Exploit:Win32/Pdfjsc.AS
Exploit:JS/Twooken.A
Exploit:JS/Belmoo
Exploit:JS/CVE-2010-3765
Exploit:Win32/ShellCode.gen!D
Exploit:Win32/CVE-2011-0980
Exploit:Win32/CVE-2011-0980 is the generic detection for specially crafted Microsoft Excel files that exploit a vulnerability discussed in CVE-2011-0980 and resolved with the release of Microsoft Security Bulletin MS11-021.
Exploit:Win32/Pdfjsc.YZ
Exploit:Win32/Pdfjsc.YZ is a specially-crafted Portable Document File (PDF), which exploits a vulnerability in Adobe Acrobat and Adobe Reader discussed in the following articles:
When executed in a vulnerable version of Adobe Acrobat or Adobe Reader, it attempts to download a certain file. It has been found included in the Blackhole exploit kit.
Exploit:Win32/Pdfjsc.ZM
Exploit:Win32/Pdfjsc.ZM is a specially-crafted Portable Document File (PDF), which exploits a vulnerability in Adobe Acrobat and Adobe Reader discussed in the following article:
Exploit:JS/ShellCode.AL
Exploit:JS/ShellCode.AL is a malicious JavaScript file that downloads and runs arbitrary files when certain vulnerabilities in the browser are exploited, usually by other malware.
JS/Timbum
Exploit:JS/Timbum is a detection for a malicious JavaScript that redirects the browser to certain URLs. It exploits a vulnerability in the TimThumb Wordpress plugin, which allows an attacker to upload and execute malicious PHP code.
Exploit:Win32/Pdfjsc.ALA
Windows Defender detects and removes this threat.
Exploit:Win32/Pdfjsc.ALA is a specially created PDF file that exploits a vulnerability in Adobe Acrobat and Adobe Reader.
The vulnerability, discussed in CVE-2010-0188, lets this file download and run other files, which might be other malware.
These versions of Adobe Acrobat and Adobe Reader are vulnerable to this exploit:
- Adobe Acrobat and Adobe Reader version 8 earlier than 8.2.1
- Adobe Acrobat and Adobe Reader version 9 earlier than 9.3.1