Skip to main content
Skip to main content
Microsoft Security Intelligence
500 entries found. Displaying page 5 of 25.
Updated on Aug 09, 2011

Exploit:Java/CVE-2010-0840.EX is the detection for a malicious and obfuscated Java class that exploits the vulnerability described in CVE-2010-0840. Successful exploitation may lead to the download and execution of arbitrary files within the user's security context.

Alert level: severe
Updated on Apr 11, 2011
Exploit:Win32/CVE-2010-4398 is a detection for exploit code that attempts to exploit a vulnerability discussed in CVE-2010-4398. Successful exploitation could allow allows local users to gain privileges and bypass the User Account Control (UAC) feature of Windows.
Alert level: severe
Updated on Jun 03, 2011
Exploit:Java/CVE-2010-0840.BC is the detection for a malicious Java applet trojan that exploits a vulnerability described in CVE-2010-0840. Successful exploitation may lead to the downloading and execution of arbitrary files under the user's security context.
Alert level: severe
Updated on Sep 22, 2011
Exploit:Java/CVE-2010-0840.BQ is a malicious Java applet trojan that exploits a vulnerability described in CVE-2010-0840. Successful exploitation may lead to the downloading and execution of arbitrary files under the user's security context.
Alert level: severe
Updated on Apr 11, 2011
Exploit:Win32/CVE-2010-0817 is the detection for a file that may try to exploit a cross-site scripting (XSS) vulnerability in the file "help.aspx" in Microsoft SharePoint Server 2007.
Alert level: severe
Updated on Apr 11, 2011
Exploit:Win32/CVE-2010-2883.A is a generic detection for specially-crafted PDF files that attempt to exploit the Acrobat SING Table Handling vulnerability CVE-2010-2883. Successful exploitation may lead to denial of service or execution of arbitrary code.
Alert level: severe
Updated on Apr 11, 2011
Exploit:Java/CVE-2010-0094.A is the detection for files that exploit a vulnerability which affects the Java Runtime Environment(JRE) up to and including version 6 update 18. The vulnerability allows an unsigned Java applet to gain elevated privileges and potentially have unrestricted access to a host system, outside its "sand box" environment.
 
The vulnerability can be exploited by malware to gain access to a user's computer to download and install malicious programs. The malware installation may occur when a malicious Java applet is executed by a vulnerable JRE. This scenario can occur when a user visits a malicious webpage that hosts such an applet. Note that a number of legitimate websites could be compromised or unwillingly host a malicious applet through advertising frames which could redirect to or host a malicious Java applet.
Alert level: severe
Updated on Apr 11, 2011
Exploit:Java/CVE-2010-0094.D is a java based vulnerability which affects Java Runtime Environment (JRE) up to version 6 release 18 inclusive. The vulnerability makes it possible for untrusted code to gain full privileges at the user's browser security scope.
Alert level: severe
Updated on Jun 30, 2011

Exploit:Java/CVE-2010-0840.DY is the detection for an obfuscated Java applet trojan that exploits a vulnerability described in CVE-2010-0840. Successful exploitation may lead to the download and execution of arbitrary files within the user's security context.

Alert level: severe
Updated on Oct 18, 2011

Exploit:Java/CVE-2010-0840.EW is a detection for certain malicious Java applets that exploit a vulnerability of privilege escalation, described in CVE-2010-0840. The vulnerability is present in Java Runtime Environment (JRE) versions 5 and 6. Successful exploitation could lead to the download and execution of other malware.

Alert level: severe
Updated on Feb 23, 2012
Exploit:Java/CVE-2010-0840.NV is an obfuscated Java class that exploits a vulnerability described in CVE-2010-0840. Successful exploitation may lead to the download and execution of arbitrary files within the user's security context. When a user visits a website that contains this malicious Java class using a computer that has a vulnerable version of Sun Java, security checks may be bypassed, which allows arbitrary code execution.
Alert level: severe
Updated on May 02, 2016

Windows Defender detects and removes this threat.

This threat uses specially-crafted Shockwave Flash (.swf) files to exploit an Adobe vulnerability to download and run files on your PC, including malware.

It runs when you visit a malicious or hacked website and you have a vulnerable version of Adobe Flash Player.

The following versions of Adobe Flash Player are vulnerable:

  • Adobe Flash Player before 9.0.277.0 and 10.x before 10.1.53.64
  • Adobe AIR before 2.0.2.12610
  • Adobe Reader and Acrobat 9.x before 9.3.3 and 8.x before 8.2.3 on Windows and Mac OS X

If you visit a webpage containing this threat and your PC has a vulnerable version of Flash installed, this threat can download and run other malware.

Find out ways that malware can get on your PC.

Alert level: severe
Updated on Apr 11, 2011
Exploit:Java/CVE-2010-0840.L is a detection for a malicious Java class that exploits the vulnerability described in CVE-2010-0840. Successful exploitation leads to remote code execution.
Alert level: severe
Updated on May 18, 2011

Exploit:Java/CVE-2010-0094.DF is the detection for malicious Java applet stored within a Java Archive (.JAR) that attempts to exploit a vulnerability in the Java Runtime Environment (JRE) up to and including version 6 update 18. The vulnerability allows an unsigned Java applet to gain elevated privileges and potentially have unrestricted access to a host system outside its "sandbox" environment. It is discussed in CVE-2010-0094.

Alert level: severe
Updated on May 20, 2011

Exploit:Java/CVE-2010-4452 is the detection for an HTML file that exploits a vulnerability in Java described in CVE-2010-4452.

Alert level: severe
Updated on Sep 11, 2012

Exploit:Java/CVE-2010-0840.QG is a malicious and obfuscated Java class that exploits the vulnerability described in CVE-2010-0840. Successful exploitation may lead to the downloading and execution of arbitrary files under the user's security context. When a user visits a website that contains this malicious Java class using a computer that has a vulnerable version of Java, security checks may be bypassed, which allows arbitrary code execution.

Alert level: severe
Updated on Apr 11, 2011
Exploit:Java/CVE-2010-0842.F is a detection for a malicious and encrypted Java class that exploits the vulnerability described in CVE-2010-0842. Successful exploitation leads to remote code execution.
Alert level: severe
Updated on Apr 11, 2011
Exploit:Java/CVE-2010-0094.BC is a Java based malware that exploits a vulnerability discussed in CVE-2010-0094. The vulnerability affects Java Runtime Environment (JRE) up to version 6 release 18 inclusive and makes it possible for untrusted code to gain full privileges at the level of the user's browser security scope.
Alert level: severe
Updated on Apr 11, 2011
Exploit:Java/CVE-2010-0840.AA is the detection for an obfuscated malicious Java class applet component that exploits the vulnerability described in CVE-2010-0840. Successful exploitation leads to remote code execution.
Alert level: severe
Updated on Jun 04, 2011

Exploit:Java/CVE-2010-0840.DB is a detection for an obfuscated malicious Java class applet component that exploits the vulnerability described in CVE-2010-0840. Successful exploitation may lead to the downloading and execution of arbitrary files under the user's security context.

Alert level: severe