Skip to main content
Skip to main content
901 entries found. Displaying page 1 of 46.
Updated on Oct 01, 2010
Exploit:Java/CVE-2008-5353.FJ is a detection for an obfuscated malicious Java class component that exploits the vulnerability described in CVE-2008-5353. The vulnerability allows an unsigned Java applet to gain elevated privileges and potentially have unrestricted access to a host system, outside of its "sandbox" environment.
Alert level: severe
Updated on Mar 11, 2011

Windows Defender Antivirus detects and removes this threat. 

This threat exploits vulnerabilities in the Android operating system to gain root privileges on your mobile device.

Alert level: severe
Updated on Oct 02, 2012

Exploit:Win32/Pdfjsc.ADH is a malicious PDF file that exploits a vulnerability in Adobe Acrobat and Adobe Reader.

The vulnerabilities, discussed in CVE-2010-0188, allow this malware to download and run arbitrary files.

The following versions of Adobe Acrobat and Adobe Reader are vulnerable to this exploit:

  • Adobe Acrobat and Adobe Reader earlier than 8.2.1
  • Adobe Acrobat and Adobe Reader earlier than 9.3.1
Alert level: severe
Updated on Oct 15, 2012

Exploit:Win32/Pdfjsc.ADQ is a malicious PDF file that exploits a vulnerability in Adobe Acrobat and Adobe Reader.

The vulnerabilities, discussed in CVE-2010-0188, allow this malware to download and run arbitrary files.

The following versions of Adobe Acrobat and Adobe Reader are vulnerable to this exploit:

  • Adobe Acrobat 8 and Adobe Reader 8 earlier than 8.2.1
  • Adobe Acrobat 9 and Adobe Reader 9 earlier than 9.3.1
Alert level: severe
Updated on Nov 16, 2006
An Exploit:Win32/MS06-070 detection signifies exploit code related to a vulnerability found in the Workstation service. Successful exploit of this vulnerability could allow an attacker to remotely execute arbitrary code on impacted systems. Details on the vulnerability, the security update, and recommended workarounds for those unable to immediately install the recommended security update can be found in Microsoft Security Bulletin MS06-070 at http://www.microsoft.com/technet/security/Bulletin/MS06-070.mspx.
Alert level: severe
Updated on Oct 24, 2007
Exploit:Win32/RdrJmp.A exploits unpatched Adobe Reader & Adobe Acrobat applications installed on Windows XP computers. Opening a malicious .PDF data file containing the exploit could result in the installation of additional malware, including TrojanSpy:Win32/Agent.BI, Trojan:Win32/Agent.OS and PWS:Win32/Ldpinch.W.
 
Microsoft has published Microsoft Security Advisory 943521 related to this threat:
 
Adobe has published updates for vulnerable applications:
http://www.adobe.com/support/security/bulletins/apsb07-18.html
Alert level: severe
Updated on Dec 12, 2008

Exploit:Win32/Crpexp is a trojan that exploits certain vulnerabilities. It may be used by other malware for their spreading routine.

Alert level: severe
Updated on Apr 02, 2009
Trojan:Win32/Cryptrun.A is a trojan embedded within an exploit in Microsoft PowerPoint (.PPS / .PPT) data files identified as Exploit:Win32/Apptom.gen. The exploit could execute on vulnerability systems using Microsoft Office 2000, XP, 2003 and Mac Office.
Alert level: severe
Updated on Sep 09, 2009
Exploit.Win32.Pdfjsc.BI is a detection for specially-crafted PDF files that attempt to exploit software vulnerabilities in Adobe Acrobat and Adobe Reader. This vulnerability allow remote code execution when a malformed PDF document is opened using vulnerable versions of Adobe Reader and Acrobat.
Alert level: severe
Updated on Dec 03, 2009
Exploit:Win32/Pdfjsc.gen!A is a generic detection of malformed PDF files that target various Adobe Acrobat and Reader vulnerabilities. Once the malformed PDF files are opened by vulnerable versions of Adobe Acrobat and Reader, the embedded JavaScript loads the exploit. The exploit may successfully execute arbitrary code of the attacker's choice, however, it is often used to download and execute additional malware on the affected computer.
Alert level: severe
Updated on Apr 19, 2010
Exploit:Win32/Pdfjsc.ER is a detection for specially-crafted PDF files that attempt to exploit software vulnerabilities in Adobe Acrobat and Adobe Reader.
Alert level: severe
Updated on Apr 19, 2010
Exploit:Win32/Pdfjsc.EX is a detection for specially-crafted PDF files that attempt to exploit software vulnerabilities in Adobe Acrobat and Adobe Reader.
Alert level: severe
Updated on Jun 18, 2010
Exploit:Win32/Pdfjsc.FO is the detection for a malicious PDF file that, when opened with a certain version of Adobe Acrobat or Reader, tries to execute a malicious batch script.
Alert level: severe
Updated on Dec 13, 2010
Exploit:Win32/Pidief.BN is a detection for specially-crafted PDF files that target a software vulnerability in Adobe Acrobat and Adobe Reader referenced by Common Vulnerabilities and Exposures (CVE) Identifier CVE-2010-0188. Successful exploitation of the vulnerability could result in the malware downloading and executing arbitrary files.
Alert level: severe
Updated on Jan 06, 2011
Exploit:JS/Pdfjsc.JU is a detection for specially-crafted PDF files that attempt to exploit software vulnerabilities in Adobe Acrobat and Adobe Reader. Once the malformed PDF files are opened by vulnerable versions of Adobe Acrobat and Reader, the embedded JavaScript is executed and loads the exploit.
Alert level: severe
Updated on Mar 22, 2011
Exploit:Win32/Pdfjsc.ML is the detection for malicious Portable Document Format (PDF) files that attempt to exploit certain vulnerabilities in Adobe Acrobat and Reader using a particular trick to obfuscate, hide, and subsequently run, malicious JavaScript and shellcode. They may connect to remote websites.
Alert level: severe
Updated on Jun 19, 2011

Exploit:SWF/ShellCode.C is the detection for a Shockwave Flash (SWF) file that attempts to exploit a software vulnerability in Adobe Acrobat and Adobe Reader that can cause unexpected behavior in the application, and potentially allow an attacker to gain access to the vulnerable computer. The vulnerability is described in the following pages:

Alert level: severe
Updated on Jul 20, 2011

Trojan:Win32/Rtfdrop.C is the detection for maliciously-crafted RTF files that exploit the vulnerability described in the following articles:

Successful exploitation may lead to the download and execution of arbitrary files within the user's security context.

Alert level: severe
Updated on Nov 10, 2011

Exploit:SWF/Blacole.R is a malicious Adobe Shockwave Flash (.SWF) file, distributed as part of the "Blackhole" exploit kit, that exploits a vulnerability described in CVE-2011-2110. Successful exploitation by the malware could result in downloading and executing arbitrary files.

Alert level: severe
Updated on Nov 10, 2011

Exploit:SWF/Blacole.G is a malicious Adobe Shockwave Flash (.SWF) file, distributed as part of the "Blackhole" exploit kit, that exploits a vulnerability described in CVE-2011-2110. Successful exploitation by the malware could result in downloading and executing arbitrary files.

Alert level: severe