Skip to main content
Skip to main content
901 entries found. Displaying page 28 of 46.
Updated on Dec 07, 2006
Alert level: severe
Updated on Dec 07, 2006
Alert level: severe
Updated on Dec 07, 2006
Alert level: severe
Updated on Dec 07, 2006
Alert level: severe
Updated on Jul 03, 2008
Trojan:JS/Flagrab.A is a Javascript trojan, which uses the SWFObject script to embed a malicious SWF file into a webpage. It usually arrives in a system when a user browses a compromised website that contains this trojan.
 
Once loaded by the browser, Flagrab.A attempts to launch the malicious SWF file, which is detected as Exploit:Win32/APSB08-11.gen!A, in the system. The file that is run depends on what version of Flash the user currently has.
Alert level: severe
Updated on Jul 30, 2008
TrojanDownloader:JS/Seena.A is a detection for malicious code that attempts to exploit a vulnerability in the Sina DLoader ActiveX control DownloadAndInstall method, which may allow an attacker to remotely execute arbitrary code on a system.
Alert level: severe
Updated on Oct 27, 2008
Exploit:Win32/Pdfjsc.G is a detection for a PDF file that exploits a PDF (Portable Document Format) vulnerability.
 
When opened using Adobe Acrobat or Adobe Reader versions prior to 8.1.2, Exploit:Win32/Pdfjsc.G exploits the vulnerability discussed in Adobe Security Advisory APSB08-15 with CVE Reference Number CVE-2008-2641.
Alert level: severe
Updated on Mar 02, 2009
Exploit:Win32/Pidief.C is a detection for an exploit that targets a Portable Document Format (PDF) vulnerability. The critical vulnerability could result in the installation of additional malware when a malicious PDF document is opened using Adobe Reader version 9, or earlier.
Alert level: severe
Updated on Apr 30, 2009
Virus:Win32/Kirpich.A is the detection for system files, if they are infected by TrojanDropper:Win32/Kirpich.A with malicious code.
Alert level: severe
Updated on May 21, 2010
Exploit:Win32/CVE-2007-0030 is the detection for a specially-crafted Excel file that, when executed, may exploit a vulnerability in Excel that leads to arbitrary remote code execution. The vulnerability has been resolved with the security update discussed in Microsoft Security Bulletin MS07-002.
Alert level: severe
Updated on Jul 27, 2010
Exploit:Java/CVE-2009-3867.DN is the detection for a malicious Java applet that exploits the vulnerability described in CVE-2009-3867. When a user visits a website that contains the applet using a computer that has a vulnerable version of Sun Java, security checks may be bypassed, allowing arbitrary code to be run.
Alert level: severe
Updated on Sep 14, 2010
Exploit:Java/CVE-2009-3867.IG is a Java applet that attempts to execute a buffer overflow exploit that may allow the execution of an arbitrary code with escalated privileges.
Alert level: severe
Updated on Oct 08, 2010
Exploit:Java/CVE-2008-5353.QB is a detection for an obfuscated malicious Java class component that exploits the vulnerability described in CVE-2008-5353.
Alert level: severe
Updated on Dec 29, 2010
TrojanDownloader:Java/OpenConnection.GC is a detection for a Java applet that attempts to download and execute arbitrary files from a remote host. It often works in conjunction with Exploit:Java/CVE-2010-0094, which attempts to exploit a vulnerability in the Java Runtime Environment (JRE). This vulnerability allows an unsigned Java applet to gain elevated privileges and potentially have unrestricted access to a host system, outside its "sand box" environment.
 
The vulnerability can be exploited by malware to gain access to a user's computer to download and install malicious programs. The malware installation may occur when a malicious Java applet is executed by a vulnerable JRE. This scenario can occur when a user visits a malicious webpage that hosts such an applet. Note that a number of legitimate websites could be compromised or unwillingly host a malicious applet through advertising frames which could redirect to or host a malicious Java applet.
Alert level: severe
Updated on Jan 04, 2011
Exploit:Win32/CVE-2010-3970 is the detection for a file that exploits a vulnerability in the Windows Graphics Rendering Engine (GRE). An attacker who successfully exploits this vulnerability could run arbitrary code in the security context of the logged-on user. Exploitation can occur by simply browsing to a folder containing the malicious file. No further user interaction is required. More information about the vulnerability is available in the following articles:
 
Alert level: severe
Updated on Jan 14, 2011
Exploit:Java/Midesq.A is the detection for Java malware that exploits a vulnerability in the Java Runtime Environment (JRE) discussed in CVE-2010-0842. Successful exploitation of the vulnerability could lead to the execution of arbitrary code.
Alert level: severe
Updated on Mar 01, 2011
Exploit:Java/CVE-2010-0842.G is a Java-based trojan that exploits the CVE-2010-0842 vulnerability, also known as Sun Java Runtime Environment (JRE) MIDI File metaEvent Remote Code Execution Vulnerability.
 
The vulnerability exploits a failure to check for boundary conditions when parsing metaEvent structure by the MixerSequencer handling code.
Alert level: severe
Updated on May 11, 2011

Exploit:Java/CVE-2010-4452 is the detection for an HTML file that exploits a vulnerability in Java described in CVE-2010-4452.

Alert level: severe
Updated on May 17, 2011

Exploit:HTML/CVE-2010-4452.A is the detection for an HTML file that exploits a vulnerability in Java described in CVE-2010-4452.

Alert level: severe
Updated on May 31, 2011

Exploit:Java/CVE-2010-0840.EX is the detection for a malicious and obfuscated Java class that exploits the vulnerability described in CVE-2010-0840. Successful exploitation may lead to the download and execution of arbitrary files within the user's security context.

Alert level: severe