Trojan:JS/Proxas.A
Exploit:JS/CVE-2008-0015
Exploit:Win32/Pidief.C
Exploit:HTML/Repl.B
Exploit:JS/Mult.AF
Exploit:JS/Mult.AI
Exploit:JS/Sevdaq.A
Windows Defender detects and removes this threat.
This threat uses a JavaScript vulnerability to check your PC for security software. It then looks for certain information about your computer that might be used in a future attack. It uses the vulnerability described in CVE-2013-7331 to exploit your PC.
It runs when you visit a hacked or malicious website and you have a vulnerable version of Internet Explorer.
You might get an alert about this threat even if you're not using vulnerable software. This is because we detect when a website tries to use the vulnerability, even if it isn't successful.
Exploit:HTML/Bankfraud
Exploit:HTML/Meloits.A
Exploit:Java/CVE-2013-0422
Windows Defender detects and removes this threat.
This threat uses a Java vulnerability to download and run files on your PC, including other malware.
It runs when you visit a hacked or malicious website and you have a vulnerable version of Java.
The following versions of Java are vulnerable:
- Java Development Kit and Java Runtime Environment 7 Update 10 and earlier
To check if you're running a vulnerable version of Java:
- In Control Panel, double-click Programs.
- If Java is installed you will see it in the list of installed programs. Click it to open the Java Control Panel.
- On the General tab, click About to see which version of Java you have installed.
You may get an alert about this threat even if you're not using a vulnerable version of Java. This is because we detect when a website tries to use the vulnerability, even if it isn't successful.
Exploit:Java/CVE-2011-3544
Windows Defender detects and removes this threat.
This threat uses a software vulnerability to download and run other files on your PC, including malware.
It runs when you visit a hacked website and you have a vulnerable version of Java. Legitimate websites can also be hacked to unwillingly host this threat.
Oracle Java SE JDK and JRE 7 and 6 Update 27 and earlier are all vulnerable to this threat.
To check if you're running a vulnerable version of Java:
- Go to the control panel (Select Start then Control Panel)
- Select Programs. If Java is installed you will see it in the list of installed programs. Click it to open the Java Control Panel.
- On the General tab, click About to see which version of Java you have installed.
You may get a detection for this threat when you visit a website that has the malicious code, even if you're not using a vulnerable version of Java. This doesn't mean that you have been compromised, it means an try to compromise your PC has been made.
The vulnerability that this threat exploits is described in CVE-2011-3544.
Exploit:SWF/CVE-2010-1297.A
Windows Defender detects and removes this threat.
This threat uses specially-crafted Shockwave Flash (.swf) files to exploit an Adobe vulnerability to download and run files on your PC, including malware.
It runs when you visit a malicious or hacked website and you have a vulnerable version of Adobe Flash Player.
The following versions of Adobe Flash Player are vulnerable:
- Adobe Flash Player before 9.0.277.0 and 10.x before 10.1.53.64
- Adobe AIR before 2.0.2.12610
- Adobe Reader and Acrobat 9.x before 9.3.3 and 8.x before 8.2.3 on Windows and Mac OS X
If you visit a webpage containing this threat and your PC has a vulnerable version of Flash installed, this threat can download and run other malware.
Exploit:JS/Meadgive.A
Microsoft security software detects and removes this threat.
It tries to exploit vulnerabilities in Java and Silverlight to download and run other malware.
Read more about how this threat is being used by cybercriminals in this blog post:
Exploit:HTML/Meadgive.I
Microsoft security software detects and removes this threat.
This threat can use vulnerabilities in Java and Silverlight to download and run other malware.
See the Exploit:JS/Meadgive description for more information.
Read more about how this threat is being used by cybercriminals in this blog post:
Exploit:SWF/CVE-2014-1776
Windows Defender detects and removes this threat.
This threat uses a vulnerability in Internet Explorer 6 through to Internet Explorer 11 to download and run files on your PC, including other malware.
The vulnerability is addressed in Microsoft Security Bulletin MS14-021. It is also described in detail in Microsoft Security Advisory 2963983.
It runs when you visit a hacked or malicious website and you have a vulnerable version of Internet Explorer.
Exploit:Win32/CVE-2015-2426
Windows Defender detects and removes this threat.
This is a maliciously-constructed Open Type font which is used to exploit the OpenType Font Driver Vulnerability - CVE-2015-2426.
It affects the following Windows versions:
- Windows Vista SP2
- Windows Server 2008 SP2 and R2 SP1
- Windows 7 SP1
- Windows 8
- Windows 8.1
- Windows Server 2012 and R2
- Windows RT 8.1
- Windows 10
Exploit:JS/NeutrinoEK.J
Windows Defender detects and removes this threat.
This threat is a webpage associated with an exploit kit known as Neutrino. You PC is at risk of infection if you visit this webpage and you have vulnerable software installed on your PC. See the JS/NeutrinoEK family description for more information.
It checks what versions of certain popular software you have in your PC. Depending on the software version, it can load malware into your PC that exploits vulnerabilities in the software.
You might be redirected to the malicious webpage without your consent.
Exploit:SWF/CVE-2011-2110.A
Exploit:SWF/CVE-2011-2110.A is a detection for specially-crafted Shockwave Flash (.SWF) files that attempt to exploit software vulnerabilities in Adobe Flash Player and Adobe Reader and Acrobat X.