Skip to main content
Skip to main content
524 entries found. Displaying page 4 of 27.
Updated on Dec 07, 2006
Alert level: severe
Updated on Dec 07, 2006
Alert level: severe
Updated on Dec 07, 2006
Alert level: severe
Updated on Dec 07, 2006
Alert level: severe
Updated on Dec 07, 2006
Alert level: severe
Updated on Dec 07, 2006
Alert level: severe
Updated on Dec 07, 2006
Alert level: severe
Updated on Dec 07, 2006
Alert level: severe
Updated on Dec 07, 2006
Alert level: severe
Updated on Dec 07, 2006
Alert level: severe
Updated on Dec 07, 2006
Alert level: severe
Updated on Dec 07, 2006
Alert level: severe
Updated on Dec 07, 2006
Alert level: severe
Updated on Dec 07, 2006
Alert level: severe
Updated on Dec 07, 2006
Alert level: severe
Updated on Dec 07, 2006
Alert level: severe
Updated on Feb 11, 2008
TrojanDownloader:Win32/Stalni.gen is a generic detection for the payload delivered by the threats detected as Exploit:Win32/Pdfjsc.A, and Exploit:JS/Pdfcmi.A. This malicious code may be executed due to a vulnerability in Acrobat Reader version 8.1.1 (or earlier).
Alert level: severe
Updated on Feb 11, 2008
Exploit:JS/Pdfcmi.A is a detection for a specially crafted JavaScript code, embedded in a malformed Portable Document Format (PDF) file, that will take advantage of a buffer overflow vulnerability in Adobe Reader version 8.1.1, and earlier.
Alert level: severe
Updated on Mar 29, 2007
Exploit:Win32/Anicmoo.A is generic detection for exploit of a vulnerability in the way certain un-patched versions of Microsoft Windows handle animated cursor (.ani) files. Exploit could allow an attacker to remotely execute arbitrary code on impacted systems. Further details on the vulnerability are found in Microsoft Security Advisory (935423).
Alert level: severe
Updated on Jul 07, 2009
Exploit:JS/CVE-2008-0015 is the detection for code that attempts to exploit a vulnerability in the Microsoft Video ActiveX Control. This vulnerability is discussed in detail in Microsoft Security Advisory (972890). When a user visits a Web page containing an exploit detected as Exploit:JS/CVE-2008-0015, it may connect to a remote server and download other malware. Currently, we are aware of cases where exploits download and execute Worm:Win32/Dogkild.A on the system.
Alert level: severe