Skip to main content
Skip to main content
901 entries found. Displaying page 3 of 46.
Updated on Apr 27, 2010
TrojanDropper:Win32/Pidrop.A is a detection for a malicious .PDF document that drops VBScripts that attempt to drop and execute other malware detected as TrojanDropper:Win32/Emold.C.
Alert level: severe
Updated on May 12, 2010
Exploit:JS/Pdfjsc.B is a detection for specially crafted PDF files that target software vulnerabilities in Adobe Acrobat and Adobe Reader.
Alert level: severe
Updated on Jun 14, 2010

Windows Defender detects and removes this threat.

This threat uses specially-crafted Shockwave Flash (.swf) files to exploit an Adobe vulnerability to download and run files on your PC, including malware.

It runs when you visit a malicious or hacked website and you have a vulnerable version of Adobe Flash Player.

The following versions of Adobe Flash Player are vulnerable:

  • Adobe Flash Player before 9.0.277.0 and 10.x before 10.1.53.64
  • Adobe AIR before 2.0.2.12610
  • Adobe Reader and Acrobat 9.x before 9.3.3 and 8.x before 8.2.3 on Windows and Mac OS X

If you visit a webpage containing this threat and your PC has a vulnerable version of Flash installed, this threat can download and run other malware.

Find out ways that malware can get on your PC.

Alert level: severe
Updated on Jun 29, 2010
Exploit:Win32/Pdfjsc.FU is a detection for a crafted PDF file which exploits the vulnerabilities discussed in  CVE-2008-2992 and CVE-2009-0927.
Alert level: severe
Updated on Jul 22, 2010
Exploit:Win32/Taro.H is a detection for an exploit affecting the word processing application Ichitaro by JustSystems of Japan.
Alert level: severe
Updated on Aug 06, 2010
Exploit:iPhoneOS/Pidief.A is the detection for specially-crafted PDF files that exploit a memory corruption vulnerability in the Preview PDF viewer for the iPhone operating system.
Alert level: severe
Updated on Sep 10, 2010
Exploit:Win32/Pdfjsc.HE is a detection for a crafted PDF file which exploits the vulnerabilities discussed in  CVE-2010-0188 and CVE-2010-2883.
Alert level: severe
Updated on Sep 22, 2010
Exploit:SWF/CVE-2010-2884.A is a detection for a specially-crafted SWF (ShockWave Flash) file exploiting a vulnerability found in Adobe Flash Player prior to version 10.1.85.3.
Alert level: severe
Updated on Oct 07, 2010
Exploit:Win32/Pidief.HW is a detection for specially-crafted PDF files that target a software vulnerability in Adobe Acrobat and Adobe Reader version 8 before 8.2.1 and version 9 before 9.3.1. The vulnerability exploited by this malware is referenced by the Common Vulnerabilities and Exposures (CVE) Identifier CVE-2010-0188.
 
Upon successful exploitation, malicious code gets executed that is used to download and execute arbitrary files.
Alert level: severe
Updated on Dec 22, 2010
Exploit:Win32/Pdfheap.A is the detection for a malicious Portable Document Format (PDF) file that attempts to exploit the vulnerability described in CVE-2009-1862.
 
The vulnerability affects Adobe Reader and Acrobat versions 9.1.2 and earlier, and Adobe Flash Player 9.0.159.0 earlier and 10.0.22.87 and earlier. It is caused by the mishandling of Shockwave (SWF) files within a PDF file, and may allow a remote attacker to execute arbitrary code, including downloading and executing malware.
Alert level: severe
Updated on Jan 07, 2011
Exploit:Win32/Pdfjsc.KG is the detection for a malicious Portable Document Format (PDF) file that exploits certain vulnerabilities in Adobe Acrobat and Reader to obfuscate and hide, and subsequently run, malicious JavaScript and shellcode. The shellcode is used to download other malware.
Alert level: severe
Updated on Jan 14, 2011
Exploit:Win32/CVE-2010-2572.A is the detection for specially-crafted Microsoft Powerpoint files that exploit a vulnerability addressed by Microsoft Security Bulletin MS10-088. This vulnerability may allow attackers to execute arbitrary code that can drop files, install programs or modify data without the user's knowledge or consent.
Alert level: severe
Updated on Feb 21, 2011
Exploit:Win32/Pdfjsc.ML is a detection for a specially crafted PDF file designed to exploit undisclosed vulnerabilities in Adobe Acrobat and Adobe Reader that could result in the download and execution of arbitrary code.
Alert level: severe
Updated on Mar 10, 2011
Exploit:Win32/Pdfjsc.LV is a detection for specially-crafted PDF files that target a software vulnerability in Adobe Acrobat and Adobe Reader. It usually arrives in the system when the user visits a webpage that contains a malicious PDF file or opens an email containing the PDF file as an attachment. The vulnerability it attempts to exploit is tracked as CVE-2010-0188.
Alert level: severe
Updated on Mar 11, 2011

Windows Defender detects and removes this threat.

The threat is a generic detection for obfuscated JavaScript found on malicious or compromised web pages. It is used to redirect you to websites other than the one you intended to visit.

Find out ways that malware can get on your PC.  

Alert level: severe
Updated on Dec 12, 2011

Exploit:JS/Blacole.AT is a variant of JS/BlacoleJavaScript malware that consists of several exploits and is created by the "Blackhole" exploit kit. Exploit:JS/Blacole.AT is installed to compromised websites by an attacker. It attempts to exploit the following CVE vulnerabilities:

Alert level: severe
Updated on Jan 18, 2012

Exploit:Win32/Pdfjsc.YX is a specially-crafted JavaScript, which exploits a vulnerability in the Java Runtime Environment, Adobe Acrobat, and Adobe Reader discussed in the following articles:

Alert level: severe
Updated on Feb 05, 2008
TrojanDownloader:HTML/Agent.K is a detection for specifically formed IFRAME tags that point to remote Web sites containing malicious content. This content could include, for example, malicious JavaScript containing an exploit for a specific vulnerability, or malicious binaries.
Alert level: severe
Updated on May 01, 2008
Exploit:HTML/IFrame_Exploit.G is a detection for malicious .eml files that attempt to exploit the vulnerability addressed by MS01-020 (Incorrect MIME Header Can Cause IE to Execute E-mail Attachment) in order to launch a malicious binary. In the wild, the use of malicious files identified by this detection have mostly been associated with the Win32/Chir family.
Alert level: severe
Updated on Nov 25, 2008
Backdoor:Win32/IRCbot.BH is a generic detection for a backdoor trojan that connects to an IRC server to receive commands from an attacker. This trojan contains code that exploits vulnerable Windows computers that have not applied Security Bulletin MS08-067.
Alert level: severe