Page 133 of 669 results (0.012 seconds)

CVSS: 7.5EPSS: 1%CPEs: 16EXPL: 0

Buffer overflow in a "core application plug-in" for Adobe Reader 5.1 through 7.0.2 and Acrobat 5.0 through 7.0.2 allows attackers to cause a denial of service (crash) and possibly execute arbitrary code via unknown vectors. • http://secunia.com/advisories/16466 http://securitytracker.com/id?1014712 http://www.adobe.com/support/techdocs/321644.html http://www.gentoo.org/security/en/glsa/glsa-200508-11.xml http://www.kb.cert.org/vuls/id/896220 http://www.novell.com/linux/security/advisories/2005_19_sr.html http://www.redhat.com/support/errata/RHSA-2005-750.html http://www.securityfocus.com/bid/14603 http://www.vupen.com/english/advisories/2005/1434 https://exchange.xforce.ibmcloud.com/ •

CVSS: 7.5EPSS: 0%CPEs: 4EXPL: 2

The Adobe Reader control in Adobe Reader and Acrobat 7.0 and 7.0.1 allows remote attackers to determine the existence of files via Javascript containing XML script, aka the "XML External Entity vulnerability." • https://www.exploit-db.com/exploits/25822 http://www.adobe.com/support/techdocs/331710.html http://www.securityfocus.com/bid/13962 • CWE-611: Improper Restriction of XML External Entity Reference •

CVSS: 5.0EPSS: 0%CPEs: 6EXPL: 0

Adobe Acrobat and Acrobat Reader 6.0 allow remote attackers to read arbitrary files via a PDF file that contains an embedded Shockwave (swf) file that references files outside of the temporary directory. • http://marc.info/?l=bugtraq&m=109771686326956&w=2 http://marc.info/?l=bugtraq&m=109779541602447&w=2 http://marc.info/?l=bugtraq&m=109812210520520&w=2 http://www.securityfocus.com/bid/11386 https://exchange.xforce.ibmcloud.com/vulnerabilities/17694 •

CVSS: 7.5EPSS: 5%CPEs: 11EXPL: 0

Buffer overflow in the ActiveX component (pdf.ocx) for Adobe Acrobat 5.0.5 and Acrobat Reader, and possibly other versions, allows remote attackers to execute arbitrary code via a URI for a PDF file with a null terminator (%00) followed by a long string. Desbordamiento de búfer en el componente ActiveX (pdf.ocx) de Adobe Acrobat 5.0.5 y Acrobat Reader, y posiblemente otras versiones, permite a atacantes remotos ejecutar código de su elección mediante una URI de un fichero PDF con un terminador nulo (%00) seguido por una cadena larga. • http://www.adobe.com/support/techdocs/330527.html http://www.gentoo.org/security/en/glsa/glsa-200408-14.xml http://www.idefense.com/application/poi/display?id=126&type=vulnerabilities http://www.securityfocus.com/bid/10947 https://exchange.xforce.ibmcloud.com/vulnerabilities/16998 •

CVSS: 7.5EPSS: 12%CPEs: 4EXPL: 0

Adobe Reader 6.0 does not properly handle null characters when splitting a filename path into components, which allows remote attackers to execute arbitrary code via a file with a long extension that is not normally handled by Reader, triggering a buffer overflow. Adobe Reader 6.0 no maneja adecuadamente caractéres nulos cuando divide la ruta de un archivo en sus componentes, lo que permite a atacantes remotos ejecutar código de su elección mediante un fichero con una extensión larga que no es normalmente manejada por Reader, disparando un desbordameinteo de búfer. • http://www.adobe.com/support/techdocs/330527.html http://www.adobe.com/support/techdocs/34222.htm http://www.idefense.com/application/poi/display?id=116&type=vulnerabilities https://exchange.xforce.ibmcloud.com/vulnerabilities/16667 •