Exploit:Java/CVE-2010-0840.AS
Exploit:Java/CVE-2010-0840.BO
Exploit:Java/CVE-2010-0840.KI
Exploit:Java/CVE-2010-0840.KI is the detection for an obfuscated Java applet trojan that exploits a vulnerability described in CVE-2010-0840. Successful exploitation may lead to the download and execution of arbitrary files within the user's security context.
Exploit:Java/CVE-2010-0840.BS
Exploit:Java/CVE-2010-0840.CL
Exploit:Java/CVE-2010-0840.NZ
Exploit:Java/CVE-2010-0840.NZ is a variant of the Exploit:Java/CVE-2010-0840 family - a detection for a malicious Java applet stored within a Java Archive (.JAR) that attempts to exploit a vulnerability in the Java Runtime Environment (JRE) up to and including version 6 update 18. The vulnerability allows an unsigned Java applet to gain elevated privileges and potentially have unrestricted access to a host system outside its "sandbox" environment. It is discussed in CVE-2010-0840.
Exploit:Java/CVE-2010-0840.CV
Exploit:Java/CVE-2010-0840.CV is a detection for an obfuscated malicious Java class applet component that exploits the vulnerability described in CVE-2010-0840. Successful exploitation leads to remote code execution.
Exploit:Java/CVE-2010-0840.NE
Exploit:Java/CVE-2010-0840.NE is a Java applet that exploits a vulnerability in Java Runtime Environment (JRE) as discussed in CVE-2010-0840.
Exploit:Java/CVE-2010-0840.BV
Exploit:Java/CVE-2010-0840.BF
Exploit:Java/CVE-2010-0840.CD
Exploit:Java/CVE-2010-0840.AO
Exploit:Java/CVE-2010-0840.BD
Exploit:Java/CVE-2010-0840.PH
Exploit:Java/CVE-2010-0840.PH is a detection for a family of malicious Java applet trojans that exploit a vulnerability described in CVE-2010-0840. The exploit is triggered when a user visits a website, containing the malicious applet, from a computer that is running a vulnerable version of Java.
Exploit:Java/CVE-2010-0840.PL
Exploit:Java/CVE-2010-0840.PL is an obfuscated Java class that exploits a vulnerability described in CVE-2010-0840. Successful exploitation may lead to the download and execution of arbitrary files within the user's security context. When a user visits a website that contains this malicious Java class using a computer that has a vulnerable version of Sun Java, security checks may be bypassed, which allows arbitrary code execution.
Exploit:Java/CVE-2010-0840.CR
Exploit:Java/CVE-2010-0840.CR is a detection for an obfuscated malicious Java class applet component that exploits the vulnerability described in CVE-2010-0840. Successful exploitation leads to remote code execution.
Exploit:Java/CVE-2010-0840.AL
Exploit:Java/CVE-2010-0840.BJ
Exploit:Java/CVE-2010-0840.CI
Exploit:Java/CVE-2010-0840.CI is a detection for an obfuscated malicious Java class applet component that exploits the vulnerability described in CVE-2010-0840. Successful exploitation may lead to the downloading and execution of arbitrary files under the user's security context.
Exploit:Java/CVE-2010-0840.DJ
Exploit:Java/CVE-2010-0840.DJ is a detection for an obfuscated malicious Java class applet component that exploits the vulnerability described in CVE-2010-0840. Successful exploitation leads to remote code execution.