We're gradually updating threat actor names in our reports to align with the new weather-themed taxonomy. Learn about Microsoft threat actor names
Exploit:JS/ActiveXComponent
Aliases: Exploit_Gen.JFA (Norman) TR/ActiveX.Exploit (Avira) Exploit.Applet.ActiveXComponent (BitDefender) Trojan.AppActXComp (Dr.Web) Exploit.JS.ActiveXComponent (Ikarus) Exploit.JS.ActiveXComponent (Kaspersky) JS/Except-Fam (Sophos) JS.Exception.Exploit (Symantec)
Summary
Exploit:JS/ActiveXComponent is a JavaScript that exploits the vulnerability described in CVE-2000-1061 to run arbitrary code.
To detect and remove this threat and other malicious software that may be installed on your computer, run a full-system scan with an appropriate, up-to-date, security solution. The following Microsoft products detect and remove this threat:
- Microsoft Security Essentials or, for Windows 8, Windows Defender
- Microsoft Safety Scanner
Additional removal instructions
This threat may make lasting changes to a computer's configuration that are NOT restored by detecting and removing this threat. For more information on returning an infected computer to its pre-infected state, please see the following articles:
- This threat may be present in your Temporary Internet Files folder. We recommend that you delete your temporary Internet files to prevent the persistent detection of this threat from within the Temporary Internet Files folder. To delete the temporary Internet files from Internet Explorer, refer to KB Article 260897.
- This threat may change your Internet Explorer Home Page. To change it back to your own setting, refer to these articles: