Exploit:Win32/Pdfjsc.ADH
Exploit:Win32/Pdfjsc.ADH is a malicious PDF file that exploits a vulnerability in Adobe Acrobat and Adobe Reader.
The vulnerabilities, discussed in CVE-2010-0188, allow this malware to download and run arbitrary files.
The following versions of Adobe Acrobat and Adobe Reader are vulnerable to this exploit:
- Adobe Acrobat and Adobe Reader earlier than 8.2.1
- Adobe Acrobat and Adobe Reader earlier than 9.3.1
Exploit:Win32/Pdfjsc.ER
Exploit:Win32/Pdfjsc.MC
Exploit:Win32/Pdfjsc.MZ
Exploit:Win32/Pdfjsc.OV
Exploit:Win32/Pdfjsc.OV is a detection for specially-crafted PDF files that target a software vulnerability in Adobe Acrobat and Adobe Reader. Once the malformed PDF files are opened by vulnerable versions of Adobe Acrobat and Reader, the embedded JavaScript is executed and loads the exploit. The vulnerability is discussed in the following links:
Exploit:JS/Pdfjsc.AC
Exploit:JS/Pdfjsc.AC is a detection for specially-crafted PDF files that attempt to exploit software vulnerabilities in Adobe Acrobat and Adobe Reader. Once the malformed PDF files are opened by vulnerable versions of Adobe Acrobat and Reader, the embedded JavaScript is executed and loads the exploit.
Exploit:Win32/Pdfjsc.OL
Exploit:Win32/Pdfjsc.OL is the detection for malicious Portable Document Format (PDF) files that contain an obfuscated JavaScript. These files exploit a vulnerability in Adobe Acrobat and Adobe Reader that allows it to download and execute arbitrary files. The vulnerability is discussed in the following links:
Exploit:Win32/Pdfjsc.H
Exploit:Win32/Pdfjsc.X
Exploit:Win32/Pdfjsc.GR
-
CVE-2009-0927 - the "Collab.getIcon" method
-
CVE-2008-2992 - the "util.printf" method
-
CVE-2007-5659 - the "Collab.collectEmailInfo" method
Exploit:JS/Pdfjsc.S
Exploit:Win32/Pdfjsc.YX
Exploit:Win32/Pdfjsc.YX is a specially-crafted JavaScript, which exploits a vulnerability in the Java Runtime Environment, Adobe Acrobat, and Adobe Reader discussed in the following articles:
Exploit:Win32/Pdfjsc.AU
Windows Defender detects and removes this threat.
This threat uses an Adobe vulnerability to download and run files on your PC, including malware.
It runs when you open an infected PDF file and you have a vulnerable version of Adobe Reader or Acrobat. You might receive this PDF file as an email attachment.
The following versions of Adobe Reader/Acrobat are vulnerable:
- Adobe Acrobat and Adobe Reader version 11 earlier than 11.0.03
- Adobe Acrobat and Adobe Reader version 10 earlier than 10.1.7
- Adobe Acrobat and Adobe Reader version 9 earlier than 9.5.5
Exploit:Win32/Pdfjsc.BC
Windows Defender detects and removes this threat.
This threat uses a vulnerability in some Adobe products to download and run files on your PC, including other malware.
It can run if you have a vulnerable version of Adobe on your PC and you visit a malicious website, or open a malicious PDF document attached to an email.
The following versions of Adobe Reader and Acrobat are vulnerable:
- 9.x before 9.5.5
- 10.x before 10.1.7
- 11.x before 11.0.03
You may get an alert about this threat even if you're not using a vulnerable software version. This is because we detect when an attempt is made to exploit this vulnerability, even if it isn't successful.
You can find more information about this threat on the CVE website or our page about exploits.
Exploit:Win32/Pdfjsc.FN
Exploit:Win32/Pdfjsc.FU
Exploit:Win32/Pdfjsc.HW
Exploit:JS/Pdfjsc.Z
Exploit:JS/Pdfjsc.Z is an obfuscated JavaScript often distributed through compromised websites. It is designed to exploit several vulnerabilities in the web browser.
Exploit:Win32/Pdfjsc.ADM
Exploit:Win32/Pdfjsc.ADM is a malicious PDF file that exploits a vulnerability in Adobe Acrobat and Adobe Reader.
The vulnerabilities, discussed in CVE-2010-0188, allow this malware to download and run arbitrary files.