Skip to main content
Skip to main content
901 entries found. Displaying page 14 of 46.
Updated on Oct 27, 2010
TrojanDownloader:Java/OpenStream.W is the detection for a Java class with the file name "crime4u.class". When run, it may download and execute malicious programs from a specific website.
Alert level: severe
Updated on Nov 03, 2010
Exploit:Java/CVE-2008-5353.RP is a detection for an obfuscated malicious Java class component that exploits the vulnerability described in CVE-2008-5353.
 
The vulnerability affects Java Virtual Machine (JVM) up to and including version 5 update 22 and 6 update 10. The vulnerability allows an unsigned Java applet to gain elevated privileges and potentially have unrestricted access to a host system, outside of its "sandbox" environment. 
Alert level: severe
Updated on Nov 07, 2010
Exploit:JS/Mult.CY is a generic detection for the obfuscated shellcode embedded in a JavaScript that attempts to exploit a vulnerability in the Microsoft Video ActiveX Control (CVE-2008-0015), resulting in the potential download and execution of files from a remote server.
Alert level: severe
Updated on Nov 07, 2010
Exploit:JS/Mult.DA is a detection for obfuscated scripts using a specific JavaScript packer. Scripts detected as Exploit:JS/Mult.DA attempt to exploit the HTML Object Memory Corruption Vulnerability in Internet Explorer. This vulnerability is discussed in, and mitigated using, the Microsoft Security Bulletin MS10-002.
Alert level: severe
Updated on Mar 22, 2011

Exploit:Win32/Pdfjsc.NJ is the detection for a PDF file that contains an obfuscated JavaScript. This JavaScript exploits certain vulnerabilities, such as CVE-2010-0188, in Adobe Acrobat and Adobe Reader, allowing it to download arbitrary files into the affected computer.

Alert level: severe
Updated on Apr 14, 2011

Exploit:JS/CVE-2010-0806.gen!A is the generic detection for specially crafted JavaScript that attempts to exploit the vulnerability in Internet Explorer resolved with the release of Microsoft Security Bulletin MS10-018.

Alert level: severe
Updated on Apr 21, 2011

Exploit:Win32/Pdfjsc.OL is the detection for malicious Portable Document Format (PDF) files that contain an obfuscated JavaScript. These files exploit a vulnerability in Adobe Acrobat and Adobe Reader that allows it to download and execute arbitrary files. The vulnerability is discussed in the following links:

Alert level: severe
Updated on May 18, 2011

TrojanDownloader:Java/OpenStream.AQ is a Java applet trojan that can be distributed inside a Java .jar package that varies in size. It is a variation of Exploit:Java/CVE-2010-0840.W and exploits the vulnerability described in CVE-2010-0840.

Alert level: severe
Updated on Sep 19, 2011

Exploit:Java/CVE-2010-0842.N is a detection for a malicious Java class that exploits a vulnerability discussed in CVE-2010-0842. Successful exploitation could lead to the execution of arbitrary code.

 
Alert level: severe
Updated on Jan 20, 2012

Exploit:JS/Blacole.AR is the detection for malicious JavaScript that loads a series of other exploits that are distributed as components of the "Blackhole kit". If the computer runs a vulnerable version of certain software and exploitation is successful, various malware may be downloaded.

Alert level: severe
Updated on Mar 15, 2012

Exploit:JS/Blacole.DC is a variant of JS/Blacole, JavaScript malware that consists of several exploits and is created by the "Blackhole" exploit kit.

Alert level: severe
Updated on Mar 29, 2012

TrojanDownloader:Java/OpenConnection.PM is an obfuscated Java applet that attempts to download and execute arbitrary files from a remote host. It is usually bundled with other malware that exploits the vulnerability described in CVE-2010-0840.

The vulnerability allows this malware to download and run arbitrary files. The trojan may also be encountered when visiting a compromised or malicious webpage with a vulnerable computer.

The following versions of Java are vulnerable to this exploit:

  • JDK and JRE 6 Update 18 and earlier for Windows, Solaris and Linux; Java SE
  • JDK 5.0 Update 23 and earlier for SolarisJava SE
  • SDK 1.4.2_25 and earlier for SolarisJava SE
  • JDK and JRE 6 Update 18 and earlier for Windows, Solaris and LinuxJava for Business
  • JDK and JRE 5.0 Update 23 and earlier for Windows, Solaris and LinuxJava for Business
  • SDK and JRE 1.4.2_25 and earlier for Windows, Solaris and LinuxJava for Business
Install updates to prevent infection

This malware exploits known vulnerabilities.

Make sure that you install all available updates from the vendor and remove old versions of Java in order to avoid this exploit. You can read more about this vulnerability and download software updates from these links:

Alert level: severe
Updated on Apr 03, 2012

Trojan:JS/Redirector.JE is a JavaScript that adds a hidden IFrame that points to other malware distributed via Blackhole kit servers. It may be embedded in an HTML file, which had been modified without the owner's knowledge. Hence it might be present in otherwise legitimate webpages.

Alert level: severe
Updated on May 10, 2012
Exploit:Java/CVE-2012-0507.BB is a malicious Java applet that attempts to exploit a vulnerability in the Java Runtime Environment (JRE) in order to download and install files of an attacker's choice onto your computer.
Alert level: severe
Updated on Mar 30, 2010
Exploit:JS/Mult.CR is a detection for a malicious shellcode that exploits a vulnerability in Internet Explorer (CVE-2010-0806) that could allow remote execution of arbitrary code.
Alert level: severe
Updated on May 27, 2010
Exploit:JS/CVE-2010-0886 is a detection for JavaScript code that exploits a vulnerability in the Java Deployment Toolkit (CVE-2010-0886). The vulnerability allows loading of arbitrary Java code with the user privileges, which may lead to downloading and executing arbitrary files or malware.
Alert level: severe
Updated on Dec 31, 2005
Exploit:Win32/Wmfap detects files that are potentially exploiting the WMF vulnerability described in Microsoft Security Advisory 912840. For details, see: http://www.microsoft.com/technet/security/advisory/912840.mspx
 
The detection is designed to detect unknown malicious WMF files only; all known exploits are detected with specific signatures. The Exploit:Win32/Wmfap detection validates the structure of a WMF file and looks for features associated with the malicious exploit.
 
Microsoft is not aware of any legitimate use of the mechanism that is being exploited. Therefore all the files reported by our products as suspicious are most likely malicious.
 
Microsoft provided a security update, described in Microsoft Security Bulletin MS06-001, on January 5, 2006 which addresses the WMF vulnerability. Apply the MS06-001 update to protect against exploit of the WMF vulnerability. To install this and other important updates, visit http://update.microsoft.com.
Alert level: high
Updated on Dec 07, 2006
Alert level: severe
Updated on Dec 07, 2006
Alert level: severe
Updated on Dec 07, 2006
Alert level: severe