Page 3 of 13 results (0.002 seconds)

CVSS: 2.1EPSS: 0%CPEs: 1EXPL: 0

Adobe Document Server for Reader Extensions 6.0 allows remote authenticated users to inject arbitrary web script via a leading (1) ftp or (2) http URI in the ReaderURL variable in the "Update Download Site" section of ads-readerext. NOTE: it is not clear whether the vendor advisory addresses this issue. In addition, since the issue requires administrative privileges to exploit, it is not clear whether this crosses security boundaries. • http://secunia.com/advisories/15924 http://secunia.com/secunia_research/2005-68/advisory http://www.adobe.com/support/techdocs/322699.html http://www.osvdb.org/24588 http://www.securityfocus.com/archive/1/430869/100/0/threaded http://www.securityfocus.com/bid/17500 http://www.vupen.com/english/advisories/2006/1342 https://exchange.xforce.ibmcloud.com/vulnerabilities/25770 •

CVSS: 2.6EPSS: 1%CPEs: 1EXPL: 0

Adobe Document Server for Reader Extensions 6.0, during log on, provides different error messages depending on whether the user ID is valid or invalid, which allows remote attackers to more easily identify valid user IDs via brute force attacks. • http://secunia.com/advisories/15924 http://secunia.com/secunia_research/2005-68/advisory http://www.adobe.com/support/techdocs/331917.html http://www.securityfocus.com/archive/1/430869/100/0/threaded http://www.securityfocus.com/bid/17500 http://www.vupen.com/english/advisories/2006/1342 https://exchange.xforce.ibmcloud.com/vulnerabilities/25772 •

CVSS: 2.6EPSS: 0%CPEs: 4EXPL: 0

Adobe Graphics Server 2.0 and 2.1 (formerly AlterCast) and Adobe Document Server (ADS) 5.0 and 6.0 allows local users to read files with certain extensions or overwrite arbitrary files and execute code via a crafted SOAP request to the AlterCast web service in which the request uses the (1) saveContent or (2) saveOptimized ADS commands, or the (3) loadContent command. • http://secunia.com/advisories/19229 http://securityreason.com/securityalert/588 http://securitytracker.com/id?1015768 http://securitytracker.com/id?1015769 http://www.adobe.com/support/techdocs/332989.html http://www.osvdb.org/23924 http://www.securityfocus.com/archive/1/427730/100/0/threaded http://www.securityfocus.com/bid/17113 http://www.vupen.com/english/advisories/2006/0956 https://exchange.xforce.ibmcloud.com/vulnerabilities/25247 •