Public exploits available
On this page
This signature detects commonly used exploitation techniques for browser based vulnerabilities.
An attacker who successfully exploited this vulnerability could take complete control of the affected system.
Technical details (analysis)
An attacker could host a specially crafted web site that is designed to exploit a browser based vulnerability and then convince a user to view the web site. The attacker could also take advantage of compromised web sites and web sites that accept or host user-provided content or advertisements. These Web sites could contain specially crafted content that could exploit a browser based vulnerability. In all cases, however, an attacker would have no way to force users to visit these web sites. Instead, an attacker would have to convince users to visit the web site, typically by getting them to click a link in an e-mail message or in an Instant Messenger message that takes users to the attacker's web site. It could also be possible to display specially crafted web content by using banner advertisements or by using other methods to deliver Web content to affected systems.
Release Date: 2009-06-04T00:00:00
Known false positives
No known false positives at this time.