Skip to main content
Skip to main content
Microsoft Security Intelligence
500 entries found. Displaying page 1 of 25.
Updated on Apr 11, 2011
Trojan:JS/Proxas.A is a detection for JavaScript-enabled objects that exhibit malware behavior. Malicious Web sites and PDF documents may contain such JavaScript code that attempts to execute code without the user's knowledge. An example of other malware that may execute this JavaScript is Exploit:Win32/Pdfjsc.D.
Alert level: severe
Updated on Apr 11, 2011
Exploit:JS/CVE-2008-0015 is the detection for code that attempts to exploit a vulnerability in the Microsoft Video ActiveX Control. This vulnerability is discussed in detail in Microsoft Security Advisory (972890). When a user visits a Web page containing an exploit detected as Exploit:JS/CVE-2008-0015, it may connect to a remote server and download other malware. Currently, we are aware of cases where exploits download and execute Worm:Win32/Dogkild.A on the system.
Alert level: severe
Updated on Sep 13, 2021
Alert level: severe
Updated on Oct 04, 2012

Exploit:JS/Sakra.A is file that is part of the Sakura exploit kit. This kit is used to infect your computer with different malware. It acts as a malware distributing platform by compromising websites; if you visit those websites, your computer may become infected with malware. It exploits vulnerabilities in different software to maximize the possibility of infection.

Alert level: severe
Updated on Jun 22, 2015

Windows Defender detects and removes this threat.

This threat uses a JavaScript vulnerability to check your PC for security software. It then looks for certain information about your computer that might be used in a future attack. It uses the vulnerability described in CVE-2013-7331 to exploit your PC.

It runs when you visit a hacked or malicious website and you have a vulnerable version of Internet Explorer.

You might get an alert about this threat even if you're not using vulnerable software. This is because we detect when a website tries to use the vulnerability, even if it isn't successful.

Alert level: severe
Updated on Mar 21, 2012

Exploit:JS/Blacole.AR is the detection for malicious JavaScript that loads a series of other exploits that are distributed as components of the "Blackhole kit". If the computer runs a vulnerable version of certain software and exploitation is successful, various malware may be downloaded.

Alert level: severe
Updated on Mar 25, 2012

Exploit:Java/CVE-2011-3544.BU is a detection for the obfuscated Java applet stored within a Java Archive (.JAR) that attempts to exploit a vulnerability in a Java Runtime Environment (JRE) component in Oracle, JAVA SE JDK and JRE 7, 6 update 27 and earlier. The vulnerability, discussed in CVE-2011-3544, allows an unsigned Java applet to gain elevated privileges and potentially have unrestricted access to run arbitrary Java code outside of the "sandbox" environment.

Alert level: severe
Updated on Apr 03, 2012

Exploit:Java/Blacole.CY is malicious Java code that exploits a vulnerability that allows the execution of arbitrary code. The vulnerability is further described in CVE-2010-0840; successful exploitation may lead to remote code execution.

Alert level: severe
Updated on Apr 11, 2011
Exploit:HTML/Bankfraud is generic detection for e-mail that contains malicious links or other characteristics indicative of a phishing attack.
Alert level: severe
Updated on Apr 11, 2011
Exploit:HTML/Meloits.A is an HTML exploit of a vulnerability found in Visual Studio 2005 which could allow an attacker to remotely execute arbitrary code on impacted systems. Details on this vulnerability can be found in Microsoft Security Advisory (927709) at  http://www.microsoft.com/technet/security/advisory/927709.mspx
Alert level: severe
Updated on Apr 11, 2011
Exploit:HTML/Repl.B is a malicious JavaScript program embedded inside HTML files which exploits a buffer overflow vulnerability in  RealPlay 10.5 and RealPlay 11 Beta.
Alert level: severe
Updated on Apr 11, 2011
Exploit:JS/Mult.AF is a detection for code that exploits a certain vulnerability in Internet Explorer 7 in order to download and run arbitrary files.
 
Files detected as Exploit:JS/Mult.AF may arrive in the system when a user browses certain sites using a vulnerable version of Internet Explorer. When a webpage that includes Exploit:JS/Mult.AF is loaded, the vulnerability in Internet Explorer is exploited.
 
