901 entries found.
Displaying page 5
of 46.
Exploit:Win32/Senglot.V
Updated on Aug 11, 2008
Exploit:Win32/Senglot.V is a generic detection that detects malicious code, often hosted in HTML files, that attempts to download and execute arbitrary files. They usually arrive in a system when a user visits a compromised website.
Alert level:
severe
TrojanDownloader:Win32/Swif.I
Updated on May 26, 2009
TrojanDownloader:Win32/Swif.I is a trojan that attempts to exploit a vulnerability in Adobe Flash Player. It attempts to download and run other malware in an infected computer.
Alert level:
severe
Exploit:Win32/Pdfjsc.DA
Updated on Jan 19, 2010
Exploit:Win32/Pdfjsc.DA is a detection for specially-crafted PDF files that target software vulnerabilities in Adobe Acrobat and Adobe Reader. If opened on vulnerable computers, this malware installs Backdoor:Win32/Ixeshe.B.
Alert level:
severe
Trojan:Java/Classloader.T
Updated on Apr 22, 2010
Trojan:Java/Classloader.T is the detection for a malicious Java applet that exploits the vulnerability described in CVE-2009-3867. The vulnerability is due to an error in the implementation of the HsbParser.getSoundBank function that can be exploited to result in a stack-based buffer overflow.
Alert level:
severe
Exploit:Java/CVE-2009-3867
Updated on Apr 22, 2010
Exploit:Java/CVE-2009-3867 is the detection for a malicious Java applet that exploits the vulnerability described in CVE-2009-3867. The vulnerability is due to an error in the implementation of the HsbParser.getSoundBank function that can be exploited to result in a stack-based buffer overflow.
Alert level:
severe
Exploit:Java/CVE-2008-5353.G
Updated on Apr 28, 2010
Exploit:Java/CVE-2008-5353.G is a detection for malicious code that attempts to exploit a vulnerability in the Java Runtime Environment (JRE). The exploit may lead to the download and execution of arbitrary files in a computer in which a vulnerable version of JRE is installed.
Alert level:
severe
TrojanDownloader:Java/OpenStream.F
Updated on Jun 02, 2010
TrojanDownloader:Java/OpenStream.F is a detection for malicious Java class components that attempt to download and execute arbitrary code. The trojan attempts to exploit vulnerabilities mitigated by Microsoft Security Bulletin MS03-011 and CVE-2009-3867.
Alert level:
severe
Backdoor:Win32/Rbot.JJ
Updated on Jul 21, 2010
Backdoor:Win32/Rbot.JJ is a member of Win32/Rbot - a large family of IRC-controlled backdoors that allow unauthorized access and control of an affected computer. Using this backdoor, an attacker can perform a large number of different actions on an affected computer, including downloading and executing arbitrary files, stealing sensitive information and spreading to other computers using various methods.
Alert level:
severe
Exploit:Java/CVE-2008-5353.BO
Updated on Jul 28, 2010
Exploit:Java/CVE-2008-5353.BO is based on a vulnerability which affects Java Virtual Machine (JVM) up to and including version 6 update 10. The vulnerability allows an unsigned Java applet to gain elevated privileges and potentially have unrestricted access to a host system, outside its "sand box" environment.
Alert level:
severe
Exploit:Java/CVE-2008-5353.CG
Updated on Aug 13, 2010
Exploit:Java/CVE-2008-5353.CG is based on a vulnerability which affects Java Virtual Machine (JVM) up to and including version 6 update 10. The vulnerability allows an unsigned Java applet to gain elevated privileges and potentially have unrestricted access to a host system, outside its "sand box" environment.
Alert level:
severe
TrojanDownloader:Java/OpenConnection.ES
Updated on Sep 02, 2010
TrojanDownloader:Java/OpenConnection.ES is the detection for an obfuscated Java class that is part of a bundled malicious Java applet. The applet exploits the vulnerability described in CVE-2008-5353 and can be used to download and run arbitrary files from a malicious website.
Alert level:
severe
Exploit:Java/CVE-2008-5353.EQ
Updated on Sep 20, 2010
Exploit:Java/CVE-2008-5353.EQ is based on a vulnerability which affects Java Virtual Machine (JVM) up to and including version 6 update 10. The vulnerability allows an unsigned Java applet to gain elevated privileges and potentially have unrestricted access to a host system, outside its "sand box" environment.
Alert level:
severe
Exploit:Java/CVE-2009-3869.A
Updated on Sep 23, 2010
Exploit:Java/CVE-2009-3869.A is a detection for the vulnerability described in CVE-2009-3869 which can be exploited to execute arbitrary code.
Alert level:
severe
Exploit:Java/CVE-2010-0842.A
Updated on Sep 27, 2010
Exploit:Java/CVE-2010-0842.A is a detection for Java malware that exploits a vulnerability discussed in CVE-2010-0842. Successful exploitation of the vulnerability could lead to the execution of arbitrary code.
Alert level:
severe
Exploit:JS/Mult.DC
Updated on Nov 25, 2010
Exploit:JS/Mult.DC is the detection for a specifically obfuscated JavaScript, embedded in PDF files, that targets software vulnerabilities in Adobe Acrobat and Adobe Reader.
Alert level:
severe
Exploit:Win32/Pdfjsc.KP
Updated on Dec 21, 2010
Exploit:Win32/Pdfjsc.KP is a detection for specially-crafted PDF files that target software vulnerabilities in Adobe Acrobat and Adobe Reader. It usually arrives in the system when the user visits a webpage that contains a malicious PDF file or opens an email containing the PDF file as an attachment.
Alert level:
severe
Exploit:Win32/Pdfjsc.KO
Updated on Dec 21, 2010
Exploit:Win32/Pdfjsc.KO is a detection for specially-crafted PDF files that target software vulnerabilities in Adobe Acrobat and Adobe Reader. It usually arrives in the system when the user visits a webpage that contains a malicious PDF file or opens an email containing the PDF file as an attachment.
Alert level:
severe
HackTool:Win32/Ntscan.A
Updated on Jan 06, 2011
HackTool:Win32/Ntscan.A is a utility that is used to scan a specified IP block to identify computers that have a weak passwords for their corresponding Admin$ and IPC$ share.
Alert level:
high
Win32/Swif
Updated on Mar 03, 2011
Win32/Swif is a generic detection for maliciously-crafted SWF (Small Web Format) files. SWF files are commonly used for graphics and video online and are developed for the Adobe Flash platform.
Alert level:
severe
Exploit:Win32/Pdfjsc.OW
Updated on May 09, 2011
Exploit:Win32/Pdfjsc.OW is the detection for a PDF file that attempts to exploit certain vulnerabilities in Adobe Acrobat and Adobe Reader. When run in a computer that has a vulnerable version of Adobe Acrobat or Adobe Reader installed, it may run arbitrary shellcode.
Alert level:
severe