Skip to main content
Skip to main content
Microsoft Security Intelligence
387 entries found. Displaying page 1 of 20.
Updated on Apr 11, 2011
Exploit:JS/ShellCode.P is a generic detection for JavaScript objects that construct shellcode. These scripts may be embedded within other document files such as specially-crafted .html files, for example.
Alert level: severe
Updated on Apr 11, 2011
JS/Shellcode is a detection for JavaScript-enabled objects that contain exploit code and may exhibit suspicious behavior. Malicious websites and malformed PDF documents may contain JavaScript which attempts to execute code without the affected user's consent.
Alert level: severe
Updated on Apr 11, 2011
Exploit:JS/ShellCode.P is a generic detection for JavaScript objects that construct shellcode. These scripts may be embedded within other document files such as specially-crafted .html files, for example.
Alert level: severe
Updated on Jul 20, 2011

Exploit:SWF/ShellCode.C is the detection for a Shockwave Flash (SWF) file that attempts to exploit a software vulnerability in Adobe Acrobat and Adobe Reader that can cause unexpected behavior in the application, and potentially allow an attacker to gain access to the vulnerable computer. The vulnerability is described in the following pages:

Alert level: severe
Updated on Apr 11, 2011
Exploit:JS/ShellCode.J is a generic detection for JavaScript objects that construct shellcode. These scripts may be embedded within other document files such as specially-crafted .PDF files, for example.
 
This detection also includes malicious JavaScript that attempts to exploit an uninitialized memory corruption vulnerability (CVE-2010-0806) that allows the execution of arbitrary code. Microsoft released Microsoft Security Bulletin MS10-018 to mitigate this vulnerability.
Alert level: severe
Updated on Apr 11, 2011
Exploit:JS/ShellCode.Z is a generic detection for JavaScript objects that construct shellcode. These scripts may be embedded within other document files such as specially-crafted .PDF files, for example.
 
This detection also includes malicious JavaScript that attempts to exploit an uninitialized memory corruption vulnerability (CVE-2010-0806) that allows the execution of arbitrary code. Microsoft released Microsoft Security Bulletin MS10-018 to mitigate this vulnerability.
Alert level: severe
Updated on Apr 11, 2011
Exploit:Win32/ShellCode.gen!B is a generic detection for files that have malicious shellcode. These shellcodes may be found within other types of files such as documents, for example, specially-crafted PDF files.
Alert level: severe
Updated on Apr 11, 2011
Exploit:Win32/ShellCode.gen!D is a generic detection for files that contain a malicious shellcode.
It has been observed that files typically detected as Exploit:Win32/ShellCode.gen!D exploit the vulnerability addressed by Microsoft Security Bulletin MS11-002.
Alert level: severe
Updated on Apr 11, 2011
Exploit:Win32/Shellcode.H is a detection for files that contain a malicious shellcode. These shellcodes may be found within data files, such as documents or spreadsheets (workbooks), in which a heapspray technique is used to exploit a vulnerability resulting in running the shellcode.
Alert level: severe
Updated on Apr 11, 2011
Exploit:Win32/Shellcode.G is a detection for files that contain a malicious shellcode. These shellcodes may be found within data files, such as documents or spreadsheets (workbooks), in which a heapspray technique is used to exploit a vulnerability resulting in running the shellcode.
Alert level: severe
Updated on Nov 22, 2011

Exploit:JS/ShellCode.AB is a generic detection for JavaScript objects that construct shellcode. These scripts may be embedded within other document files such as specially-crafted .HTML files that are uploaded to certain websites.

Alert level: severe
Updated on Mar 09, 2012

Exploit:JS/ShellCode.AL is a malicious JavaScript file that downloads and runs arbitrary files when certain vulnerabilities in the browser are exploited, usually by other malware.

Alert level: severe
Updated on Mar 28, 2012

Exploit:JS/ShellCode.AH is a detection for certain malicious JavaScript code that is embedded within HTML files.

Alert level: severe
Updated on Mar 18, 2012

Exploit:JS/ShellCode.AJ is a detection for certain malicious JavaScript code that is embedded within HTML files.

Alert level: severe
Updated on May 17, 2012

Exploit:JS/ShellCode.AS is a detection for JavaScript objects that construct shellcode. These scripts may be embedded within other document files such as specially-crafted .HTML files.

Alert level: severe
Updated on Oct 09, 2012

Exploit:SWF/ShellCode.L is the detection for a specially-crafted SWF (ShockWave Flash) file that exploits a vulnerability found in Adobe Flash Player prior to version 10.1.85.3. The vulnerability is discussed in detail in the following pages:

Alert level: severe
Updated on Jul 24, 2013

Windows Defender detects and removes this threat.

Exploit:Win32/ShellCode.gen!C is a generic detection for JavaScript files that have malicious code. Generally, attackers use this malicious code to infect your computer with other malware.

These files are often downloaders which use the malicious code to exploit vulnerabilities in various software.

A vulnerability is like a hole in your software that malware can use (or exploit) to get on your computer. These holes are fixed by installing updates to the vulnerable software; this is why it is extremely important to keep all of the programs on your computer up to date.

See here for information on how to update some software.

As this is a generic detection, we cannot identify the precise files that use this code or the particular exploits that the code uses.

Alert level: severe
Updated on Oct 20, 2016

Windows Defender detects and removes this threat.

Exploit:JS/Shellcode.gen is a JavaScript-enabled object that does something malicious. Malicious websites and malformed PDF documents may contain JavaScript, which tries to run code without your consent.

Alert level: severe
Updated on Jun 16, 2014
Windows Defender Antivirus detects and removes this threat.
 
This is a generic detection for script objects that construct shellcodes. These scripts may be embedded within other types of documents, for example, specially-crafted PDF files.
Alert level: severe
Updated on Dec 07, 2023
Alert level: severe