Page 66 of 597 results (0.050 seconds)

CVSS: 9.3EPSS: 0%CPEs: 8EXPL: 0

Adobe Acrobat Reader versions 15.020.20042 and earlier, 15.006.30244 and earlier, 11.0.18 and earlier have an exploitable memory corruption vulnerability in the XFA engine related to a form's structure and organization. Successful exploitation could lead to arbitrary code execution. Las versiones de Adobe Acrobat Reader 15.020.20042 y anteriores, 15.006.30244 y anteriores, 11.0.18 y anteriores tienen una vulnerabilidad de corrupción de memoria explotable en el motor XFA relacionado con la estructura y organización de un formulario. Una explotación satisfactoria podría conducir a la ejecución de código arbitrario. This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Adobe Reader DC. • http://www.securityfocus.com/bid/95345 http://www.securitytracker.com/id/1037574 http://www.zerodayinitiative.com/advisories/ZDI-17-031 https://helpx.adobe.com/security/products/acrobat/apsb17-01.html • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 9.3EPSS: 80%CPEs: 8EXPL: 0

Adobe Acrobat Reader versions 15.020.20042 and earlier, 15.006.30244 and earlier, 11.0.18 and earlier have an exploitable heap overflow vulnerability in the XSLT engine. Successful exploitation could lead to arbitrary code execution. Las versiones de Adobe Acrobat Reader 15.020.20042 y anteriores, 15.006.30244 y anteriores, 11.0.18 y anteriores tienen una vulnerabilidad de desbordamiento de memoria dinámica explotable en el motor XSLT. Una explotación satisfactoria podría conducir a la ejecución de código arbitrario. This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Adobe Acrobat Reader DC. • http://www.securityfocus.com/bid/95344 http://www.securitytracker.com/id/1037574 http://www.zerodayinitiative.com/advisories/ZDI-17-005 http://www.zerodayinitiative.com/advisories/ZDI-17-006 http://www.zerodayinitiative.com/advisories/ZDI-17-007 http://www.zerodayinitiative.com/advisories/ZDI-17-008 http://www.zerodayinitiative.com/advisories/ZDI-17-009 http://www.zerodayinitiative.com/advisories/ZDI-17-011 http://www.zerodayinitiative.com/advisories/ZDI-17-012 http://www.zerodayinitiative.com • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 10.0EPSS: 0%CPEs: 8EXPL: 0

Adobe Reader and Acrobat before 11.0.18, Acrobat and Acrobat Reader DC Classic before 15.006.30243, and Acrobat and Acrobat Reader DC Continuous before 15.020.20039 on Windows and OS X allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors. Adobe Reader y Acrobat en versiones anteriores a 11.0.18, Acrobat y Acrobat Reader DC Classic en versiones anteriores a 15.006.30243 y Acrobat y Acrobat Reader DC Continuous en versiones anteriores a 15.020.20039 en Windows y OS X permite a atacantes ejecutar un código arbitrario o provocar una denegación de servicio (corrupción de memoria) a través de vectores no especificados. • http://www.securityfocus.com/bid/94253 https://helpx.adobe.com/security/products/acrobat/apsb16-33.html • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 8.8EPSS: 1%CPEs: 2EXPL: 0

Out-of-Bounds read vulnerability in Foxit Reader and PhantomPDF before 8.1 on Windows, when the gflags app is enabled, allows remote attackers to execute arbitrary code via a crafted BMP image embedded in the XFA stream in a PDF document, aka "Data from Faulting Address may be used as a return value starting at FOXITREADER." Vulnerabilidad de lectura fuera de límites en Foxit Reader y PhantomPDF en versiones anteriores a 8.1 en Windows, cuando se habilita la aplicación gflags, permite a atacantes remotos ejecutar código arbitrario a través de una imagen BMP manipulada incrustada en el flujo XFA en un documento PDF, vulnerabilidad también conocida como "Data de Faulting Address puede ser usada como un valor de retorno a partir de FOXITREADER". • http://www.securityfocus.com/bid/93608 https://www.foxitsoftware.com/support/security-bulletins.php • CWE-125: Out-of-bounds Read •

CVSS: 8.8EPSS: 2%CPEs: 2EXPL: 0

Heap buffer overflow (Out-of-Bounds write) vulnerability in Foxit Reader and PhantomPDF before 8.1 on Windows allows remote attackers to execute arbitrary code via a crafted JPEG2000 image embedded in a PDF document, aka a "corrupted suffix pattern" issue. Vulnerabilidad de desbordamiento de búfer basado en memoria dinámica (escritura fuera de límites) en Foxit Reader y PhantomPDF en versiones anteriores a 8.1 en Windows permite a atacantes remotos ejecutar código arbitrario a través de una imagen JPEG2000 manipulada incrustada en un documento PDF, vulnerabilidad también conocida como un problema "patrón de sufijo corrupto". • http://www.securityfocus.com/bid/93608 https://www.foxitsoftware.com/support/security-bulletins.php • CWE-787: Out-of-bounds Write •