Page 71 of 356 results (0.011 seconds)

CVSS: 7.5EPSS: 1%CPEs: 1EXPL: 1

Buffer overflow in the WWWLaunchNetscape function of Adobe Acrobat Reader (acroread) 5.0.7 and earlier allows remote attackers to execute arbitrary code via a .pdf file with a long mailto link. Desbordamiento de búfer en la función WWWLaunchNetscape de Adobe Acrobat Reader 5.0.7 y anteriores permite a atacantes remotos ejecutar código arbitrario mediante un fichero .pdf con un enlace largo. • https://www.exploit-db.com/exploits/22846 http://marc.info/?l=bugtraq&m=105709569312583&w=2 http://marc.info/?l=bugtraq&m=105785749721291&w=2 •

CVSS: 4.6EPSS: 0%CPEs: 12EXPL: 0

The digital signature mechanism for the Adobe Acrobat PDF viewer only verifies the PE header of executable code for a plug-in, which can allow attackers to execute arbitrary code in certified mode by making the plug-in appear to be signed by Adobe. El mecanismo de firma digital del visor de PDF Adobe Acrobat Reader sólo verifica la cabecera PE del código ejecutable de un plug-in, lo que puede permitir a atacantes ejecutar código arbitrario en modo certificado haciendo que parezca que el plug-in parezca firmado por Adobe. • http://archives.neohapsis.com/archives/vulnwatch/2003-q1/0148.html http://lists.grok.org.uk/pipermail/full-disclosure/2003-March/004230.html http://www.kb.cert.org/vuls/id/549913 http://www.kb.cert.org/vuls/id/JSHA-5EZQGZ •

CVSS: 2.1EPSS: 0%CPEs: 1EXPL: 0

acroread in Adobe Acrobat Reader 4.05 on Linux allows local users to overwrite arbitrary files via a symlink attack on temporary files. • http://online.securityfocus.com/archive/1/277932 http://www.securityfocus.com/bid/5068 https://exchange.xforce.ibmcloud.com/vulnerabilities/9407 •

CVSS: 7.2EPSS: 0%CPEs: 1EXPL: 0

libCoolType library as used in Adobe Acrobat (acroread) on Linux creates the AdobeFnt.lst file with world-writable permissions, which allows local users to modify the file and possibly modify acroread's behavior. • http://lists.debian.org/debian-security/2001/debian-security-200101/msg00085.html http://marc.info/?l=bugtraq&m=99849121502399&w=2 http://www.securityfocus.com/bid/3225 https://exchange.xforce.ibmcloud.com/vulnerabilities/7024 •

CVSS: 7.6EPSS: 0%CPEs: 8EXPL: 0

Buffer overflow in Adobe Acrobat 4.05, Reader, Business Tools, and Fill In products that handle PDF files allows attackers to execute arbitrary commands via a long /Registry or /Ordering specifier. • http://archives.neohapsis.com/archives/bugtraq/2000-07/0382.html http://www.adobe.com/misc/pdfsecurity.html http://www.securityfocus.com/bid/1509 •