Page 41 of 210 results (0.011 seconds)

CVSS: 7.5EPSS: 3%CPEs: 1EXPL: 0

Adobe Document Server for Reader Extensions 6.0 does not provide proper access control, which allows remote authenticated users to perform privileged actions by modifying the (1) actionID and (2) pageID parameters. NOTE: due to an error during reservation, this identifier was inadvertently associated with multiple issues. Other CVE identifiers have been assigned to handle other problems that are covered by the same disclosure. • http://secunia.com/advisories/15924 http://secunia.com/secunia_research/2005-68/advisory http://securitytracker.com/id?1015905 http://www.adobe.com/support/techdocs/322699.html http://www.securityfocus.com/archive/1/430869/100/0/threaded http://www.securityfocus.com/bid/17500 http://www.vupen.com/english/advisories/2006/1342 https://exchange.xforce.ibmcloud.com/vulnerabilities/25769 •

CVSS: 4.6EPSS: 0%CPEs: 60EXPL: 0

Multiple Adobe products, including (1) Photoshop CS2, (2) Illustrator CS2, and (3) Adobe Help Center, install a large number of .EXE and .DLL files with write-access permission for the Everyone group, which allows local users to gain privileges via Trojan horse programs. • http://secunia.com/advisories/18698 http://securitytracker.com/id?1015577 http://securitytracker.com/id?1015578 http://securitytracker.com/id?1015579 http://www.adobe.com/support/techdocs/332644.html http://www.cs.princeton.edu/~sudhakar/papers/winval.pdf http://www.kb.cert.org/vuls/id/953860 http://www.osvdb.org/22908 http://www.securityfocus.com/archive/1/423587/100/0/threaded http://www.securityfocus.com/bid/16451 http://www.vupen.com/english/advisories/2006/ • CWE-264: Permissions, Privileges, and Access Controls •

CVSS: 7.5EPSS: 1%CPEs: 16EXPL: 0

Buffer overflow in a "core application plug-in" for Adobe Reader 5.1 through 7.0.2 and Acrobat 5.0 through 7.0.2 allows attackers to cause a denial of service (crash) and possibly execute arbitrary code via unknown vectors. • http://secunia.com/advisories/16466 http://securitytracker.com/id?1014712 http://www.adobe.com/support/techdocs/321644.html http://www.gentoo.org/security/en/glsa/glsa-200508-11.xml http://www.kb.cert.org/vuls/id/896220 http://www.novell.com/linux/security/advisories/2005_19_sr.html http://www.redhat.com/support/errata/RHSA-2005-750.html http://www.securityfocus.com/bid/14603 http://www.vupen.com/english/advisories/2005/1434 https://exchange.xforce.ibmcloud.com/ •

CVSS: 2.6EPSS: 3%CPEs: 3EXPL: 0

** UNVERIFIABLE ** NOTE: this issue describes a problem that can not be independently verified as of 20050421. Adobe Acrobat reader (AcroRd32.exe) 6.0 and earlier allows remote attackers to cause a denial of service ("Invalid-ID-Handle-Error" error) and modify memory beginning at a particular address, possibly allowing the execution of arbitrary code, via a crafted PDF file. NOTE: the vendor has stated that the reporter refused to provide sufficient details to confirm the issue. In addition, due to the lack of details in the original advisory, an independent verification is not possible. Finally, the reliability of the original reporter is unknown. • http://securitytracker.com/id?1013774 http://www.alphahackers.com/advisories/acrobat6.txt http://www.osvdb.org/15850 http://www.securityfocus.com/bid/13265 https://exchange.xforce.ibmcloud.com/vulnerabilities/20216 •

CVSS: 5.1EPSS: 6%CPEs: 9EXPL: 0

The Acrobat web control in Adobe Acrobat and Acrobat Reader 7.0 and earlier, when used with Internet Explorer, allows remote attackers to determine the existence of arbitrary files via the LoadFile ActiveX method. • http://secunia.com/advisories/14813 http://www.adobe.com/support/techdocs/331465.html http://www.hyperdose.com/advisories/H2005-06.txt http://www.niscc.gov.uk/niscc/docs/re-20050401-00264.pdf http://www.osvdb.org/15242 http://www.securityfocus.com/bid/12989 http://www.vupen.com/english/advisories/2005/0310 •