Trojan:JS/Proxas.A
Exploit:JS/CVE-2008-0015
Exploit:JS/Meadgive.A
Microsoft security software detects and removes this threat.
It tries to exploit vulnerabilities in Java and Silverlight to download and run other malware.
Read more about how this threat is being used by cybercriminals in this blog post:
Exploit:HTML/Meadgive.I
Microsoft security software detects and removes this threat.
This threat can use vulnerabilities in Java and Silverlight to download and run other malware.
See the Exploit:JS/Meadgive description for more information.
Read more about how this threat is being used by cybercriminals in this blog post:
Exploit:JS/Sakra.A
Exploit:JS/Sakra.A is file that is part of the Sakura exploit kit. This kit is used to infect your computer with different malware. It acts as a malware distributing platform by compromising websites; if you visit those websites, your computer may become infected with malware. It exploits vulnerabilities in different software to maximize the possibility of infection.
Exploit:JS/Blacole.AD
Exploit:JS/Blacole.AD is a malicious JavaScript that attempts to exploit several vulnerabilities in Adobe Acrobat and Reader. If the exploit is successful in compromising a vulnerable host, it could result in downloading and executing other malware. Exploit:JS/Blacole.AD is a component of an exploit kit that is distributed as the "Blackhole exploit pack".
Exploit:SWF/CVE-2014-1776
Windows Defender detects and removes this threat.
This threat uses a vulnerability in Internet Explorer 6 through to Internet Explorer 11 to download and run files on your PC, including other malware.
The vulnerability is addressed in Microsoft Security Bulletin MS14-021. It is also described in detail in Microsoft Security Advisory 2963983.
It runs when you visit a hacked or malicious website and you have a vulnerable version of Internet Explorer.
Exploit:HTML/Bankfraud
Exploit:HTML/Meloits.A
Exploit:HTML/Repl.B
Exploit:JS/Mult.AF
Exploit:JS/Mult.AI
Exploit:Win32/Pidief.C
Exploit:HTML/Meadgive.AC
Windows Defender detects and removes this threat.
This threat loads a malicious Adobe Flash object in your browser in order to download malware, including ransomware such as Ransom:Win32/Cerber.
You might be redirected to the web page that loads the object without your consent.
The malicious Adobe Flash object exploits the vulnerability described in CVE-2015-8651 and Adobe Security Bulletin APSB16-01.
Note that you might get an alert about this threat even if you're not using a vulnerable version of the application. This is because we detect when a website or file tries to use the vulnerability, even if it isn't successful.
Read more about how this threat is being used by cybercriminals in this blog post:
- Exploit kits remain a cybercrime staple against outdated software – 2016 threat landscape review series
- Ransomware: a declining nuisance or an evolving menace?
- No slowdown in Cerber ransomware activity as 2016 draws to a close
Exploit:JS/Blacole.AR
Exploit:JS/Blacole.AR is the detection for malicious JavaScript that loads a series of other exploits that are distributed as components of the "Blackhole kit". If the computer runs a vulnerable version of certain software and exploitation is successful, various malware may be downloaded.
Exploit:Java/CVE-2011-3544.BU
Exploit:Java/CVE-2011-3544.BU is a detection for the obfuscated Java applet stored within a Java Archive (.JAR) that attempts to exploit a vulnerability in a Java Runtime Environment (JRE) component in Oracle, JAVA SE JDK and JRE 7, 6 update 27 and earlier. The vulnerability, discussed in CVE-2011-3544, allows an unsigned Java applet to gain elevated privileges and potentially have unrestricted access to run arbitrary Java code outside of the "sandbox" environment.
Exploit:Java/Blacole.CY
Exploit:Java/Blacole.CY is malicious Java code that exploits a vulnerability that allows the execution of arbitrary code. The vulnerability is further described in CVE-2010-0840; successful exploitation may lead to remote code execution.
Exploit:JS/Sevdaq.A
Windows Defender detects and removes this threat.
This threat uses a JavaScript vulnerability to check your PC for security software. It then looks for certain information about your computer that might be used in a future attack. It uses the vulnerability described in CVE-2013-7331 to exploit your PC.
It runs when you visit a hacked or malicious website and you have a vulnerable version of Internet Explorer.
You might get an alert about this threat even if you're not using vulnerable software. This is because we detect when a website tries to use the vulnerability, even if it isn't successful.
Exploit:Java/CVE-2013-0422
Windows Defender detects and removes this threat.
This threat uses a Java vulnerability to download and run files on your PC, including other malware.
It runs when you visit a hacked or malicious website and you have a vulnerable version of Java.
The following versions of Java are vulnerable:
- Java Development Kit and Java Runtime Environment 7 Update 10 and earlier
To check if you're running a vulnerable version of Java:
- In Control Panel, double-click Programs.
- If Java is installed you will see it in the list of installed programs. Click it to open the Java Control Panel.
- On the General tab, click About to see which version of Java you have installed.
You may get an alert about this threat even if you're not using a vulnerable version of Java. This is because we detect when a website tries to use the vulnerability, even if it isn't successful.