Page 94 of 952 results (0.020 seconds)

CVSS: 9.8EPSS: 4%CPEs: 16EXPL: 0

16 Aug 2005 — Buffer overflow in a "core application plug-in" for Adobe Reader 5.1 through 7.0.2 and Acrobat 5.0 through 7.0.2 allows attackers to cause a denial of service (crash) and possibly execute arbitrary code via unknown vectors. • http://secunia.com/advisories/16466 •

CVSS: 7.1EPSS: 0%CPEs: 2EXPL: 0

07 Jul 2005 — The control for Adobe Reader 5.0.9 and 5.0.10 on Linux, Solaris, HP-UX, and AIX creates temporary files with the permissions as specified in a user's umask, which could allow local users to read PDF documents of that user if the umask allows it. • http://secunia.com/advisories/14457 •

CVSS: 9.8EPSS: 1%CPEs: 2EXPL: 0

05 Jul 2005 — Stack-based buffer overflow in the UnixAppOpenFilePerform function in Adobe Reader 5.0.9 and 5.0.10 for Unix allows remote attackers to execute arbitrary code via a PDF document with a long /Filespec tag. • http://www.adobe.com/support/techdocs/329083.html •

CVSS: 7.5EPSS: 0%CPEs: 4EXPL: 2

15 Jun 2005 — The Adobe Reader control in Adobe Reader and Acrobat 7.0 and 7.0.1 allows remote attackers to determine the existence of files via Javascript containing XML script, aka the "XML External Entity vulnerability." • https://www.exploit-db.com/exploits/25822 • CWE-611: Improper Restriction of XML External Entity Reference •

CVSS: 7.8EPSS: 3%CPEs: 3EXPL: 0

28 Apr 2005 — ** UNVERIFIABLE ** NOTE: this issue describes a problem that can not be independently verified as of 20050421. Adobe Acrobat reader (AcroRd32.exe) 6.0 and earlier allows remote attackers to cause a denial of service ("Invalid-ID-Handle-Error" error) and modify memory beginning at a particular address, possibly allowing the execution of arbitrary code, via a crafted PDF file. NOTE: the vendor has stated that the reporter refused to provide sufficient details to confirm the issue. In addition, due to the lack... • http://securitytracker.com/id?1013774 •

CVSS: 7.5EPSS: 6%CPEs: 9EXPL: 0

21 Apr 2005 — The Acrobat web control in Adobe Acrobat and Acrobat Reader 7.0 and earlier, when used with Internet Explorer, allows remote attackers to determine the existence of arbitrary files via the LoadFile ActiveX method. • http://secunia.com/advisories/14813 •

CVSS: 7.5EPSS: 0%CPEs: 2EXPL: 0

21 Feb 2005 — Adobe Acrobat Reader 6.0.3 and 7.0.0 allows remote attackers to cause a denial of service (application crash) via a PDF file that contains a negative Count value in the root page node. • http://marc.info/?l=bugtraq&m=110879063511486&w=2 • CWE-20: Improper Input Validation •

CVSS: 10.0EPSS: 22%CPEs: 3EXPL: 1

22 Dec 2004 — Format string vulnerability in Adobe Acrobat Reader 6.0.0 through 6.0.2 allows remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via an .ETD document containing format string specifiers in (1) title or (2) baseurl fields. • http://www.adobe.com/support/downloads/detail.jsp?ftpID=2679 •

CVSS: 10.0EPSS: 9%CPEs: 1EXPL: 0

22 Dec 2004 — Buffer overflow in the mailListIsPdf function in Adobe Acrobat Reader 5.09 for Unix allows remote attackers to execute arbitrary code via an e-mail message with a crafted PDF attachment. • http://secunia.com/advisories/13474 •

CVSS: 7.5EPSS: 0%CPEs: 6EXPL: 0

12 Oct 2004 — Adobe Acrobat and Acrobat Reader 6.0 allow remote attackers to read arbitrary files via a PDF file that contains an embedded Shockwave (swf) file that references files outside of the temporary directory. • http://marc.info/?l=bugtraq&m=109771686326956&w=2 •