Also detected as:
Alerts from your security software may be the only symptom.
detects and removes this threat.
This threat is a webpage that contains code to download malware onto your PC. You might be redirected to this webpage from another, possibly hacked, webpage.
It tries to use vulnerabilities in your software to infect your PC.
You might get an alert about this threat even if you're not using a vulnerable version of Java. This is because we detect when a website tries to use the vulnerability, even if it isn't successful.
See our page about exploits and learn how to update common software.
The following free Microsoft software detects and removes this threat:
Even if we've already detected and removed this particular threat, running a full scan might find other malware that is hiding on your PC.
You can also visit our advanced troubleshooting page or search the Microsoft virus and malware community for more help.
If you’re using Windows XP, see our Windows XP end of support page.
Make sure you install all available Java updates.
You should remove older versions of Java, as keeping old and unsupported versions of Java on your PC is a serious security risk:
If you continue to get alerted about this threat, deleting your temporary Java files can help:
It's also important to keep your other software up to date:
This threat is a component of the Nuclear exploit kit. It is malicious code embedded in an HTML page.
The threat checks to see if your PC is running a vulnerable version of Java or Adobe Reader.
We have seen it try to use the following vulnerabilities:
We have seen the threat hosted on pages at the following URLs:
The landing page might look like the following:
If your PC has vulnerable software installed this threat can download other malware, including:
Take these steps to help prevent infection on your PC.
I want to...
Note: Your feedback is very important to us, however we do not respond to individual submissions through this channel.
If you require support, please visit the
Safety & Security Center.