Skip to main content
Skip to main content
Microsoft Security Intelligence
500 entries found. Displaying page 1 of 25.
Updated on Apr 11, 2011
TrojanDropper:Win32/Ilomo is a trojan that drops another malware, detected as Trojan:Win32/Ilomo.gen!A, in the system. In the wild, this trojan has been observed to be installed by Javascript malware, such as Exploit:JS/Mult.K.
Alert level: severe
Updated on Apr 11, 2011
TrojanDownloader:HTML/Iframe.F is the detection for HTML files that are loaded when a user visits certain websites. These may be found in webpages from servers that have been compromised by SQL injection attacks.
Alert level: severe
Updated on Apr 11, 2011
Exploit:JS/Pdfupf.A is a detection for Javascript code that tries to exploit a vulnerability in Adobe Acrobat and Adobe Reader.
Alert level: severe
Updated on Apr 11, 2011
Exploit:Win32/Pidief.B is a detection for an exploit that targets a Portable Document Format (PDF) vulnerability. The critical vulnerability could result in the installation of additional malware when a malicious PDF document is opened using Adobe Reader version 9, or earlier.
Alert level: severe
Updated on Apr 11, 2011
Exploit:JS/Pdfcmi.C is a detection for a specially crafted JavaScript code, embedded in a malformed Portable Document Format (PDF) file, that attempts to exploit a buffer overflow vulnerability (CVE-2007-5659) in Adobe Reader version 8.1.1, and earlier.
Alert level: severe
Updated on Apr 11, 2011
Exploit:JS/Mult.BB is a detection for obfuscated shellcode embedded in a Javascript file. It may be embedded in Web pages or PDF files. It attempts to exploit various vulnerabilities, for example, certain ones in Adobe Acrobat/Reader or those resolved by the Microsoft MS06-057 and MS06-014 security updates.
 
Files detected as Exploit:JS/Mult.BB may perform any number of malicious actions, such as downloading other malware.
Alert level: severe
Updated on Apr 11, 2011
Exploit:JS/Elecom.D is a detection for shellcode used to exploit a vulnerability in Internet Explorer that may allow arbitrary code execution without a user's permission.
 
For more information on the vulnerability, please see the following advisories:
Alert level: severe
Updated on Feb 21, 2016

Windows Defender detects and removes this threat.

This is a generic detection for specially formed IFrame tags pointing to webpages that have malicious content.

Find out ways that malware can get on your PC.

Alert level: severe
Updated on Sep 20, 2015

Windows Defender detects and removes this threat.

This threat uses a Java vulnerability (CVE-2013-1493) to download and run files on your PC, including other malware.

It runs when you visit a hacked or malicious website and if you have a vulnerable version of Java.

The following versions of Java are vulnerable:

  • Oracle Java JDK and JRE 7 Update 15 and earlier
  • Oracle Java JDK and JRE 6 Update 41 and earlier
  • Oracle Java JDK and JRE 5 Update 40 and earlier

To check if you're running a vulnerable version of Java:

  1. In Control Panel, double-click Programs.
  2. If Java is installed you will see it in the list of installed programs. Click it to open the Java Control Panel.
  3. On the General tab, click About to see which version of Java you have installed.

You might get an alert about this threat even if you're not using a vulnerable version of Java. This is because we detect when a website tries to use the vulnerability, even if it isn't successful. This doesn't mean that you have been hacked; it means someone has tried to hack into your PC.

Find out ways that malware can get on your PC.

Alert level: severe
Updated on Jan 23, 2012

Exploit:Java/CVE-2010-0840.NT is a malicious Java applet that exploits a vulnerability of privilege escalation in JRE (Java Runtime Environment) versions 5 and 6 as described in CVE-2010-0840. The Java exploit is a component of the "Blackhole" exploit pack and is hosted on compromised web sites.

Alert level: severe
Updated on Feb 09, 2012

Exploit:Win32/Pdfjsc.YQ is a specially-crafted Portable Document File (PDF), which exploits vulnerabilities in Adobe Acrobat and Adobe Reader discussed in the following articles:

Alert level: severe
Updated on May 12, 2022
Alert level: severe
Updated on Mar 20, 2014

Windows Defender detects and removes this threat.

This threat is on a website that downloads malware onto your PC. You might be redirected to this website when you visit a hacked webpage.

It tries to use vulnerabilities in your software to infect your PC.

You may get an alert about this threat even if you're not using a vulnerable version of Java. This is because we detect when a website tries to use the vulnerability, even if it isn't successful.

See our page about exploits and learn how to update common software.

Alert level: severe
Updated on Aug 21, 2014

Windows Defender detects and removes this threat.

