Skip to main content
Skip to main content
Published May 12, 2010 | Updated Sep 15, 2017

Exploit:JS/Pdfjsc.B

Detected by Microsoft Defender Antivirus

Aliases: PDF/Obfusc.I!Camelot (Command) Exploit.JS.Pdfka.atf (Kaspersky) JS/Exploit.AS (Norman) JS.Crypt.UQNP (VirusBuster) Exploit.PDF-JS.Gen (BitDefender) PDF/Pidief.QD (CA) Exploit.JS.Pdfka (Ikarus) Exploit.JS.Pdfka.atf (Kaspersky) Exploit-PDF.ac (McAfee) Hack.Exploit.Script.PDF.GEN (Rising AV) Troj/PDFJs-HJ (Sophos) JS_PIDIEF.SMF (Trend Micro)

Summary

Exploit:JS/Pdfjsc.B is a detection for specially crafted PDF files that target software vulnerabilities in Adobe Acrobat and Adobe Reader.
Manual removal is not recommended for this threat. Use the Microsoft Malicious Software Removal Tool, Microsoft Security Essentials, or another up-to-date scanning and removal tool to detect and remove this threat and other unwanted software from your computer. For more information on Microsoft security products, see http://www.microsoft.com/protect/products/computer/default.mspx.
Additional recovery instructions
This threat exploits known vulnerabilities in Adobe Acrobat and Reader. After removing this threat, make sure that you install the updates available from the vendor. You can read more about these vulnerabilities in PDF documents, as well as where to download the software update from the following links:
Follow us