A program or technique that takes advantage of a vulnerability to remotely access or attack a program, computer or server.
Depending on the settings of your F-Secure security product, it will either automatically delete, quarantine or rename the suspect file, or ask you for a desired action.
More scanning & removal options
More information on the scanning and removal options available in your F-Secure product can be found in the Help Center.
You may also refer to the Knowledge Base on the F-Secure Community site for more information.
Exploit:W32/PDFExploit.G is distributed in a maliciously-crafted PDF file and exploits a vulnerability (CVE-2010-0188) in Adobe Reader program to open a connection to a remote website.
For more information about the vulnerability, please see:
- https://www.adobe.com/support/security/bulletins/apsb10-07.html (external site)
When the malicious PDF file is executed, a downloader is dropped on the computer and attempts to open a connection to: