Trojan:JS/Proxas.A
Exploit:JS/CVE-2008-0015
Exploit:Win32/Pidief.C
Exploit:HTML/Repl.B
Exploit:JS/Mult.AF
Exploit:JS/Mult.AI
Exploit:Java/CVE-2013-0422
Windows Defender detects and removes this threat.
This threat uses a Java vulnerability to download and run files on your PC, including other malware.
It runs when you visit a hacked or malicious website and you have a vulnerable version of Java.
The following versions of Java are vulnerable:
- Java Development Kit and Java Runtime Environment 7 Update 10 and earlier
To check if you're running a vulnerable version of Java:
- In Control Panel, double-click Programs.
- If Java is installed you will see it in the list of installed programs. Click it to open the Java Control Panel.
- On the General tab, click About to see which version of Java you have installed.
You may get an alert about this threat even if you're not using a vulnerable version of Java. This is because we detect when a website tries to use the vulnerability, even if it isn't successful.
Exploit:HTML/Bankfraud
Exploit:HTML/Meloits.A
Exploit:JS/Meadgive.A
Microsoft security software detects and removes this threat.
It tries to exploit vulnerabilities in Java and Silverlight to download and run other malware.
Read more about how this threat is being used by cybercriminals in this blog post:
Exploit:HTML/Meadgive.I
Microsoft security software detects and removes this threat.
This threat can use vulnerabilities in Java and Silverlight to download and run other malware.
See the Exploit:JS/Meadgive description for more information.
Read more about how this threat is being used by cybercriminals in this blog post:
Exploit:Java/CVE-2011-3544.A
Exploit:Java/CVE-2011-3544.A is a malicious Java applet stored within a Java Archive (.JAR) file. It attempts to exploit a vulnerability in the Java Runtime Environment (JRE) component in Oracle JAVA SE JDK and JRE 7, 6 Update 27 and earlier. The vulnerability allows an unsigned Java applet to gain elevated privileges and potentially have unrestricted access to run arbitrary Java code outside of the "sandbox" environment.
More information about the vulnerability is available in the following articles:
Exploit:JS/Colkit.A
Microsoft security software detects and removes this threat.
This malicious JavaScript code can use vulnerable versions of Java, Adobe Reader, and Adobe Flash to load other malware onto your computer.
You can be infected with this threat if you visit a malicious or compromised webpage.
Exploit:JS/Blacole.AD
Exploit:JS/Blacole.AD is a malicious JavaScript that attempts to exploit several vulnerabilities in Adobe Acrobat and Reader. If the exploit is successful in compromising a vulnerable host, it could result in downloading and executing other malware. Exploit:JS/Blacole.AD is a component of an exploit kit that is distributed as the "Blackhole exploit pack".
Exploit:Java/CVE-2010-0840.DJ
Exploit:Java/CVE-2010-0840.DJ is a detection for an obfuscated malicious Java class applet component that exploits the vulnerability described in CVE-2010-0840. Successful exploitation leads to remote code execution.
Exploit:SWF/CVE-2014-1776
Windows Defender detects and removes this threat.
This threat uses a vulnerability in Internet Explorer 6 through to Internet Explorer 11 to download and run files on your PC, including other malware.
The vulnerability is addressed in Microsoft Security Bulletin MS14-021. It is also described in detail in Microsoft Security Advisory 2963983.
It runs when you visit a hacked or malicious website and you have a vulnerable version of Internet Explorer.
Exploit:HTML/IframeRef.V
Exploit:HTML/IframeRef.V is a detection for specially-formed IFrame tags that point to remote websites containing malicious content, for example malicious JavaScript containing an exploit for a specific vulnerability.
Exploit:Java/CVE-2010-0840.CI
Exploit:Java/CVE-2010-0840.CI is a detection for an obfuscated malicious Java class applet component that exploits the vulnerability described in CVE-2010-0840. Successful exploitation may lead to the downloading and execution of arbitrary files under the user's security context.
Exploit:Win32/CVE-2011-0979
Exploit:Win32/CVE-2011-0979 is a detection for a malformed Microsoft Excel spreadsheet data file that contains a file structure that attempts to exploit a vulnerability mentioned in CVE-2011-0979. Successful exploitation of the vulnerability could lead to the execution of arbitrary code. The vulnerability is mitigated by Microsoft Security Bulletin MS11-021, released April 2011.