500 entries found.
Displaying page 1
of 25.
Trojan:JS/Proxas.A
Trojan:JS/Proxas.A is a detection for JavaScript-enabled objects that exhibit malware behavior. Malicious Web sites and PDF documents may contain such JavaScript code that attempts to execute code without the user's knowledge. An example of other malware that may execute this JavaScript is Exploit:Win32/Pdfjsc.D.
Alert level:
severe
Exploit:JS/CVE-2008-0015
Exploit:JS/CVE-2008-0015 is the detection for code that attempts to exploit a vulnerability in the Microsoft Video ActiveX Control. This vulnerability is discussed in detail in Microsoft Security Advisory (972890). When a user visits a Web page containing an exploit detected as Exploit:JS/CVE-2008-0015, it may connect to a remote server and download other malware. Currently, we are aware of cases where exploits download and execute Worm:Win32/Dogkild.A on the system.
Alert level:
severe
Exploit:Win32/CVE-2015-2426
Windows Defender detects and removes this threat.
This is a maliciously-constructed Open Type font which is used to exploit the OpenType Font Driver Vulnerability - CVE-2015-2426.
It affects the following Windows versions:
- Windows Vista SP2
- Windows Server 2008 SP2 and R2 SP1
- Windows 7 SP1
- Windows 8
- Windows 8.1
- Windows Server 2012 and R2
- Windows RT 8.1
- Windows 10
Alert level:
severe
Exploit:HTML/Bankfraud
Exploit:HTML/Bankfraud is generic detection for e-mail that contains malicious links or other characteristics indicative of a phishing attack.
Alert level:
severe
Exploit:HTML/Meloits.A
Exploit:HTML/Meloits.A is an HTML exploit of a vulnerability found in Visual Studio 2005 which could allow an attacker to remotely execute arbitrary code on impacted systems. Details on this vulnerability can be found in Microsoft Security Advisory (927709) at http://www.microsoft.com/technet/security/advisory/927709.mspx
Alert level:
severe
Exploit:HTML/Repl.B
Exploit:HTML/Repl.B is a malicious JavaScript program embedded inside HTML files which exploits a buffer overflow vulnerability in RealPlay 10.5 and RealPlay 11 Beta.
Alert level:
severe
Exploit:JS/Mult.AF
Exploit:JS/Mult.AF is a detection for code that exploits a certain vulnerability in Internet Explorer 7 in order to download and run arbitrary files.
Files detected as Exploit:JS/Mult.AF may arrive in the system when a user browses certain sites using a vulnerable version of Internet Explorer. When a webpage that includes Exploit:JS/Mult.AF is loaded, the vulnerability in Internet Explorer is exploited.
Microsoft strongly recommends that users refer to the workarounds specified in Microsoft Security Advisory (961051) immediately.
Alert level:
severe
Exploit:JS/Mult.AI
Exploit:JS/Mult.AI is a detection for code that exploits a certain vulnerability in Internet Explorer 7 in order to download and run arbitrary files.
Files detected as Exploit:JS/Mult.AI may arrive in the system when a user browses certain sites using a vulnerable version of Internet Explorer. When a webpage that includes Exploit:JS/Mult.AI is loaded, the vulnerability in Internet Explorer is exploited.
Microsoft strongly recommends that users refer to the workarounds specified in Microsoft Security Advisory (961051) immediately.
Alert level:
severe
Exploit:Win32/Pidief.C
Exploit:Win32/Pidief.C is a detection for an exploit that targets a Portable Document Format (PDF) vulnerability. The critical vulnerability could result in the installation of additional malware when a malicious PDF document is opened using Adobe Reader version 9, or earlier.
Alert level:
severe
Exploit:SWF/CVE-2011-2110.A
Exploit:SWF/CVE-2011-2110.A is a detection for specially-crafted Shockwave Flash (.SWF) files that attempt to exploit software vulnerabilities in Adobe Flash Player and Adobe Reader and Acrobat X.
Alert level:
severe
Exploit:Win32/Pdfjsc.EP
Exploit:Win32/Pdfjsc.EP is a detection for specially-crafted PDF files that attempt to exploit a software vulnerability in Adobe Acrobat and Adobe Reader.
Alert level:
severe
Exploit:Win32/Pdfjsc.FG
Exploit:Win32/Pdfjsc.FG is a detection for specially-crafted PDF files that attempt to exploit software vulnerabilities in Adobe Acrobat and Adobe Reader.
Alert level:
severe
Exploit:Java/CVE-2008-5353.HN
Exploit:Java/CVE-2008-5353.HN is based on a vulnerability which affects Java Virtual Machine (JVM) up to and including version 6 update 10. The vulnerability allows an unsigned Java applet to gain elevated privileges and potentially have unrestricted access to a host system, outside its "sand box" environment.
Alert level:
severe
Exploit:Java/CVE-2009-3867.HD
Exploit:Java/CVE-2009-3867.HD is a Java applet that attempts to exploit vulnerabilities described in CVE-2009-3867 and CVE-2009-3868 that may allow the execution of an arbitrary code with escalated privileges.
Alert level:
severe
Exploit:JS/Mult.DC
Exploit:JS/Mult.DC is the detection for a specifically obfuscated JavaScript, embedded in PDF files, that targets software vulnerabilities in Adobe Acrobat and Adobe Reader.
Alert level:
severe
Exploit:Win32/Pdfjsc.KO
Exploit:Win32/Pdfjsc.KO is a detection for specially-crafted PDF files that target software vulnerabilities in Adobe Acrobat and Adobe Reader. It usually arrives in the system when the user visits a webpage that contains a malicious PDF file or opens an email containing the PDF file as an attachment.
Alert level:
severe
Exploit:Java/CVE-2010-0840.L
Exploit:Java/CVE-2010-0840.L is a detection for a malicious Java class that exploits the vulnerability described in CVE-2010-0840. Successful exploitation leads to remote code execution.
Alert level:
severe
Exploit:Java/CVE-2008-5353.XL
Exploit:Java/CVE-2008-5353.XL is a detection for an exploit that is based on a vulnerability described in CVE-2008-5353. The vulnerability affects Java Virtual Machine (JVM) version 5 up to and including update 22, as well as version 6 up to and including update 10. The vulnerability allows an unsigned Java applet to gain elevated privileges and potentially have unrestricted access to a host system, outside its "sand box" environment.
Alert level:
severe
Exploit:Java/CVE-2008-5353.WX
Exploit:Java/CVE-2008-5353.WX is the detection for an obfuscated malicious Java class component that exploits the vulnerability described in CVE-2008-5353.
The vulnerability affects Java Virtual Machine (JVM) up to and including version 5 update 22 and version 6 update 10. The vulnerability allows an unsigned Java applet to gain elevated privileges and potentially have unrestricted access to a host system, outside of its "sandbox" environment. When a user visits a website that contains the applet, using a computer that has a vulnerable version of Sun Java, security checks may be bypassed, allowing arbitrary codes to be run.
Alert level:
severe
Exploit:Java/CVE-2009-3869.M
Exploit:Java/CVE-2009-3869.M is a Java applet that attempts to execute a buffer overflow exploit that may allow the execution of an arbitrary code with escalated privileges. The applet exploits a buffer overflow which existed in processing malformed images or audio files and affects Sun Java SE in JDK and JRE 5.0 before Update 22 and JDK and JRE 6 before Update 17.
Alert level:
severe