Skip to main content
Skip to main content
901 entries found. Displaying page 23 of 46.
Updated on Nov 24, 2011

Exploit:SWF/Blacole.K is a malicious Adobe Shockwave (.SWF) code that exploits a vulnerability in certain versions of Adobe Flash Player that could result in redirecting the web browser or downloading and executing arbitrary files. The vulnerability is discussed in the following articles:

Alert level: severe
Updated on Jan 24, 2012

Exploit:AndroidOS/CVE-2011-1823 is the detection for specially-crafted Android programs that attempt to exploit a vulnerability in the Android operating system to gain root privilege. The vulnerability is discussed in CVE-2011-1823.

Alert level: severe
Updated on Mar 14, 2012
Alert level: severe
Updated on Mar 14, 2012

Exploit:Java/CVE-2012-0507.A is the detection for a malicious Java applet stored within a Java archive (.JAR) that attempts to exploit a vulnerability in the Java Runtime Environment (JRE) up to and including versions 7 update 2, versions 6 update 30 and versions 5 update 33. The vulnerability is described in CVE-2012-0507.

Alert level: severe
Updated on Mar 16, 2012

Exploit:Win32/CVE-2012-0002.A is the detection for Proof-of-Concept code that exploits a vulnerability in the Remote Desktop Protocol (RDP). The vulnerability, discussed in CVE-2012-0002, could allow remote code execution and was resolved with the release of Microsoft Security Bulletin MS12-002.

Alert level: severe
Updated on Apr 11, 2012
Exploit:Java/CVE-2012-0507.Q is a malicious Java applet that attempts to exploit a vulnerability in the Java Runtime Environment (JRE) in order to download and install files of an attacker's choice onto your computer. Versions up to and including version 7 update 2, version 6 update 30 and version 5 update 33 of the JRE are vulnerable to this exploit. The vulnerability is described further in CVE-2012-0507.
Alert level: severe
Updated on Jul 16, 2012

Windows Defender Antivirus detects and removes this threat. 

This threat uses a Java vulnerability to download and run files on your PC, including other malware.

It runs when you visit a hacked or malicious website and you have a vulnerable version of Java.

The following versions of Java are vulnerable:

  • JDK and JRE 7 Update 4 and earlier Java SE
  • JDK and JRE 6 Update 32 and earlier Java SE
  • JDK and JRE 5.0 Update 35 and earlier Java SE
  • SDK and JRE 1.4.2_37 and earlier Java SE

To check if you're running a vulnerable version of Java:

  1. In Control Panel, double-click Programs.
  2. If Java is installed you will see it in the list of installed programs. Click it to open the Java Control Panel.
  3. On the General tab, click About to see which version of Java you have installed.

You may get an alert about this threat even if you're not using a vulnerable version of Java. This is because we detect when a website tries to use the vulnerability, even if it isn't successful.

There is more information on the vulnerability that this threat uses in the Exploit:Java/CVE-2012-1723 description.

Alert level: severe
Updated on Feb 11, 2014

Windows Defender detects and removes this threat.

Exploit:Win32/Pdfjsc.ALA is a specially created PDF file that exploits a vulnerability in Adobe Acrobat and Adobe Reader.

The vulnerability, discussed in CVE-2010-0188, lets this file download and run other files, which might be other malware.

These versions of Adobe Acrobat and Adobe Reader are vulnerable to this exploit:

  • Adobe Acrobat and Adobe Reader version 8 earlier than 8.2.1
  • Adobe Acrobat and Adobe Reader version 9 earlier than 9.3.1
Alert level: severe
Updated on Jun 21, 2016

Mimikatz is a well-known hacktool used to extract Windows passwords in plain-text from memory, perform pass-the-hash attacks, inject code into remote processes, generate golden tickets, and more. This tool is used by red teams and real threat actors alike due to its powerful toolset and open-source nature allowing for easy modification. This tool is still regularly maintained and kept up to date with latest changes in Windows. Mimikatz is often delivered and executed without writing to disk (fileless) in an attempt to avoid detection. 

Alert level: high
Updated on Dec 07, 2006
Alert level: severe
Updated on Dec 07, 2006
Alert level: severe
Updated on Jul 03, 2008
Virus:VBS/Starter.A.gen is a generic detection for VB Script viruses that launch executables on the local machine using infected active desktop templates (HTT files for customizing a folder's view). The folder template is altered by the executable part of the virus.
 
Once the user opens or browses a folder with the infected active desktop template (HTT file), the infected template, and thus the virus, is run. It then infects other HTT files found in the system.
 
This virus exploits a vulnerability in a Microsoft ActiveX control addressed in MS99-032.
Alert level: severe
Updated on May 22, 2006
Win32/Wordjmp exploits a vulnerability found in Microsoft Word 2002 and Microsoft Word 2003 which could allow an attacker to remotely execute arbitrary code on impacted systems. Details on the vulnerability can be found in the Microsoft Security Advisory (919637) at http://www.microsoft.com/technet/security/advisory/919637.mspx.
Alert level: severe
Updated on Nov 17, 2006
An Exploit:HTML/Xmlreq.A detection signifies exploit code related to a vulnerability in Microsoft XML Core Services, discussed in Microsoft Security Advisory (927892). Successful exploit of this vulnerability could allow an attacker to remotely execute arbitrary code on vulnerable systems. For details on the vulnerability, please read the Microsoft Security Advisory (927892) found at http://www.microsoft.com/technet/security/advisory/927892.mspx. To download the security update (recommended), please refer to Microsoft Security Bulletin MS06-071 at http://www.microsoft.com/technet/security/Bulletin/MS06-071.mspx.
Alert level: severe
Updated on Dec 07, 2006
Alert level: severe
Updated on Dec 07, 2006
Alert level: severe
Updated on Dec 07, 2006
Alert level: severe
Updated on Dec 07, 2006
Alert level: severe
Updated on Dec 07, 2006
Alert level: severe
Updated on Dec 07, 2006
Alert level: severe