A is a detection for files that exploit a vulnerability in Adobe Flash Player version 10 through 10.1.85.3, and in Adobe Reader and Acrobat version 9 through 9.4. The vulnerability is tracked using the CVE identifier CVE-2010-3654.
Alert level: severe