Skip to main content
Skip to main content
Microsoft Security Intelligence
500 entries found. Displaying page 1 of 25.
Updated on Dec 28, 2011

Exploit:Win32/Pdfjsc.YP is a specially-crafted Portable Document Format (PDF) file that exploits a vulnerability in Adobe Acrobat and Adobe Reader described in the following articles:

Alert level: severe
Updated on Sep 21, 2014

Microsoft security software detects and removes these threats.

This malware family exploit vulnerabilities in Adobe Acrobat and Adobe Reader

The vulnerabilities allow malware to download and run files, inlcuding other malware.

Find out ways that malware can get on your PC.  

Alert level: severe
Updated on Jan 02, 2013

Exploit:Win32/Pdfjsc.AEW is a malicious PDF file that exploits a vulnerability in Adobe Acrobat and Adobe Reader.

The vulnerabilities, discussed in CVE-2010-0188, allow this malware to download and run arbitrary files.

The following versions of Adobe Acrobat and Adobe Reader are vulnerable to this exploit:

  • Adobe Acrobat and Adobe Reader earlier than 8.2.1
  • Adobe Acrobat and Adobe Reader earlier than 9.3.1
Install updates to prevent infection

This malware exploits known vulnerabilities.

You should always install the latest updates available from the software vendor to prevent reinfection from this threat, and possible infection from other threats.

Download updates for Adobe products from the following link:

Alert level: severe
Updated on Apr 11, 2011
Exploit:Win32/Pdfjsc.FM is the detection for a specially crafted PDF file that exploits a vulnerability in Adobe Acrobat and Adobe Reader. This file only successfully exploits computer that are affected by the Adobe Acrobat and Adobe Reader vulnerability discussed in CVE-2009-1492.
Alert level: severe
Updated on Apr 20, 2011

Exploit:Win32/Pdfjsc.NJ is the detection for a PDF file that contains an obfuscated JavaScript. This JavaScript exploits certain vulnerabilities, such as CVE-2010-0188, in Adobe Acrobat and Adobe Reader, allowing it to download arbitrary files into the affected computer.

Alert level: severe
Updated on Apr 11, 2011
Exploit:Win32/Pdfjsc.CR is the detection for a malicious PDF file that exploits the vulnerability discussed in CVE-2007-5659. Upon execution, Exploit:Win32/Pdfjsc.CR runs a JavaScript that attempts to download and execute arbitrary files from remote servers.
Alert level: severe
Updated on Apr 11, 2011
Exploit:Win32/Pdfjsc.L is the detection for a specially crafted PDF file that exploits several vulnerabilities in Adobe Acrobat and Adobe Reader.
Alert level: severe
Updated on Nov 14, 2012

Exploit:Win32/Pdfjsc.ADY is a malicious PDF file that exploits a vulnerability in Adobe Acrobat and Adobe Reader.

The vulnerabilities, discussed in CVE-2010-0188, allow this malware to download and run arbitrary files, including malware from the following families:

The following versions of Adobe Acrobat and Adobe Reader are vulnerable to this exploit:

  • Adobe Acrobat and Adobe Reader earlier than 8.2.1
  • Adobe Acrobat and Adobe Reader earlier than 9.3.1
Install updates to prevent infection

This malware exploits known vulnerabilities.

You should always install the latest updates available from Adobe to prevent reinfection from this threat, and possible infection from other threats.

Download updates for Adobe products from the following link:

Alert level: severe
Updated on Jan 31, 2012

Exploit:Win32/Pdfjsc.YZ is a specially-crafted Portable Document File (PDF), which exploits a vulnerability in Adobe Acrobat and Adobe Reader discussed in the following articles:

When executed in a vulnerable version of Adobe Acrobat or Adobe Reader, it attempts to download a certain file. It has been found included in the Blackhole exploit kit.

Alert level: severe
Updated on Apr 10, 2012

Exploit:Win32/Pdfjsc.AAP is the detection for specially-crafted PDF files that target software vulnerabilities in Adobe Acrobat and Adobe Reader. The vulnerabilities, discussed in CVE-2010-0188, could allow a remote attacker to cause a denial of service or application crash or possibly execute arbitrary code.

