Exploit:Java/CVE-2010-0840.EX
Exploit:Java/CVE-2010-0840.EX is the detection for a malicious and obfuscated Java class that exploits the vulnerability described in CVE-2010-0840. Successful exploitation may lead to the download and execution of arbitrary files within the user's security context.
Exploit:Win32/CVE-2010-1885.A
Exploit:Java/CVE-2010-0094.N
Exploit:Win32/CVE-2010-4398
Exploit:Java/CVE-2010-0840.BC
Exploit:Java/CVE-2010-0842.G
Exploit:Java/CVE-2010-0840.AJ
Exploit:Java/CVE-2010-0840.CJ
Exploit:Java/CVE-2010-0840.NT
Exploit:Java/CVE-2010-0840.NT is a malicious Java applet that exploits a vulnerability of privilege escalation in JRE (Java Runtime Environment) versions 5 and 6 as described in CVE-2010-0840. The Java exploit is a component of the "Blackhole" exploit pack and is hosted on compromised web sites.
Exploit:Java/CVE-2010-0840
Windows Defender detects and removes this threat.
This threat uses a vulnerability in your software to download other malware.
It runs when you visit a hacked website and you have a vulnerable version of Java installed on your PC. A number of legitimate websites could be hacked or unwillingly host this threat.
The following versions of Java are vulnerable:
- Oracle Java SE and Java for Business 6 Update 18 and earlier
To check if you're running a vulnerable version of Java:
- Go to the control panel (Select Start then Control Panel)
- Select Programs. If Java is installed you will see it in the list of installed programs. Click it to open the Java Control Panel.
- On the General tab, click About to see which version of Java you have installed.
You might get a detection for this threat if you visit a website that has the malicious code, even if you're not using a vulnerable version of Java. This doesn't mean that you have been hacked; it means someone has tried to hack into your PC.
The vulnerability that this threat exploits is described in CVE-2010-0840.
Exploit:Java/CVE-2010-0840.AV
Exploit:Win32/CVE-2010-3962.B
Exploit:Win32/CVE-2010-3962.B is the detection for a Javascript that attempts to exploit a vulnerability in Internet Explorer.
Exploit:JS/CVE-2010-0806
Exploit:Java/CVE-2010-0840.BK
Exploit:Java/CVE-2010-0842.N
Exploit:Java/CVE-2010-0842.N is a detection for a malicious Java class that exploits a vulnerability discussed in CVE-2010-0842.
Exploit:Java/CVE-2010-0840.DV
Exploit:Java/CVE-2010-0840.DV is the detection for a malicious and obfuscated Java class that exploits the vulnerability in Java described in CVE-2010-0840. Successful exploitation leads to remote code execution.
Exploit:Java/CVE-2010-0094.BL
Java/CVE-2010-0094.BL is a Java applet stored within a Java Archive (.JAR) that attempts to exploit a vulnerability in the Java Runtime Environment (JRE) up to and including version 6 update 18. The vulnerability allows an unsigned Java applet to gain elevated privileges and potentially have unrestricted access to a host system outside its "sandbox" environment. It is discussed in CVE-2010-0094.
If you visit a website containing the malicious code while using a vulnerable version of Java, Exploit:Java/CVE-2010-0094.BL is loaded. It then attempts to download and execute files from a remote host/URL. The files that are downloaded and executed could be any of the attacker's choice and could include additional malware.