Skip to main content
Skip to main content
901 entries found. Displaying page 4 of 46.
Updated on Dec 12, 2011

Exploit:JS/Blacole.AT is a variant of JS/BlacoleJavaScript malware that consists of several exploits and is created by the "Blackhole" exploit kit. Exploit:JS/Blacole.AT is installed to compromised websites by an attacker. It attempts to exploit the following CVE vulnerabilities:

Alert level: severe
Updated on Jan 18, 2012

Exploit:Win32/Pdfjsc.YX is a specially-crafted JavaScript, which exploits a vulnerability in the Java Runtime Environment, Adobe Acrobat, and Adobe Reader discussed in the following articles:

Alert level: severe
Updated on Feb 05, 2008
TrojanDownloader:HTML/Agent.K is a detection for specifically formed IFRAME tags that point to remote Web sites containing malicious content. This content could include, for example, malicious JavaScript containing an exploit for a specific vulnerability, or malicious binaries.
Alert level: severe
Updated on May 01, 2008
Exploit:HTML/IFrame_Exploit.G is a detection for malicious .eml files that attempt to exploit the vulnerability addressed by MS01-020 (Incorrect MIME Header Can Cause IE to Execute E-mail Attachment) in order to launch a malicious binary. In the wild, the use of malicious files identified by this detection have mostly been associated with the Win32/Chir family.
Alert level: severe
Updated on Apr 16, 2010
Exploit:Win32/Pdfjsc.EP is a detection for specially-crafted PDF files that attempt to exploit a software vulnerability in Adobe Acrobat and Adobe Reader.
Alert level: severe
Updated on Apr 29, 2010
Trojan:Java/Classloader.X is the detection for a malicious Java applet that exploits the vulnerability described in CVE-2009-3867. The vulnerability is due to an error in the implementation of the HsbParser.getSoundBank function, which can be exploited to result in a stack-based buffer overflow.
Alert level: severe
Updated on May 21, 2010
Trojan:Java/Classloader.S is the detection for malware that downloads and executes an arbitrary file from a predefined Web site. Computers with the Microsoft Security Update MS03-011 installed are not affected by this malware.
Alert level: severe
Updated on May 27, 2010
TrojanDownloader:Java/Agent.G is a detection for Java applet code that downloads and executes arbitrary files from a remote server.
Alert level: severe
Updated on May 28, 2010
TrojanDownloader:Java/Agent.G.ldr is a detection for a trojan Java applet that runs other Java code to download and run arbitrary files.
Alert level: severe
Updated on Jun 07, 2010
Trojan:Java/Classloader.Z is the detection for Java class malware that attempts to exploit the Microsoft Windows VM to download and execute an arbitrary file from a predefined Web site. Computers with the Microsoft Security Update MS03-011 installed are not affected by this malware.
Alert level: severe
Updated on Jun 25, 2010
Exploit:Java/CVE-2008-5353.I is a detection for malicious code that attempts to exploit a vulnerability in the Java Runtime Environment (JRE). The exploit may lead to the download and execution of arbitrary files in a computer in which a vulnerable version of JRE is installed.
Alert level: severe
Updated on Jul 21, 2010
Backdoor:Win32/Rbot.DU is a member of Win32/Rbot - a large family of IRC-controlled backdoors that allow unauthorized access and control of an affected computer. Using this backdoor, an attacker can perform a large number of different actions on an affected computer, including downloading and executing arbitrary files, stealing sensitive information and spreading to other computers using various methods.
Alert level: severe
Updated on Aug 12, 2010
Exploit:JS/Pdfjsc.GO is a detection for specially-crafted PDF files that attempt to exploit software vulnerabilities in Adobe Acrobat and Adobe Reader. Once the malformed PDF files are opened by vulnerable versions of Adobe Acrobat and Reader, the embedded JavaScript is executed and loads the exploit.
Alert level: severe
Updated on Aug 24, 2010
Backdoor:Win32/Sdbot.OR is a member of Win32/Sdbot - a large family of IRC-controlled backdoors that allow unauthorized access and control of an affected computer. Using this backdoor, an attacker can perform a large number of different actions on an affected computer, including downloading and executing arbitrary files, stealing sensitive information and spreading to other computers using various methods.
Alert level: severe
Updated on Jan 21, 2011
Exploit:Java/CVE-2010-0094.BA is the detection for malicious Java applet stored within a Java Archive (.JAR) that attempts to exploit a vulnerability in the Java Runtime Environment (JRE) up to and including version 6 update 18. The vulnerability allows an unsigned Java applet to gain elevated privileges and potentially have unrestricted access to a host system, outside its "sandbox" environment.
 
In the wild, Exploit:Java/CVE-2010-0094.BA has been observed to be distributed with other malware, such as Trojan:Java/Rowindal.D.
Alert level: severe
Updated on May 17, 2011

Exploit:JS/Pdfjsc.PK is the detection for specially-crafted PDF files that attempt to exploit a software vulnerability in Adobe Acrobat and Adobe Reader. It connects to a remote server to download and possibly execute arbitrary files.

Alert level: severe
Updated on Oct 16, 2012

Microsoft Defender Antivirus detects and removes this threat.

Backdoor:Win32/Qakbot!lnk is a malicious shortcut file that exploits the vulnerability described in CVE-2010-2568 and resolved with the release of Microsoft Security Bulletin MS10-046. It infects your computer with another malware.

Update vulnerable applications

This threat exploits a known vulnerability described in CVE-2010-2568, in Windows. After removing this threat, make sure that you install the updates available from the vendor. You can read more about the vulnerability, as well as where to download the software update, in Microsoft Security Bulletin MS10-046.

For more information on this threat, read: Mitigating and eliminating info-stealing Qakbot and Emotet in corporate networks

Alert level: severe
Updated on Apr 12, 2011

Exploit:Win32/CVE-2011-0094.A is the detection for an JavaScript, which attempts to exploit a vulnerability in Internet Explorer.

Alert level: severe
Updated on Dec 07, 2006
Alert level: severe
Updated on Dec 07, 2006
Alert level: severe