Skip to main content
Skip to main content
Microsoft Security Intelligence
500 entries found. Displaying page 6 of 25.
Updated on Jul 04, 2011

Exploit:Java/CVE-2010-3552.A is a detection for HTML code that uses a certain Java plug-in to exploit a vulnerability in Java described in CVE-2010-3552, otherwise known as the Java Skyline exploit. Successful exploitation leads to remote code execution.

Alert level: severe
Updated on Apr 11, 2011
Exploit:SWF/CVE-2010-2884.A is a detection for a specially-crafted SWF (ShockWave Flash) file exploiting a vulnerability found in Adobe Flash Player prior to version 10.1.85.3.
Alert level: severe
Updated on Apr 11, 2011
Exploit:Win32/CVE-2010-2572.A is the detection for specially-crafted Microsoft Powerpoint files that exploit a vulnerability addressed by Microsoft Security Bulletin MS10-088. This vulnerability may allow attackers to execute arbitrary code that can drop files, install programs or modify data without the user's knowledge or consent.
Alert level: severe
Updated on Apr 11, 2011
Exploit:JS/CVE-2010-0886 is a detection for JavaScript code that exploits a vulnerability in the Java Deployment Toolkit (CVE-2010-0886). The vulnerability allows loading of arbitrary Java code with the user privileges, which may lead to downloading and executing arbitrary files or malware.
Alert level: severe
Updated on Oct 13, 2011

Exploit:Java/CVE-2010-0842.N is a detection for a malicious Java class that exploits a vulnerability discussed in CVE-2010-0842. Successful exploitation could lead to the execution of arbitrary code.

 
Alert level: severe
Updated on Dec 05, 2011

Exploit:Java/CVE-2010-0094.AX is a Java-based malware that exploits a vulnerability discussed in CVE-2010-0094. The vulnerability affects Java Runtime Environment (JRE) up to version 6 release 18 inclusive, and makes it possible for untrusted code to gain full privileges at the level of the user's browser security scope.

Alert level: severe
Updated on Apr 11, 2011
Exploit:Win32/CVE-2010-3971 is the detection for a vulnerability in Internet Explorer discussed in the following articles:
 
 
Alert level: severe
Updated on Apr 11, 2011
Exploit:Win32/CVE-2010-3970 is the detection for a file that exploits a vulnerability in the Windows Graphics Rendering Engine (GRE). An attacker who successfully exploits this vulnerability could run arbitrary code in the security context of the logged-on user. Exploitation can occur by simply browsing to a folder containing the malicious file. No further user interaction is required. More information about the vulnerability is available in the following articles:
 
Alert level: severe
Updated on Apr 11, 2011
Exploit:JS/CVE-2010-0806.B is a detection for malicious JavaScript that attempts to exploit a vulnerability discussed in CVE-2010-0806 and mitigated in Microsoft Security Bulletin MS10-018 released in March 2010. By exploiting this vulnerability, an attacker may be able to execute remote arbitrary code on a vulnerable computer.
Alert level: severe
Updated on Apr 11, 2011
Exploit:Java/CVE-2010-0094.T is the detection for files that exploit a vulnerability which affects the Java Runtime Environment (JRE) up to and including version 6 update 18. The vulnerability allows an unsigned Java applet to gain elevated privileges and potentially have unrestricted access to a host system, outside its "sand box" environment.
Alert level: severe
Updated on Apr 11, 2011
Exploit:Java/CVE-2010-0094.AA is the detection for malicious Java applet stored within a Java Archive (.JAR) that attempts to exploit a vulnerability in the Java Runtime Environment (JRE) up to and including version 6 update 18. The vulnerability allows an unsigned Java applet to gain elevated privileges and potentially have unrestricted access to a host system, outside its "sand box" environment.
Alert level: severe
Updated on Feb 24, 2014

Windows Defender detects and removes this threat.

Exploit:Win32/CVE-2010-3333 is a detection for specially-crafted RTF files that try to exploit a vulnerability in Microsoft Word. The vulnerability is discussed in CVE-2010-3333 and resolved with the release of Microsoft Security Bulletin MS10-087.

If you open a document using a version of Microsoft Word that's not updated to the latest secure version, malicious code within the file can run in your PC. We've seen this threat download and drop other malware.

In the wild, we've received samples masquerading as files related to the "Bilawar Bhutto Sex Scandal" and a "New Year's Greeting Card" (with both the file name and message written in Russian).

Alert level: severe
Updated on Apr 11, 2011
Exploit:Java/CVE-2010-0842.F is a detection for a malicious and encrypted Java class that exploits the vulnerability described in CVE-2010-0842. Successful exploitation leads to remote code execution.
Alert level: severe
Updated on Apr 11, 2011
Exploit:Java/CVE-2010-0094.BC is a Java based malware that exploits a vulnerability discussed in CVE-2010-0094. The vulnerability affects Java Runtime Environment (JRE) up to version 6 release 18 inclusive and makes it possible for untrusted code to gain full privileges at the level of the user's browser security scope.
Alert level: severe
Updated on May 02, 2016

Windows Defender detects and removes this threat.

This threat uses specially-crafted Shockwave Flash (.swf) files to exploit an Adobe vulnerability to download and run files on your PC, including malware.

It runs when you visit a malicious or hacked website and you have a vulnerable version of Adobe Flash Player.

The following versions of Adobe Flash Player are vulnerable:

  • Adobe Flash Player before 9.0.277.0 and 10.x before 10.1.53.64
  • Adobe AIR before 2.0.2.12610
  • Adobe Reader and Acrobat 9.x before 9.3.3 and 8.x before 8.2.3 on Windows and Mac OS X

If you visit a webpage containing this threat and your PC has a vulnerable version of Flash installed, this threat can download and run other malware.

Find out ways that malware can get on your PC.

Alert level: severe
Updated on May 18, 2011

Exploit:Java/CVE-2010-0094.DF is the detection for malicious Java applet stored within a Java Archive (.JAR) that attempts to exploit a vulnerability in the Java Runtime Environment (JRE) up to and including version 6 update 18. The vulnerability allows an unsigned Java applet to gain elevated privileges and potentially have unrestricted access to a host system outside its "sandbox" environment. It is discussed in CVE-2010-0094.

Alert level: severe
Updated on May 20, 2011

Exploit:Java/CVE-2010-4452 is the detection for an HTML file that exploits a vulnerability in Java described in CVE-2010-4452.

Alert level: severe
Updated on Apr 11, 2011
Exploit:Win32/CVE-2010-0817 is the detection for a file that may try to exploit a cross-site scripting (XSS) vulnerability in the file "help.aspx" in Microsoft SharePoint Server 2007.
Alert level: severe
Updated on Apr 11, 2011
Exploit:Win32/CVE-2010-2883.A is a generic detection for specially-crafted PDF files that attempt to exploit the Acrobat SING Table Handling vulnerability CVE-2010-2883. Successful exploitation may lead to denial of service or execution of arbitrary code.
Alert level: severe
Updated on Apr 11, 2011
Exploit:Java/CVE-2010-0094.D is a java based vulnerability which affects Java Runtime Environment (JRE) up to version 6 release 18 inclusive. The vulnerability makes it possible for untrusted code to gain full privileges at the user's browser security scope.
Alert level: severe