Skip to main content
Skip to main content
Microsoft Security Intelligence
500 entries found. Displaying page 1 of 25.
Updated on Apr 11, 2011
Trojan:Win32/Clort.A!exploit is a trojan that exploits computers that have not applied Security Bulletin MS08-067.
Also detected as: Exploit.Win32.MS08-067.a(Kaspersky),Exploit-MS08-067(McAfee),Win32/Exploit.MS08-067.A(ESET)
Alert level: severe
Updated on Oct 07, 2008
Alert level: severe
Updated on Aug 31, 2020
Alert level: high
Updated on Oct 07, 2008
Alert level: severe
Updated on Dec 01, 2020
Alert level: severe
Updated on Apr 19, 2021
Alert level: severe
Updated on May 06, 2011

Exploit:Win32/CVE-2010-3962.B is the detection for a Javascript that attempts to exploit a vulnerability in Internet Explorer.

Also detected as: Win32/CVE-2010-3962!exploit(CA),Exploit.JS.Agent.ben(Kaspersky),Trojan.Exploit.HTML.Agent.Z(BitDefender)
Alert level: severe
Updated on Apr 11, 2011
Exploit:JS/ShellCode.Z is a generic detection for JavaScript objects that construct shellcode. These scripts may be embedded within other document files such as specially-crafted .PDF files, for example.
 
This detection also includes malicious JavaScript that attempts to exploit an uninitialized memory corruption vulnerability (CVE-2010-0806) that allows the execution of arbitrary code. Microsoft released Microsoft Security Bulletin MS10-018 to mitigate this vulnerability.
Also detected as: JS/CVE-2008-0015!exploit(CA),Trojan.JS.BOFExploit(Sunbelt Software),Exploit-CVE2010-0806(McAfee)
Alert level: severe
Updated on Sep 22, 2011
Exploit:Java/CVE-2010-0840.BS is the detection for a malicious Java applet trojan that exploits the vulnerability described in CVE-2010-0840.
Also detected as: Java/CVE-2010-0840!Exploit(CA)
Alert level: severe
Updated on Sep 20, 2015

Windows Defender detects and removes this threat.

This threat uses a Java vulnerability (CVE-2013-1493) to download and run files on your PC, including other malware.

It runs when you visit a hacked or malicious website and if you have a vulnerable version of Java.

The following versions of Java are vulnerable:

  • Oracle Java JDK and JRE 7 Update 15 and earlier
  • Oracle Java JDK and JRE 6 Update 41 and earlier
  • Oracle Java JDK and JRE 5 Update 40 and earlier

To check if you're running a vulnerable version of Java:

  1. In Control Panel, double-click Programs.
  2. If Java is installed you will see it in the list of installed programs. Click it to open the Java Control Panel.
  3. On the General tab, click About to see which version of Java you have installed.

You might get an alert about this threat even if you're not using a vulnerable version of Java. This is because we detect when a website tries to use the vulnerability, even if it isn't successful. This doesn't mean that you have been hacked; it means someone has tried to hack into your PC.

Find out ways that malware can get on your PC.

Also detected as: Java/CVE_2013_1493.NT!exploit(other),Exploit.Java.CVE-2013-1493.gen(Kaspersky),Exploit-FHV!CVE2013-1493(McAfee)
Alert level: severe
Updated on Feb 09, 2012

Exploit:Win32/Pdfjsc.YQ is a specially-crafted Portable Document File (PDF), which exploits vulnerabilities in Adobe Acrobat and Adobe Reader discussed in the following articles:

