Trojan:Win32/Chymine.A
Worm:Win32/Stuxnet.B
Exploit:Java/CVE-2008-5353.B
Exploit:Win32/Pdfjsc.FN
Exploit:HTML/Pangimop.C
Windows Defender detects and removes this threat.
It uses vulnerabilities in recent versions of Adobe Flash Player and Java to install malware on your PC.
You might get this threat if you visit a malicious or hacked website, or by clicking a malicious link in an email.
Exploit:JS/Neclu.P
Windows Defender detects and removes this threat.
This threat is a webpage that contains code to download malware onto your PC. You might be redirected to this webpage from another, possibly hacked, webpage.
It tries to use vulnerabilities in your software to infect your PC.
You might get an alert about this threat even if you're not using a vulnerable version of Java. This is because we detect when a website tries to use the vulnerability, even if it isn't successful.
See our page about exploits and learn how to update common software.
Exploit:HTML/Fiexp.G
Windows Defender detects and removes this threat.
The threat is a webpage that tries to exploit vulnerabilities in software on your PC. It can then try to download other malware.
It tries to exploit vulnerabilities in the following software:
- Java
- Adobe Flash Player
- Adobe Acrobat Reader
- Microsoft Silverlight
- Internet Explorer.
Members of the Fiexp family belong to the exploit kit called Fiesta.
See the family description for HTML/Fiexp and our page on exploits for more information.
This threat might get into your PC if you visit a hacked or malicious website.
Exploit:Win32/Pdfjsc.FU
Exploit:Win32/Taro.H
Exploit:Java/CVE-2008-5353.DG
Exploit:Java/CVE-2009-3869.A
Exploit:Win32/Pdfjsc.HW
Exploit:JS/Belmoo
Exploit:Java/CVE-2008-5353.WW
Exploit:Win32/CVE-2010-2572.A
Exploit:Java/CVE-2010-0840.AL
Exploit:Java/CVE-2010-0840.BJ
Exploit:Java/CVE-2010-0094.CY
Exploit:HTML/Sevdaq.C
Windows Defender detects and removes this threat.
This threat uses a JavaScript vulnerability to check your PC for security software. It then looks for certain information about your computer that might be used in a future attack. It uses the vulnerability described in CVE-2013-7331 to exploit your PC.
It runs when you visit a hacked or malicious website and you have a vulnerable version of Internet Explorer.
You might get an alert about this threat even if you're not using vulnerable software. This is because we detect when a website tries to use the vulnerability, even if it isn't successful.
See the Exploit:JS/Sevdaq family description for more information.
Exploit:HTML/Fashack.B
Windows Defender detects and removes this threat.
This threat uses vulnerabilities in Adobe Flash Player, Oracle Java and Silverlight to install malware on your PC.
You might encounter it when you visit compromised or malicious websites.