Attention: We have transitioned to a new AAD or Microsoft Entra ID from the week of May 20, 2024. In case your tenant requires admin consent, please refer to this document located at Overview of user and admin consent - Microsoft Entra ID | Microsoft Learn and grant access to App ID: 6ba09155-cb24-475b-b24f-b4e28fc74365 with graph permissions for Directory.Read.All and User.Read for continued access. While the app may appear unverified, you can confirm its legitimacy by verifying the App ID provided.
5 entries found.
Exploit:JS/ShellCode.gen
Windows Defender detects and removes this threat.
Exploit:JS/Shellcode.gen is a JavaScript-enabled object that does something malicious. Malicious websites and malformed PDF documents may contain JavaScript, which tries to run code without your consent.
Alert level:
severe
Exploit:JS/CVE-2008-0015
Exploit:JS/CVE-2008-0015 is the detection for code that attempts to exploit a vulnerability in the Microsoft Video ActiveX Control. This vulnerability is discussed in detail in Microsoft Security Advisory (972890). When a user visits a Web page containing an exploit detected as Exploit:JS/CVE-2008-0015, it may connect to a remote server and download other malware. Currently, we are aware of cases where exploits download and execute Worm:Win32/Dogkild.A on the system.
Alert level:
severe
Exploit:JS/ShellCode.gen!AA
Alert level:
severe
Exploit:JS/Shellcode.gen!I
Alert level:
severe
Exploit:JS/Shellcode.gen!C
Alert level:
severe