CVE-2005-0035
https://notcve.org/view.php?id=CVE-2005-0035
The Acrobat web control in Adobe Acrobat and Acrobat Reader 7.0 and earlier, when used with Internet Explorer, allows remote attackers to determine the existence of arbitrary files via the LoadFile ActiveX method. • http://secunia.com/advisories/14813 http://www.adobe.com/support/techdocs/331465.html http://www.hyperdose.com/advisories/H2005-06.txt http://www.niscc.gov.uk/niscc/docs/re-20050401-00264.pdf http://www.osvdb.org/15242 http://www.securityfocus.com/bid/12989 http://www.vupen.com/english/advisories/2005/0310 •
CVE-2004-1152
https://notcve.org/view.php?id=CVE-2004-1152
Buffer overflow in the mailListIsPdf function in Adobe Acrobat Reader 5.09 for Unix allows remote attackers to execute arbitrary code via an e-mail message with a crafted PDF attachment. • http://secunia.com/advisories/13474 http://www.adobe.com/support/techdocs/331153.html http://www.idefense.com/application/poi/display?id=161&type=vulnerabilities&flashstatus=false http://www.kb.cert.org/vuls/id/253024 http://www.novell.com/linux/security/advisories/2005_01_sr.html https://exchange.xforce.ibmcloud.com/vulnerabilities/18477 https://access.redhat.com/security/cve/CVE-2004-1152 https://bugzilla.redhat.com/show_bug.cgi?id=1617381 •
CVE-2004-1153
https://notcve.org/view.php?id=CVE-2004-1153
Format string vulnerability in Adobe Acrobat Reader 6.0.0 through 6.0.2 allows remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via an .ETD document containing format string specifiers in (1) title or (2) baseurl fields. • http://www.adobe.com/support/downloads/detail.jsp?ftpID=2679 http://www.idefense.com/application/poi/display?id=163&type=vulnerabilities https://exchange.xforce.ibmcloud.com/vulnerabilities/18478 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A2919 •
CVE-2004-1598
https://notcve.org/view.php?id=CVE-2004-1598
Adobe Acrobat and Acrobat Reader 6.0 allow remote attackers to read arbitrary files via a PDF file that contains an embedded Shockwave (swf) file that references files outside of the temporary directory. • http://marc.info/?l=bugtraq&m=109771686326956&w=2 http://marc.info/?l=bugtraq&m=109779541602447&w=2 http://marc.info/?l=bugtraq&m=109812210520520&w=2 http://www.securityfocus.com/bid/11386 https://exchange.xforce.ibmcloud.com/vulnerabilities/17694 •
CVE-2004-0629
https://notcve.org/view.php?id=CVE-2004-0629
Buffer overflow in the ActiveX component (pdf.ocx) for Adobe Acrobat 5.0.5 and Acrobat Reader, and possibly other versions, allows remote attackers to execute arbitrary code via a URI for a PDF file with a null terminator (%00) followed by a long string. Desbordamiento de búfer en el componente ActiveX (pdf.ocx) de Adobe Acrobat 5.0.5 y Acrobat Reader, y posiblemente otras versiones, permite a atacantes remotos ejecutar código de su elección mediante una URI de un fichero PDF con un terminador nulo (%00) seguido por una cadena larga. • http://www.adobe.com/support/techdocs/330527.html http://www.gentoo.org/security/en/glsa/glsa-200408-14.xml http://www.idefense.com/application/poi/display?id=126&type=vulnerabilities http://www.securityfocus.com/bid/10947 https://exchange.xforce.ibmcloud.com/vulnerabilities/16998 •