Skip to main content
Skip to main content
69 entries found. Displaying page 1 of 4.
Updated on Feb 04, 2009
Worm:VBS/Autorun.X is a VBS worm that propagates to all removable drives and attempts to copy itself into floppy disks. It attempts to enable Autorun so that it can spread.
Alert level: severe
Updated on Feb 13, 2012

Exploit:JS/Blacole.BV is the detection for malicious JavaScript that loads a series of other exploits that are distributed as components of the "Blackhole kit". If the computer runs a vulnerable version of certain software and exploitation is successful, various malware may be downloaded.

Alert level: severe
Updated on Aug 05, 2010
Worm:MSIL/Autorun.C!inf is detection for an autorun configuration file named "autorun.inf". The file is found on infected removable media with a copy of the worm Worm:MSIL/Autorun.C.
Alert level: severe
Updated on Nov 14, 2012
Windows Defender Antivirus detects and removes this threat. 
 
This threat can redirect your web browser to malicious or compromised webpages. It tries to redirect your browser to sites that can download malware onto your PC, often by exploiting software vulnerabilities.

Find out ways that malware can get on your PC.  

Alert level: severe
Updated on Sep 22, 2010
Exploit:SWF/CVE-2010-2884.A is a detection for a specially-crafted SWF (ShockWave Flash) file exploiting a vulnerability found in Adobe Flash Player prior to version 10.1.85.3.
Alert level: severe
Updated on Apr 12, 2011

Exploit:Win32/CVE-2011-0094.A is the detection for an JavaScript, which attempts to exploit a vulnerability in Internet Explorer.

Alert level: severe
Updated on Jun 19, 2011

Exploit:SWF/ShellCode.C is the detection for a Shockwave Flash (SWF) file that attempts to exploit a software vulnerability in Adobe Acrobat and Adobe Reader that can cause unexpected behavior in the application, and potentially allow an attacker to gain access to the vulnerable computer. The vulnerability is described in the following pages:

Alert level: severe
Updated on Jul 27, 2011

TrojanDownloader:SWF/Meccapop.A is the detection for a Shockwave Flash (SWF) file that attempts to exploit a software vulnerability in Adobe Acrobat and Adobe Reader that can cause unexpected behavior in the application, and potentially allow an attacker to gain access to the vulnerable computer.

Alert level: severe
Updated on Oct 31, 2011

Exploit:SWF/Blacole.E is the detection for malicious code within specially crafted Adobe Shockwave Flash (.SWF) files. The malicious files are commonly distributed via an exploit kit, known as "Blackhole", within compromised webpages. The malware is capable of redirecting a web browser to another specified website and downloading and executing arbitrary files.

Alert level: severe
Updated on Nov 14, 2011

Exploit:SWF/CVE-2011-2140.A is the detection for specially crafted Adobe Shockwave Flash (SWF) files that exploit the vulnerability described in the following articles:

It attempts to play a movie file. As of this writing, the movie file is unavailable.

Alert level: severe
Updated on Nov 14, 2011

Exploit:SWF/Blacole.J is a malicious Adobe Shockwave Flash (.SWF) file, distributed as part of the "Blackhole" exploit kit, that exploits a vulnerability described in CVE-2011-2110. Successful exploitation by the malware could result in downloading and executing arbitrary files.

Alert level: severe
Updated on Nov 24, 2011

Exploit:SWF/Blacole.K is a malicious Adobe Shockwave (.SWF) code that exploits a vulnerability in certain versions of Adobe Flash Player that could result in redirecting the web browser or downloading and executing arbitrary files. The vulnerability is discussed in the following articles:

Alert level: severe
Updated on Sep 28, 2010

Windows Defender detects and removes this threat.

Exploit:Win32/ShellCode.gen!C is a generic detection for JavaScript files that have malicious code. Generally, attackers use this malicious code to infect your computer with other malware.

These files are often downloaders which use the malicious code to exploit vulnerabilities in various software.

A vulnerability is like a hole in your software that malware can use (or exploit) to get on your computer. These holes are fixed by installing updates to the vulnerable software; this is why it is extremely important to keep all of the programs on your computer up to date.

See here for information on how to update some software.

As this is a generic detection, we cannot identify the precise files that use this code or the particular exploits that the code uses.

Alert level: severe
Updated on Dec 01, 2011

Exploit:Win32/Pdfjsc.YQ is a specially-crafted Portable Document File (PDF), which exploits vulnerabilities in Adobe Acrobat and Adobe Reader discussed in the following articles:

Alert level: severe
Updated on Dec 27, 2011

Exploit:JS/Blacole.AV is a malicious JavaScript that attempts to exploit several vulnerabilities in Adobe Acrobat and Reader. If the exploit is successful in compromising a vulnerable host, it could result in downloading and executing other malware.

Alert level: severe
Updated on Jan 18, 2012

Exploit:Win32/Pdfjsc.YX is a specially-crafted JavaScript, which exploits a vulnerability in the Java Runtime Environment, Adobe Acrobat, and Adobe Reader discussed in the following articles:

Alert level: severe
Updated on Feb 03, 2012

Exploit:JS/Pdfjsc.Z is an obfuscated JavaScript often distributed through compromised websites. It is designed to exploit several vulnerabilities in the web browser.

Alert level: severe
Updated on Dec 07, 2006
Alert level: severe
Updated on Dec 07, 2006
Alert level: severe
Updated on May 03, 2019
Alert level: severe