We're gradually updating threat actor names in our reports to align with the new weather-themed taxonomy. Learn about Microsoft threat actor names
Exploit:JS/Meadgive
Aliases: No associated aliases
Summary
Microsoft security software detects and removes this threat.
It is a webpage on a malicious or compromised website that tries to exploit vulnerabilities in Java and Silverlight to download and run other malware.
You might be redirected to this website when you visit a compromised webpage.
To learn more about how this threat is being used by cybercriminals,
The following free Microsoft software detects and removes this threat:
- Microsoft Defender Antivirus for Windows 10 and Windows 8.1, or Microsoft Security Essentials for Windows 7 and Windows Vista
- Microsoft Safety Scanner
Even if we've already detected and removed this particular threat, running a full scan might find other malware that is hiding on your PC.
Update Java
Make sure you install all available Java updates. You can read more about this vulnerability and download software updates from these links:
- CVE-2015-0311 (Adobe Flash Player through 13.0.0.262 and 14.x, 15.x and 16.x through 16.0.0.287 on Windows and Mac OS X, and through 11.2.202.438 on Linux)
- CVE-2012-1723 (Oracle Java SE 7 update 4 and earlier, 6 update 32 and earlier, 5 update 35 and earlier, and 1.4.2_37 and earlier)
- CVE-2013-1493 (Oracle Java SE 7 Update 15 and earlier, 6 Update 41 and earlier, and 5.0 Update 40 and earlier)
- CVE-2013-2423 (Oracle Java SE 7 Update 17 and earlier, and OpenJDK 7)
- CVE-2013-0074 (Microsoft Silverlight 5, and 5 Developer Runtime, before 5.1.20125.0)
- CVE-2013-3896 (Microsoft Silverlight 5 before 5.1.20913.0)
- CVE-2013-2551 (Use-after-free vulnerability in Microsoft Internet Explorer 6 through 10)
- Java Download
You should remove older versions of Java, as keeping old and unsupported versions of Java on your PC is a serious security risk:
If you continue to get alerted about this threat, deleting your temporary Java files can help:
Update Windows
Since this threat also exploits vulnerabilities in Windows, it's also important to keep your other software up to date:
Get more help
You can also see our advanced troubleshooting page for more help.
If you’re using Windows XP, see our Windows XP end of support page.