Exploit:SWF/Anogre.B
Windows Defender detects and removes this threat.
This threat uses an Adobe vulnerability to download and run files on your PC, including malware.
This threat is associated with an exploit kit called SweetOrange. It can exploit vulnerabilities in Adobe Flash, specifically the vulnerability discussed in CVE-2015-0311.
It runs when you visit a malicious or hacked website and you have a vulnerable version of Adobe Flash Player.
The following versions of Adobe Flash Player are vulnerable:
- Adobe Flash Player 16.0.0.287 and earlier versions for Windows and Macintosh
- Adobe Flash Player 13.0.0.26, 14.x, and 15.x versions for Windows and Macintosh
- Adobe Flash Player 11.2.202.438 and earlier versions for Linux
If you visit a webpage containing this threat and your PC has a vulnerable version of Flash installed, this threat can download and run other malware.
Exploit:SWF/Axpergle
Windows Defender detects this threat.
This threat is a detection for specially-crafted Shockwave Flash (.SWF) files that attempt to exploit software vulnerabilities in Adobe Flash Player known as part of the Angler exploit kit. We have seen this threat exploit the CVE-2014-8439, CVE-2015-0310, CVE-2015-0311, CVE-2015-0313 vulnerabilities.
It uses an Adobe Flash Player vulnerability to download and run files on your PC, including malware.
The exploit is also called Angler.
The following versions of Adobe Flash Player are vulnerable:
- Adobe Flash Player 16.0.0.296 and earlier versions
- Adobe Flash Player 13.0.0.264 and earlier 13.x versions
- Adobe Flash Player 11.2.202.440 and earlier 11.x versions
You might get an alert about this threat even if you're not using a vulnerable version of Adobe Flash Player. This is because we detect when a website tries to use the vulnerability, even if it isn't successful.
To learn more about how this threat is being used by cybercriminals,