Skip to main content
Skip to main content
Microsoft Security Intelligence
500 entries found. Displaying page 1 of 25.
Updated on May 01, 2016

Windows Defender detects and removes this family of threats.

You should also update your software to be fully protected.

The Blacole exploit pack tries to infect your PC with other malware, such as trojans and viruses. It also known as "Blackhole".

See our page about exploits and learn how to update common software.

When you visit a malicious or compromised website, Blacole scans your PC for vulnerabilities or weaknesses in your software.

You might visit the website from a link or attachment in an email, or from a previously safe website that has been hacked.

The threat uses those vulnerabilities it has found on your PC to download malware onto your PC:

Typically, the Blacole exploit kit attempts to exploit vulnerabilities in applications such as Oracle Java, Sun Java, Adobe Acrobat and Adobe Reader.

Alert level: severe
Updated on Jul 09, 2015

Windows Defender detects and removes this threat.

This threat uses a JavaScript vulnerability to check your PC for security software. It then looks for certain information about your computer that might be used in a future attack. It uses the vulnerability described in CVE-2013-7331 to exploit your PC.

It runs when you visit a hacked or malicious website and you have a vulnerable version of Internet Explorer.

You might get an alert about this threat even if you're not using vulnerable software. This is because we detect when a website tries to use the vulnerability, even if it isn't successful.

Alert level: severe
Updated on Feb 10, 2015

Windows Defender detects and removes this threat.

This threat uses an Adobe vulnerability to download and run files on your PC, including malware.

It runs when you visit a malicious or hacked website and you have a vulnerable version of Adobe Flash Player.

The following versions of Adobe Flash Player are vulnerable:

  • Adobe Flash Player 16.0.0.287 and earlier versions for Windows and Macintosh
  • Adobe Flash Player 13.0.0.262 and earlier 13.x versions
  • Adobe Flash Player 11.2.202.438 and earlier versions for Linux

If you visit a webpage containing this threat and your PC has a vulnerable version of Flash installed, this threat can download and run other malware.

Find out ways that malware can get on your PC.

Alert level: severe
Updated on Jan 15, 2013

Exploit:JS/Cooexp.A is script contained within an exploit pack known as the "Cool Exploit Kit". It can install arbitrary malware on your computer.

Alert level: severe
Updated on Jan 23, 2012

Exploit:SWF/Heapspray.gen!A is the generic detection for exploits affecting the Adobe Flash Player virtual machine, which use heap-spraying techniques in order to execute exploit code.

This detection may occur when you browse a webpage containing the malicious code.

Alert level: severe
Updated on Feb 27, 2012
Exploit:Java/CVE-2010-0840.OG is an obfuscated Java class that exploits a vulnerability described in CVE-2010-0840. Successful exploitation may lead to the download and execution of arbitrary files within the user's security context. When a user visits a website that contains this malicious Java class using a computer that has a vulnerable version of Sun Java, security checks may be bypassed, which could allow arbitrary code execution.
Alert level: severe
Updated on Nov 02, 2011

Exploit:Java/CVE-2009-3869.R is the detection for malicious Java applets that exploits a stack overflow vulnerability in the Java Runtime Environment (JRE) versions 5 and 6 and described in CVE-2009-3869.

Alert level: severe
Updated on Nov 12, 2011

Exploit:JS/Mult.DY is the detection for infected webpages containing an IFrame that redirects users to a malicious website. The compromised webpages are usually found in websites running a vulnerable version of the osCommerce v2.2 software.

Alert level: severe
Updated on Mar 14, 2012

Exploit:Win32/Pdfjsc.RM is a detection for a PDF file that contains an obfuscated malicious JavaScript that attempts to contact remote hosts in order to download arbitrary files.

Alert level: severe
Updated on Apr 11, 2011
Exploit:Win32/Senglot.J is a generic detection that detects malicious code, often hosted in HTML files, that attempts to download and execute arbitrary files.
Alert level: severe
Updated on Apr 11, 2011
Exploit:Java/ByteVerify.G is a detection of malicious code that attempts to exploit a vulnerability in the Microsoft Virtual Machine (VM). The VM enables Java programs to run on Windows platforms. The Microsoft Java VM is included in most versions of Windows and Internet Explorer.
Alert level: severe
Updated on Apr 11, 2011
Exploit:JS/Usea.A is a detection for a Javascript that detects the UUSee UUUpgrade ActiveX Control 'Update' Method arbitrary file download vulnerability. UUSee is an application designed to allow users to view content such as videos over the Internet.
Alert level: severe
Updated on Apr 11, 2011
Exploit:Win32/Pdfjsc.BK is a detection for specially-crafted PDF files that targets software vulnerabilities in Adobe Acrobat and Adobe Reader.
Alert level: severe
Updated on Apr 11, 2011
Exploit:Win32/Pdfjsc.EM is a detection for specially-crafted PDF files that attempt to exploit software vulnerabilities in Adobe Acrobat and Adobe Reader.
Alert level: severe
Updated on Apr 11, 2011
Exploit:JS/Twooken.A is the detection for a script that exploits a cross-site scripting vulnerability in the website of the Twitter service "twitter.com".
Alert level: severe
Updated on Apr 11, 2011
Exploit:JS/Mult.DA is a detection for obfuscated scripts using a specific JavaScript packer. Scripts detected as Exploit:JS/Mult.DA attempt to exploit the HTML Object Memory Corruption Vulnerability in Internet Explorer. This vulnerability is discussed in, and mitigated using, the Microsoft Security Bulletin MS10-002.
Alert level: severe
Updated on Apr 11, 2011
Exploit:Win32/Pdfheap.A is the detection for a malicious Portable Document Format (PDF) file that attempts to exploit the vulnerability described in CVE-2009-1862.
 
The vulnerability affects Adobe Reader and Acrobat versions 9.1.2 and earlier, and Adobe Flash Player 9.0.159.0 earlier and 10.0.22.87 and earlier. It is caused by the mishandling of Shockwave (SWF) files within a PDF file, and may allow a remote attacker to execute arbitrary code, including downloading and executing malware.
Alert level: severe
Updated on Jun 10, 2011

Exploit:SWF/CVE-2011-2107.A is the detection for specially-crafted Shockwave Flash (.SWF) files that attempt to exploit software vulnerabilities in Adobe Flash Player and Adobe Reader and Acrobat X. The vulnerability is discussed in the following articles:

Alert level: severe
Updated on Jun 14, 2011
Exploit:Win32/Pdfjsc.OJ is a variant of the Exploit:Win32/Pdfjsc family – a specially crafted PDF files that exploits Adobe Acrobat and Adobe Reader vulnerabilities. These files contain malicious JavaScript that exploits the vulnerability and executes the payload when the file is opened. The vulnerability it attempts to exploit is referred as CVE-2010-0188.
Alert level: severe
Updated on Apr 11, 2011
Exploit:Java/CVE-2010-0840.AC is a detection for a malicious Java class that exploits the vulnerability described in CVE-2010-0840. Successful exploitation leads to remote code execution.
Alert level: severe