Page 88 of 449 results (0.010 seconds)

CVSS: 10.0EPSS: 46%CPEs: 3EXPL: 1

Format string vulnerability in Adobe Acrobat Reader 6.0.0 through 6.0.2 allows remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via an .ETD document containing format string specifiers in (1) title or (2) baseurl fields. • http://www.adobe.com/support/downloads/detail.jsp?ftpID=2679 http://www.idefense.com/application/poi/display?id=163&type=vulnerabilities https://exchange.xforce.ibmcloud.com/vulnerabilities/18478 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A2919 •

CVSS: 5.0EPSS: 0%CPEs: 6EXPL: 0

Adobe Acrobat and Acrobat Reader 6.0 allow remote attackers to read arbitrary files via a PDF file that contains an embedded Shockwave (swf) file that references files outside of the temporary directory. • http://marc.info/?l=bugtraq&m=109771686326956&w=2 http://marc.info/?l=bugtraq&m=109779541602447&w=2 http://marc.info/?l=bugtraq&m=109812210520520&w=2 http://www.securityfocus.com/bid/11386 https://exchange.xforce.ibmcloud.com/vulnerabilities/17694 •

CVSS: 7.5EPSS: 5%CPEs: 11EXPL: 0

Buffer overflow in the ActiveX component (pdf.ocx) for Adobe Acrobat 5.0.5 and Acrobat Reader, and possibly other versions, allows remote attackers to execute arbitrary code via a URI for a PDF file with a null terminator (%00) followed by a long string. Desbordamiento de búfer en el componente ActiveX (pdf.ocx) de Adobe Acrobat 5.0.5 y Acrobat Reader, y posiblemente otras versiones, permite a atacantes remotos ejecutar código de su elección mediante una URI de un fichero PDF con un terminador nulo (%00) seguido por una cadena larga. • http://www.adobe.com/support/techdocs/330527.html http://www.gentoo.org/security/en/glsa/glsa-200408-14.xml http://www.idefense.com/application/poi/display?id=126&type=vulnerabilities http://www.securityfocus.com/bid/10947 https://exchange.xforce.ibmcloud.com/vulnerabilities/16998 •

CVSS: 10.0EPSS: 7%CPEs: 3EXPL: 1

Buffer overflow in the uudecoding feature for Adobe Acrobat Reader 5.0.5 and 5.0.6 for Unix and Linux, and possibly other versions including those before 5.0.9, allows remote attackers to execute arbitrary code via a long filename for the PDF file that is provided to the uudecode command. Desbordamiento de búfer en la característica uudecoding de Adobe Acrobat Reader 5.0.5 y 5.0.6 de Unix y Linux, u posiblemente otras versiones incluyendo aquellas anteriores a 5.0.9, permite a atacantes remotos ejecutar código de su elección mediane un nombre de fichero largo para el PDF que es suministrado a al orden uudecode. • http://security.gentoo.org/glsa/glsa-200408-14.xml http://www.adobe.com/support/techdocs/322914.html http://www.idefense.com/application/poi/display?id=125&type=vulnerabilities http://www.redhat.com/support/errata/RHSA-2004-432.html http://www.securityfocus.com/bid/10932 https://exchange.xforce.ibmcloud.com/vulnerabilities/16972 https://access.redhat.com/security/cve/CVE-2004-0631 https://bugzilla.redhat.com/show_bug.cgi?id=1617242 •

CVSS: 10.0EPSS: 13%CPEs: 3EXPL: 0

The uudecoding feature in Adobe Acrobat Reader 5.0.5 and 5.0.6 for Unix and Linux, and possibly other versions including those before 5.0.9, allows remote attackers to execute arbitrary code via shell metacharacters ("`" or backtick) in the filename of the PDF file that is provided to the uudecode command. La caractérística uudecoding en Adobe Acrobat Reader 5.0.5 a 5.0.6 para Unix y Linux, y posiblemente otras versiones incluyendo aquellas anteriores a 5.0.9, permite a atacantes remotos ejecutar código arbitrario mediante metacaractéres de shell ("`" o comilla invertida) en el nombre del fichero que es suministrado a la orden uudecode. • http://security.gentoo.org/glsa/glsa-200408-14.xml http://www.adobe.com/support/techdocs/322914.html http://www.idefense.com/application/poi/display?id=124&type=vulnerabilities http://www.redhat.com/support/errata/RHSA-2004-432.html http://www.securityfocus.com/bid/10931 https://exchange.xforce.ibmcloud.com/vulnerabilities/16973 https://access.redhat.com/security/cve/CVE-2004-0630 https://bugzilla.redhat.com/show_bug.cgi?id=1617241 •