Microsoft strongly recommends that users refer to the workarounds specified in Microsoft Security Advisory (961051) immediately.
Alert level: severe
Updated on Apr 11, 2011
Exploit:JS/Mult.AI is a detection for code that exploits a certain vulnerability in Internet Explorer 7 in order to download and run arbitrary files.
 
Files detected as Exploit:JS/Mult.AI may arrive in the system when a user browses certain sites using a vulnerable version of Internet Explorer. When a webpage that includes Exploit:JS/Mult.AI is loaded, the vulnerability in Internet Explorer is exploited.
 
Microsoft strongly recommends that users refer to the workarounds specified in Microsoft Security Advisory (961051) immediately.
Alert level: severe
Updated on Apr 11, 2011
Exploit:Win32/Pidief.C is a detection for an exploit that targets a Portable Document Format (PDF) vulnerability. The critical vulnerability could result in the installation of additional malware when a malicious PDF document is opened using Adobe Reader version 9, or earlier.
Alert level: severe
Updated on Oct 21, 2012

Java/Blacole.GN is a detection for a component of the Blackhole exploit kit - a kit used by attackers to distribute malware. Attackers install the kit onto a server, and then when you visit the compromised server, the kit attempts to exploit various, multiple vulnerabilities on your computer in order to install malware. For example, if you browsed a compromised website containing the exploit pack using a vulnerable computer, malware could be downloaded and installed onto your computer.

Typically, the Blackhole exploit kit attempts to exploit vulnerabilities in applications such as Oracle Java, Sun Java, Adobe Acrobat and Adobe Reader.

For more information on this exploit kit, and steps you can take to avoid being compromised, please see the detailed Blacole description, elsewhere in our encyclopedia.

Alert level: severe
Updated on Oct 30, 2012

Exploit:Java/CVE-2012-0507.ANG is a malicious Java applet that attempts to exploit a vulnerability (CVE-2012-0507) in the Java Runtime Environment (JRE) in order to download and install files of an attacker’s choice onto your computer.

If you visit a website containing the malicious code while using a vulnerable version of Java, the exploit is loaded. It then attempts to download and execute files from a remote host/URL; the files that are downloaded and executed could include additional malware.

The following versions of Java are vulnerable to this exploit:

  • JDK and JRE 7 Update 2 and earlier Java SE
  • JDK and JRE 6 Update 30 and earlier Java SE
  • JDK and JRE 5.0 Update 33 and earlier Java SE
  • SDK and JRE 1.4.2_35 and earlier Java SE
  • JavaFX 2.0.2 and earlier JavaFX
Alert level: severe
Updated on Nov 20, 2012

Exploit:JS/BlacoleJQ is a detection for a component of the Blackhole exploit kit - a kit used by attackers to distribute malware. Attackers install the kit onto a server, and then when you visit the compromised server, the kit attempts to exploit various, multiple vulnerabilities on your computer in order to install malware. For example, if you browsed a compromised website containing the exploit pack using a vulnerable computer, malware could be downloaded and installed onto your computer.

Typically, the Blackhole exploit kit attempts to exploit vulnerabilities in applications such as Oracle Java, Sun Java, Adobe Acrobat and Adobe Reader.

For more information on this exploit kit, and steps you can take to avoid being compromised, please see the detailed Blacole description, elsewhere in our encyclopedia.

Alert level: severe
Updated on May 12, 2022
Alert level: severe
Updated on May 07, 2012
Exploit:Java/CVE-2012-0507.Q!dr is a malicious Java class component that, in combination with Exploit:Java/CVE-2012-0507.Q attempts to exploit a vulnerability in the Java Runtime Environment (JRE) in order to download and install files of an attacker's choice onto your computer. Versions up to and including version 7 update 2, version 6 update 30 and version 5 update 33 of the JRE are vulnerable to this exploit. The vulnerability is described further in CVE-2012-0507.
Alert level: severe
Updated on Nov 09, 2011

Exploit:Java/Blacole.D is a Java Class module that is included in a JAR file. It is part of the 'Blackhole' exploit kit, described in CVE-2010-0840.

Alert level: severe