Page 65 of 644 results (0.006 seconds)

CVSS: 9.3EPSS: 97%CPEs: 6EXPL: 4

20 Feb 2009 — Buffer overflow in Adobe Reader 9.0 and earlier, and Acrobat 9.0 and earlier, allows remote attackers to execute arbitrary code via a crafted PDF document, related to a non-JavaScript function call and possibly an embedded JBIG2 image stream, as exploited in the wild in February 2009 by Trojan.Pidief.E. Un desbordamiento del búfer en Adobe Reader versión 9.0 y anteriores, y Acrobat versión 9.0 y anteriores, permite a los atacantes remotos ejecutar código arbitrario por medio de un documento PDF creado, rela... • https://www.exploit-db.com/exploits/8099 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 9.1EPSS: 0%CPEs: 3EXPL: 0

05 Dec 2008 — Adobe Acrobat 9 uses more efficient encryption than previous versions, which makes it easier for attackers to guess a document's password via a brute-force attack. Adobe Acrobat v9 utiliza un cifrado mas eficiente que en anteriores versiones, lo que permite a atacantes averiguar la contraseña de un documento mas fácilmente a través de un ataque de fuerza bruta. • http://blogs.adobe.com/security/2008/12/acrobat_9_and_password_encrypt.html • CWE-310: Cryptographic Issues •

CVSS: 7.8EPSS: 0%CPEs: 60EXPL: 0

02 Feb 2006 — Multiple Adobe products, including (1) Photoshop CS2, (2) Illustrator CS2, and (3) Adobe Help Center, install a large number of .EXE and .DLL files with write-access permission for the Everyone group, which allows local users to gain privileges via Trojan horse programs. • http://secunia.com/advisories/18698 • CWE-264: Permissions, Privileges, and Access Controls •

CVSS: 9.8EPSS: 24%CPEs: 14EXPL: 1

18 Jun 2003 — Various PDF viewers including (1) Adobe Acrobat 5.06 and (2) Xpdf 1.01 allow remote attackers to execute arbitrary commands via shell metacharacters in an embedded hyperlink. Varios visores de PDF, incluidos Adobe Acrobat 5.06 y Xpdf 1.01 permiten a atacantes remotos la ejecución arbitraria de comandos mediante metacaracteres de shell en un hipervínculo embebido. • https://www.exploit-db.com/exploits/22771 •