Page 127 of 646 results (0.010 seconds)

CVSS: 2.6EPSS: 0%CPEs: 2EXPL: 0

Adobe Acrobat Reader 6.0.3 and 7.0.0 allows remote attackers to cause a denial of service (application crash) via a PDF file that contains a negative Count value in the root page node. • http://marc.info/?l=bugtraq&m=110879063511486&w=2 http://secunia.com/advisories/14813 http://www.adobe.com/support/techdocs/331468.html http://www.vupen.com/english/advisories/2005/0310 https://exchange.xforce.ibmcloud.com/vulnerabilities/19946 • CWE-20: Improper Input Validation •

CVSS: 10.0EPSS: 10%CPEs: 1EXPL: 0

Buffer overflow in the mailListIsPdf function in Adobe Acrobat Reader 5.09 for Unix allows remote attackers to execute arbitrary code via an e-mail message with a crafted PDF attachment. • http://secunia.com/advisories/13474 http://www.adobe.com/support/techdocs/331153.html http://www.idefense.com/application/poi/display?id=161&type=vulnerabilities&flashstatus=false http://www.kb.cert.org/vuls/id/253024 http://www.novell.com/linux/security/advisories/2005_01_sr.html https://exchange.xforce.ibmcloud.com/vulnerabilities/18477 https://access.redhat.com/security/cve/CVE-2004-1152 https://bugzilla.redhat.com/show_bug.cgi?id=1617381 •

CVSS: 10.0EPSS: 46%CPEs: 3EXPL: 1

Format string vulnerability in Adobe Acrobat Reader 6.0.0 through 6.0.2 allows remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via an .ETD document containing format string specifiers in (1) title or (2) baseurl fields. • http://www.adobe.com/support/downloads/detail.jsp?ftpID=2679 http://www.idefense.com/application/poi/display?id=163&type=vulnerabilities https://exchange.xforce.ibmcloud.com/vulnerabilities/18478 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A2919 •

CVSS: 5.0EPSS: 0%CPEs: 6EXPL: 0

Adobe Acrobat and Acrobat Reader 6.0 allow remote attackers to read arbitrary files via a PDF file that contains an embedded Shockwave (swf) file that references files outside of the temporary directory. • http://marc.info/?l=bugtraq&m=109771686326956&w=2 http://marc.info/?l=bugtraq&m=109779541602447&w=2 http://marc.info/?l=bugtraq&m=109812210520520&w=2 http://www.securityfocus.com/bid/11386 https://exchange.xforce.ibmcloud.com/vulnerabilities/17694 •

CVSS: 7.5EPSS: 5%CPEs: 11EXPL: 0

Buffer overflow in the ActiveX component (pdf.ocx) for Adobe Acrobat 5.0.5 and Acrobat Reader, and possibly other versions, allows remote attackers to execute arbitrary code via a URI for a PDF file with a null terminator (%00) followed by a long string. Desbordamiento de búfer en el componente ActiveX (pdf.ocx) de Adobe Acrobat 5.0.5 y Acrobat Reader, y posiblemente otras versiones, permite a atacantes remotos ejecutar código de su elección mediante una URI de un fichero PDF con un terminador nulo (%00) seguido por una cadena larga. • http://www.adobe.com/support/techdocs/330527.html http://www.gentoo.org/security/en/glsa/glsa-200408-14.xml http://www.idefense.com/application/poi/display?id=126&type=vulnerabilities http://www.securityfocus.com/bid/10947 https://exchange.xforce.ibmcloud.com/vulnerabilities/16998 •