Page 46 of 230 results (0.010 seconds)

CVSS: 7.5EPSS: 1%CPEs: 16EXPL: 0

Buffer overflow in a "core application plug-in" for Adobe Reader 5.1 through 7.0.2 and Acrobat 5.0 through 7.0.2 allows attackers to cause a denial of service (crash) and possibly execute arbitrary code via unknown vectors. • http://secunia.com/advisories/16466 http://securitytracker.com/id?1014712 http://www.adobe.com/support/techdocs/321644.html http://www.gentoo.org/security/en/glsa/glsa-200508-11.xml http://www.kb.cert.org/vuls/id/896220 http://www.novell.com/linux/security/advisories/2005_19_sr.html http://www.redhat.com/support/errata/RHSA-2005-750.html http://www.securityfocus.com/bid/14603 http://www.vupen.com/english/advisories/2005/1434 https://exchange.xforce.ibmcloud.com/ •

CVSS: 7.5EPSS: 0%CPEs: 4EXPL: 2

The Adobe Reader control in Adobe Reader and Acrobat 7.0 and 7.0.1 allows remote attackers to determine the existence of files via Javascript containing XML script, aka the "XML External Entity vulnerability." • https://www.exploit-db.com/exploits/25822 http://www.adobe.com/support/techdocs/331710.html http://www.securityfocus.com/bid/13962 • CWE-611: Improper Restriction of XML External Entity Reference •

CVSS: 5.1EPSS: 6%CPEs: 9EXPL: 0

The Acrobat web control in Adobe Acrobat and Acrobat Reader 7.0 and earlier, when used with Internet Explorer, allows remote attackers to determine the existence of arbitrary files via the LoadFile ActiveX method. • http://secunia.com/advisories/14813 http://www.adobe.com/support/techdocs/331465.html http://www.hyperdose.com/advisories/H2005-06.txt http://www.niscc.gov.uk/niscc/docs/re-20050401-00264.pdf http://www.osvdb.org/15242 http://www.securityfocus.com/bid/12989 http://www.vupen.com/english/advisories/2005/0310 •

CVSS: 2.6EPSS: 0%CPEs: 2EXPL: 0

Adobe Acrobat Reader 6.0.3 and 7.0.0 allows remote attackers to cause a denial of service (application crash) via a PDF file that contains a negative Count value in the root page node. • http://marc.info/?l=bugtraq&m=110879063511486&w=2 http://secunia.com/advisories/14813 http://www.adobe.com/support/techdocs/331468.html http://www.vupen.com/english/advisories/2005/0310 https://exchange.xforce.ibmcloud.com/vulnerabilities/19946 • CWE-20: Improper Input Validation •

CVSS: 10.0EPSS: 46%CPEs: 3EXPL: 1

Format string vulnerability in Adobe Acrobat Reader 6.0.0 through 6.0.2 allows remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via an .ETD document containing format string specifiers in (1) title or (2) baseurl fields. • http://www.adobe.com/support/downloads/detail.jsp?ftpID=2679 http://www.idefense.com/application/poi/display?id=163&type=vulnerabilities https://exchange.xforce.ibmcloud.com/vulnerabilities/18478 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A2919 •