Trojan:Win32/Chymine.A
Worm:Win32/Stuxnet.B
Exploit:Win32/Pdfjsc.FN
Exploit:Win32/Pdfjsc.FU
Exploit:Win32/Taro.H
Exploit:Java/CVE-2008-5353.DG
Exploit:Java/CVE-2009-3869.A
Exploit:Java/CVE-2010-0840.DW
Exploit:Java/CVE-2010-0840.DW is the detection for a malicious and obfuscated Java class that exploits the vulnerability described in CVE-2010-0840. Successful exploitation may lead to the download and execution of arbitrary files within the user's security context.
Exploit:Java/CVE-2013-0431
Windows Defender detects and removes this threat.
This threat uses a Java vulnerability to download and run files on your PC, including other malware.
It runs when you visit a hacked or malicious website and you have a vulnerable version of Java.
The following versions of Java are vulnerable:
- Java Development Kit, Java Runtime Environment 7 Update 11 and earlier
To check if you're running a vulnerable version of Java:
- Go to the control panel (Select Start then Control Panel)
- Select Programs. If Java is installed you will see it in the list of installed programs. Click it to open the Java Control Panel.
- On the General tab, click About to see which version of Java you have installed.
You might get an alert about this threat even if you're not using a vulnerable version of Java. This is because we detect when a website tries to use the vulnerability, even if it isn't successful.
Exploit:Java/CVE-2008-5353.B
Exploit:Win32/Pdfjsc.HW
Exploit:JS/Belmoo
Exploit:Java/CVE-2008-5353.WW
Exploit:Java/CVE-2010-0840.AL
Exploit:Win32/CVE-2010-2572.A
Exploit:JS/Blacole
Microsoft security software detects and removes this family of threats.
You should also update your software to be fully protected.
These threats are part of the Blacole family of malware. For more information, see our Blacole family description.
Exploit:Java/Obfuscator.F
Windows Defender Antivirus detects and removes this threat.
This threat has been "obfuscated", which means it has tried to hide its purpose so your security software doesn't detect it.
The malware that lies underneath this obfuscation can have almost any purpose.
Exploit:HTML/Sevdaq.C
Windows Defender detects and removes this threat.
This threat uses a JavaScript vulnerability to check your PC for security software. It then looks for certain information about your computer that might be used in a future attack. It uses the vulnerability described in CVE-2013-7331 to exploit your PC.
It runs when you visit a hacked or malicious website and you have a vulnerable version of Internet Explorer.
You might get an alert about this threat even if you're not using vulnerable software. This is because we detect when a website tries to use the vulnerability, even if it isn't successful.
See the Exploit:JS/Sevdaq family description for more information.