20 entries found.
Updated on May 21, 2010
TrojanDownloader:HTML/Adodb.gen!A is generic detection for an HTML script trojan that exploits a vulnerability in Microsoft Data Access Components (MDAC) that allows code execution (MS06-014). This trojan attempts to download and execute arbitrary files (including additional malware).
Alert level: severe
Updated on Jul 23, 2010
TrojanDownloader:JS/Adodb.gen!A is generic detection for a JavaScript trojan that exploits a vulnerability in Microsoft Data Access Components (MDAC) that allows code execution (MS06-014). This trojan attempts to download and execute arbitrary files (including additional malware).
Alert level: severe
Updated on Apr 11, 2011
TrojanDownloader:JS/Adodb.F is the component detection for malicious JavaScript code that downloads and executes another malware components, for example other JavaScript or malware binaries.
Alert level: severe
Updated on Apr 11, 2011
TrojanDownloader:JS/Adodb.G is the component detection for malicious JavaScript code that downloads and executes another malware components.
Alert level: severe
Updated on May 18, 2011
TrojanDownloader:JS/Adodb is the detection for a JavaScript trojan that exploits a vulnerability in Microsoft Data Access Components (MDAC) that allows remote code execution. The vulnerability was resolved with the release of Microsoft Security Bulletin MS06-014. This trojan attempts to download...
Alert level: severe
Updated on Oct 14, 2012
TrojanDownloader:Win32/Adodb.A is a trojan that silently downloads and installs other programs without consent. This could include the installation of additional malware or malware components to an affected computer.
Alert level: severe
Updated on Nov 12, 2007
Exploit:HTML/AdoStream is a generic detection for malicious JavaScript or VBScripts embedded inside HTML pages. These scripts takes advantage of the ADODB.Stream functionality in ActiveX, combined with known security vulnerabilities in Microsoft Internet Explorer, in order to download and install...
Alert level: severe
Updated on May 10, 2011
TrojanDownloader:VBS/Psyme.Y is a detection for VBScript that attempts to download arbitrary files and may also attempt to execute the retrieved file. The trojan code is often executed by other malware or other exploit code.
Alert level: severe
Updated on Apr 11, 2011
Exploit:Win32/CVE-2010-1885.A is a detection for a cross-site scripting method that exploits a vulnerability (CVE-2010-1885) in Windows Help and Support Center that could allow an attacker to run arbitrary code on the local computer.
Alert level: severe
Updated on Apr 11, 2011
Eleonore Exploit Kit (EEK) is a configurable set of exploits that is used on a web server in order to compromise the security of web browsers that browse to the site.
Alert level: low
Updated on Apr 11, 2011
The Phoenix Exploit Kit (PEK) is a configurable set of exploits that is used on a web server in order to compromise the security of web browsers that browse to the site.
Alert level: low
Updated on Mar 13, 2013
TrojanDownloader:VBS/Psyme.AF is an obfuscated Visual Basic script that attempts to download and run arbitrary files. In the wild, it has been observed to run and download a file detected as Virus:Win32/Zbot.A.
Alert level: severe
Updated on Nov 01, 2007
Trojan:JS/Psyme.AD exploits publicly published vulnerabilities via the Web browser Internet Explorer to execute malicious JavaScript. This malicious JavaScript is commonly used to download and execute other malware onto the system. 
Alert level: severe
Updated on Apr 11, 2011
Backdoor:Win32/Rbot.NC is a backdoor Trojan that connects to an IRC server to receive commands from remote attackers. Commands could include (but are not limited to) instructions to spread to other computers via open network shares or by exploiting a vulnerability, or to launch denial of service...
Alert level: severe
Updated on Oct 27, 2015
Windows Defender detects and removes this threat. This threat is a file that is used to download rogue security software programs that we detect as Win32/FakePav. See the Win32/FakePAV description for more information. Find out ways that malware can get on your PC.
Alert level: severe
Updated on May 05, 2016
Windows Defender detects and removes this threat. TrojanDownloader:VBS/Agent.EH is a detection for malicious VBScript embedded in HTML web pages that attempt to exploit a vulnerability described in CVE-2006-0003 to download and execute arbitrary files.
Alert level: severe
Updated on May 25, 2011
Worm:ALisp/Kenilfe.A is a detection for a worm written in Autocad Lisp, which is distributed as an Autocad FAS file, 9,922 bytes in size.
Alert level: severe
Updated on May 01, 2016
Windows Defender detects and removes this family of threats. You should also update your software to be fully protected. The Blacole exploit pack tries to infect your PC with other malware, such as trojans and viruses. It also known as "Blackhole". See our page about exploits and...
Alert level: severe
Updated on Jun 08, 2012
Worm:JS/Morph.A is a worm that spreads to all disk drives, including removable drives and network shares, as a file named "M0rPheS.tpl". This worm could download other malware to your infected computer.
Alert level: severe
Updated on Apr 11, 2011
Worm:Win32/Lightmoon.G is a mass-mailing worm that sends itself to email addresses found on the infected computer. It also attempts to propagate via P2P applications.
Alert level: severe