Exploit:Java/CVE-2010-0840.LE
Exploit:Java/CVE-2010-0840.LE is a variant of Exploit:Java/CVE-2010-0840 - a detection for malicious Java applets that exploit the vulnerability described in CVE-2010-0840. Successful exploitation may lead to remote code execution.
Exploit:Win32/CVE-2011-3402
Exploit:Win32/CVE-2011-3402 is a detection for malicious code that attempts to exploit a vulnerability in the Win32 TrueType font parsing engine in the Microsoft Windows component "Win32k.sys". An attacker who successfully exploits this vulnerability could run arbitrary code in kernel mode. The attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.
Exploit:Java/CVE-2011-3544.E
Exploit:Java/CVE-2011-3544.E is a detection for a malicious Java applet stored within a Java Archive (.JAR) that attempts to exploit a vulnerability in a Java Runtime Environment (JRE) component in Oracle, JAVA SE JDK and JRE 7, 6 update 27 and earlier. The vulnerability, discussed in CVE-2011-3544, allows an unsigned Java applet to gain elevated privileges and potentially have unrestricted access to run arbitrary Java code outside of the "sandbox" environment.
Exploit:SWF/CVE-2014-0515
Windows Defender detects and removes this threat.
This threat uses an Adobe vulnerability to download and run files on your PC, including malware.
It runs when you visits a malicious or hacked website and you have a vulnerable version of Adobe Flash Player.
The following versions of Adobe Flash Player are vulnerable:
- Adobe Flash Player before 11.7.700.279 and 11.8.x through 13.0.x before 13.0.0.206 on Windows and OS X, and before 11.2.202.356 on Linux
If you visit a webpage containing this threat and your PC has a vulnerable version of Flash installed, this threat can download and run other malware.
Exploit:Java/CVE-2010-0094.AF
Exploit:Java/CVE-2010-0094.BA
Exploit:JS/CVE-2010-0806.gen!A
Exploit:JS/CVE-2010-0806.gen!A is the generic detection for specially crafted JavaScript that attempts to exploit the vulnerability in Internet Explorer resolved with the release of Microsoft Security Bulletin MS10-018.
Exploit:Java/CVE-2010-0840.BA
Exploit:Java/CVE-2010-0840.BB
Exploit:Java/CVE-2010-0094
Java/CVE-2010-0094 is a family of malicious Java applets stored within a Java Archive (.JAR) that attempts to exploit a vulnerability in the Java Runtime Environment (JRE) up to and including version 6 update 18. The vulnerability allows an unsigned Java applet to gain elevated privileges and potentially have unrestricted access to a host system outside its "sandbox" environment. It is discussed in CVE-2010-0094.
Exploit:SWF/CVE-2015-0311
Windows Defender detects and removes this threat.
This threat uses an Adobe vulnerability to download and run files on your PC, including malware.
It runs when you visit a malicious or hacked website and you have a vulnerable version of Adobe Flash Player.
The following versions of Adobe Flash Player are vulnerable:
- Adobe Flash Player 16.0.0.287 and earlier versions for Windows and Macintosh
- Adobe Flash Player 13.0.0.262 and earlier 13.x versions
- Adobe Flash Player 11.2.202.438 and earlier versions for Linux
If you visit a webpage containing this threat and your PC has a vulnerable version of Flash installed, this threat can download and run other malware.
Exploit:Java/CVE-2010-0840.OG
Exploit:SWF/CVE-2011-2107.A
Exploit:SWF/CVE-2011-2107.A is the detection for specially-crafted Shockwave Flash (.SWF) files that attempt to exploit software vulnerabilities in Adobe Flash Player and Adobe Reader and Acrobat X. The vulnerability is discussed in the following articles:
Exploit:HTML/CVE-2014-1776
Windows Defender detects and removes this threat.
This threat uses a vulnerability in Internet Explorer 6 through to Internet Explorer 11 to download and run files on your PC, including other malware.
The vulnerability is addressed in Microsoft Security Bulletin MS14-021. It is also described in detail in Microsoft Security Advisory 2963983.
It runs when you visit a hacked or malicious website and you have a vulnerable version of Internet Explorer.
Exploit:Java/CVE-2010-0840.AC
Exploit:Java/CVE-2010-0840.AM
Exploit:HTML/CVE-2010-4452.A
Exploit:HTML/CVE-2010-4452.A is the detection for an HTML file that exploits a vulnerability in Java described in CVE-2010-4452.
Exploit:Win32/CVE-2011-0977
Exploit:Win32/CVE-2011-0977 is the generic detection for specially crafted Microsoft Office files that exploit a vulnerabilty discussed in CVE-2011-0977 and mitigated with the release of Microsoft Security Bulletin MS11-023.
Exploit:Java/CVE-2009-3869.R
Exploit:Java/CVE-2009-3869.R is the detection for malicious Java applets that exploits a stack overflow vulnerability in the Java Runtime Environment (JRE) versions 5 and 6 and described in CVE-2009-3869.