Exploit:Java/Anogre.A
Windows Defender detects and removes this threat.
This threat is associated with an exploit kit called SweetOrange. It can exploit vulnerabilities in Java, specifically the vulnerability discussed in CVE-2013-0422.
Exploit:SWF/CVE-2014-0515
Windows Defender detects and removes this threat.
This threat uses an Adobe vulnerability to download and run files on your PC, including malware.
It runs when you visits a malicious or hacked website and you have a vulnerable version of Adobe Flash Player.
The following versions of Adobe Flash Player are vulnerable:
- Adobe Flash Player before 11.7.700.279 and 11.8.x through 13.0.x before 13.0.0.206 on Windows and OS X, and before 11.2.202.356 on Linux
If you visit a webpage containing this threat and your PC has a vulnerable version of Flash installed, this threat can download and run other malware.
Exploit:Java/CVE-2010-0840.BA
Exploit:Java/CVE-2010-0840.BB
Exploit:Java/CVE-2010-0094.AF
Exploit:Java/CVE-2010-0094.BA
Exploit:JS/CVE-2010-0806.gen!A
Exploit:JS/CVE-2010-0806.gen!A is the generic detection for specially crafted JavaScript that attempts to exploit the vulnerability in Internet Explorer resolved with the release of Microsoft Security Bulletin MS10-018.
Exploit:O97M/CVE-2017-12824
Microsoft Defender Antivirus detects and removes this threat.
This threat is an InPage document that exploits a vulnerability in InPage, a word processing software.
This malicious document can only be opened using an InPage software. When it successfully exploits the vulnerability, it creates a backdoor that logs keystrokes and steals sensitive information.
This threat is distributed through spam campaigns.
Exploit:JS/CVE-2014-0322
Windows Defender detects and removes this threat.
This threat uses a vulnerability in Internet Explorer 9 and 10 to download and run files on your PC, including other malware.
It runs when you visit a hacked or malicious website and you have a vulnerable version of Internet Explorer.
Exploit:Java/CVE-2010-0840.ED
Exploit:Java/CVE-2010-0840.ED is the detection for a trojan Java applet that exploits a vulnerability described in CVE-2010-0840. Successful exploitation may lead to the downloading and execution of arbitrary files under the user's security context.
Exploit:Java/CVE-2010-0840.BL
Exploit:Java/CVE-2010-0094
Java/CVE-2010-0094 is a family of malicious Java applets stored within a Java Archive (.JAR) that attempts to exploit a vulnerability in the Java Runtime Environment (JRE) up to and including version 6 update 18. The vulnerability allows an unsigned Java applet to gain elevated privileges and potentially have unrestricted access to a host system outside its "sandbox" environment. It is discussed in CVE-2010-0094.
Exploit:Java/CVE-2010-0840.OS
Exploit:Java/CVE-2010-0840.OS is a detection for a family of malicious Java applet trojans that exploit a vulnerability described in CVE-2010-0840.OS. The exploit is triggered when a user visits a website, containing the malicious applet, from a computer that is running a vulnerable version of Java.
Exploit:JS/CVE-2009-1136
Exploit:Win32/CVE-2011-0105
This is a detection for threats that attempt to exploit a vulnerability in the following software:
- Microsoft Excel 2002 SP3
- Office 2004 and 2008 for Mac
- Open XML File Format Converter for Mac
Exploit:Win32/CVE-2012-4969.C
Exploit:Win32/CVE-2012-4969.C is an exploit for the vulnerability in Internet Explorer described in Microsoft Security Advisory 2757760. The exploit eventually leads to another malware being downloaded into your computer.
Exploit:Win32/CVE-2012-4969.A
Exploit:Win32/CVE-2012-4969.A is a special crafted JavaScript, which takes advantage of a vulnerability in Internet Explorer 6 through 9. The vulnerability is described in detail in CVE-2012-4969. It is mitigated with the release of a Fixit tool as described in Microsoft Security Advisory 2757760.
Exploit:Java/CVE-2012-1723.AYH
Exploit:Java/CVE-2012-1723.AYH is a malicious Java applet that attempts to exploit a vulnerability (CVE-2012-1723) in the Java Runtime Environment (JRE) in order to download and install files of an attacker’s choice onto your computer.
If you visit a website containing the malicious code while using a vulnerable version of Java, the exploit is loaded. It then attempts to download and execute files from a remote host/URL; the files that are downloaded and executed could include additional malware.
The following versions of Java are vulnerable to this exploit:
- JDK and JRE 7 Update 4 and earlier Java SE
- JDK and JRE 6 Update 32 and earlier Java SE
- JDK and JRE 5.0 Update 35 and earlier Java SE
- SDK and JRE 1.4.2_37 and earlier Java SE