This threat uses a vulnerability in your software to download other malware.

It runs when you visit a hacked website and you have a vulnerable version of Java installed on your PC. A number of legitimate websites could be hacked or unwillingly host this threat.

The following versions of Java are vulnerable:

  • Oracle Java SE and Java for Business 6 Update 18 and earlier

To check if you're running a vulnerable version of Java:

  1. Go to the control panel (Select Start then Control Panel)
  2. Select Programs. If Java is installed you will see it in the list of installed programs. Click it to open the Java Control Panel.
  3. On the General tab, click About to see which version of Java you have installed.

You might get a detection for this threat if you visit a website that has the malicious code, even if you're not using a vulnerable version of Java. This doesn't mean that you have been hacked; it means someone has tried to hack into your PC.

The vulnerability that this threat exploits is described in CVE-2010-0840.

Find out ways that malware can get on your PC.

Alert level: severe
Updated on Jul 11, 2014

Windows Defender detects and removes this threat.

This threat is on a website that downloads malware onto your PC. You might be redirected to this website when you visit a hacked webpage.

It tries to use vulnerabilities in your software to infect your PC.

You might get an alert about this threat even if you're not using a vulnerable version of Java. This is because we detect when a website tries to use the vulnerability, even if it isn't successful.

See our page about exploits and learn how to update common software.

Find out ways that malware can get on your PC.

Alert level: severe
Updated on Jan 28, 2013

Exploit:Win32/Pdfjsc.AFE is a malicious PDF file that exploits a vulnerability in Adobe Acrobat and Adobe Reader.

The vulnerabilities, discussed in CVE-2010-0188, allow this malware to download and run arbitrary files.

The following versions of Adobe Acrobat and Adobe Reader are vulnerable to this exploit:

  • Adobe Acrobat and Adobe Reader earlier than 8.2.1
  • Adobe Acrobat and Adobe Reader earlier than 9.3.1
Install updates to prevent infection

This malware exploits known vulnerabilities.

You should always install the latest updates available from the software vendor to prevent reinfection from this threat, and possible infection from other threats.

Download updates for Adobe products from the following link:

Alert level: severe
Updated on Feb 04, 2013

Exploit:Java/CVE-2013-0422.B is a variant of the Exploit:Java/CVE-2013-0422 family of exploits; malicious Java applets that attempt to exploit a vulnerability (CVE-2013-0422) the Java Runtime Environment (JRE), in order to download and install files of an attacker’s choice onto your computer.

If you visit a website containing the malicious code while using a vulnerable version of Java, the exploit is loaded. Note, however, that a number of legitimate websites could be compromised or unwillingly host a malicious applet through advertising frames which could redirect to or host a malicious Java applet.

Update vulnerable Java applications

This threat exploits a known vulnerability in Java. After removing this threat, make sure that you install the updates available from the vendor. You can read more about this vulnerability in Java, as well as where to download the software update from the following links:

It may be necessary to remove older versions of Java that are still present. Keeping old and unsupported versions of Java on your system presents a serious security risk. To read more about why you should remove older versions of Java, see the following information.

Alert level: severe
Updated on Feb 05, 2013

Exploit:Win32/Pdfjsc.AGC is a malicious PDF file that exploits a vulnerability in Adobe Acrobat and Adobe Reader.

The vulnerabilities, discussed in CVE-2010-0188, allow this malware to download and run arbitrary files.

The following versions of Adobe Acrobat and Adobe Reader are vulnerable to this exploit:

  • Adobe Acrobat and Adobe Reader earlier than 8.2.1
  • Adobe Acrobat and Adobe Reader earlier than 9.3.1
Install updates to prevent infection

This malware exploits known vulnerabilities.

You should always install the latest updates available from the software vendor to prevent reinfection from this threat, and possible infection from other threats.

Download updates for Adobe products from the following link:

Alert level: severe
Updated on Aug 09, 2010
Exploit:JS/Pdfjsc.GD is a detection for specially-crafted PDF files that attempt to exploit software vulnerabilities in Adobe Acrobat and Adobe Reader.
Alert level: severe
Updated on Apr 11, 2011
Exploit:JS/ShellCode.Z is a generic detection for JavaScript objects that construct shellcode. These scripts may be embedded within other document files such as specially-crafted .PDF files, for example.
 
This detection also includes malicious JavaScript that attempts to exploit an uninitialized memory corruption vulnerability (CVE-2010-0806) that allows the execution of arbitrary code. Microsoft released Microsoft Security Bulletin MS10-018 to mitigate this vulnerability.
Alert level: severe