Also detected as: Script/PDF.Exploit(AVG),Exploit.JS.Pdfka.fkf(Kaspersky),Exploit-PDF.ra.gen(McAfee)
Alert level: severe
Updated on May 17, 2010
Exploit:Win32/Pdfjsc.gen!A is a generic detection of malformed PDF files that target various Adobe Acrobat and Reader vulnerabilities. Once the malformed PDF files are opened by vulnerable versions of Adobe Acrobat and Reader, the embedded JavaScript loads the exploit. The exploit may successfully execute arbitrary code of the attacker's choice, however, it is often used to download and execute additional malware on the affected computer.
Also detected as: PDF/Exploit(AhnLab),Exploit.JS.Pdfka.ama(Kaspersky),Bloodhound.Exploit.196(Symantec)
Alert level: severe
Updated on Apr 11, 2011
Exploit:JS/Pdfjsc.JU is a detection for specially-crafted PDF files that attempt to exploit software vulnerabilities in Adobe Acrobat and Adobe Reader. Once the malformed PDF files are opened by vulnerable versions of Adobe Acrobat and Reader, the embedded JavaScript is executed and loads the exploit.
Also detected as: PDF/Exploit(AhnLab),Exploit-PDF.bh(McAfee),JS/Exploit.Pdfka.AXX(ESET)
Alert level: severe
Updated on Dec 28, 2011

Exploit:Win32/Pdfjsc.YP is a specially-crafted Portable Document Format (PDF) file that exploits a vulnerability in Adobe Acrobat and Adobe Reader described in the following articles:

Also detected as: PDF.Exploit(Ikarus),Exploit.JS.Pdfka.fhr(Kaspersky),Exploit.JS.Pdfka.fhr(Kaspersky)
Alert level: severe
Updated on Jan 10, 2012

Exploit:JS/Blacole.AV is a malicious JavaScript that attempts to exploit several vulnerabilities in Adobe Acrobat and Reader. If the exploit is successful in compromising a vulnerable host, it could result in downloading and executing other malware.

Also detected as: Script/PDF.Exploit(AVG),Exploit.JS.Pdfka.dcu(Kaspersky),JS/Exploit.Pdfka.OOE.Gen(ESET)
Alert level: severe
Updated on Apr 11, 2011
Exploit.Win32.Pdfjsc.BI is a detection for specially-crafted PDF files that attempt to exploit software vulnerabilities in Adobe Acrobat and Adobe Reader. This vulnerability allow remote code execution when a malformed PDF document is opened using vulnerable versions of Adobe Reader and Acrobat.
Also detected as: PDF/Exploit(AhnLab),Exploit.Win32.Pidief.bgr(Kaspersky),Exploit-PDF.q.gen(McAfee)
Alert level: severe
Updated on Apr 11, 2011
Exploit:Win32/Pdfjsc.FO is the detection for a malicious PDF file that, when opened with a certain version of Adobe Acrobat or Reader, tries to execute a malicious batch script.
Also detected as: PDF/POS!exploit(CA),Exploit-PDF.ck(McAfee),Exploit/PDF(Panda)
Alert level: severe
Updated on Apr 11, 2011
Exploit:Win32/Pidief.IP is a detection for specially-crafted PDF files that target a software vulnerability in Adobe Acrobat and Adobe Reader. The vulnerability exploited by this malware is referenced by the Common Vulnerabilities and Exposures (CVE) Identifier CVE-2010-2883.
Also detected as: PDF/CVE-2010-2883.A!exploit(CA),Exploit.Win32.CVE-2010-2883.a(Kaspersky),Exploit-PDF.q.gen!stream(McAfee)
Alert level: severe
Updated on Apr 11, 2011
Exploit:Win32/Pidief.BN is a detection for specially-crafted PDF files that target a software vulnerability in Adobe Acrobat and Adobe Reader referenced by Common Vulnerabilities and Exposures (CVE) Identifier CVE-2010-0188. Successful exploitation of the vulnerability could result in the malware downloading and executing arbitrary files.
Also detected as: PDF/Exploit(AhnLab),Exploit.Win32.Pidief.ddl(Kaspersky),PDF/Exploit.Pidief.PDS.Gen(ESET)
Alert level: severe
Updated on Apr 11, 2011
An Exploit:Win32/MS06-070 detection signifies exploit code related to a vulnerability found in the Workstation service. Successful exploit of this vulnerability could allow an attacker to remotely execute arbitrary code on impacted systems. Details on the vulnerability, the security update, and recommended workarounds for those unable to immediately install the recommended security update can be found in Microsoft Security Bulletin MS06-070 at http://www.microsoft.com/technet/security/Bulletin/MS06-070.mspx.
Also detected as: Win32/MS06-070!exploit(CA),Exploit-DcomRpc.gen(McAfee),Exploit.APT(AVG)
Alert level: severe