We're gradually updating threat actor names in our reports to align with the new weather-themed taxonomy. Learn about Microsoft threat actor names
Exploit:HTML/CVE-2014-1776
Aliases: No associated aliases
Summary
Windows Defender detects and removes this threat.
This threat uses a vulnerability in Internet Explorer 6 through to Internet Explorer 11 to download and run files on your PC, including other malware.
The vulnerability is addressed in Microsoft Security Bulletin MS14-021. It is also described in detail in Microsoft Security Advisory 2963983.
It runs when you visit a hacked or malicious website and you have a vulnerable version of Internet Explorer.
The following free Microsoft software detects and removes this threat:
- Microsoft Defender Antivirus for Windows 10 and Windows 8.1, or Microsoft Security Essentials for Windows 7 and Windows Vista
- Microsoft Safety Scanner
Even if we've already detected and removed this particular threat, running a full scan might find other malware that is hiding on your PC.
Apply updates to Internet Explorer
Updates for this vulnerability should be automatically downloaded and installed on your PC. If you have disabled automatic updates or want to manually update, see the following:
Get more help
You should make sure the software on your PC is up to date:
You can also visit our advanced troubleshooting page or search the Microsoft virus and malware community for more help.
See the following for more information on this vulnerability: