Skip to main content
Skip to main content
Published Apr 28, 2010 | Updated Sep 15, 2017

Exploit:JS/ShellCode.J

Detected by Microsoft Defender Antivirus

Aliases: JS/Cosmu.A (Command) EXP/CVE-20100806.B (Avira) JS/Dish!exploit (CA) JS/Exploit.CVE-2010-0806 (ESET) Exploit.JS.CVE-2010-0806.b (Kaspersky) Exploit-CVE2010-0806 (McAfee) Troj/ExpJS-R (Sophos) Trojan.JS.BOFExploit (Sunbelt Software) JS.Sykipot (Symantec) JS_COSMU.A (Trend Micro)

Summary

Exploit:JS/ShellCode.J is a generic detection for JavaScript objects that construct shellcode. These scripts may be embedded within other document files such as specially-crafted .PDF files, for example.
 
This detection also includes malicious JavaScript that attempts to exploit an uninitialized memory corruption vulnerability (CVE-2010-0806) that allows the execution of arbitrary code. Microsoft released Microsoft Security Bulletin MS10-018 to mitigate this vulnerability.
To detect and remove this threat and other malicious software that may have been installed, run a full-system scan with an up-to-date antivirus product such as Microsoft Security Essentials, or the Microsoft Safety Scanner. For more information about using antivirus software, see http://www.microsoft.com/security/antivirus/av.aspx.
 
This detection also includes malicious JavaScript that attempts to exploit an uninitialized memory corruption vulnerability (CVE-2010-0806) that allows the execution of arbitrary code. Microsoft released Microsoft Security Bulletin MS10-018 to mitigate this vulnerability.
Follow us