Follow:

Search the malware encyclopedia

Search term = bloodhound
Sorted by Relevance | Sort by Date

40 entries found | Page 1 of 4


Exploit:HTML/MhtRedir.gen
Aliases: Bloodhound.Exploit.6 (Symantec)
Description: See notes.
Published Date: May 21, 2010
Alert level: Severe

Exploit:Win32/Pdfjsc.gen!A
Aliases: Bloodhound.Exploit.196 (Symantec)
Description: Exploit:Win32/Pdfjsc.gen!A is a generic detection of malformed PDF files that target various Adobe Acrobat and Reader vulnerabilities. Once the malformed PDF files are opened by vulnerable versions of Adobe Acrobat and Reader, the embedded JavaScript loads the exploit. The exploit may successfully...
Published Date: May 17, 2010
Alert level: Severe

Exploit:JS/Mult.BS
Aliases: Bloodhound.Exploit.263 (Symantec)
Description: Exploit:JS/Mult.BS is the generic detection for obfuscated shellcode embedded in JavaScript that downloads and executes files from a remote server. It is usually embedded in a JavaScript file hosted in a compromised or malicious Web site. When the page containing the JavaScript is accessed, for...
Published Date: Apr 11, 2011
Alert level: Severe

Exploit:Win32/Jdrop.gen!A
Aliases: Bloodhound.Exploit.183 (Symantec)
Description: Exploit:Win32/Jdrop.gen!A is a generic detection for specially crafted Microsoft Access Database (MDB) files that exploit the Microsoft Jet Database Engine File Parsing Stack Overflow Vulnerability. This vulnerability is referenced by Common Vulnerabilities and Exposures ID CVE-2008-1092, and...
Published Date: Apr 11, 2011
Alert level: Severe

Exploit:Win32/Pidief.A
Aliases: Bloodhound.PDF.8 (Symantec)
Description: Exploit:Win32/Pidief.A is a detection for an exploit that targets a Portable Document Format (PDF) vulnerability. The critical vulnerability could result in the installation of additional malware when a malicious PDF document is opened using Adobe Reader version 9, or earlier.
Published Date: Apr 11, 2011
Alert level: Severe

Exploit:Win32/Pidief.D
Aliases: Bloodhound.PDF.8 (Symantec)
Description: Exploit:Win32/Pidief.D is a detection for an exploit that targets a Portable Document Format (PDF) vulnerability. The critical vulnerability could allow remote code execution when a malformed document is opened using Adobe Reader version 9, or earlier.
Published Date: Apr 11, 2011
Alert level: Severe

Exploit:Win32/Pidief.B
Aliases: Bloodhound.Exploit.213 (Symantec)
Description: Exploit:Win32/Pidief.B is a detection for an exploit that targets a Portable Document Format (PDF) vulnerability. The critical vulnerability could result in the installation of additional malware when a malicious PDF document is opened using Adobe Reader version 9, or earlier.
Published Date: Apr 11, 2011
Alert level: Severe

Exploit:Win32/Pdfjsc.CG
Aliases: Bloodhound.Exploit.196 (Symantec)
Description: Exploit:Win32/Pdfjsc.CG is a detection for malicious PDF files, which attempt to exploit various vulnerabilities in PDF viewing software. These malicious files contain obfuscated JavaScript, which in turn executes shellcode by exploiting vulnerabilities.
Published Date: Apr 11, 2011
Alert level: Severe

Exploit:Win32/CVE-2010-2883.A
Aliases: Bloodhound.Exploit.357 (Symantec)
Description: Exploit:Win32/CVE-2010-2883.A is a generic detection for specially-crafted PDF files that attempt to exploit the Acrobat SING Table Handling vulnerability CVE-2010-2883. Successful exploitation may lead to denial of service or execution of arbitrary code.
Published Date: Apr 11, 2011
Alert level: Severe

Exploit:Win32/Pdfheap.A
Aliases: Bloodhound.Exploit.266 (Symantec)
Description: Exploit:Win32/Pdfheap.A is the detection for a malicious Portable Document Format (PDF) file that attempts to exploit the vulnerability described in CVE-2009-1862.  The vulnerability affects Adobe Reader and Acrobat versions 9.1.2 and earlier, and Adobe Flash Player 9.0.159.0 earlier and 10.0.22.87...
Published Date: Apr 11, 2011
Alert level: Severe



Didn't find what you were looking for? Here are some search tips:
  • Use short queries with the most important words you are looking for, for example search for “Alureon” instead of “How do I remove Alureon from my computer?
  • Use quotation marks (" ") to search for phrases of multiple words, for example "Green AV".
  • Try again, but with slightly different words that might mean something similar
  • Check if you've accidentally misspelled words