Skip to main content
Skip to main content
Microsoft Security Intelligence
500 entries found. Displaying page 1 of 25.
Updated on Apr 11, 2011
Trojan:JS/Proxas.A is a detection for JavaScript-enabled objects that exhibit malware behavior. Malicious Web sites and PDF documents may contain such JavaScript code that attempts to execute code without the user's knowledge. An example of other malware that may execute this JavaScript is Exploit:Win32/Pdfjsc.D.
Alert level: severe
Updated on Apr 11, 2011
Exploit:JS/CVE-2008-0015 is the detection for code that attempts to exploit a vulnerability in the Microsoft Video ActiveX Control. This vulnerability is discussed in detail in Microsoft Security Advisory (972890). When a user visits a Web page containing an exploit detected as Exploit:JS/CVE-2008-0015, it may connect to a remote server and download other malware. Currently, we are aware of cases where exploits download and execute Worm:Win32/Dogkild.A on the system.
Alert level: severe
Updated on Apr 11, 2011
Exploit:Win32/Pidief.C is a detection for an exploit that targets a Portable Document Format (PDF) vulnerability. The critical vulnerability could result in the installation of additional malware when a malicious PDF document is opened using Adobe Reader version 9, or earlier.
Alert level: severe
Updated on Apr 11, 2011
Exploit:HTML/Repl.B is a malicious JavaScript program embedded inside HTML files which exploits a buffer overflow vulnerability in  RealPlay 10.5 and RealPlay 11 Beta.
Alert level: severe
Updated on Apr 11, 2011
Exploit:JS/Mult.AF is a detection for code that exploits a certain vulnerability in Internet Explorer 7 in order to download and run arbitrary files.
 
Files detected as Exploit:JS/Mult.AF may arrive in the system when a user browses certain sites using a vulnerable version of Internet Explorer. When a webpage that includes Exploit:JS/Mult.AF is loaded, the vulnerability in Internet Explorer is exploited.
 
Microsoft strongly recommends that users refer to the workarounds specified in Microsoft Security Advisory (961051) immediately.
Alert level: severe
Updated on Apr 11, 2011
Exploit:JS/Mult.AI is a detection for code that exploits a certain vulnerability in Internet Explorer 7 in order to download and run arbitrary files.
 
Files detected as Exploit:JS/Mult.AI may arrive in the system when a user browses certain sites using a vulnerable version of Internet Explorer. When a webpage that includes Exploit:JS/Mult.AI is loaded, the vulnerability in Internet Explorer is exploited.
 
Microsoft strongly recommends that users refer to the workarounds specified in Microsoft Security Advisory (961051) immediately.
Alert level: severe
Updated on May 12, 2022
Alert level: severe
Updated on Jan 06, 2012

Exploit:JS/Blacole.AD is a malicious JavaScript that attempts to exploit several vulnerabilities in Adobe Acrobat and Reader. If the exploit is successful in compromising a vulnerable host, it could result in downloading and executing other malware. Exploit:JS/Blacole.AD is a component of an exploit kit that is distributed as the "Blackhole exploit pack".

Alert level: severe
Updated on Apr 11, 2011
Exploit:HTML/Bankfraud is generic detection for e-mail that contains malicious links or other characteristics indicative of a phishing attack.
Alert level: severe
Updated on Apr 11, 2011
Exploit:HTML/Meloits.A is an HTML exploit of a vulnerability found in Visual Studio 2005 which could allow an attacker to remotely execute arbitrary code on impacted systems. Details on this vulnerability can be found in Microsoft Security Advisory (927709) at  http://www.microsoft.com/technet/security/advisory/927709.mspx
Alert level: severe
Updated on May 01, 2016

Windows Defender detects and removes this threat.

This threat uses a software vulnerability to download and run other files on your PC, including malware.

It runs when you visit a hacked website and you have a vulnerable version of Java. Legitimate websites can also be hacked to unwillingly host this threat.

Oracle Java SE JDK and JRE 7 and 6 Update 27 and earlier are all vulnerable to this threat.

To check if you're running a vulnerable version of Java:

  1. Go to the control panel (Select Start then Control Panel)
  2. Select Programs. If Java is installed you will see it in the list of installed programs. Click it to open the Java Control Panel.
  3. On the General tab, click About to see which version of Java you have installed.

