Skip to main content
Skip to main content
901 entries found. Displaying page 22 of 46.
Updated on Mar 16, 2010
Exploit:Win32/Pdfjsc.EH is a detection for specially-crafted PDF files that attempt to exploit software vulnerabilities in Adobe Acrobat and Adobe Reader.
Alert level: severe
Updated on Mar 26, 2010
Trojan:Win32/Swif.L is a detection for an obfuscated and malicious Shockwave (SWF) data file. The underlying code of the SWF file could have any purpose.
Alert level: severe
Updated on Mar 30, 2010
Exploit:Win32/Pdfjsc.EM is a detection for specially-crafted PDF files that attempt to exploit software vulnerabilities in Adobe Acrobat and Adobe Reader.
Alert level: severe
Updated on Apr 30, 2010
Exploit:JS/ShellCode.Z is a generic detection for JavaScript objects that construct shellcode. These scripts may be embedded within other document files such as specially-crafted .PDF files, for example.
 
This detection also includes malicious JavaScript that attempts to exploit an uninitialized memory corruption vulnerability (CVE-2010-0806) that allows the execution of arbitrary code. Microsoft released Microsoft Security Bulletin MS10-018 to mitigate this vulnerability.
Alert level: severe
Updated on May 04, 2010
Exploit:JS/Sykipot.A is a detection for obfuscated script files that exploit a vulnerability in Internet Explorer. The vulnerability has been resolved with the release of Microsoft Security Update MS10-018.
Alert level: severe
Updated on Jul 21, 2010
Alert level: severe
Updated on Jul 21, 2010
Alert level: severe
Updated on Jul 21, 2010
Alert level: severe
Updated on Aug 05, 2010
Exploit:Java/CVE-2008-5353.CQ is based on a vulnerability which affects Java Virtual Machine (JVM) up to and including version 6 update 10. The vulnerability allows an unsigned Java applet to gain elevated privileges and potentially have unrestricted access to a host system, outside its "sand box" environment.
Alert level: severe
Updated on Sep 16, 2010

Exploit:SWF/ShellCode.L is the detection for a specially-crafted SWF (ShockWave Flash) file that exploits a vulnerability found in Adobe Flash Player prior to version 10.1.85.3. The vulnerability is discussed in detail in the following pages:

Alert level: severe
Updated on Nov 17, 2010
Trojan:Java/Mesdeh is the detection for a data file that is used by malware to exploit a vulnerability in the Java Runtime Environment (JRE) discussed in CVE-2010-0094. Successful exploitation of the affected computer allows attackers to bypass Java sandbox restrictions and gain read and write access to the local file system.
Alert level: severe
Updated on Dec 06, 2010
Exploit:Java/CVE-2008-5353.WO is a detection for an obfuscated malicious Java class component that exploits the vulnerability described in CVE-2008-5353.
 
The vulnerability affects Java Virtual Machine (JVM) up to and including version 5 update 22 and version 6 update 10. The vulnerability allows an unsigned Java applet to gain elevated privileges and potentially have unrestricted access to a host system, outside of its "sandbox" environment. 
Alert level: severe
Updated on Jan 07, 2011
Trojan:SWF/Jaswi.A is small web format (.SWF) trojan that attempts to download other malware using an embedded and obfuscated malicious JavaScript. The SWF format trojan uses a vulnerability known as CVE-2010-0806 to exploit Windows computers and execute code via the malicious JavaScript.
Alert level: severe
Updated on Mar 08, 2011
Trojan:JS/Redirector.GO a generic detection for obfuscated JavaScript files that attempt to redirect the user's browser to a specific website.
Alert level: severe
Updated on Mar 19, 2011

Exploit:Win32/CVE-2010-3962.B is the detection for a Javascript that attempts to exploit a vulnerability in Internet Explorer.

Alert level: severe
Updated on May 16, 2011
TrojanDownloader:Java/Exdoer is a detection for an malicious Java class that exploits the vulnerability described in CVE-2010-0840. Successful exploitation may lead to remote code execution.
Alert level: severe
Updated on May 31, 2011

Exploit:Java/CVE-2010-0840.DN is the detection for a malicious and obfuscated Java class that exploits the vulnerability in Java described in CVE-2010-0840. Successful exploitation leads to remote code execution.

Alert level: severe
Updated on Oct 26, 2011

Exploit:Java/Blacole.W is the detection for the Java class module included in "worms.jar" that is part of the "Blackhole" exploit pack. The file "worms.jar" is an applet that exploits the vulnerability in Java Runtime Environment described in CVE-2010-0840.

Alert level: severe
Updated on Nov 14, 2011

Exploit:SWF/CVE-2011-2140.A is the detection for specially crafted Adobe Shockwave Flash (SWF) files that exploit the vulnerability described in the following articles:

It attempts to play a movie file. As of this writing, the movie file is unavailable.

Alert level: severe
Updated on Nov 18, 2011
Exploit:Java/Blacole.BD is malicious Java code that exploits a vulnerability in the Java Runtime Environment component of Oracle Java SE and Java for Business that allows the execution of arbitrary code. The vulnerability is further described in CVE-2010-0840.
Alert level: severe