901 entries found.
Displaying page 12
of 46.
TrojanDownloader:Java/OpenConnection.L
Updated on Jul 14, 2005
TrojanDownloader:Java/OpenConnection.L is a Java applet that attempts to download and execute files from a malicious web site. It often works in conjunction with Java/Classloader and Java/Bytverify that exploit a vulnerability in the ByteCode verifier component of the Microsoft VM, as described and fixed in MS03-011.
Alert level:
severe
Exploit:Win32/Byteverify
Updated on Dec 08, 2006
Java/Byteverify is a malicious Java applet that exploits a vulnerability in certain unpatched versions of Microsoft virtual machine (Microsoft VM). Details on the vulnerability can be found in Microsoft Security Bulletin MS03-011 at http://www.microsoft.com/technet/security/Bulletin/MS03-011.mspx
Alert level:
severe
Trojan:Java/Classloader
Updated on Jan 29, 2007
Trojan:Java/Classloader is a malicious Java applet that exploits a vulnerability in certain unpatched versions of Microsoft virtual machine (Microsoft VM). Details on the vulnerability can be found in Microsoft Security Bulletin MS03-011 at http://www.microsoft.com/technet/security/Bulletin/MS03-011.mspx
Alert level:
severe
TrojanDownloader:Java/OpenConnection.M
Updated on Mar 29, 2007
TrojanDownloader:Java/OpenConnection.M is a Java applet that attempts to download and execute files from a malicious web site. It often works in conjunction with Java/Classloader and Java/Bytverify that exploit a vulnerability in the ByteCode verifier component of the Microsoft VM, as described and fixed in MS03-011.
Alert level:
severe
TrojanDownloader:Java/OpenConnection.P
Updated on Mar 29, 2007
TrojanDownloader:Java/OpenConnection.P is a Java applet that attempts to download and execute files from a malicious web site. It often works in conjunction with Java/Classloader and Java/Bytverify that exploit a vulnerability in the ByteCode verifier component of the Microsoft VM, as described and fixed in MS03-011.
Alert level:
severe
TrojanDownloader:Java/OpenConnection.Q
Updated on Mar 29, 2007
TrojanDownloader:Java/OpenConnection.Q is a Java applet that attempts to download and execute files from a malicious web site. It often works in conjunction with Java/Classloader and Java/Bytverify that exploit a vulnerability in the ByteCode verifier component of the Microsoft VM, as described and fixed in MS03-011.
Alert level:
severe
Exploit:Java/ByteVerify
Updated on Oct 01, 2007
Exploit:Java/ByteVerify is a detection of malicious code that attempts to exploit a vulnerability in the Microsoft Virtual Machine (VM). This flaw enables attackers to execute arbitrary code on a user's machine such as writing, downloading and executing additional malware. This vulnerability is addressed by update MS03-011, released in 2003.
Alert level:
severe
Exploit:Java/ByteVerify.C
Updated on Oct 11, 2007
Exploit:Java/ByteVerify.C is a detection of malicious code that attempts to exploit a vulnerability in the Microsoft Virtual Machine (VM) in order to download and execute arbitrary files on a user's machine. This vulnerability is addressed by update MS03-011, released in 2003.
Alert level:
severe
Exploit:HTML/IFrame_Exploit.E
Updated on Nov 21, 2007
Exploit:HTML/IFrame_Exploit.E is a detection of code that exploits a vulnerability to automatically execute e-mail attachments without user intervention. Exploit:HTML/IFrame_Exploit.E is typically associated with mass-mailing worms and other malware that is distributed via spam.
Alert level:
severe
Trojan:Java/Classloader.D
Updated on Dec 05, 2007
Trojan:Java/Classloader.D is a malicious Java applet that can infect Microsoft Windows computers that are not patched with Microsoft Security Update MS03-011. An attacker can insert the Java applet into HTML code and host the code on a Web server or send the code in e-mail. When a user opens the malicious Web page or e-mail, the vulnerability allows the applet to bypass a security check on the computer. The applet can then run malicious code on the computer and open a backdoor to receive commands from attackers.
Alert level:
severe
TrojanDropper:Java/Beyond.gen!A
Updated on Jan 31, 2008
TrojanDropper:Java/Beyond.gen!A is a generic detection for malicious Java applets, that often work in conjunction with Java/Classloader and Java/Bytverify, that attempt to exploit a vulnerability in the Microsoft Virtual Machine (VM). This flaw enables attackers to execute arbitrary code on a user's machine such as writing, downloading and executing additional malware. This vulnerability is addressed by update MS03-011, released in 2003.
An attacker can insert the Java applet into HTML code which can then be distributed via malicious web sites or sent in an e-mail. When a user opens the malicious web page or e-mail, the vulnerability allows the applet to bypass a security check on the computer. The applet can then run malicious code on the computer.
Alert level:
severe
Exploit:Java/ByteVerify.F
Updated on May 06, 2008
Exploit:Java/ByteVerify.F is a detection of malicious code that attempts to exploit a vulnerability in the Microsoft Virtual Machine (VM). This flaw enables attackers to execute arbitrary code on a user's machine such as writing, downloading and executing additional malware. This vulnerability is addressed by update MS03-011, released in 2003.
Alert level:
severe
Trojan:Java/Bytverify
Updated on May 30, 2008
Trojan:Java/Bytverify is a detection for malicious Java code that attempts to exploit a vulnerability in the Microsoft Virtual Machine (VM). This flaw enables attackers to execute arbitrary code on a user's machine such as writing, downloading and executing additional malware. This vulnerability is addressed by update MS03-011, released in 2003.
Alert level:
severe
Exploit:JS/Axdow.C
Updated on Oct 01, 2008
Exploit:JS/Axdow.C is Microsoft's generic detection for a Javascript malware that exploits a vulnerability in the GLIEDown.IEDown.1 ActiveX control.
Alert level:
severe
TrojanDownloader:Java/Classloader.D
Updated on Oct 13, 2008
TrojanDownloader:Java/Classloader.D is a malicious Java applet that can infect Microsoft Windows computers that are not patched with Microsoft Security Update MS03-011. An attacker can insert the Java applet into HTML code and host the code on a Web server or send the code in e-mail. When a user opens the malicious Web page or e-mail, the vulnerability allows the applet to bypass a security check on the computer. The applet can then run malicious code on the computer and open a backdoor to receive commands from attackers.
Alert level:
severe