Page 124 of 646 results (0.013 seconds)

CVSS: 4.3EPSS: 92%CPEs: 36EXPL: 2

Adobe Acrobat Reader Plugin before 8.0.0 for the Firefox, Internet Explorer, and Opera web browsers allows remote attackers to force the browser to make unauthorized requests to other web sites via a URL in the (1) FDF, (2) xml, and (3) xfdf AJAX request parameters, following the # (hash) character, aka "Universal CSRF and session riding." Adobe Acrobat Reader Plugin anterior a la versión 8.0.0 para los navegadores Firefox, Internet Explorer y Opera permite a atacantes remotos forzar al navegador a realizar una petición no autorizada a otros sitios web a través de una mediante una URL en los parámetros de petición (1) FDF, (2) xml y (3) xfdf AJAX, seguidos del carácter # (almohadilla), también conocido como "Universal CSRF and session riding". • https://www.exploit-db.com/exploits/29383 http://events.ccc.de/congress/2006/Fahrplan/attachments/1158-Subverting_Ajax.pdf http://lists.suse.com/archive/suse-security-announce/2007-Jan/0012.html http://secunia.com/advisories/23812 http://secunia.com/advisories/23882 http://secunia.com/advisories/29065 http://security.gentoo.org/glsa/glsa-200701-16.xml http://securityreason.com/securityalert/2090 http://securitytracker.com/id?1017469 http://www.redhat.com/support/errata/RHSA-2008- • CWE-352: Cross-Site Request Forgery (CSRF) •

CVSS: 9.3EPSS: 48%CPEs: 54EXPL: 0

Adobe Reader and Acrobat 7.0.8 and earlier allows user-assisted remote attackers to execute code via a crafted PDF file that triggers memory corruption and overwrites a subroutine pointer during rendering. Adobe Reader y Acrobat 7.0.8 y anteriores permite a atacantes remotos con la intervención del usuario ejecutar código mediante un archivo PDF manipulado que dispara una corrupción de memoria y sobrescribe un puntero de subrutina durante el dibujado. • http://archives.neohapsis.com/archives/fulldisclosure/2007-01/0200.html http://lists.suse.com/archive/suse-security-announce/2007-Jan/0012.html http://osvdb.org/31316 http://secunia.com/advisories/23666 http://secunia.com/advisories/23691 http://secunia.com/advisories/23812 http://secunia.com/advisories/23877 http://secunia.com/advisories/23882 http://secunia.com/advisories/24533 http://security.gentoo.org/glsa/glsa-200701-16.xml http://securitytracker.com/id?1017491 http:/ • CWE-399: Resource Management Errors •

CVSS: 9.3EPSS: 48%CPEs: 9EXPL: 1

Adobe Reader (Adobe Acrobat Reader) 7.0 through 7.0.8 allows remote attackers to cause a denial of service and possibly execute arbitrary code via a long argument string to the (1) src, (2) setPageMode, (3) setLayoutMode, and (4) setNamedDest methods in an AcroPDF ActiveX control, a different set of vectors than CVE-2006-6027. Adobe Reader (Adobe Acrobat Reader) 7.0 hasta 7.0.8 permite a un atacante remoto provocar denegación de servicio y posiblemente ejecutar código de su elección a tavés de un parámetro de cadena a los métodos (1) src, (2) setPageMode, (3) setLayoutMode, y (4) setNamedDest en el control AcroPDF ActiveX, diferente al grupo de vectores de CVE-2006-6027. • http://research.eeye.com/html/alerts/zeroday/20061128.html http://secunia.com/advisories/23138 http://www.adobe.com/support/security/advisories/apsa06-02.html http://www.kb.cert.org/vuls/id/198908 http://www.securityfocus.com/archive/1/453579/100/0/threaded http://www.securityfocus.com/bid/21338 http://www.securityfocus.com/bid/21813 http://www.vupen.com/english/advisories/2006/4751 https://exchange.xforce.ibmcloud.com/vulnerabilities/30574 https://exchange.xforce.ibmcloud.c •

CVSS: 9.3EPSS: 94%CPEs: 9EXPL: 3

Adobe Reader (Adobe Acrobat Reader) 7.0 through 7.0.8 allows remote attackers to cause a denial of service and possibly execute arbitrary code via a long argument string to the LoadFile method in an AcroPDF ActiveX control. Adobe Reader (Adobe Acrobat Reader) 7.0 hasta 7.0.8 permite a atacantes remotos provocar una denegación de servicio y posiblemente ejecutar código de su elección mediante un argumento de cadena largo al método LoadFile en el control ActiveX AcroPDF. • https://www.exploit-db.com/exploits/29076 http://downloads.securityfocus.com/vulnerabilities/exploits/21155-AcroPDF_DoS.html http://research.eeye.com/html/alerts/zeroday/20061128.html http://secunia.com/advisories/23138 http://securitytracker.com/id?1017297 http://www.adobe.com/support/security/advisories/apsa06-02.html http://www.kb.cert.org/vuls/id/198908 http://www.securityfocus.com/archive/1/453579/100/0/threaded http://www.securityfocus.com/bid/21155 http://www.vupen.com& •

CVSS: 7.5EPSS: 18%CPEs: 39EXPL: 8

Multiple stack-based buffer overflows in the TIFF library (libtiff) before 3.8.2, as used in Adobe Reader 9.3.0 and other products, allow context-dependent attackers to execute arbitrary code or cause a denial of service via unspecified vectors, including a large tdir_count value in the TIFFFetchShortPair function in tif_dirread.c. Múltiples desbordamientos de búfer basados en pila en la librería TIFF (libtiff)anterior a 3.8.2 permiten a atacantes locales o remotos (dependiendo del contexto) provocar una denegación de servicio y posiblemente ejecutar código de su elección a través de vectores desconocidos, incluyendo un valor grande de tdir_count en la función TIFFFetchShortPair de tif_dirread.c • https://www.exploit-db.com/exploits/16862 https://www.exploit-db.com/exploits/16868 https://www.exploit-db.com/exploits/16869 https://www.exploit-db.com/exploits/21869 https://www.exploit-db.com/exploits/21868 https://www.exploit-db.com/exploits/11787 ftp://patches.sgi.com/support/free/security/advisories/20060801-01-P ftp://patches.sgi.com/support/free/security/advisories/20060901-01-P.asc http://lists.apple.com/archives/security-announce/2006//Aug/msg00000.html http&# • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •