Trojan:Win32/Chymine.A
Worm:Win32/Stuxnet.B
Exploit:Java/CVE-2008-5353.B
Exploit:Win32/Pdfjsc.FN
Exploit:JS/Pdfjsc.Z
Exploit:JS/Pdfjsc.Z is an obfuscated JavaScript often distributed through compromised websites. It is designed to exploit several vulnerabilities in the web browser.
Exploit:JS/ShellCode.AH
Exploit:JS/ShellCode.AH is a detection for certain malicious JavaScript code that is embedded within HTML files.
Exploit:JS/Blacole.DE
Exploit:JS/Blacole.DE is a variant of JS/Blacole, JavaScript malware that consists of several exploits and is created by the "Blackhole" exploit kit. Exploit:JS/Blacole.DE is installed to compromised websites by an attacker. It attempts to exploit the following CVE vulnerabilities:
Exploit:Win32/Taro.H
Exploit:Java/CVE-2008-5353.DG
Exploit:Win32/Pdfjsc.FU
Exploit:Java/CVE-2009-3869.A
Exploit:Win32/Pdfjsc.HW
Exploit:JS/Belmoo
Exploit:Java/CVE-2008-5353.WW
Exploit:Win32/CVE-2010-2572.A
Exploit:Java/CVE-2010-0840.AL
Exploit:Java/CVE-2010-0094.CY
Exploit:Java/CVE-2010-0840.BJ
Exploit:Java/CVE-2013-0431
Windows Defender detects and removes this threat.
This threat uses a Java vulnerability to download and run files on your PC, including other malware.
It runs when you visit a hacked or malicious website and you have a vulnerable version of Java.
The following versions of Java are vulnerable:
- Java Development Kit, Java Runtime Environment 7 Update 11 and earlier
To check if you're running a vulnerable version of Java:
- Go to the control panel (Select Start then Control Panel)
- Select Programs. If Java is installed you will see it in the list of installed programs. Click it to open the Java Control Panel.
- On the General tab, click About to see which version of Java you have installed.
You might get an alert about this threat even if you're not using a vulnerable version of Java. This is because we detect when a website tries to use the vulnerability, even if it isn't successful.
Exploit:Java/CVE-2010-0840.DW
Exploit:Java/CVE-2010-0840.DW is the detection for a malicious and obfuscated Java class that exploits the vulnerability described in CVE-2010-0840. Successful exploitation may lead to the download and execution of arbitrary files within the user's security context.