Skip to main content
Skip to main content
Microsoft Security Intelligence
500 entries found. Displaying page 1 of 25.
Updated on Apr 11, 2011
Trojan:Win32/Chymine.A is a trojan that drops a keylogging malware detected as TrojanSpy:Win32/Chymine.A. It consists of several components: an .EXE component and a .DLL component. It may be launched and installed by Exploit:Win32/CplLnk.A.
Alert level: severe
Updated on Apr 11, 2011
Worm:Win32/Stuxnet.B is the detection for a worm that spreads to all removable drives. It does this by dropping exploit shortcut files (files having .LNK file extension) that automatically run when the removable drive is accessed using an application that displays shortcut icons (for example, Windows Explorer). The shortcut files are detected as Exploit:Win32/CplLnk.A.
 
The worm is capable of dropping and installing other components, injecting code into currently-running processes, and allowing backdoor access and control to the infected computer.
Alert level: severe
Updated on Apr 11, 2011
Exploit:Java/CVE-2008-5353.B is a detection for malicious code that attempts to exploit a vulnerability in the Java Runtime Environment (JRE). The vulnerability, with CVE number CVE-2008-5353, may lead to the download and execution of arbitrary files in an affected system.
Alert level: severe
Updated on Apr 11, 2011
Exploit:Win32/Pdfjsc.FN is a detection for specially-crafted PDF files that attempt to exploit software vulnerabilities in Adobe Acrobat and Adobe Reader known as CVE-2010-1297. This exploit method may also be detected generically by Microsoft as Exploit:Win32/Pdfjsc.gen!A.
Alert level: severe
Updated on Apr 11, 2011
Exploit:Win32/Taro.H is a detection for an exploit affecting the word processing application Ichitaro by JustSystems of Japan.
Alert level: severe
Updated on Apr 11, 2011
Exploit:Java/CVE-2008-5353.DG is based on a vulnerability which affects Java Virtual Machine (JVM) up to and including version 6 update 10. The vulnerability allows an unsigned Java applet to gain elevated privileges and potentially have unrestricted access to a host system, outside its "sand box" environment.
Alert level: severe
Updated on Apr 11, 2011
Exploit:Win32/Pdfjsc.FU is a detection for a crafted PDF file which exploits the vulnerabilities discussed in  CVE-2008-2992 and CVE-2009-0927.
Alert level: severe
Updated on Apr 11, 2011
Exploit:Java/CVE-2009-3869.A is a detection for the vulnerability described in CVE-2009-3869 which can be exploited to execute arbitrary code.
Alert level: severe
Updated on Apr 11, 2011
Exploit:Win32/Pidief.HW is a detection for specially-crafted PDF files that target a software vulnerability in Adobe Acrobat and Adobe Reader version 8 before 8.2.1 and version 9 before 9.3.1. The vulnerability exploited by this malware is referenced by the Common Vulnerabilities and Exposures (CVE) Identifier CVE-2010-0188.
 
Upon successful exploitation, malicious code gets executed that is used to download and execute arbitrary files.
Alert level: severe
Updated on Oct 30, 2014

Windows Defender Antivirus detects and removes this threat. 

This threat has been "obfuscated", which means it has tried to hide its purpose so your security software doesn't detect it.

The malware that lies underneath this obfuscation can have almost any purpose.

Alert level: severe
Updated on Jun 24, 2011

Exploit:Java/CVE-2010-0840.DN is the detection for a malicious and obfuscated Java class that exploits the vulnerability in Java described in CVE-2010-0840. Successful exploitation leads to remote code execution.

Alert level: severe
Updated on Jun 23, 2016

Windows Defender detects and removes this threat.

This threat is a webpage that spreads the exploit kit known as Neutrino. See the HTML/NeutrinoEK family description for more information.

You PC is at risk of infection if you visit this webpage and you have vulnerable software installed on your PC.

You might be redirected to the malicious webpage without your consent.

Alert level: severe
Updated on Aug 17, 2015

Windows Defender detects and removes this threat.

This threat uses a Microsoft vulnerability to download and run files on your PC, including other malware.

It runs if you visit a website, and have a vulnerable operating system; the following software are affected:

  • Windows 8.1
  • Windows RT Gold and 8.1
  • Windows 7 SP1
  • Windows Server 2012 Gold and R2
  • Windows Server 2008 SP2 and R2 SP1
  • Windows Vista SP2
  • Windows Server 2003 SP2

You might get an alert about this threat even if you're not using a vulnerable version of the application. This is because we detect when a website or file tries to use the vulnerability, even if it isn't successful.

Alert level: severe
Updated on Aug 17, 2015

Windows Defender detects and removes this threat.

This threat uses a Microsoft vulnerability to download and run files on your PC, including other malware.

It runs if you visit a website, and have a vulnerable operating system; the following software are affected:

  • Windows 8.1
  • Windows RT Gold and 8.1
  • Windows 7 SP1
  • Windows Server 2012 Gold and R2
  • Windows Server 2008 SP2 and R2 SP1
  • Windows Vista SP2
  • Windows Server 2003 SP2

You might get an alert about this threat even if you're not using a vulnerable version of the application. This is because we detect when a website or file tries to use the vulnerability, even if it isn't successful.

Alert level: severe
Updated on Apr 11, 2011
Exploit:JS/Objsnapt.E is a detection for a Javascript file that exploits a known vulnerability in the Microsoft Access Snapshot Viewer ActiveX Control described in http://www.microsoft.com/technet/security/advisory/955179.mspx.
Alert level: severe
Updated on Apr 11, 2011
Exploit:JS/Mult.BN is a generic detection of obfuscated malicious code that may be used to exploit vulnerabilities in different software, in order to download and execute arbitrary files from a remote server.
Alert level: severe
Updated on Jan 28, 2014

Microsoft security software detects and removes this family of threats.

You should also update your software to be fully protected.

These threats are part of the Blacole family of malware. For more information, see our Blacole family description.

Alert level: severe
Updated on May 17, 2010
Exploit:HTML/Snapew.gen!A is a generic detection for a malicious HTML Web page that attempts to exploit a vulnerability in Snapshot Viewer for Microsoft Access (Security Advisory 955179 - http://www.microsoft.com/technet/security/advisory/955179.mspx).
Alert level: severe
Updated on May 17, 2010
Exploit:Win32/Apptom.gen is generic detection for an exploit in Microsoft PowerPoint Presentation (.PPS / .PPT) data files. The vulnerability exists in Microsoft Office 2000, XP, 2003 and Mac Office. Opening the exploit on vulnerable systems could install malware onto the local computer.
Alert level: severe
Updated on May 17, 2010
Exploit:Win32/MS06040.gen is a generic detection for malicious software that attempts to exploit a vulnerability in Windows Server Service that can allow the execution of arbitrary code. The vulnerability is referenced in Microsoft Security Bulletin MS06-040 and Microsoft Knowledge Base article KB921883.
Alert level: severe