Skip to main content
Skip to main content
901 entries found. Displaying page 13 of 46.
Updated on Jan 31, 2008
TrojanDropper:Java/Beyond.gen!A is a generic detection for malicious Java applets, that often work in conjunction with Java/Classloader and Java/Bytverify, that attempt to exploit a vulnerability in the Microsoft Virtual Machine (VM). This flaw enables attackers to execute arbitrary code on a user's machine such as writing, downloading and executing additional malware. This vulnerability is addressed by update MS03-011, released in 2003.
An attacker can insert the Java applet into HTML code which can then be distributed via malicious web sites or sent in an e-mail. When a user opens the malicious web page or e-mail, the vulnerability allows the applet to bypass a security check on the computer. The applet can then run malicious code on the computer.
Alert level: severe
Updated on May 06, 2008
Exploit:Java/ByteVerify.F is a detection of malicious code that attempts to exploit a vulnerability in the Microsoft Virtual Machine (VM). This flaw enables attackers to execute arbitrary code on a user's machine such as writing, downloading and executing additional malware. This vulnerability is addressed by update MS03-011, released in 2003.
Alert level: severe
Updated on May 30, 2008
Trojan:Java/Bytverify is a detection for malicious Java code that attempts to exploit a vulnerability in the Microsoft Virtual Machine (VM). This flaw enables attackers to execute arbitrary code on a user's machine such as writing, downloading and executing additional malware. This vulnerability is addressed by update MS03-011, released in 2003.
Alert level: severe
Updated on Oct 01, 2008
Exploit:JS/Axdow.C is Microsoft's generic detection for a Javascript malware that exploits a vulnerability in the GLIEDown.IEDown.1 ActiveX control.
Alert level: severe
Updated on Oct 13, 2008
TrojanDownloader:Java/Classloader.D is a malicious Java applet that can infect Microsoft Windows computers that are not patched with Microsoft Security Update MS03-011. An attacker can insert the Java applet into HTML code and host the code on a Web server or send the code in e-mail. When a user opens the malicious Web page or e-mail, the vulnerability allows the applet to bypass a security check on the computer. The applet can then run malicious code on the computer and open a backdoor to receive commands from attackers.
Alert level: severe
Updated on Dec 03, 2008
Trojan:JS/Redirector.V is a detection for trojan Java scripts that download and execute malicious Shockwave Flash (SWF) files.  The malicious SWF files are crafted to exploit “Adobe Flash Player Invalid Pointer Vulnerability”, and detected by Microsoft antivirus solutions as Exploit:Win32/APSB08-11.gen!A.
Alert level: severe
Updated on Dec 04, 2008
Exploit:Win32/Pdfjsc.M is a detection for a PDF file that exploits a PDF (Portable Document Format) vulnerability tracked with the CVE Reference Number CVE-2008-2992.
Alert level: severe
Updated on Dec 18, 2008

Exploit:JS/Mult.AH is a malicious JavaScript that attempts to execute multiple instances of code to exploit a potentially vulnerable operating system environment. The malware could download arbitrary files and send details about the affected computer to a remote attacker.

Alert level: severe
Updated on Jan 13, 2009
Exploit:Win32/Pdfjsc.L is the detection for a specially crafted PDF file that exploits several vulnerabilities in Adobe Acrobat and Adobe Reader.
Alert level: severe
Updated on Aug 04, 2009
Exploit:JS/Mult.BS is the generic detection for obfuscated shellcode embedded in JavaScript that downloads and executes files from a remote server. It is usually embedded in a JavaScript file hosted in a compromised or malicious Web site. When the page containing the JavaScript is accessed, for example if a user visits a compromised site, the JavaScript is executed, triggering the shellcode to run.
Alert level: severe
Updated on Sep 03, 2009
Exploit:Win32/Pdfjsc.BK is a detection for specially-crafted PDF files that targets software vulnerabilities in Adobe Acrobat and Adobe Reader.
Alert level: severe
Updated on Nov 02, 2009
Exploit:Java/CVE-2008-5353.B is a detection for malicious code that attempts to exploit a vulnerability in the Java Runtime Environment (JRE). The vulnerability, with CVE number CVE-2008-5353, may lead to the download and execution of arbitrary files in an affected system.
Alert level: severe
Updated on Jan 06, 2010
Exploit:Win32/Pdfjsc.CR is the detection for a malicious PDF file that exploits the vulnerability discussed in CVE-2007-5659. Upon execution, Exploit:Win32/Pdfjsc.CR runs a JavaScript that attempts to download and execute arbitrary files from remote servers.
Alert level: severe
Updated on Apr 20, 2010
Exploit:Win32/Pidief.gen!B is the detection for an exploit targeting multiple Portable Document Format (PDF) vulnerabilities. These vulnerabilities allow remote code execution when malformed PDF document is opened using vulnerable versions of Adobe Reader and Acrobat.
Alert level: severe
Updated on May 28, 2010
Exploit:Win32/Pdfjsc.FG is a detection for specially-crafted PDF files that attempt to exploit software vulnerabilities in Adobe Acrobat and Adobe Reader.
Alert level: severe
Updated on Jun 10, 2010
Exploit:Win32/CVE-2010-1885.A is a detection for a cross-site scripting method that exploits a vulnerability (CVE-2010-1885) in Windows Help and Support Center that could allow an attacker to run arbitrary code on the local computer.
Alert level: severe
Updated on Jun 23, 2010
TrojanDownloader:JS/Adodb.F is the component detection for malicious JavaScript code that downloads and executes another malware components, for example other JavaScript or malware binaries.
Alert level: severe
Updated on Jun 23, 2010
TrojanDownloader:JS/Adodb.G is the component detection for malicious JavaScript code that downloads and executes another malware components.
Alert level: severe
Updated on Jun 24, 2010
Exploit:Win32/Pdfjsc.FM is the detection for a specially crafted PDF file that exploits a vulnerability in Adobe Acrobat and Adobe Reader. This file only successfully exploits computer that are affected by the Adobe Acrobat and Adobe Reader vulnerability discussed in CVE-2009-1492.
Alert level: severe
Updated on Jun 28, 2010
Exploit:Win32/CVE-2010-1885.gen is a generic detection for a cross-site scripting method that exploits a vulnerability (CVE-2010-1885) in Windows Help and Support Center that could allow an attacker to run arbitrary code on the local computer.
Alert level: severe