Skip to main content
Skip to main content
901 entries found. Displaying page 36 of 46.
Updated on Dec 07, 2006
Alert level: severe
Updated on Oct 07, 2009
Windows Defender Antivirus detects and removes this threat.
 
This is a generic detection for script objects that construct shellcodes. These scripts may be embedded within other types of documents, for example, specially-crafted PDF files.
Alert level: severe
Updated on Nov 18, 2009
Exploit:Win32/Pdfjsc.CG is a detection for malicious PDF files, which attempt to exploit various vulnerabilities in PDF viewing software. These malicious files contain obfuscated JavaScript, which in turn executes shellcode by exploiting vulnerabilities.
Alert level: severe
Updated on Jan 09, 2010
Exploit:Win32/Pdfjsc.CV is a detection for specially-crafted PDF files that attempt to exploit software vulnerabilities in Adobe Acrobat and Adobe Reader. This vulnerability allows remote code execution when a malformed PDF document is opened using vulnerable versions of Adobe Reader and Acrobat.
Alert level: severe
Updated on Mar 08, 2010
Exploit:Win32/Pidief.AX is a detection for specially-crafted PDF files that target a software vulnerabilities in Adobe Acrobat and Adobe Reader. If opened on vulnerable computers, this exploit installs TrojanDownloader:Win32/Qaantiz.A.
Alert level: severe
Updated on Oct 18, 2010
TrojanDownloader:Win32/Lnkget.AQ is a detection for a shortcut link that, when opened, connects to a remote server using TFTP (Trivial File Transfer Protocol) to download and execute arbitrary VBScript files.
Alert level: severe
Updated on Nov 08, 2010
TrojanDownloader:BAT/Ftper.L is a detection for a shortcut link that, when opened, connects to a remote server using TFTP (Trivial File Transfer Protocol) to download and execute arbitrary VBScript files.
Alert level: severe
Updated on Nov 21, 2010
TrojanDownloader:BAT/Lnkget.AQ is a detection for file shortcuts that connect to a TFTP server and download and execute arbitrary VBScript files.
Alert level: severe
Updated on Jan 28, 2011

TrojanDownloader:JS/Qakbot.G is a JavaScript trojan that attempts to download and install Backdoor:Win32/Qakbot.gen!A.

Alert level: severe
Updated on Sep 14, 2011

Exploit:Java/CVE-2010-0840.KI is the detection for an obfuscated Java applet trojan that exploits a vulnerability described in CVE-2010-0840. Successful exploitation may lead to the download and execution of arbitrary files within the user's security context.

Alert level: severe
Updated on Sep 20, 2011
Exploit:Java/CVE-2010-0840.BQ is a malicious Java applet trojan that exploits a vulnerability described in CVE-2010-0840. Successful exploitation may lead to the downloading and execution of arbitrary files under the user's security context.
Alert level: severe
Updated on Oct 25, 2011

Exploit:Java/CVE-2010-0840.MB is a detection for malicious Java applets that exploit the vulnerability described in CVE-2010-0840. Successful exploitation may lead to the downloading and execution of arbitrary files under the user's security context.

Alert level: severe
Updated on Jan 20, 2012

Exploit:Java/CVE-2010-0840.NZ is a variant of the Exploit:Java/CVE-2010-0840 family - a detection for a malicious Java applet stored within a Java Archive (.JAR) that attempts to exploit a vulnerability in the Java Runtime Environment (JRE) up to and including version 6 update 18. The vulnerability allows an unsigned Java applet to gain elevated privileges and potentially have unrestricted access to a host system outside its "sandbox" environment. It is discussed in CVE-2010-0840.

Alert level: severe
Updated on Jan 20, 2012

Exploit:Java/CVE-2011-3544.T is a malicious Java applet stored within a Java Archive (.JAR) file. It attempts to exploit a vulnerability in the Java Runtime Environment (JRE) component in Oracle JAVA SE JDK and JRE 7, 6 Update 27 and earlier. The vulnerability allows an unsigned Java applet to gain elevated privileges and potentially have unrestricted access to run arbitrary Java code outside of the "sandbox" environment.

More information about the vulnerability is available in the following articles:

Alert level: severe
Updated on Feb 21, 2012

Exploit:Java/CVE-2011-3544.AV is a detection for a malicious Java applet stored within a Java Archive (.JAR) that attempts to exploit a vulnerability in a Java Runtime Environment (JRE) component in Oracle, JAVA SE JDK and JRE 7, 6 update 27 and earlier. The vulnerability, discussed in CVE-2011-3544, allows an unsigned Java applet to gain elevated privileges and potentially have unrestricted access to run arbitrary Java code outside of the "sandbox" environment.

Alert level: severe
Updated on Mar 15, 2012

Exploit:Java/Blacole.ES is malicious Java code that exploits a vulnerability that allows the execution of arbitrary code. The vulnerability is further described in CVE-2011-3544; successful exploitation may lead to remote code execution.

Alert level: severe
Updated on Mar 27, 2012

Exploit:Java/CVE-2011-3544.gen!D is the generic detection for a obfuscated malicious Java applet stored within a Java Archive (.JAR) that attempts to exploit a vulnerability in Java Runtime Environment (JRE). The vulnerability, discussed in CVE-2011-3544, allows an unsigned Java applet to gain elevated privileges and potentially have unrestricted access to run arbitrary Java code outside of the "sandbox" environment.

Alert level: severe
Updated on Apr 03, 2012

Exploit:Java/CVE-2010-0840.QG is a malicious and obfuscated Java class that exploits the vulnerability described in CVE-2010-0840. Successful exploitation may lead to the downloading and execution of arbitrary files under the user's security context. When a user visits a website that contains this malicious Java class using a computer that has a vulnerable version of Java, security checks may be bypassed, which allows arbitrary code execution.

Alert level: severe
Updated on Dec 07, 2006
Alert level: severe
Updated on Dec 07, 2006
Alert level: severe