Skip to main content
Skip to main content
Microsoft Security Intelligence
95 entries found. Displaying page 4 of 5.
Updated on Sep 19, 2013
Alert level: severe
Updated on Oct 23, 2013
Alert level: severe
Updated on Dec 27, 2013
Alert level: severe
Updated on Dec 27, 2013
Alert level: severe
Updated on Nov 17, 2017
Alert level: severe
Updated on Nov 21, 2017
Alert level: severe
Updated on Apr 04, 2017
Alert level: severe
Updated on Apr 29, 2017
Alert level: severe
Updated on Feb 02, 2015
Alert level: severe
Updated on Feb 24, 2015
Alert level: severe
Updated on Feb 24, 2015
Alert level: severe
Updated on Oct 02, 2021
Alert level: severe
Updated on Nov 05, 2023
Alert level: severe
Updated on Jan 17, 2013

Exploit:JS/Coolex.A is script contained within an exploit pack known as the "Cool Exploit Kit". It can install arbitrary malware on your computer, including variants from the Trojan:Win32/Reveton family of ransomware trojans that may lock your computer and demand payment of a supposed fine.

For more information on ransomware, please see our FAQs at http://www.microsoft.com/security/portal/Shared/Ransomware.aspx.

Alert level: severe
Updated on Nov 04, 2012

Exploit:Win32/Pdfjsc.ADQ is a malicious PDF file that exploits a vulnerability in Adobe Acrobat and Adobe Reader.

The vulnerabilities, discussed in CVE-2010-0188, allow this malware to download and run arbitrary files.

The following versions of Adobe Acrobat and Adobe Reader are vulnerable to this exploit:

  • Adobe Acrobat 8 and Adobe Reader 8 earlier than 8.2.1
  • Adobe Acrobat 9 and Adobe Reader 9 earlier than 9.3.1
Alert level: severe
Updated on Nov 14, 2012

Exploit:Win32/Pdfjsc.ADY is a malicious PDF file that exploits a vulnerability in Adobe Acrobat and Adobe Reader.

The vulnerabilities, discussed in CVE-2010-0188, allow this malware to download and run arbitrary files, including malware from the following families:

The following versions of Adobe Acrobat and Adobe Reader are vulnerable to this exploit:

  • Adobe Acrobat and Adobe Reader earlier than 8.2.1
  • Adobe Acrobat and Adobe Reader earlier than 9.3.1
Install updates to prevent infection

This malware exploits known vulnerabilities.

You should always install the latest updates available from Adobe to prevent reinfection from this threat, and possible infection from other threats.

Download updates for Adobe products from the following link:

Alert level: severe
Updated on Feb 05, 2013

Exploit:Win32/Pdfjsc.AGC is a malicious PDF file that exploits a vulnerability in Adobe Acrobat and Adobe Reader.

The vulnerabilities, discussed in CVE-2010-0188, allow this malware to download and run arbitrary files.

The following versions of Adobe Acrobat and Adobe Reader are vulnerable to this exploit:

  • Adobe Acrobat and Adobe Reader earlier than 8.2.1
  • Adobe Acrobat and Adobe Reader earlier than 9.3.1
Install updates to prevent infection

This malware exploits known vulnerabilities.

You should always install the latest updates available from the software vendor to prevent reinfection from this threat, and possible infection from other threats.

Download updates for Adobe products from the following link:

Alert level: severe
Updated on Jan 24, 2017

Microsoft security software detects and removes this threat.

It uses vulnerabilities in recent versions of Internet ExplorerMicrosoft Silverlight, Adobe Flash Player, and Java to install malware on your PC. We have seen it try to install Trojan:Win32/Reveton.

You might get this threat if you visit a malicious or hacked website, or by clicking a malicious link in an email.

To learn more about how this threat is being used by cybercriminals,

Read: Exploit kits remain a cybercrime staple against outdated software – 2016 threat landscape review series

Alert level: severe
Updated on Jan 24, 2017

Microsoft security software detects and removes this threat.

It uses vulnerabilities in recent versions of Internet ExplorerMicrosoft Silverlight, Adobe Flash Player, and Java to install malware on your PC. We have seen it try to install Trojan:Win32/Reveton.

You might get this threat if you visit a malicious or hacked website, or by clicking a malicious link in an email.

To learn more about how this threat is being used by cybercriminals,

Read: Exploit kits remain a cybercrime staple against outdated software – 2016 threat landscape review series

Alert level: severe
Updated on Jan 24, 2017

Microsoft security software detects and removes this threat.

It uses vulnerabilities in recent versions of Internet ExplorerMicrosoft Silverlight, Adobe Flash Player, and Java to install malware on your PC. We have seen it try to install Trojan:Win32/Reveton.

You might get this threat if you visit a malicious or hacked website, or by clicking a malicious link in an email.

To learn more about how this threat is being used by cybercriminals,

Read: Exploit kits remain a cybercrime staple against outdated software – 2016 threat landscape review series

Find out ways that malware can get on your PC.

Alert level: severe