Page 126 of 646 results (0.009 seconds)

CVSS: 2.1EPSS: 0%CPEs: 2EXPL: 0

The control for Adobe Reader 5.0.9 and 5.0.10 on Linux, Solaris, HP-UX, and AIX creates temporary files with the permissions as specified in a user's umask, which could allow local users to read PDF documents of that user if the umask allows it. • http://secunia.com/advisories/14457 http://secunia.com/secunia_research/2005-6/advisory http://www.adobe.com/support/techdocs/329121.html http://www.redhat.com/support/errata/RHSA-2005-575.html https://access.redhat.com/security/cve/CVE-2005-1841 https://bugzilla.redhat.com/show_bug.cgi?id=1617672 •

CVSS: 5.0EPSS: 1%CPEs: 2EXPL: 0

Stack-based buffer overflow in the UnixAppOpenFilePerform function in Adobe Reader 5.0.9 and 5.0.10 for Unix allows remote attackers to execute arbitrary code via a PDF document with a long /Filespec tag. • http://www.adobe.com/support/techdocs/329083.html http://www.idefense.com/application/poi/display?id=279&type=vulnerabilities http://www.novell.com/linux/security/advisories/2005_42_acroread.html http://www.redhat.com/support/errata/RHSA-2005-575.html https://access.redhat.com/security/cve/CVE-2005-1625 https://bugzilla.redhat.com/show_bug.cgi?id=1617656 •

CVSS: 7.5EPSS: 0%CPEs: 4EXPL: 2

The Adobe Reader control in Adobe Reader and Acrobat 7.0 and 7.0.1 allows remote attackers to determine the existence of files via Javascript containing XML script, aka the "XML External Entity vulnerability." • https://www.exploit-db.com/exploits/25822 http://www.adobe.com/support/techdocs/331710.html http://www.securityfocus.com/bid/13962 • CWE-611: Improper Restriction of XML External Entity Reference •

CVSS: 2.6EPSS: 3%CPEs: 3EXPL: 0

** UNVERIFIABLE ** NOTE: this issue describes a problem that can not be independently verified as of 20050421. Adobe Acrobat reader (AcroRd32.exe) 6.0 and earlier allows remote attackers to cause a denial of service ("Invalid-ID-Handle-Error" error) and modify memory beginning at a particular address, possibly allowing the execution of arbitrary code, via a crafted PDF file. NOTE: the vendor has stated that the reporter refused to provide sufficient details to confirm the issue. In addition, due to the lack of details in the original advisory, an independent verification is not possible. Finally, the reliability of the original reporter is unknown. • http://securitytracker.com/id?1013774 http://www.alphahackers.com/advisories/acrobat6.txt http://www.osvdb.org/15850 http://www.securityfocus.com/bid/13265 https://exchange.xforce.ibmcloud.com/vulnerabilities/20216 •

CVSS: 5.1EPSS: 6%CPEs: 9EXPL: 0

The Acrobat web control in Adobe Acrobat and Acrobat Reader 7.0 and earlier, when used with Internet Explorer, allows remote attackers to determine the existence of arbitrary files via the LoadFile ActiveX method. • http://secunia.com/advisories/14813 http://www.adobe.com/support/techdocs/331465.html http://www.hyperdose.com/advisories/H2005-06.txt http://www.niscc.gov.uk/niscc/docs/re-20050401-00264.pdf http://www.osvdb.org/15242 http://www.securityfocus.com/bid/12989 http://www.vupen.com/english/advisories/2005/0310 •