Skip to main content
Skip to main content
901 entries found. Displaying page 4 of 46.
Updated on Apr 16, 2010
Exploit:Win32/Pdfjsc.EP is a detection for specially-crafted PDF files that attempt to exploit a software vulnerability in Adobe Acrobat and Adobe Reader.
Alert level: severe
Updated on Apr 29, 2010
Trojan:Java/Classloader.X is the detection for a malicious Java applet that exploits the vulnerability described in CVE-2009-3867. The vulnerability is due to an error in the implementation of the HsbParser.getSoundBank function, which can be exploited to result in a stack-based buffer overflow.
Alert level: severe
Updated on May 21, 2010
Trojan:Java/Classloader.S is the detection for malware that downloads and executes an arbitrary file from a predefined Web site. Computers with the Microsoft Security Update MS03-011 installed are not affected by this malware.
Alert level: severe
Updated on May 27, 2010
TrojanDownloader:Java/Agent.G is a detection for Java applet code that downloads and executes arbitrary files from a remote server.
Alert level: severe
Updated on May 28, 2010
TrojanDownloader:Java/Agent.G.ldr is a detection for a trojan Java applet that runs other Java code to download and run arbitrary files.
Alert level: severe
Updated on Jun 07, 2010
Trojan:Java/Classloader.Z is the detection for Java class malware that attempts to exploit the Microsoft Windows VM to download and execute an arbitrary file from a predefined Web site. Computers with the Microsoft Security Update MS03-011 installed are not affected by this malware.
Alert level: severe
Updated on Jun 25, 2010
Exploit:Java/CVE-2008-5353.I is a detection for malicious code that attempts to exploit a vulnerability in the Java Runtime Environment (JRE). The exploit may lead to the download and execution of arbitrary files in a computer in which a vulnerable version of JRE is installed.
Alert level: severe
Updated on Jul 21, 2010
Backdoor:Win32/Rbot.DU is a member of Win32/Rbot - a large family of IRC-controlled backdoors that allow unauthorized access and control of an affected computer. Using this backdoor, an attacker can perform a large number of different actions on an affected computer, including downloading and executing arbitrary files, stealing sensitive information and spreading to other computers using various methods.
Alert level: severe
Updated on Aug 12, 2010
Exploit:JS/Pdfjsc.GO is a detection for specially-crafted PDF files that attempt to exploit software vulnerabilities in Adobe Acrobat and Adobe Reader. Once the malformed PDF files are opened by vulnerable versions of Adobe Acrobat and Reader, the embedded JavaScript is executed and loads the exploit.
Alert level: severe
Updated on Aug 24, 2010
Backdoor:Win32/Sdbot.OR is a member of Win32/Sdbot - a large family of IRC-controlled backdoors that allow unauthorized access and control of an affected computer. Using this backdoor, an attacker can perform a large number of different actions on an affected computer, including downloading and executing arbitrary files, stealing sensitive information and spreading to other computers using various methods.
Alert level: severe
Updated on Jan 21, 2011
Exploit:Java/CVE-2010-0094.BA is the detection for malicious Java applet stored within a Java Archive (.JAR) that attempts to exploit a vulnerability in the Java Runtime Environment (JRE) up to and including version 6 update 18. The vulnerability allows an unsigned Java applet to gain elevated privileges and potentially have unrestricted access to a host system, outside its "sandbox" environment.
 
In the wild, Exploit:Java/CVE-2010-0094.BA has been observed to be distributed with other malware, such as Trojan:Java/Rowindal.D.
Alert level: severe
Updated on May 17, 2011

Exploit:JS/Pdfjsc.PK is the detection for specially-crafted PDF files that attempt to exploit a software vulnerability in Adobe Acrobat and Adobe Reader. It connects to a remote server to download and possibly execute arbitrary files.

Alert level: severe
Updated on Oct 16, 2012

Microsoft Defender Antivirus detects and removes this threat.

Backdoor:Win32/Qakbot!lnk is a malicious shortcut file that exploits the vulnerability described in CVE-2010-2568 and resolved with the release of Microsoft Security Bulletin MS10-046. It infects your computer with another malware.

Update vulnerable applications

This threat exploits a known vulnerability described in CVE-2010-2568, in Windows. After removing this threat, make sure that you install the updates available from the vendor. You can read more about the vulnerability, as well as where to download the software update, in Microsoft Security Bulletin MS10-046.

For more information on this threat, read: Mitigating and eliminating info-stealing Qakbot and Emotet in corporate networks

Alert level: severe
Updated on Dec 08, 2009
Virus:HTML/Virut.BM is a detection for HTML script appended to Web pages by Virus:Win32/Virut.BM. The appended script contains an IFrame and redirection URL that attempts to download other malware.
Alert level: severe
Updated on Apr 12, 2011

Exploit:Win32/CVE-2011-0094.A is the detection for an JavaScript, which attempts to exploit a vulnerability in Internet Explorer.

Alert level: severe
Updated on Dec 07, 2006
Alert level: severe
Updated on Dec 07, 2006
Alert level: severe
Updated on Dec 07, 2006

Exploit:JS/ActiveXComponent is a JavaScript that exploits the vulnerability described in CVE-2000-1061 to run arbitrary code.

Alert level: severe
Updated on Oct 15, 2007
Exploit:Win32/MS05002.gen is a generic detection for malware that exploits a vulnerability in the way certain un-patched versions of Microsoft Windows handle malformed animated cursor files. These files commonly have an 'ani' file extension. The exploit causes a buffer overflow that could allow an attacker to remotely execute arbitrary code on impacted systems.

A patch for this vulnerability has been available since 2005, and further discussion is located on Technet (http://www.microsoft.com/technet/security/Bulletin/MS05-002.mspx).
Alert level: severe
Updated on May 28, 2008
TrojanDownloader:Win32/Swif.A is a trojan that attempts to exploit a vulnerability in Adobe Shockwave Flash. Successful exploitation of this vulnerability could result in arbitrary code execution. In the wild, this trojan has been used in order to download and execute arbitrary files (including additional malware) onto an affected system.
Alert level: severe