Alert level: severe
Updated on Dec 12, 2011

Exploit:Win32/Pdfjsc.YF is a specially-crafted Portable Document File (PDF), which exploits a vulnerability in Adobe Acrobat and Adobe Reader discussed in the following articles:

It connects to certain servers to download and execute other files.

Alert level: severe
Updated on Apr 11, 2011
Exploit:Win32/Pdfjsc.EX is a detection for specially-crafted PDF files that attempt to exploit software vulnerabilities in Adobe Acrobat and Adobe Reader.
Alert level: severe
Updated on Apr 11, 2011
Exploit:Win32/Pdfjsc.LV is a detection for specially-crafted PDF files that target a software vulnerability in Adobe Acrobat and Adobe Reader. It usually arrives in the system when the user visits a webpage that contains a malicious PDF file or opens an email containing the PDF file as an attachment. The vulnerability it attempts to exploit is tracked as CVE-2010-0188.
Alert level: severe
Updated on Apr 11, 2011
Exploit:Win32/Pdfjsc.ML is the detection for malicious Portable Document Format (PDF) files that attempt to exploit certain vulnerabilities in Adobe Acrobat and Reader using a particular trick to obfuscate, hide, and subsequently run, malicious JavaScript and shellcode. They may connect to remote websites.
Alert level: severe
Updated on May 18, 2011

Exploit:JS/Pdfjsc.PK is the detection for specially-crafted PDF files that attempt to exploit a software vulnerability in Adobe Acrobat and Adobe Reader. It connects to a remote server to download and possibly execute arbitrary files.

Alert level: severe
Updated on Apr 11, 2011
Exploit:Win32/Pdfjsc.J is a detection for specially-crafted PDF files that target software vulnerabilities in Adobe Acrobat and Adobe Reader. Once the malformed PDF files are opened by vulnerable versions of Adobe Acrobat and Reader, the embedded JavaScript loads the exploit. The exploit may execute arbitrary code of the attacker's choice, however, it is often used to download and execute additional malware on the affected computer.
Alert level: severe
Updated on Apr 11, 2011
Exploit:Win32/Pdfjsc.CV is a detection for specially-crafted PDF files that attempt to exploit software vulnerabilities in Adobe Acrobat and Adobe Reader. This vulnerability allows remote code execution when a malformed PDF document is opened using vulnerable versions of Adobe Reader and Acrobat.
Alert level: severe
Updated on Apr 11, 2011
Exploit:Win32/Pdfjsc.EI is a detection for files that use an obfuscation technique in an attempt to evade detection. This technique is generally employed by malicious PDF files that target software vulnerabilities in Adobe Acrobat and Adobe Reader. Once the malformed PDF files are opened by vulnerable versions of Adobe Acrobat and Reader, the embedded JavaScript gets executed and loads the exploit. The exploit may execute code to download and execute arbitrary files on the affected computer. These files may include additional malware.
Alert level: severe
Updated on Oct 21, 2014

Windows Defender detects and removes this threat.

This threat uses an Adobe vulnerability to download and run files on your PC, including malware.

It runs when you open an infected PDF file and you have a vulnerable version of Adobe Reader or Acrobat. You might receive this PDF file as an email attachment.

The following versions of Adobe Acrobat and Adobe Reader are vulnerable to this exploit:

  • Adobe Acrobat and Adobe Reader 9
  • Adobe Acrobat and Adobe Reader 10
  • Adobe Acrobat and Adobe Reader 11
Alert level: severe
Updated on Nov 22, 2012

Exploit:Win32/Pdfjsc.AEB is a malicious PDF file that exploits a vulnerability in Adobe Acrobat and Adobe Reader.

The vulnerabilities, discussed in CVE-2010-0188, allow this malware to download and run arbitrary files.

The following versions of Adobe Acrobat and Adobe Reader are vulnerable to this exploit:

  • Adobe Acrobat and Adobe Reader earlier than 8.2.1
  • Adobe Acrobat and Adobe Reader earlier than 9.3.1
Install updates to prevent infection

This malware exploits known vulnerabilities.

You should always install the latest updates available from Adobe to prevent reinfection from this threat, and possible infection from other threats.

Download updates for Adobe products from the following link:

Alert level: severe