Skip to main content
Skip to main content
Microsoft Security Intelligence
500 entries found. Displaying page 7 of 25.
Updated on Jul 07, 2014

Windows Defender detects and removes this threat.

This threat is associated with an exploit kit called SweetOrange. It can exploit vulnerabilities in Java, specifically the vulnerability discussed in CVE-2013-0422.

Find out ways that malware can get on your PC.  

Alert level: severe
Updated on Nov 06, 2020
Alert level: severe
Updated on Jan 11, 2015

Windows Defender detects and removes this threat.

This threat uses an Adobe vulnerability to download and run files on your PC, including malware.

It runs when you visits a malicious or hacked website and you have a vulnerable version of Adobe Flash Player.

The following versions of Adobe Flash Player are vulnerable:

  • Adobe Flash Player before 11.7.700.279 and 11.8.x through 13.0.x before 13.0.0.206 on Windows and OS X, and before 11.2.202.356 on Linux

If you visit a webpage containing this threat and your PC has a vulnerable version of Flash installed, this threat can download and run other malware.

Find out ways that malware can get on your PC.

Alert level: severe
Updated on Jun 03, 2011
Exploit:Java/CVE-2010-0840.BA is the detection for a malicious Java applet trojan that exploits a vulnerability described in CVE-2010-0840. Successful exploitation may lead to the downloading and execution of arbitrary files under the user's security context.
Alert level: severe
Updated on Jun 03, 2011
Exploit:Java/CVE-2010-0840.BB is the detection for a malicious Java applet trojan that exploits a vulnerability described in CVE-2010-0840. Successful exploitation may lead to the downloading and execution of arbitrary files under the user's security context.
Alert level: severe
Updated on Apr 11, 2011
Exploit:Java/CVE-2010-0094.AF is a Java based vulnerability which affects Java Runtime Environment (JRE) up to version 6 release 18 inclusive. The vulnerability makes it possible for untrusted code to gain full privileges at the level of the user's browser security scope.
Alert level: severe
Updated on Apr 11, 2011
Exploit:Java/CVE-2010-0094.BA is the detection for malicious Java applet stored within a Java Archive (.JAR) that attempts to exploit a vulnerability in the Java Runtime Environment (JRE) up to and including version 6 update 18. The vulnerability allows an unsigned Java applet to gain elevated privileges and potentially have unrestricted access to a host system, outside its "sandbox" environment.
 
In the wild, Exploit:Java/CVE-2010-0094.BA has been observed to be distributed with other malware, such as Trojan:Java/Rowindal.D.
Alert level: severe
Updated on May 18, 2011

Exploit:JS/CVE-2010-0806.gen!A is the generic detection for specially crafted JavaScript that attempts to exploit the vulnerability in Internet Explorer resolved with the release of Microsoft Security Bulletin MS10-018.

Alert level: severe
Updated on Jun 27, 2018

Microsoft Defender Antivirus detects and removes this threat.

This threat is an InPage document that exploits a vulnerability in InPage, a word processing software.

This malicious document can only be opened using an InPage software. When it successfully exploits the vulnerability, it creates a backdoor that logs keystrokes and steals sensitive information.

This threat is distributed through spam campaigns.

Find out ways that malware can get on your PC.

Alert level: severe
Updated on Feb 26, 2014

Windows Defender detects and removes this threat.

This threat uses a vulnerability in Internet Explorer 9 and 10 to download and run files on your PC, including other malware.

It runs when you visit a hacked or malicious website and you have a vulnerable version of Internet Explorer.

Alert level: severe
Updated on Jul 18, 2011

Exploit:Java/CVE-2010-0840.ED is the detection for a trojan Java applet that exploits a vulnerability described in CVE-2010-0840. Successful exploitation may lead to the downloading and execution of arbitrary files under the user's security context.

Alert level: severe
Updated on Jul 06, 2011
Exploit:Java/CVE-2010-0840.BL is a detection for a malicious Java applet trojan that exploits a vulnerability described in CVE-2010-0840. Successful exploitation may lead to the downloading and execution of arbitrary files under the user's security context.
Alert level: severe
Updated on Apr 25, 2012

Java/CVE-2010-0094 is a family of malicious Java applets stored within a Java Archive (.JAR) that attempts to exploit a vulnerability in the Java Runtime Environment (JRE) up to and including version 6 update 18. The vulnerability allows an unsigned Java applet to gain elevated privileges and potentially have unrestricted access to a host system outside its "sandbox" environment. It is discussed in CVE-2010-0094.

Alert level: severe
Updated on Feb 29, 2012

Exploit:Java/CVE-2010-0840.OS is a detection for a family of malicious Java applet trojans that exploit a vulnerability described in CVE-2010-0840.OS. The exploit is triggered when a user visits a website, containing the malicious applet, from a computer that is running a vulnerable version of Java.

Alert level: severe
Updated on Apr 11, 2011
Exploit:JS/CVE-2009-1136 is detection for malicious JavaScript that exploits a vulnerability in Microsoft Office Web Components that could execute arbitrary code.
Alert level: severe
Updated on Nov 14, 2023
Alert level: severe
Updated on Sep 04, 2015

This is a detection for threats that attempt to exploit a vulnerability in the following software:

  • Microsoft Excel 2002 SP3
  • Office 2004 and 2008 for Mac
  • Open XML File Format Converter for Mac

Find out ways that malware can get on your PC.

Alert level: severe
Updated on Sep 21, 2012

Exploit:Win32/CVE-2012-4969.C is an exploit for the vulnerability in Internet Explorer described in Microsoft Security Advisory 2757760. The exploit eventually leads to another malware being downloaded into your computer.

Alert level: severe
Updated on Sep 21, 2012

Exploit:Win32/CVE-2012-4969.A is a special crafted JavaScript, which takes advantage of a vulnerability in Internet Explorer 6 through 9. The vulnerability is described in detail in CVE-2012-4969. It is mitigated with the release of a Fixit tool as described in Microsoft Security Advisory 2757760.

Alert level: severe
Updated on Oct 21, 2012

Exploit:Java/CVE-2012-1723.AYH is a malicious Java applet that attempts to exploit a vulnerability (CVE-2012-1723) in the Java Runtime Environment (JRE) in order to download and install files of an attacker’s choice onto your computer.

If you visit a website containing the malicious code while using a vulnerable version of Java, the exploit is loaded. It then attempts to download and execute files from a remote host/URL; the files that are downloaded and executed could include additional malware.

The following versions of Java are vulnerable to this exploit:

  • JDK and JRE 7 Update 4 and earlier Java SE
  • JDK and JRE 6 Update 32 and earlier Java SE
  • JDK and JRE 5.0 Update 35 and earlier Java SE
  • SDK and JRE 1.4.2_37 and earlier Java SE
Alert level: severe