Page 113 of 562 results (0.005 seconds)

CVSS: 5.0EPSS: 1%CPEs: 2EXPL: 0

Stack-based buffer overflow in the UnixAppOpenFilePerform function in Adobe Reader 5.0.9 and 5.0.10 for Unix allows remote attackers to execute arbitrary code via a PDF document with a long /Filespec tag. • http://www.adobe.com/support/techdocs/329083.html http://www.idefense.com/application/poi/display?id=279&type=vulnerabilities http://www.novell.com/linux/security/advisories/2005_42_acroread.html http://www.redhat.com/support/errata/RHSA-2005-575.html https://access.redhat.com/security/cve/CVE-2005-1625 https://bugzilla.redhat.com/show_bug.cgi?id=1617656 •

CVSS: 2.6EPSS: 3%CPEs: 3EXPL: 0

** UNVERIFIABLE ** NOTE: this issue describes a problem that can not be independently verified as of 20050421. Adobe Acrobat reader (AcroRd32.exe) 6.0 and earlier allows remote attackers to cause a denial of service ("Invalid-ID-Handle-Error" error) and modify memory beginning at a particular address, possibly allowing the execution of arbitrary code, via a crafted PDF file. NOTE: the vendor has stated that the reporter refused to provide sufficient details to confirm the issue. In addition, due to the lack of details in the original advisory, an independent verification is not possible. Finally, the reliability of the original reporter is unknown. • http://securitytracker.com/id?1013774 http://www.alphahackers.com/advisories/acrobat6.txt http://www.osvdb.org/15850 http://www.securityfocus.com/bid/13265 https://exchange.xforce.ibmcloud.com/vulnerabilities/20216 •