Skip to main content
Skip to main content
Published Nov 07, 2010 | Updated Sep 15, 2017

Exploit:JS/Mult.CY

Detected by Microsoft Defender Antivirus

Aliases: VBS/Direktshow (AhnLab) JS/Shellcode.J (Command) Exploit.JS.DirektShow.gen (Kaspersky) HTML/Shellcode.Gen (Avira) JS/IRCFlood.TTLR (CA) Exploit.JS.CVE-2008 (Ikarus) Exploit-MSDirectShow.b (McAfee) Hack.Exploit.Script.JS.Agent.jh (Rising AV) Troj/JSShell-J (Sophos) Exploit-CVE2009-0075 (Sunbelt Software) Downloader.Fostrem (Symantec) TROJ_Generic.DIT (Trend Micro)

Summary

Exploit:JS/Mult.CY is a generic detection for the obfuscated shellcode embedded in a JavaScript that attempts to exploit a vulnerability in the Microsoft Video ActiveX Control (CVE-2008-0015), resulting in the potential download and execution of files from a remote server.
To detect and remove this threat and other malicious software that may be installed in your computer, run a full-system scan with an up-to-date antivirus product such as the following:
 
For more information on antivirus software, see http://www.microsoft.com/windows/antivirus-partners/.
Follow us