Skip to main content
Published Mar 23, 2014 | Updated Sep 15, 2017

Exploit:JS/Meadgive

Detected by Microsoft Defender Antivirus

Aliases: No associated aliases

Summary

Microsoft security software detects and removes this threat.

It is a webpage on a malicious or compromised website that tries to exploit vulnerabilities in Java and Silverlight to download and run other malware. 

You might be redirected to this website when you visit a compromised webpage.

 

To learn more about how this threat is being used by cybercriminals,

 

Read: Exploit kits remain a cybercrime staple against outdated software – 2016 threat landscape review series

 

Find out ways that malware can get on your PC

The following free Microsoft software detects and removes this threat:

Even if we've already detected and removed this particular threat, running a full scan might find other malware that is hiding on your PC.

Update Java

Make sure you install all available Java updates. You can read more about this vulnerability and download software updates from these links:

  • CVE-2015-0311 (Adobe Flash Player through 13.0.0.262 and 14.x, 15.x and 16.x through 16.0.0.287 on Windows and Mac OS X, and through 11.2.202.438 on Linux)
  • CVE-2012-1723 (Oracle Java SE 7 update 4 and earlier, 6 update 32 and earlier, 5 update 35 and earlier, and 1.4.2_37 and earlier)
  • CVE-2013-1493 (Oracle Java SE 7 Update 15 and earlier, 6 Update 41 and earlier, and 5.0 Update 40 and earlier)
  • CVE-2013-2423 (Oracle Java SE 7 Update 17 and earlier, and OpenJDK 7)
  • CVE-2013-0074 (Microsoft Silverlight 5, and 5 Developer Runtime, before 5.1.20125.0)
  • CVE-2013-3896 (Microsoft Silverlight 5 before 5.1.20913.0)
  • CVE-2013-2551 (Use-after-free vulnerability in Microsoft Internet Explorer 6 through 10)
  • Java Download

You should remove older versions of Java, as keeping old and unsupported versions of Java on your PC is a serious security risk:

If you continue to get alerted about this threat, deleting your temporary Java files can help:

Update Windows

Since this threat also exploits vulnerabilities in Windows, it's also important to keep your other software up to date:

Get more help

You can also see our advanced troubleshooting page for more help.

If you’re using Windows XP, see our Windows XP end of support page.

Follow us