You may get a detection for this threat when you visit a website that has the malicious code, even if you're not using a vulnerable version of Java. This doesn't mean that you have been compromised, it means an try to compromise your PC has been made.

The vulnerability that this threat exploits is described in CVE-2011-3544.

Alert level: severe
Updated on May 02, 2016

Windows Defender detects and removes this threat.

This threat uses specially-crafted Shockwave Flash (.swf) files to exploit an Adobe vulnerability to download and run files on your PC, including malware.

It runs when you visit a malicious or hacked website and you have a vulnerable version of Adobe Flash Player.

The following versions of Adobe Flash Player are vulnerable:

  • Adobe Flash Player before 9.0.277.0 and 10.x before 10.1.53.64
  • Adobe AIR before 2.0.2.12610
  • Adobe Reader and Acrobat 9.x before 9.3.3 and 8.x before 8.2.3 on Windows and Mac OS X

If you visit a webpage containing this threat and your PC has a vulnerable version of Flash installed, this threat can download and run other malware.

Find out ways that malware can get on your PC.

Alert level: severe
Updated on Jul 24, 2013

Microsoft security software detects and removes this threat.

This malicious JavaScript code can use vulnerable versions of Java, Adobe Reader, and Adobe Flash to load other malware onto your computer.

You can be infected with this threat if you visit a malicious or compromised webpage.

Alert level: severe
Updated on Nov 09, 2011

Exploit:Java/Blacole.D is a Java Class module that is included in a JAR file. It is part of the 'Blackhole' exploit kit, described in CVE-2010-0840.

Alert level: severe
Updated on Nov 17, 2011

Exploit:Java/Blacole.W is the detection for the Java class module included in "worms.jar" that is part of the "Blackhole" exploit pack. The file "worms.jar" is an applet that exploits the vulnerability in Java Runtime Environment described in CVE-2010-0840.

Alert level: severe
Updated on Dec 13, 2011

Exploit:Java/CVE-2011-3544.A is a malicious Java applet stored within a Java Archive (.JAR) file. It attempts to exploit a vulnerability in the Java Runtime Environment (JRE) component in Oracle JAVA SE JDK and JRE 7, 6 Update 27 and earlier. The vulnerability allows an unsigned Java applet to gain elevated privileges and potentially have unrestricted access to run arbitrary Java code outside of the "sandbox" environment.

More information about the vulnerability is available in the following articles:

Alert level: severe
Updated on Mar 22, 2017

Windows Defender detects and removes this threat.

This threat loads a malicious Adobe Flash object in your browser in order to download malware, including ransomware such as Ransom:Win32/Cerber.

You might be redirected to the web page that loads the object without your consent.

The malicious Adobe Flash object exploits the vulnerability described in CVE-2015-8651 and Adobe Security Bulletin APSB16-01.

Note that you might get an alert about this threat even if you're not using a vulnerable version of the application. This is because we detect when a website or file tries to use the vulnerability, even if it isn't successful.

Read more about how this threat is being used by cybercriminals in this blog post:

 

Alert level: severe
Updated on Jan 24, 2017

Microsoft security software detects and removes this threat.

It tries to exploit vulnerabilities in Java and Silverlight to download and run other malware.

Read more about how this threat is being used by cybercriminals in this blog post:

Exploit kits remain a cybercrime staple against outdated software – 2016 threat landscape review series

Alert level: severe
Updated on Jan 24, 2017

Microsoft security software detects and removes this threat.

This threat can use vulnerabilities in Java and Silverlight to download and run other malware.

See the Exploit:JS/Meadgive description for more information.

Read more about how this threat is being used by cybercriminals in this blog post:

Exploit kits remain a cybercrime staple against outdated software – 2016 threat landscape review series

Find out ways that malware can get on your PC.

Alert level: severe
Updated on Jun 22, 2015

Windows Defender detects and removes this threat.

This threat uses a JavaScript vulnerability to check your PC for security software. It then looks for certain information about your computer that might be used in a future attack. It uses the vulnerability described in CVE-2013-7331 to exploit your PC.

It runs when you visit a hacked or malicious website and you have a vulnerable version of Internet Explorer.

You might get an alert about this threat even if you're not using vulnerable software. This is because we detect when a website tries to use the vulnerability, even if it isn't successful.

Alert level: severe