Exploit:JS/Coolex.D
Windows Defender detects and removes this threat.
Exploit:JS/Coolex.D is script contained within an exploit pack known as the "Cool exploit kit". It can install arbitrary malware on your computer through exploiting software vulnerabilities in Java version 7, update 17 and earlier.
As the Cool exploit kit and the Blacole exploit kit share malicious web page patterns and exploits, in some instances you might see Exploit:JS/Blacole detected on your computer alongside Exploit:JS/Coolex.D.
Exploit:Java/Blacole.D
Exploit:Java/Blacole.D is a Java Class module that is included in a JAR file. It is part of the 'Blackhole' exploit kit, described in CVE-2010-0840.
Exploit:Java/Blacole.W
Exploit:Java/Blacole.W is the detection for the Java class module included in "worms.jar" that is part of the "Blackhole" exploit pack. The file "worms.jar" is an applet that exploits the vulnerability in Java Runtime Environment described in CVE-2010-0840.
Exploit:Java/CVE-2011-3544.A
Exploit:Java/CVE-2011-3544.A is a malicious Java applet stored within a Java Archive (.JAR) file. It attempts to exploit a vulnerability in the Java Runtime Environment (JRE) component in Oracle JAVA SE JDK and JRE 7, 6 Update 27 and earlier. The vulnerability allows an unsigned Java applet to gain elevated privileges and potentially have unrestricted access to run arbitrary Java code outside of the "sandbox" environment.
More information about the vulnerability is available in the following articles:
Exploit:JS/Blacole.AD
Exploit:JS/Blacole.AD is a malicious JavaScript that attempts to exploit several vulnerabilities in Adobe Acrobat and Reader. If the exploit is successful in compromising a vulnerable host, it could result in downloading and executing other malware. Exploit:JS/Blacole.AD is a component of an exploit kit that is distributed as the "Blackhole exploit pack".
Exploit:Java/CVE-2012-5076.GAA
Exploit:Java/CVE-2012-5076.GAA is a malicious Java applet that attempt to exploit a vulnerability (CVE-2012-5076) in the Java Runtime Environment (JRE) in order to download and install files of an attacker’s choice onto your computer.
If you visit a website containing the malicious code while using a vulnerable version of Java, Exploit:Java/CVE-2012-5076.GAA is loaded. It then attempts to download and execute files from a remote host/URL; the files that are downloaded and executed could include additional malware.
The following versions of Java are vulnerable to this exploit:
JDK and JRE 7 Update 7 and earlier
Steps you can take
The nature of this threat means that you may need to take some steps to prevent being vulnerable from this, and similar exploits. We suggest you:
For detailed information about these steps, please see the Additional removal instructions below.
Exploit:JS/Colkit.A
Microsoft security software detects and removes this threat.
This malicious JavaScript code can use vulnerable versions of Java, Adobe Reader, and Adobe Flash to load other malware onto your computer.
You can be infected with this threat if you visit a malicious or compromised webpage.
Exploit:JS/NeutrinoEK.J
Windows Defender detects and removes this threat.
This threat is a webpage associated with an exploit kit known as Neutrino. You PC is at risk of infection if you visit this webpage and you have vulnerable software installed on your PC. See the JS/NeutrinoEK family description for more information.
It checks what versions of certain popular software you have in your PC. Depending on the software version, it can load malware into your PC that exploits vulnerabilities in the software.
You might be redirected to the malicious webpage without your consent.
Exploit:Java/CVE-2013-0422
Windows Defender detects and removes this threat.
This threat uses a Java vulnerability to download and run files on your PC, including other malware.
It runs when you visit a hacked or malicious website and you have a vulnerable version of Java.
The following versions of Java are vulnerable:
- Java Development Kit and Java Runtime Environment 7 Update 10 and earlier
To check if you're running a vulnerable version of Java:
- In Control Panel, double-click Programs.
- If Java is installed you will see it in the list of installed programs. Click it to open the Java Control Panel.
- On the General tab, click About to see which version of Java you have installed.
You may get an alert about this threat even if you're not using a vulnerable version of Java. This is because we detect when a website tries to use the vulnerability, even if it isn't successful.
Exploit:HTML/Bankfraud
Exploit:HTML/Meloits.A
Exploit:HTML/Repl.B
Exploit:JS/Mult.AF
Exploit:JS/Mult.AI
Exploit:SWF/CVE-2014-1776
Windows Defender detects and removes this threat.
This threat uses a vulnerability in Internet Explorer 6 through to Internet Explorer 11 to download and run files on your PC, including other malware.
The vulnerability is addressed in Microsoft Security Bulletin MS14-021. It is also described in detail in Microsoft Security Advisory 2963983.
It runs when you visit a hacked or malicious website and you have a vulnerable version of Internet Explorer.
Exploit:Win32/Pidief.C
Exploit:JS/CVE-2008-0015
Exploit:JS/Meadgive.A
Microsoft security software detects and removes this threat.
It tries to exploit vulnerabilities in Java and Silverlight to download and run other malware.
Read more about how this threat is being used by cybercriminals in this blog post:
Exploit:HTML/Meadgive.I
Microsoft security software detects and removes this threat.
This threat can use vulnerabilities in Java and Silverlight to download and run other malware.
See the Exploit:JS/Meadgive description for more information.
Read more about how this threat is being used by cybercriminals in this blog post: