Page 95 of 952 results (0.011 seconds)

CVSS: 8.8EPSS: 5%CPEs: 11EXPL: 0

18 Aug 2004 — Buffer overflow in the ActiveX component (pdf.ocx) for Adobe Acrobat 5.0.5 and Acrobat Reader, and possibly other versions, allows remote attackers to execute arbitrary code via a URI for a PDF file with a null terminator (%00) followed by a long string. Desbordamiento de búfer en el componente ActiveX (pdf.ocx) de Adobe Acrobat 5.0.5 y Acrobat Reader, y posiblemente otras versiones, permite a atacantes remotos ejecutar código de su elección mediante una URI de un fichero PDF con un terminador nulo (%00) se... • http://www.adobe.com/support/techdocs/330527.html •

CVSS: 10.0EPSS: 13%CPEs: 3EXPL: 1

13 Aug 2004 — Buffer overflow in the uudecoding feature for Adobe Acrobat Reader 5.0.5 and 5.0.6 for Unix and Linux, and possibly other versions including those before 5.0.9, allows remote attackers to execute arbitrary code via a long filename for the PDF file that is provided to the uudecode command. Desbordamiento de búfer en la característica uudecoding de Adobe Acrobat Reader 5.0.5 y 5.0.6 de Unix y Linux, u posiblemente otras versiones incluyendo aquellas anteriores a 5.0.9, permite a atacantes remotos ejecutar cód... • http://security.gentoo.org/glsa/glsa-200408-14.xml •

CVSS: 10.0EPSS: 9%CPEs: 3EXPL: 0

13 Aug 2004 — The uudecoding feature in Adobe Acrobat Reader 5.0.5 and 5.0.6 for Unix and Linux, and possibly other versions including those before 5.0.9, allows remote attackers to execute arbitrary code via shell metacharacters ("`" or backtick) in the filename of the PDF file that is provided to the uudecode command. La caractérística uudecoding en Adobe Acrobat Reader 5.0.5 a 5.0.6 para Unix y Linux, y posiblemente otras versiones incluyendo aquellas anteriores a 5.0.9, permite a atacantes remotos ejecutar código arb... • http://security.gentoo.org/glsa/glsa-200408-14.xml •

CVSS: 9.8EPSS: 12%CPEs: 4EXPL: 0

16 Jul 2004 — Adobe Reader 6.0 does not properly handle null characters when splitting a filename path into components, which allows remote attackers to execute arbitrary code via a file with a long extension that is not normally handled by Reader, triggering a buffer overflow. Adobe Reader 6.0 no maneja adecuadamente caractéres nulos cuando divide la ruta de un archivo en sus componentes, lo que permite a atacantes remotos ejecutar código de su elección mediante un fichero con una extensión larga que no es normalmente m... • http://www.adobe.com/support/techdocs/330527.html •

CVSS: 8.8EPSS: 19%CPEs: 1EXPL: 1

29 Mar 2004 — Stack-based buffer overflow in the OutputDebugString function for Adobe Acrobat Reader 5.1 allows remote attackers to execute arbitrary code via a PDF document with XML Forms Data Format (XFDF) data. Desbordamiento de búfer basado en la pila en la función OutputDebugString de Adobe Acrobat Reader 5.1 permite a atacantes remotos ejecutar código arbitraro mediante un documento PDF con datos XML Forms Data Format (XFDF). • https://www.exploit-db.com/exploits/17488 •

CVSS: 9.8EPSS: 0%CPEs: 1EXPL: 0

17 Jul 2003 — Adobe Acrobat Reader (acroread) 6, under certain circumstances when running with the "Certified plug-ins only" option disabled, loads plug-ins with signatures used for older versions of Acrobat, which can allow attackers to cause Acrobat to enter Certified mode and run untrusted plugins by modifying the CTIsCertifiedMode function. Adobe Acrobat Reader (acroread) 6, bajo ciertas circunstancias cuando corre con la opción "plug-ins certificados sólo" desactivada, carga plug-ins con firmas usadas para versiones... • http://www.kb.cert.org/vuls/id/689835 •

CVSS: 8.8EPSS: 1%CPEs: 1EXPL: 1

04 Jul 2003 — Buffer overflow in the WWWLaunchNetscape function of Adobe Acrobat Reader (acroread) 5.0.7 and earlier allows remote attackers to execute arbitrary code via a .pdf file with a long mailto link. Desbordamiento de búfer en la función WWWLaunchNetscape de Adobe Acrobat Reader 5.0.7 y anteriores permite a atacantes remotos ejecutar código arbitrario mediante un fichero .pdf con un enlace largo. • https://www.exploit-db.com/exploits/22846 •

CVSS: 9.8EPSS: 0%CPEs: 12EXPL: 0

26 Mar 2003 — The digital signature mechanism for the Adobe Acrobat PDF viewer only verifies the PE header of executable code for a plug-in, which can allow attackers to execute arbitrary code in certified mode by making the plug-in appear to be signed by Adobe. El mecanismo de firma digital del visor de PDF Adobe Acrobat Reader sólo verifica la cabecera PE del código ejecutable de un plug-in, lo que puede permitir a atacantes ejecutar código arbitrario en modo certificado haciendo que parezca que el plug-in parezca firm... • http://archives.neohapsis.com/archives/vulnwatch/2003-q1/0148.html •

CVSS: 5.5EPSS: 0%CPEs: 1EXPL: 0

31 Dec 2002 — acroread in Adobe Acrobat Reader 4.05 on Linux allows local users to overwrite arbitrary files via a symlink attack on temporary files. • http://online.securityfocus.com/archive/1/277932 •

CVSS: 7.8EPSS: 0%CPEs: 1EXPL: 0

31 Aug 2001 — libCoolType library as used in Adobe Acrobat (acroread) on Linux creates the AdobeFnt.lst file with world-writable permissions, which allows local users to modify the file and possibly modify acroread's behavior. • http://lists.debian.org/debian-security/2001/debian-security-200101/msg00085.html •