1. Symantec/
  2. Security Response/
  3. JS.Exception.Exploit


Risk Level 2: Low

August 16, 2001
February 13, 2007 12:01:12 PM
Trojan Horse
Systems Affected:
CVE References:

JS.Exception.Exploit is a detection for an exploit that allows Java applets to perform various actions on your system if you are using an older or unpatched version of Microsoft Internet Explorer.

In many cases, JS.Exception.Exploit may perform simple actions such as changing your Internet Explorer home page. (This is one of the most common uses of this exploit.) It has been reported, but not confirmed, that some adware programs use JS.Exception.Exploit to do this. As a result, your Symantec antivirus program may detect JS.Exception.Exploit when the adware program displays a pop-up ad that uses the exploit.

If your Symantec antivirus program alerts you to JS.Exception.Exploit, this means that it has stopped the exploit and prevented it from running. It does not mean that your computer is "infected" with this threat. Rather, it means that the antivirus program has stopped it. Because the exploit is usually not on your computer, in most cases you will not be able to "delete" it, since there is nothing to delete.

To be sure that your computer is free of currently-known threats, we suggest that you run LiveUpdate and then run a full system scan.

If you continue to receive alerts when pop-up ads are displayed, you need to determine what adware you have installed on your computer, then disable or remove it. You may need to contact your computer vendor for assistance in identifying and disabling advertising software. You can also obtain and run programs that are designed to detect and remove adware.

Antivirus Protection Dates

  • Initial Rapid Release version August 20, 2001
  • Latest Rapid Release version July 16, 2013 revision 035
  • Initial Daily Certified version August 20, 2001
  • Latest Daily Certified version July 17, 2013 revision 002
  • Initial Weekly Certified release date August 20, 2001
Click here for a more detailed description of Rapid Release and Daily Certified virus definitions.
Writeup By: Patrick Nolan

Search Threats

Search by name
Example: W32.Beagle.AG@mm
STAR Antimalware Protection Technologies
2016 Internet Security Threat Report, Volume 21
  • Twitter
  • Facebook
  • LinkedIn
  • Google+
  • YouTube