Virus:Win32/Kirpich.A
Exploit:Win32/CVE-2007-0030
Exploit:Java/CVE-2009-3867.DN
Exploit:Java/CVE-2009-3867.IG
Exploit:Java/CVE-2008-5353.QB
TrojanDownloader:Java/OpenConnection.GC
Exploit:Win32/CVE-2010-3970
Exploit:Java/Midesq.A
Exploit:Java/CVE-2010-0842.G
Exploit:Java/CVE-2010-4452
Exploit:Java/CVE-2010-4452 is the detection for an HTML file that exploits a vulnerability in Java described in CVE-2010-4452.
Exploit:HTML/CVE-2010-4452.A
Exploit:HTML/CVE-2010-4452.A is the detection for an HTML file that exploits a vulnerability in Java described in CVE-2010-4452.
Exploit:Java/CVE-2010-0840.EX
Exploit:Java/CVE-2010-0840.EX is the detection for a malicious and obfuscated Java class that exploits the vulnerability described in CVE-2010-0840. Successful exploitation may lead to the download and execution of arbitrary files within the user's security context.
Exploit:JS/BlacoleRef.D
Exploit:JS/BlacoleRef.D is a detection for obfuscated JavaScript often found distributed through compromised websites.
Exploit:Java/CVE-2010-0840.CJ
Exploit:Java/CVE-2010-0840
Windows Defender detects and removes this threat.
This threat uses a vulnerability in your software to download other malware.
It runs when you visit a hacked website and you have a vulnerable version of Java installed on your PC. A number of legitimate websites could be hacked or unwillingly host this threat.
The following versions of Java are vulnerable:
- Oracle Java SE and Java for Business 6 Update 18 and earlier
To check if you're running a vulnerable version of Java:
- Go to the control panel (Select Start then Control Panel)
- Select Programs. If Java is installed you will see it in the list of installed programs. Click it to open the Java Control Panel.
- On the General tab, click About to see which version of Java you have installed.
You might get a detection for this threat if you visit a website that has the malicious code, even if you're not using a vulnerable version of Java. This doesn't mean that you have been hacked; it means someone has tried to hack into your PC.
The vulnerability that this threat exploits is described in CVE-2010-0840.
Exploit:Win32/CVE-2011-2140.A
Exploit:Win32/CVE-2011-2140.A is a detection for malware that attempts to exploit a vulnerability in Adobe Flash Player
Exploit:Java/CVE-2010-0840.NS
Exploit:Java/CVE-2010-0840.NS is a variant of the Exploit:Java/CVE-2010-0840 family - a detection for a malicious Java applet stored within a Java Archive (.JAR) that attempts to exploit a vulnerability in the Java Runtime Environment (JRE) up to and including version 6 update 18. The vulnerability allows an unsigned Java applet to gain elevated privileges and potentially have unrestricted access to a host system outside its "sandbox" environment. It is discussed in CVE-2010-0840.
Exploit:SWF/Blacole.T
Exploit:SWF/Blacole.T is a malicious Adobe Shockwave Flash (.SWF) file, distributed as part of the "Blackhole" exploit kit, that exploits a vulnerability described in CVE-2011-2110. Successful exploitation by the malware could result in downloading and executing arbitrary files.
Exploit:Win32/CVE-2012-4969.C
Exploit:Win32/CVE-2012-4969.C is an exploit for the vulnerability in Internet Explorer described in Microsoft Security Advisory 2757760. The exploit eventually leads to another malware being downloaded into your computer.
Exploit:Win32/CVE-2012-4969.A
Exploit:Win32/CVE-2012-4969.A is a special crafted JavaScript, which takes advantage of a vulnerability in Internet Explorer 6 through 9. The vulnerability is described in detail in CVE-2012-4969. It is mitigated with the release of a Fixit tool as described in Microsoft Security Advisory 2757760.