Skip to main content
Skip to main content
Microsoft Security Intelligence
125 entries found. Displaying page 6 of 7.
Updated on Dec 11, 2017
Alert level: severe
Updated on Dec 17, 2017
Alert level: severe
Updated on Dec 14, 2019
Alert level: severe
Updated on Dec 14, 2019
Alert level: severe
Updated on Jan 17, 2021
Alert level: severe
Updated on May 29, 2023
Alert level: severe
Updated on Aug 21, 2023
Alert level: severe
Updated on Oct 27, 2023
Alert level: severe
Updated on Dec 08, 2023
Alert level: severe
Updated on Nov 14, 2012

Exploit:Win32/Pdfjsc.ADY is a malicious PDF file that exploits a vulnerability in Adobe Acrobat and Adobe Reader.

The vulnerabilities, discussed in CVE-2010-0188, allow this malware to download and run arbitrary files, including malware from the following families:

The following versions of Adobe Acrobat and Adobe Reader are vulnerable to this exploit:

  • Adobe Acrobat and Adobe Reader earlier than 8.2.1
  • Adobe Acrobat and Adobe Reader earlier than 9.3.1
Install updates to prevent infection

This malware exploits known vulnerabilities.

You should always install the latest updates available from Adobe to prevent reinfection from this threat, and possible infection from other threats.

Download updates for Adobe products from the following link:

Alert level: severe
Updated on Sep 04, 2014

Windows Defender detects and removes this threat.

This threat uses vulnerabilities in Adobe Flash Player, Oracle Java and Silverlight to install malware on your PC.

You might encounter it when you visit compromised or malicious websites.

Find out ways that malware can get on your PC.  

Alert level: severe
Updated on Jul 04, 2014

Windows Defender detects and removes this threat.

This threat uses vulnerabilities in Adobe Flash Player, Java and Silverlight to install malware on your PC.

You might encounter it when you visit compromised or malicious websites.

Find out ways that malware can get on your PC.  

Alert level: severe
Updated on May 13, 2014

Windows Defender detects and removes this threat.

This threat uses vulnerabilities in Adobe Flash Player, Oracle Java and Silverlight to install malware on your PC.

You might encounter it when you visit compromised or malicious websites.

Find out ways that malware can get on your PC.  

Alert level: severe
Updated on Sep 04, 2014

Windows Defender detects and removes this threat.

This threat uses vulnerabilities in Adobe Flash Player, Oracle Java and Silverlight to install malware on your PC.

You might encounter it when you visit compromised or malicious websites.

Find out ways that malware can get on your PC.  

Alert level: severe
Updated on May 13, 2014

Windows Defender detects and removes this threat.

This threat uses vulnerabilities in Adobe Flash Player, Oracle Java and Silverlight to install malware on your PC.

You might encounter it when you visit compromised or malicious websites.

Find out ways that malware can get on your PC.  

Alert level: severe
Updated on Aug 05, 2016

Microsoft security software detects and removes this family of threats.

This malware family can download other threats onto your PC, such as Win32/Carberp and Win32/Vundo.

They can be installed on your PC by exploits, or other malware, such as Win32/Upatre.

We have seen new Rovnix variants exploit vulnerabilities addressed in CVE-2013-3660, CVE-2014-4113, and CVE-2015-1701.

Alert level: severe
Updated on Apr 11, 2011
Trojan:Win32/Opachki.F is a backdoor that modifies a number of system settings, and periodically attempts to download and execute arbitrary files.
Alert level: severe
Updated on May 08, 2012
Exploit:Java/CVE-2012-0507.R is a malicious Java applet that attempts to exploit a vulnerability in the Java Runtime Environment (JRE) in order to download and install files of an attacker's choice onto your computer.
Alert level: severe
Updated on Aug 01, 2011

Exploit:JS/Blacole.A is the detection for malicious Javascript that loads a series of other exploits. If the computer runs a vulnerable version of certain software and exploitation is successful, various malware may be downloaded.

Alert level: severe
Updated on Sep 21, 2014

Windows Defender detects and removes this threat.

This threat uses a Java vulnerability to download and run files on your PC, including other malware.

It runs when you visit a hacked or malicious website and you have a vulnerable version of Java.

The following versions of Java are vulnerable:

  • JDK and JRE 7 Update 2 and earlier Java SE
  • JDK and JRE 6 Update 30 and earlier Java SE
  • JDK and JRE 5.0 Update 33 and earlier Java SE
  • SDK and JRE 1.4.2_35 and earlier Java SE
  • JavaFX 2.0.2 and earlier JavaFX

To check if you're running a vulnerable version of Java:

  1. In Control Panel, double-click Programs.
  2. If Java is installed you will see it in the list of installed programs. Click it to open the Java Control Panel.
  3. On the General tab, click About to see which version of Java you have installed.

You may get an alert about this threat even if you're not using a vulnerable version of Java. This is because we detect when a website tries to use the vulnerability, even if it isn't successful.

Find out ways that malware can get on your PC.

Alert level: severe