While visiting a web site I frequent everyday I got this warning from avast.
My Java software is completely up to date as is adobe reader/flash and also firefox, many people have been getting this warning on this web site and it seems to be associated with ( JAVA ) AND when it happened my java icon appeared in my system tray.
Any thoughts on whats going on with this condition.
EXPLOIT BLOCKED
Avast! Web shield has has blocked a harmful web page or file.
Hi, I have the same problem on video-a-la-demande.orange.fr website, the exploit is JS:Pdfka-AYC. But the website is sure and the file is dojo.js that is an official file created with dojotoolkit framework.
I think it’s a false positive case, will you correct this point ?
Sucuri gives the site an all clean and also these links are found clean:
htxp://video-a-la-demande.orange.fr
htxp://c.orange.fr/Js/o_oep.js
htxp://c.orange.fr/Js/common_oep.js
I get this maintanance report when trying to connect there:
Les sites Vidéo à la demande et Web TV évoluent...
Le service est interrompu le temps de mettre en mettre en oeuvre les évolutions.
Vous pouvez visionner sans aucun problème à partir de votre player Orange les vidéos que vous avez déjà téléchargées.
Le service sera de nouveau accessible dès 00h00.
Nous vous prions de bien vouloir nous excuser pour le désagrément.
L'équipe Vidéo Party
here it is also found clean: http://www.urlvoid.com/scan/video-a-la-demande.orange.fr
status code: 403. Forbidden.
But some interesting discussion links can be found here for this link to oep.js:
http://www.unmaskparasites.com/web-page-options/?url=http://c.orange.fr/Js/common_oep.js
Read on this e.g.: http://blog.unmaskparasites.com/2009/12/23/from-hidden-iframes-to-obfuscated-scripts/
various jsunpack links, this was the only recent one found:
htxp://jsunpack.jeek.org/dec/go?report=693e36cb8272f41daba319f279b4239b0edc8f68
but the site has had previous issues, certainly had,