Exploit:Java/CVE-2010-0840.AY
Exploit:Java/CVE-2010-0840.BV
Exploit:Java/CVE-2010-0840.BJ
Exploit:Java/CVE-2010-0840.BH
Exploit:Java/CVE-2010-0840.BF
Exploit:Java/CVE-2010-0840.BU
Exploit:Java/CVE-2010-0840.BS
Exploit:Java/CVE-2010-0840.BE
Exploit:Java/CVE-2010-0840.CA
Exploit:Java/CVE-2010-0840.CB
Exploit:Java/CVE-2010-0840.CC
Exploit:Java/CVE-2010-0840.CE
Exploit:Java/CVE-2010-0840.CD
Exploit:Java/CVE-2010-0840.CF
Exploit:Java/CVE-2010-0840.CO
Exploit:Java/CVE-2010-0840.CO is the detection for a obfuscated Java applet trojan that exploits the vulnerability described in CVE-2010-0840. Successful exploitation may lead to the downloading and execution of arbitrary files under the user's security context.
Exploit:Java/CVE-2010-0840.CR
Exploit:Java/CVE-2010-0840.CR is a detection for an obfuscated malicious Java class applet component that exploits the vulnerability described in CVE-2010-0840. Successful exploitation leads to remote code execution.
Exploit:Java/CVE-2010-0840.CI
Exploit:Java/CVE-2010-0840.CI is a detection for an obfuscated malicious Java class applet component that exploits the vulnerability described in CVE-2010-0840. Successful exploitation may lead to the downloading and execution of arbitrary files under the user's security context.