Exploit:Win32/Pdfjsc.EP
Trojan:Java/Classloader.X
Trojan:Java/Classloader.S
TrojanDownloader:Java/Agent.G
TrojanDownloader:Java/Agent.G.ldr
Trojan:Java/Classloader.Z
Exploit:Java/CVE-2008-5353.I
Backdoor:Win32/Rbot.DU
Exploit:Win32/Pdfjsc.GO
Backdoor:Win32/Sdbot.OR
Exploit:Java/CVE-2010-0094.BA
Exploit:Win32/Pdfjsc.PK
Exploit:JS/Pdfjsc.PK is the detection for specially-crafted PDF files that attempt to exploit a software vulnerability in Adobe Acrobat and Adobe Reader. It connects to a remote server to download and possibly execute arbitrary files.
Backdoor:Win32/Qakbot!lnk
Microsoft Defender Antivirus detects and removes this threat.
Backdoor:Win32/Qakbot!lnk is a malicious shortcut file that exploits the vulnerability described in CVE-2010-2568 and resolved with the release of Microsoft Security Bulletin MS10-046. It infects your computer with another malware.
Update vulnerable applications
This threat exploits a known vulnerability described in CVE-2010-2568, in Windows. After removing this threat, make sure that you install the updates available from the vendor. You can read more about the vulnerability, as well as where to download the software update, in Microsoft Security Bulletin MS10-046.
For more information on this threat, read: Mitigating and eliminating info-stealing Qakbot and Emotet in corporate networks
Virus:HTML/Virut.BM
Exploit:Win32/CVE-2011-0094.A
Exploit:Win32/CVE-2011-0094.A is the detection for an JavaScript, which attempts to exploit a vulnerability in Internet Explorer.
Exploit:JS/ActiveXComponent
Exploit:JS/ActiveXComponent is a JavaScript that exploits the vulnerability described in CVE-2000-1061 to run arbitrary code.
Exploit:Win32/MS05002.gen
A patch for this vulnerability has been available since 2005, and further discussion is located on Technet (http://www.microsoft.com/technet/security/Bulletin/MS05-002.mspx).