Skip to main content
Skip to main content
901 entries found. Displaying page 14 of 46.
Updated on Jul 15, 2010

Windows Defender detects and removes this threat.

This is a generic detection for specially crafted, malicious shortcut files that target the vulnerability exploited by the Win32/Stuxnet family.

When you browse a folder that has the malicious shortcut using an app that displays shortcut icons, the malware runs instead.

Find out ways that malware can get on your PC.  

Alert level: severe
Updated on Aug 09, 2010
Exploit:Win32/Pdfjsc.GR is a detection for specially-crafted PDF files that target software vulnerabilities in Adobe Acrobat and Adobe Reader. Once the malformed PDF files are opened by vulnerable versions of Adobe Acrobat and Reader, the embedded JavaScript is executed and loads the exploit.
 
Files detected as Pdfjsc.GR attempt to exploit the following vulnerabilities:
 
Alert level: severe
Updated on Sep 28, 2010

Windows Defender detects and removes this threat.

Exploit:Win32/ShellCode.gen!C is a generic detection for JavaScript files that have malicious code. Generally, attackers use this malicious code to infect your computer with other malware.

These files are often downloaders which use the malicious code to exploit vulnerabilities in various software.

A vulnerability is like a hole in your software that malware can use (or exploit) to get on your computer. These holes are fixed by installing updates to the vulnerable software; this is why it is extremely important to keep all of the programs on your computer up to date.

See here for information on how to update some software.

As this is a generic detection, we cannot identify the precise files that use this code or the particular exploits that the code uses.

Alert level: severe
Updated on Oct 04, 2010
Exploit:Java/CVE-2008-5353.PZ is a detection for an obfuscated malicious Java class component that exploits the vulnerability described in CVE-2008-5353.
 
Alert level: severe
Updated on Oct 22, 2010
Exploit:Java/CVE-2008-5353.MW is based on a vulnerability which affects Java Virtual Machine (JVM) up to and including version 6 update 10. The vulnerability allows an unsigned Java applet to gain elevated privileges and potentially have unrestricted access to a host system, outside its "sand box" environment.
Alert level: severe
Updated on Oct 27, 2010
TrojanDownloader:Java/OpenStream.W is the detection for a Java class with the file name "crime4u.class". When run, it may download and execute malicious programs from a specific website.
Alert level: severe
Updated on Nov 03, 2010
Exploit:Java/CVE-2008-5353.RP is a detection for an obfuscated malicious Java class component that exploits the vulnerability described in CVE-2008-5353.
 
The vulnerability affects Java Virtual Machine (JVM) up to and including version 5 update 22 and 6 update 10. The vulnerability allows an unsigned Java applet to gain elevated privileges and potentially have unrestricted access to a host system, outside of its "sandbox" environment. 
Alert level: severe
Updated on Nov 07, 2010
Exploit:JS/Mult.CY is a generic detection for the obfuscated shellcode embedded in a JavaScript that attempts to exploit a vulnerability in the Microsoft Video ActiveX Control (CVE-2008-0015), resulting in the potential download and execution of files from a remote server.
Alert level: severe
Updated on Nov 07, 2010
Exploit:JS/Mult.DA is a detection for obfuscated scripts using a specific JavaScript packer. Scripts detected as Exploit:JS/Mult.DA attempt to exploit the HTML Object Memory Corruption Vulnerability in Internet Explorer. This vulnerability is discussed in, and mitigated using, the Microsoft Security Bulletin MS10-002.
Alert level: severe
Updated on Mar 22, 2011

Exploit:Win32/Pdfjsc.NJ is the detection for a PDF file that contains an obfuscated JavaScript. This JavaScript exploits certain vulnerabilities, such as CVE-2010-0188, in Adobe Acrobat and Adobe Reader, allowing it to download arbitrary files into the affected computer.

Alert level: severe
Updated on Apr 14, 2011

Exploit:JS/CVE-2010-0806.gen!A is the generic detection for specially crafted JavaScript that attempts to exploit the vulnerability in Internet Explorer resolved with the release of Microsoft Security Bulletin MS10-018.

Alert level: severe
Updated on Apr 21, 2011

Exploit:Win32/Pdfjsc.OL is the detection for malicious Portable Document Format (PDF) files that contain an obfuscated JavaScript. These files exploit a vulnerability in Adobe Acrobat and Adobe Reader that allows it to download and execute arbitrary files. The vulnerability is discussed in the following links:

Alert level: severe
Updated on May 18, 2011

TrojanDownloader:Java/OpenStream.AQ is a Java applet trojan that can be distributed inside a Java .jar package that varies in size. It is a variation of Exploit:Java/CVE-2010-0840.W and exploits the vulnerability described in CVE-2010-0840.

Alert level: severe
Updated on Jan 20, 2012

Exploit:JS/Blacole.AR is the detection for malicious JavaScript that loads a series of other exploits that are distributed as components of the "Blackhole kit". If the computer runs a vulnerable version of certain software and exploitation is successful, various malware may be downloaded.

Alert level: severe
Updated on Mar 15, 2012

Exploit:JS/Blacole.DC is a variant of JS/Blacole, JavaScript malware that consists of several exploits and is created by the "Blackhole" exploit kit.

Alert level: severe
Updated on Mar 29, 2012

TrojanDownloader:Java/OpenConnection.PM is an obfuscated Java applet that attempts to download and execute arbitrary files from a remote host. It is usually bundled with other malware that exploits the vulnerability described in CVE-2010-0840.

The vulnerability allows this malware to download and run arbitrary files. The trojan may also be encountered when visiting a compromised or malicious webpage with a vulnerable computer.

The following versions of Java are vulnerable to this exploit:

  • JDK and JRE 6 Update 18 and earlier for Windows, Solaris and Linux; Java SE
  • JDK 5.0 Update 23 and earlier for SolarisJava SE
  • SDK 1.4.2_25 and earlier for SolarisJava SE
  • JDK and JRE 6 Update 18 and earlier for Windows, Solaris and LinuxJava for Business
  • JDK and JRE 5.0 Update 23 and earlier for Windows, Solaris and LinuxJava for Business
  • SDK and JRE 1.4.2_25 and earlier for Windows, Solaris and LinuxJava for Business
Install updates to prevent infection

This malware exploits known vulnerabilities.

Make sure that you install all available updates from the vendor and remove old versions of Java in order to avoid this exploit. You can read more about this vulnerability and download software updates from these links:

Alert level: severe
Updated on Apr 03, 2012

Trojan:JS/Redirector.JE is a JavaScript that adds a hidden IFrame that points to other malware distributed via Blackhole kit servers. It may be embedded in an HTML file, which had been modified without the owner's knowledge. Hence it might be present in otherwise legitimate webpages.

Alert level: severe
Updated on May 10, 2012
Exploit:Java/CVE-2012-0507.BB is a malicious Java applet that attempts to exploit a vulnerability in the Java Runtime Environment (JRE) in order to download and install files of an attacker's choice onto your computer.
Alert level: severe
Updated on Mar 30, 2010
Exploit:JS/Mult.CR is a detection for a malicious shellcode that exploits a vulnerability in Internet Explorer (CVE-2010-0806) that could allow remote execution of arbitrary code.
Alert level: severe
Updated on May 27, 2010
Trojan:JS/Adclicker is the detection for a webpage that contains code used to redirect users to other sites that may contain malware.
Alert level: severe