Exploit:Java/CVE-2010-0840.ED
Exploit:Java/CVE-2010-0840.ED is the detection for a trojan Java applet that exploits a vulnerability described in CVE-2010-0840. Successful exploitation may lead to the downloading and execution of arbitrary files under the user's security context.
Exploit:Java/CVE-2010-0840.EX
Exploit:Java/CVE-2010-0840.EX is the detection for a malicious and obfuscated Java class that exploits the vulnerability described in CVE-2010-0840. Successful exploitation may lead to the download and execution of arbitrary files within the user's security context.
Exploit:Java/CVE-2010-0840.EW
Exploit:Java/CVE-2010-0840.EW is a detection for certain malicious Java applets that exploit a vulnerability of privilege escalation, described in CVE-2010-0840. The vulnerability is present in Java Runtime Environment (JRE) versions 5 and 6. Successful exploitation could lead to the download and execution of other malware.
Exploit:Java/CVE-2010-0840.HH
Exploit:Java/CVE-2010-0840.HH is the detection for a malicious and obfuscated Java class that exploits a vulnerability described in CVE-2010-0840. Successful exploitation may lead to the downloading and execution of arbitrary files under the user's security context.
Exploit:Java/CVE-2010-0840.DR
Exploit:Java/CVE-2010-0840.DR is a detection for a malicious and obfuscated Java class that exploits the vulnerability described in CVE-2010-0840. Successful exploitation leads to remote code execution.
Exploit:Java/CVE-2010-0840.A
Exploit:Java/CVE-2010-0840.NS
Exploit:Java/CVE-2010-0840.NS is a variant of the Exploit:Java/CVE-2010-0840 family - a detection for a malicious Java applet stored within a Java Archive (.JAR) that attempts to exploit a vulnerability in the Java Runtime Environment (JRE) up to and including version 6 update 18. The vulnerability allows an unsigned Java applet to gain elevated privileges and potentially have unrestricted access to a host system outside its "sandbox" environment. It is discussed in CVE-2010-0840.
Exploit:Java/CVE-2010-0840.Z
Exploit:Java/CVE-2010-0840.AK
Exploit:Java/CVE-2010-0840.AY
Exploit:Java/CVE-2010-0840.CQ
Exploit:Java/CVE-2010-0840.DT
Exploit:Java/CVE-2010-0840.DT is the detection for a malicious and obfuscated Java class that exploits the vulnerability described in CVE-2010-0840. Successful exploitation leads to remote code execution.
Exploit:Java/CVE-2010-0840.AH
Exploit:Java/CVE-2010-0840.DB
Exploit:Java/CVE-2010-0840.DB is a detection for an obfuscated malicious Java class applet component that exploits the vulnerability described in CVE-2010-0840. Successful exploitation may lead to the downloading and execution of arbitrary files under the user's security context.
Exploit:Java/CVE-2010-0840.DU
Exploit:Java/CVE-2010-0840.DU is a detection for an obfuscated malicious Java class applet component that exploits the vulnerability described in CVE-2010-0840. Successful exploitation leads to remote code execution.
Exploit:Java/CVE-2010-0840.DN
Exploit:Java/CVE-2010-0840.DN is the detection for a malicious and obfuscated Java class that exploits the vulnerability in Java described in CVE-2010-0840. Successful exploitation leads to remote code execution.
Exploit:Java/CVE-2010-0840.MB
Exploit:Java/CVE-2010-0840.MB is a detection for malicious Java applets that exploit the vulnerability described in CVE-2010-0840. Successful exploitation may lead to the downloading and execution of arbitrary files under the user's security context.
Exploit:Java/CVE-2010-0840.DW
Exploit:Java/CVE-2010-0840.DW is the detection for a malicious and obfuscated Java class that exploits the vulnerability described in CVE-2010-0840. Successful exploitation may lead to the download and execution of arbitrary files within the user's security context.
Exploit:Java/CVE-2010-0840.DY
Exploit:Java/CVE-2010-0840.DY is the detection for an obfuscated Java applet trojan that exploits a vulnerability described in CVE-2010-0840. Successful exploitation may lead to the download and execution of arbitrary files within the user's security context.