Threat in context
This exploit targets Internet Explorer 6 through to Internet Explorer 11.
It is described in further detail in Microsoft Security Advisory 2963983.
What is an exploit?
Exploits are written to take advantage of weaknesses (or vulnerabilities) in legitimate software. A project called Common Vulnerabilities and Exposures (CVE) gives each vulnerability a unique number, in this case "CVE-2014-1776".
You can find more information on the CVE website or on our page about exploits.
This exploit can be encountered when you visit a malicious or hacked website that then attempts to download malware onto your PC.
Analysis by Karthik Selvaraj
Alerts from your security software may be the only symptom.