Skip to main content
Skip to main content
901 entries found. Displaying page 28 of 46.
Updated on Apr 30, 2009
Virus:Win32/Kirpich.A is the detection for system files, if they are infected by TrojanDropper:Win32/Kirpich.A with malicious code.
Alert level: severe
Updated on May 21, 2010
Exploit:Win32/CVE-2007-0030 is the detection for a specially-crafted Excel file that, when executed, may exploit a vulnerability in Excel that leads to arbitrary remote code execution. The vulnerability has been resolved with the security update discussed in Microsoft Security Bulletin MS07-002.
Alert level: severe
Updated on Jul 27, 2010
Exploit:Java/CVE-2009-3867.DN is the detection for a malicious Java applet that exploits the vulnerability described in CVE-2009-3867. When a user visits a website that contains the applet using a computer that has a vulnerable version of Sun Java, security checks may be bypassed, allowing arbitrary code to be run.
Alert level: severe
Updated on Sep 14, 2010
Exploit:Java/CVE-2009-3867.IG is a Java applet that attempts to execute a buffer overflow exploit that may allow the execution of an arbitrary code with escalated privileges.
Alert level: severe
Updated on Oct 08, 2010
Exploit:Java/CVE-2008-5353.QB is a detection for an obfuscated malicious Java class component that exploits the vulnerability described in CVE-2008-5353.
Alert level: severe
Updated on Dec 29, 2010
TrojanDownloader:Java/OpenConnection.GC is a detection for a Java applet that attempts to download and execute arbitrary files from a remote host. It often works in conjunction with Exploit:Java/CVE-2010-0094, which attempts to exploit a vulnerability in the Java Runtime Environment (JRE). This vulnerability allows an unsigned Java applet to gain elevated privileges and potentially have unrestricted access to a host system, outside its "sand box" environment.
 
The vulnerability can be exploited by malware to gain access to a user's computer to download and install malicious programs. The malware installation may occur when a malicious Java applet is executed by a vulnerable JRE. This scenario can occur when a user visits a malicious webpage that hosts such an applet. Note that a number of legitimate websites could be compromised or unwillingly host a malicious applet through advertising frames which could redirect to or host a malicious Java applet.
Alert level: severe
Updated on Jan 04, 2011
Exploit:Win32/CVE-2010-3970 is the detection for a file that exploits a vulnerability in the Windows Graphics Rendering Engine (GRE). An attacker who successfully exploits this vulnerability could run arbitrary code in the security context of the logged-on user. Exploitation can occur by simply browsing to a folder containing the malicious file. No further user interaction is required. More information about the vulnerability is available in the following articles:
 
Alert level: severe
Updated on Jan 14, 2011
Exploit:Java/Midesq.A is the detection for Java malware that exploits a vulnerability in the Java Runtime Environment (JRE) discussed in CVE-2010-0842. Successful exploitation of the vulnerability could lead to the execution of arbitrary code.
Alert level: severe
Updated on Mar 01, 2011
Exploit:Java/CVE-2010-0842.G is a Java-based trojan that exploits the CVE-2010-0842 vulnerability, also known as Sun Java Runtime Environment (JRE) MIDI File metaEvent Remote Code Execution Vulnerability.
 
The vulnerability exploits a failure to check for boundary conditions when parsing metaEvent structure by the MixerSequencer handling code.
Alert level: severe
Updated on May 11, 2011

Exploit:Java/CVE-2010-4452 is the detection for an HTML file that exploits a vulnerability in Java described in CVE-2010-4452.

Alert level: severe
Updated on May 17, 2011

Exploit:HTML/CVE-2010-4452.A is the detection for an HTML file that exploits a vulnerability in Java described in CVE-2010-4452.

Alert level: severe
Updated on May 31, 2011

Exploit:Java/CVE-2010-0840.EX is the detection for a malicious and obfuscated Java class that exploits the vulnerability described in CVE-2010-0840. Successful exploitation may lead to the download and execution of arbitrary files within the user's security context.

Alert level: severe
Updated on Sep 07, 2011

Exploit:JS/BlacoleRef.D is a detection for obfuscated JavaScript often found distributed through compromised websites.

Alert level: severe
Updated on Sep 21, 2011
Exploit:Java/CVE-2010-0840.CJ is a detection for a malicious Java applet trojan that exploits a vulnerability described in CVE-2010-0840. Successful exploitation may lead to the downloading and execution of arbitrary files under the user's security context.
Alert level: severe
Updated on Sep 27, 2011

Windows Defender detects and removes this threat.

This threat uses a vulnerability in your software to download other malware.

It runs when you visit a hacked website and you have a vulnerable version of Java installed on your PC. A number of legitimate websites could be hacked or unwillingly host this threat.

The following versions of Java are vulnerable:

  • Oracle Java SE and Java for Business 6 Update 18 and earlier

To check if you're running a vulnerable version of Java:

  1. Go to the control panel (Select Start then Control Panel)
  2. Select Programs. If Java is installed you will see it in the list of installed programs. Click it to open the Java Control Panel.
  3. On the General tab, click About to see which version of Java you have installed.

You might get a detection for this threat if you visit a website that has the malicious code, even if you're not using a vulnerable version of Java. This doesn't mean that you have been hacked; it means someone has tried to hack into your PC.

The vulnerability that this threat exploits is described in CVE-2010-0840.

Find out ways that malware can get on your PC.

Alert level: severe
Updated on Nov 10, 2011

Exploit:Win32/CVE-2011-2140.A is a detection for malware that attempts to exploit a vulnerability in Adobe Flash Player

Alert level: severe
Updated on Dec 29, 2011

Exploit:Java/CVE-2010-0840.NS is a variant of the Exploit:Java/CVE-2010-0840 family - a detection for a malicious Java applet stored within a Java Archive (.JAR) that attempts to exploit a vulnerability in the Java Runtime Environment (JRE) up to and including version 6 update 18. The vulnerability allows an unsigned Java applet to gain elevated privileges and potentially have unrestricted access to a host system outside its "sandbox" environment. It is discussed in CVE-2010-0840.

Alert level: severe
Updated on Jan 17, 2012

Exploit:SWF/Blacole.T is a malicious Adobe Shockwave Flash (.SWF) file, distributed as part of the "Blackhole" exploit kit, that exploits a vulnerability described in CVE-2011-2110. Successful exploitation by the malware could result in downloading and executing arbitrary files.

Alert level: severe
Updated on Sep 17, 2012

Exploit:Win32/CVE-2012-4969.C is an exploit for the vulnerability in Internet Explorer described in Microsoft Security Advisory 2757760. The exploit eventually leads to another malware being downloaded into your computer.

Alert level: severe
Updated on Sep 19, 2012

Exploit:Win32/CVE-2012-4969.A is a special crafted JavaScript, which takes advantage of a vulnerability in Internet Explorer 6 through 9. The vulnerability is described in detail in CVE-2012-4969. It is mitigated with the release of a Fixit tool as described in Microsoft Security Advisory 2757760.

Alert level: severe