Skip to main content
Skip to main content
901 entries found. Displaying page 22 of 46.
Updated on Nov 29, 2007
VirTool:WinNT/Rootkitdrv.CN is a detection for a rootkit, a type of driver crafted to hide files and registry keys from the user. The presence of this threat may indicate that additional malicious programs are present on the affected machine.
Alert level: severe
Updated on Aug 01, 2008
TrojanDownloader:Win32/Snapit.A is a trojan that downloads and executes arbitrary files. In the wild, we have seen this trojan being distributed via the successful exploitation of a vulnerability in the Snapshot Viewer for Microsoft Access (Security Advisory 955179 - http://www.microsoft.com/technet/security/advisory/955179.mspx).
Alert level: severe
Updated on Aug 04, 2008
Exploit:HTML/Snapew.gen!A is a generic detection for a malicious HTML Web page that attempts to exploit a vulnerability in Snapshot Viewer for Microsoft Access (Security Advisory 955179 - http://www.microsoft.com/technet/security/advisory/955179.mspx).
Alert level: severe
Updated on Aug 05, 2008
Exploit:HTML/Expascii.gen is Microsoft's generic detection for malicious web pages that contains code that exploits a vulnerability in the way that ASCII characters are interpreted in Internet Explorer. The vulnerability is tracked as CVE-2006-3227.
Alert level: severe
Updated on Aug 10, 2008
Exploit:JS/Objsnapt.E is a detection for a Javascript file that exploits a known vulnerability in the Microsoft Access Snapshot Viewer ActiveX Control described in http://www.microsoft.com/technet/security/advisory/955179.mspx.
Alert level: severe
Updated on Oct 09, 2009
Trojan:Win32/Swif.E is a malicious SWF file obfuscator. In the wild it has been observed to be a wrapper for malicious Flash files, which are detected as TrojanDownloader:Win32/Swif.M.
Alert level: severe
Updated on Jan 22, 2010
Exploit:JS/Elecom.B!SC is a generic detection for the malicious JavaScript shellcode contained in Exploit:JS/Elecom.B that is used to exploit a vulnerability in Internet Explorer that may allow arbitrary code execution without a user's permission.
Alert level: severe
Updated on Mar 16, 2010
Exploit:Win32/Pdfjsc.EH is a detection for specially-crafted PDF files that attempt to exploit software vulnerabilities in Adobe Acrobat and Adobe Reader.
Alert level: severe
Updated on Mar 26, 2010
Trojan:Win32/Swif.L is a detection for an obfuscated and malicious Shockwave (SWF) data file. The underlying code of the SWF file could have any purpose.
Alert level: severe
Updated on Mar 30, 2010
Exploit:Win32/Pdfjsc.EM is a detection for specially-crafted PDF files that attempt to exploit software vulnerabilities in Adobe Acrobat and Adobe Reader.
Alert level: severe
Updated on Apr 30, 2010
Exploit:JS/ShellCode.Z is a generic detection for JavaScript objects that construct shellcode. These scripts may be embedded within other document files such as specially-crafted .PDF files, for example.
 
This detection also includes malicious JavaScript that attempts to exploit an uninitialized memory corruption vulnerability (CVE-2010-0806) that allows the execution of arbitrary code. Microsoft released Microsoft Security Bulletin MS10-018 to mitigate this vulnerability.
Alert level: severe
Updated on May 04, 2010
Exploit:JS/Sykipot.A is a detection for obfuscated script files that exploit a vulnerability in Internet Explorer. The vulnerability has been resolved with the release of Microsoft Security Update MS10-018.
Alert level: severe
Updated on Jul 21, 2010
Alert level: severe
Updated on Jul 21, 2010
Alert level: severe
Updated on Jul 21, 2010
Alert level: severe
Updated on Aug 05, 2010
Exploit:Java/CVE-2008-5353.CQ is based on a vulnerability which affects Java Virtual Machine (JVM) up to and including version 6 update 10. The vulnerability allows an unsigned Java applet to gain elevated privileges and potentially have unrestricted access to a host system, outside its "sand box" environment.
Alert level: severe
Updated on Sep 16, 2010

Exploit:SWF/ShellCode.L is the detection for a specially-crafted SWF (ShockWave Flash) file that exploits a vulnerability found in Adobe Flash Player prior to version 10.1.85.3. The vulnerability is discussed in detail in the following pages:

Alert level: severe
Updated on Nov 17, 2010
Trojan:Java/Mesdeh is the detection for a data file that is used by malware to exploit a vulnerability in the Java Runtime Environment (JRE) discussed in CVE-2010-0094. Successful exploitation of the affected computer allows attackers to bypass Java sandbox restrictions and gain read and write access to the local file system.
Alert level: severe
Updated on Dec 06, 2010
Exploit:Java/CVE-2008-5353.WO is a detection for an obfuscated malicious Java class component that exploits the vulnerability described in CVE-2008-5353.
 
The vulnerability affects Java Virtual Machine (JVM) up to and including version 5 update 22 and version 6 update 10. The vulnerability allows an unsigned Java applet to gain elevated privileges and potentially have unrestricted access to a host system, outside of its "sandbox" environment. 
Alert level: severe
Updated on Jan 07, 2011
Trojan:SWF/Jaswi.A is small web format (.SWF) trojan that attempts to download other malware using an embedded and obfuscated malicious JavaScript. The SWF format trojan uses a vulnerability known as CVE-2010-0806 to exploit Windows computers and execute code via the malicious JavaScript.
Alert level: severe