Skip to main content
Skip to main content
901 entries found. Displaying page 13 of 46.
Updated on Dec 03, 2008
Trojan:JS/Redirector.V is a detection for trojan Java scripts that download and execute malicious Shockwave Flash (SWF) files.  The malicious SWF files are crafted to exploit “Adobe Flash Player Invalid Pointer Vulnerability”, and detected by Microsoft antivirus solutions as Exploit:Win32/APSB08-11.gen!A.
Alert level: severe
Updated on Dec 04, 2008
Exploit:Win32/Pdfjsc.M is a detection for a PDF file that exploits a PDF (Portable Document Format) vulnerability tracked with the CVE Reference Number CVE-2008-2992.
Alert level: severe
Updated on Dec 18, 2008

Exploit:JS/Mult.AH is a malicious JavaScript that attempts to execute multiple instances of code to exploit a potentially vulnerable operating system environment. The malware could download arbitrary files and send details about the affected computer to a remote attacker.

Alert level: severe
Updated on Jan 13, 2009
Exploit:Win32/Pdfjsc.L is the detection for a specially crafted PDF file that exploits several vulnerabilities in Adobe Acrobat and Adobe Reader.
Alert level: severe
Updated on Aug 04, 2009
Exploit:JS/Mult.BS is the generic detection for obfuscated shellcode embedded in JavaScript that downloads and executes files from a remote server. It is usually embedded in a JavaScript file hosted in a compromised or malicious Web site. When the page containing the JavaScript is accessed, for example if a user visits a compromised site, the JavaScript is executed, triggering the shellcode to run.
Alert level: severe
Updated on Sep 03, 2009
Exploit:Win32/Pdfjsc.BK is a detection for specially-crafted PDF files that targets software vulnerabilities in Adobe Acrobat and Adobe Reader.
Alert level: severe
Updated on Nov 02, 2009
Exploit:Java/CVE-2008-5353.B is a detection for malicious code that attempts to exploit a vulnerability in the Java Runtime Environment (JRE). The vulnerability, with CVE number CVE-2008-5353, may lead to the download and execution of arbitrary files in an affected system.
Alert level: severe
Updated on Jan 06, 2010
Exploit:Win32/Pdfjsc.CR is the detection for a malicious PDF file that exploits the vulnerability discussed in CVE-2007-5659. Upon execution, Exploit:Win32/Pdfjsc.CR runs a JavaScript that attempts to download and execute arbitrary files from remote servers.
Alert level: severe
Updated on Apr 20, 2010
Exploit:Win32/Pidief.gen!B is the detection for an exploit targeting multiple Portable Document Format (PDF) vulnerabilities. These vulnerabilities allow remote code execution when malformed PDF document is opened using vulnerable versions of Adobe Reader and Acrobat.
Alert level: severe
Updated on May 28, 2010
Exploit:Win32/Pdfjsc.FG is a detection for specially-crafted PDF files that attempt to exploit software vulnerabilities in Adobe Acrobat and Adobe Reader.
Alert level: severe
Updated on Jun 10, 2010
Exploit:Win32/CVE-2010-1885.A is a detection for a cross-site scripting method that exploits a vulnerability (CVE-2010-1885) in Windows Help and Support Center that could allow an attacker to run arbitrary code on the local computer.
Alert level: severe
Updated on Jun 23, 2010
TrojanDownloader:JS/Adodb.F is the component detection for malicious JavaScript code that downloads and executes another malware components, for example other JavaScript or malware binaries.
Alert level: severe
Updated on Jun 23, 2010
TrojanDownloader:JS/Adodb.G is the component detection for malicious JavaScript code that downloads and executes another malware components.
Alert level: severe
Updated on Jun 24, 2010
Exploit:Win32/Pdfjsc.FM is the detection for a specially crafted PDF file that exploits a vulnerability in Adobe Acrobat and Adobe Reader. This file only successfully exploits computer that are affected by the Adobe Acrobat and Adobe Reader vulnerability discussed in CVE-2009-1492.
Alert level: severe
Updated on Jun 28, 2010
Exploit:Win32/CVE-2010-1885.gen is a generic detection for a cross-site scripting method that exploits a vulnerability (CVE-2010-1885) in Windows Help and Support Center that could allow an attacker to run arbitrary code on the local computer.
Alert level: severe
Updated on Jul 15, 2010

Windows Defender detects and removes this threat.

This is a generic detection for specially crafted, malicious shortcut files that target the vulnerability exploited by the Win32/Stuxnet family.

When you browse a folder that has the malicious shortcut using an app that displays shortcut icons, the malware runs instead.

Find out ways that malware can get on your PC.  

Alert level: severe
Updated on Aug 09, 2010
Exploit:Win32/Pdfjsc.GR is a detection for specially-crafted PDF files that target software vulnerabilities in Adobe Acrobat and Adobe Reader. Once the malformed PDF files are opened by vulnerable versions of Adobe Acrobat and Reader, the embedded JavaScript is executed and loads the exploit.
 
Files detected as Pdfjsc.GR attempt to exploit the following vulnerabilities:
 
Alert level: severe
Updated on Sep 28, 2010

Windows Defender detects and removes this threat.

Exploit:Win32/ShellCode.gen!C is a generic detection for JavaScript files that have malicious code. Generally, attackers use this malicious code to infect your computer with other malware.

These files are often downloaders which use the malicious code to exploit vulnerabilities in various software.

A vulnerability is like a hole in your software that malware can use (or exploit) to get on your computer. These holes are fixed by installing updates to the vulnerable software; this is why it is extremely important to keep all of the programs on your computer up to date.

See here for information on how to update some software.

As this is a generic detection, we cannot identify the precise files that use this code or the particular exploits that the code uses.

Alert level: severe
Updated on Oct 04, 2010
Exploit:Java/CVE-2008-5353.PZ is a detection for an obfuscated malicious Java class component that exploits the vulnerability described in CVE-2008-5353.
 
Alert level: severe
Updated on Oct 22, 2010
Exploit:Java/CVE-2008-5353.MW is based on a vulnerability which affects Java Virtual Machine (JVM) up to and including version 6 update 10. The vulnerability allows an unsigned Java applet to gain elevated privileges and potentially have unrestricted access to a host system, outside its "sand box" environment.
Alert level: severe