Skip to main content
Skip to main content
901 entries found. Displaying page 5 of 46.
Updated on Dec 07, 2006

Exploit:JS/ActiveXComponent is a JavaScript that exploits the vulnerability described in CVE-2000-1061 to run arbitrary code.

Alert level: severe
Updated on Oct 15, 2007
Exploit:Win32/MS05002.gen is a generic detection for malware that exploits a vulnerability in the way certain un-patched versions of Microsoft Windows handle malformed animated cursor files. These files commonly have an 'ani' file extension. The exploit causes a buffer overflow that could allow an attacker to remotely execute arbitrary code on impacted systems.

A patch for this vulnerability has been available since 2005, and further discussion is located on Technet (http://www.microsoft.com/technet/security/Bulletin/MS05-002.mspx).
Alert level: severe
Updated on May 28, 2008
TrojanDownloader:Win32/Swif.A is a trojan that attempts to exploit a vulnerability in Adobe Shockwave Flash. Successful exploitation of this vulnerability could result in arbitrary code execution. In the wild, this trojan has been used in order to download and execute arbitrary files (including additional malware) onto an affected system.
Alert level: severe
Updated on Aug 11, 2008
Exploit:Win32/Senglot.V is a generic detection that detects malicious code, often hosted in HTML files, that attempts to download and execute arbitrary files. They usually arrive in a system when a user visits a compromised website.
Alert level: severe
Updated on May 26, 2009
TrojanDownloader:Win32/Swif.I is a trojan that attempts to exploit a vulnerability in Adobe Flash Player. It attempts to download and run other malware in an infected computer.
Alert level: severe
Updated on Jan 19, 2010
Exploit:Win32/Pdfjsc.DA is a detection for specially-crafted PDF files that target software vulnerabilities in Adobe Acrobat and Adobe Reader. If opened on vulnerable computers, this malware installs Backdoor:Win32/Ixeshe.B.
Alert level: severe
Updated on Apr 22, 2010
Trojan:Java/Classloader.T is the detection for a malicious Java applet that exploits the vulnerability described in CVE-2009-3867. The vulnerability is due to an error in the implementation of the HsbParser.getSoundBank function that can be exploited to result in a stack-based buffer overflow.
Alert level: severe
Updated on Apr 22, 2010
Exploit:Java/CVE-2009-3867 is the detection for a malicious Java applet that exploits the vulnerability described in CVE-2009-3867. The vulnerability is due to an error in the implementation of the HsbParser.getSoundBank function that can be exploited to result in a stack-based buffer overflow.
Alert level: severe
Updated on Apr 28, 2010
Exploit:Java/CVE-2008-5353.G is a detection for malicious code that attempts to exploit a vulnerability in the Java Runtime Environment (JRE). The exploit may lead to the download and execution of arbitrary files in a computer in which a vulnerable version of JRE is installed.
Alert level: severe
Updated on Jun 02, 2010
TrojanDownloader:Java/OpenStream.F is a detection for malicious Java class components that attempt to download and execute arbitrary code. The trojan attempts to exploit vulnerabilities mitigated by Microsoft Security Bulletin MS03-011 and CVE-2009-3867.
Alert level: severe
Updated on Jul 21, 2010
Backdoor:Win32/Rbot.JJ is a member of Win32/Rbot - a large family of IRC-controlled backdoors that allow unauthorized access and control of an affected computer. Using this backdoor, an attacker can perform a large number of different actions on an affected computer, including downloading and executing arbitrary files, stealing sensitive information and spreading to other computers using various methods.
Alert level: severe
Updated on Jul 28, 2010
Exploit:Java/CVE-2008-5353.BO is based on a vulnerability which affects Java Virtual Machine (JVM) up to and including version 6 update 10. The vulnerability allows an unsigned Java applet to gain elevated privileges and potentially have unrestricted access to a host system, outside its "sand box" environment.
Alert level: severe
Updated on Aug 13, 2010
Exploit:Java/CVE-2008-5353.CG is based on a vulnerability which affects Java Virtual Machine (JVM) up to and including version 6 update 10. The vulnerability allows an unsigned Java applet to gain elevated privileges and potentially have unrestricted access to a host system, outside its "sand box" environment.
Alert level: severe
Updated on Sep 02, 2010
TrojanDownloader:Java/OpenConnection.ES is the detection for an obfuscated Java class that is part of a bundled malicious Java applet. The applet exploits the vulnerability described in CVE-2008-5353 and can be used to download and run arbitrary files from a malicious website.
Alert level: severe
Updated on Sep 20, 2010
Exploit:Java/CVE-2008-5353.EQ is based on a vulnerability which affects Java Virtual Machine (JVM) up to and including version 6 update 10. The vulnerability allows an unsigned Java applet to gain elevated privileges and potentially have unrestricted access to a host system, outside its "sand box" environment.
Alert level: severe
Updated on Sep 23, 2010
Exploit:Java/CVE-2009-3869.A is a detection for the vulnerability described in CVE-2009-3869 which can be exploited to execute arbitrary code.
Alert level: severe
Updated on Sep 27, 2010
Exploit:Java/CVE-2010-0842.A is a detection for Java malware that exploits a vulnerability discussed in CVE-2010-0842. Successful exploitation of the vulnerability could lead to the execution of arbitrary code.
Alert level: severe
Updated on Nov 25, 2010
Exploit:JS/Mult.DC is the detection for a specifically obfuscated JavaScript, embedded in PDF files, that targets software vulnerabilities in Adobe Acrobat and Adobe Reader.
Alert level: severe
Updated on Dec 21, 2010
Exploit:Win32/Pdfjsc.KP is a detection for specially-crafted PDF files that target software vulnerabilities in Adobe Acrobat and Adobe Reader. It usually arrives in the system when the user visits a webpage that contains a malicious PDF file or opens an email containing the PDF file as an attachment.
Alert level: severe
Updated on Dec 21, 2010
Exploit:Win32/Pdfjsc.KO is a detection for specially-crafted PDF files that target software vulnerabilities in Adobe Acrobat and Adobe Reader. It usually arrives in the system when the user visits a webpage that contains a malicious PDF file or opens an email containing the PDF file as an attachment.
Alert level: severe