Exploit:Win32/Pdfjsc.X
Exploit:Win32/Pdfjsc.Y
Exploit:Win32/Pdfjsc.Y is a detection for malicious PDF files that attempt to exploit the heap corruption vulnerability in a component (U3D) in Adobe Reader and Acrobat 10.1.1 and earlier, described in CVE-2011-2462. An attacker may create specially-crafted malicious PDF files to trigger the memory corruption, and possibly execute arbitrary code to run malicious JavaScript and shellcode. It may also connect to remote websites.
Exploit:Win32/Pdfjsc.D
Exploit:Win32/Pdfjsc.J
TrojanDownloader:Win32/Stalni.gen
Exploit:JS/Pdfcmi.A
Exploit:Win32/Pdfjsc.GR
-
CVE-2009-0927 - the "Collab.getIcon" method
-
CVE-2008-2992 - the "util.printf" method
-
CVE-2007-5659 - the "Collab.collectEmailInfo" method
Exploit:Win32/Pdfjsc.NJ
Exploit:Win32/Pdfjsc.NJ is the detection for a PDF file that contains an obfuscated JavaScript. This JavaScript exploits certain vulnerabilities, such as CVE-2010-0188, in Adobe Acrobat and Adobe Reader, allowing it to download arbitrary files into the affected computer.
Exploit:Win32/Pdfjsc.OL
Exploit:Win32/Pdfjsc.OL is the detection for malicious Portable Document Format (PDF) files that contain an obfuscated JavaScript. These files exploit a vulnerability in Adobe Acrobat and Adobe Reader that allows it to download and execute arbitrary files. The vulnerability is discussed in the following links: