Skip to main content
Skip to main content
901 entries found. Displaying page 23 of 46.
Updated on Mar 08, 2011
Trojan:JS/Redirector.GO a generic detection for obfuscated JavaScript files that attempt to redirect the user's browser to a specific website.
Alert level: severe
Updated on Mar 19, 2011

Exploit:Win32/CVE-2010-3962.B is the detection for a Javascript that attempts to exploit a vulnerability in Internet Explorer.

Alert level: severe
Updated on May 16, 2011
TrojanDownloader:Java/Exdoer is a detection for an malicious Java class that exploits the vulnerability described in CVE-2010-0840. Successful exploitation may lead to remote code execution.
Alert level: severe
Updated on May 31, 2011

Exploit:Java/CVE-2010-0840.DN is the detection for a malicious and obfuscated Java class that exploits the vulnerability in Java described in CVE-2010-0840. Successful exploitation leads to remote code execution.

Alert level: severe
Updated on Oct 26, 2011

Exploit:Java/Blacole.W is the detection for the Java class module included in "worms.jar" that is part of the "Blackhole" exploit pack. The file "worms.jar" is an applet that exploits the vulnerability in Java Runtime Environment described in CVE-2010-0840.

Alert level: severe
Updated on Nov 14, 2011

Exploit:SWF/CVE-2011-2140.A is the detection for specially crafted Adobe Shockwave Flash (SWF) files that exploit the vulnerability described in the following articles:

It attempts to play a movie file. As of this writing, the movie file is unavailable.

Alert level: severe
Updated on Nov 18, 2011
Exploit:Java/Blacole.BD is malicious Java code that exploits a vulnerability in the Java Runtime Environment component of Oracle Java SE and Java for Business that allows the execution of arbitrary code. The vulnerability is further described in CVE-2010-0840.
Alert level: severe
Updated on Nov 24, 2011

Exploit:SWF/Blacole.K is a malicious Adobe Shockwave (.SWF) code that exploits a vulnerability in certain versions of Adobe Flash Player that could result in redirecting the web browser or downloading and executing arbitrary files. The vulnerability is discussed in the following articles:

Alert level: severe
Updated on Jan 24, 2012

Exploit:AndroidOS/CVE-2011-1823 is the detection for specially-crafted Android programs that attempt to exploit a vulnerability in the Android operating system to gain root privilege. The vulnerability is discussed in CVE-2011-1823.

Alert level: severe
Updated on Mar 14, 2012
Alert level: severe
Updated on Mar 14, 2012

Exploit:Java/CVE-2012-0507.A is the detection for a malicious Java applet stored within a Java archive (.JAR) that attempts to exploit a vulnerability in the Java Runtime Environment (JRE) up to and including versions 7 update 2, versions 6 update 30 and versions 5 update 33. The vulnerability is described in CVE-2012-0507.

Alert level: severe
Updated on Mar 16, 2012

Exploit:Win32/CVE-2012-0002.A is the detection for Proof-of-Concept code that exploits a vulnerability in the Remote Desktop Protocol (RDP). The vulnerability, discussed in CVE-2012-0002, could allow remote code execution and was resolved with the release of Microsoft Security Bulletin MS12-002.

Alert level: severe
Updated on Apr 11, 2012
Exploit:Java/CVE-2012-0507.Q is a malicious Java applet that attempts to exploit a vulnerability in the Java Runtime Environment (JRE) in order to download and install files of an attacker's choice onto your computer. Versions up to and including version 7 update 2, version 6 update 30 and version 5 update 33 of the JRE are vulnerable to this exploit. The vulnerability is described further in CVE-2012-0507.
Alert level: severe
Updated on Jul 16, 2012

Windows Defender Antivirus detects and removes this threat. 

This threat uses a Java vulnerability to download and run files on your PC, including other malware.

It runs when you visit a hacked or malicious website and you have a vulnerable version of Java.

The following versions of Java are vulnerable:

  • JDK and JRE 7 Update 4 and earlier Java SE
  • JDK and JRE 6 Update 32 and earlier Java SE
  • JDK and JRE 5.0 Update 35 and earlier Java SE
  • SDK and JRE 1.4.2_37 and earlier Java SE

To check if you're running a vulnerable version of Java:

  1. In Control Panel, double-click Programs.
  2. If Java is installed you will see it in the list of installed programs. Click it to open the Java Control Panel.
  3. On the General tab, click About to see which version of Java you have installed.

You may get an alert about this threat even if you're not using a vulnerable version of Java. This is because we detect when a website tries to use the vulnerability, even if it isn't successful.

There is more information on the vulnerability that this threat uses in the Exploit:Java/CVE-2012-1723 description.

Alert level: severe
Updated on Jun 21, 2016

Mimikatz is a well-known hacktool used to extract Windows passwords in plain-text from memory, perform pass-the-hash attacks, inject code into remote processes, generate golden tickets, and more. This tool is used by red teams and real threat actors alike due to its powerful toolset and open-source nature allowing for easy modification. This tool is still regularly maintained and kept up to date with latest changes in Windows. Mimikatz is often delivered and executed without writing to disk (fileless) in an attempt to avoid detection. 

Alert level: high
Updated on Dec 07, 2006
Alert level: severe
Updated on Dec 07, 2006
Alert level: severe
Updated on Dec 07, 2006
Alert level: severe
Updated on Feb 06, 2014

Windows Defender detects and removes this threat.

Exploit:Win32/CVE-2011-0104 is a malicious Microsoft Office file that exploits the vulnerability described in CVE-2011-0104, and resolved with the release of Microsoft Security Bulletin MS11-021.

This file might arrive as an attachment to a spammed email, and might use social engineering techniques (like a legitimate-sounding file name) to get you to open it.

Alert level: severe
Updated on Dec 07, 2006
Alert level: severe