Exploit:JS/ShellCode.O
JS/ShellCode
Exploit:JS/ShellCode.P
Exploit:SWF/ShellCode.C
Exploit:SWF/ShellCode.C is the detection for a Shockwave Flash (SWF) file that attempts to exploit a software vulnerability in Adobe Acrobat and Adobe Reader that can cause unexpected behavior in the application, and potentially allow an attacker to gain access to the vulnerable computer. The vulnerability is described in the following pages:
Exploit:JS/ShellCode.J
Exploit:JS/ShellCode.Z
Exploit:Win32/ShellCode.gen!B
Exploit:Win32/ShellCode.gen!D
Exploit:Win32/ShellCode.H
Exploit:Win32/ShellCode.G
Exploit:JS/Shellcode.AB
Exploit:JS/ShellCode.AB is a generic detection for JavaScript objects that construct shellcode. These scripts may be embedded within other document files such as specially-crafted .HTML files that are uploaded to certain websites.
Exploit:JS/ShellCode.AL
Exploit:JS/ShellCode.AL is a malicious JavaScript file that downloads and runs arbitrary files when certain vulnerabilities in the browser are exploited, usually by other malware.
Exploit:JS/ShellCode.AH
Exploit:JS/ShellCode.AH is a detection for certain malicious JavaScript code that is embedded within HTML files.
Exploit:JS/ShellCode.AJ
Exploit:JS/ShellCode.AJ is a detection for certain malicious JavaScript code that is embedded within HTML files.
Exploit:JS/ShellCode.AS
Exploit:JS/ShellCode.AS is a detection for JavaScript objects that construct shellcode. These scripts may be embedded within other document files such as specially-crafted .HTML files.
Exploit:SWF/ShellCode.L
Exploit:SWF/ShellCode.L is the detection for a specially-crafted SWF (ShockWave Flash) file that exploits a vulnerability found in Adobe Flash Player prior to version 10.1.85.3. The vulnerability is discussed in detail in the following pages:
Exploit:Win32/ShellCode.gen!C
Windows Defender detects and removes this threat.
Exploit:Win32/ShellCode.gen!C is a generic detection for JavaScript files that have malicious code. Generally, attackers use this malicious code to infect your computer with other malware.
These files are often downloaders which use the malicious code to exploit vulnerabilities in various software.
A vulnerability is like a hole in your software that malware can use (or exploit) to get on your computer. These holes are fixed by installing updates to the vulnerable software; this is why it is extremely important to keep all of the programs on your computer up to date.
See here for information on how to update some software.
As this is a generic detection, we cannot identify the precise files that use this code or the particular exploits that the code uses.
Exploit:JS/ShellCode.gen
Windows Defender detects and removes this threat.
Exploit:JS/Shellcode.gen is a JavaScript-enabled object that does something malicious. Malicious websites and malformed PDF documents may contain JavaScript, which tries to run code without your consent.