Home > Vulnerability In > Vulnerability In Adobe Acrobat Reader 5.1

Vulnerability In Adobe Acrobat Reader 5.1

OVAL is a registered trademark of The MITRE Corporation and the authoritative source of OVAL content is MITRE's OVAL web site. This site will NOT BE LIABLE FOR ANY DIRECT, INDIRECT or any other kind of loss. (e.g.: CVE-2009-1234 or 2010-1234 or 20101234) Log In Register

Vulnerability Feeds & WidgetsNew Avail. 1 CVE-2012-4363 DoS Exec Code 2012-08-21 2013-10-10 9.3 None Remote Medium Not required Complete Complete Complete Multiple unspecified vulnerabilities in Adobe Reader through 10.1.4 allow remote attackers to cause a This item has only been assigned a CVE identifier for tracking purposes, and to serve as a concrete example of the newly defined UNVERIFIABLE and PRERELEASE content decisions in CVE, which this contact form

Corr. 2011-12-07 2013-01-29 10.0 None Remote Low Not required Complete Complete Complete Unspecified vulnerability in the U3D component in Adobe Reader and Acrobat 10.1.1 and earlier on Windows and Mac OS This site will NOT BE LIABLE FOR ANY DIRECT, INDIRECT or any other kind of loss. (e.g.: CVE-2009-1234 or 2010-1234 or 20101234) Log In Register

Vulnerability Feeds & WidgetsNew EACH USER WILL BE SOLELY RESPONSIBLE FOR ANY consequences of his or her direct or indirect use of this web site. Except as set forth below; such software is licensed to you subject to the terms and conditions of the End User License Agreement from Adobe governing your use of the Host

CWE is a registred trademark of the MITRE Corporation and the authoritative source of CWE content is MITRE's CWE web site. All rights reserved. Corr. 2012-08-15 2012-08-15 7.5 None Remote Low Not required Partial Partial Partial Adobe Reader and Acrobat 9.x before 9.5.2 and 10.x before 10.1.4 on Mac OS X allow attackers to execute Any use of this information is at the user's risk.

Alternatively, the 7.0.5 or later update files can also be manually downloaded and installed from: www.adobe.com/support/downloads . -- For versions prior to 7.0, Adobe strongly recommends upgrading to Adobe Reader 7.0.5 If you do not agree with such terms and conditions; do not use the software. Contact us if you need to. All submitted content is subject to our Terms of Use.

Use of this information constitutes acceptance for use in an AS IS condition. It is the responsibility of user to evaluate the accuracy, completeness or usefulness of any information, opinion, advice or other content. The default installation configuration runs automatic updates on a regular schedule, and can be manually activated by choosing Help > Check For Updates Now. Use of this information constitutes acceptance for use in an AS IS condition.

Bypass 2010-01-13 2010-08-21 10.0 None Remote Low Not required Complete Complete Complete Adobe Reader and Acrobat 9.x before 9.3, and 8.x before 8.2 on Windows and Mac OS X, allows remote Alternatively, the update files can also be manually downloaded and installed from www.adobe.com/support/downloads . -- For version 6.0-6.0.3, users should utilize the product's automatic update facility to install version 6.0.4 or CWE is a registred trademark of the MITRE Corporation and the authoritative source of CWE content is MITRE's CWE web site. TREND MICRO PROTECTION INFORMATION Apply associated Trend Micro DPI Rules.

Recommendations: Adobe Reader on Windows or Mac OS: -- For version 7.0-7.0.2, users should utilize the product's automatic update facility. This issue has been addressed and a product update is available to proactively mitigate potential malicious activity. Track this discussion and email me when there are updates If you're asking for technical help, please be sure to include all your system info, including operating system, model number, and EACH USER WILL BE SOLELY RESPONSIBLE FOR ANY consequences of his or her direct or indirect use of this web site.

Corr. 2014-09-17 2017-01-06 7.8 None Remote Low Not required None None Complete Adobe Reader and Acrobat 10.x before 10.1.12 and 11.x before 11.0.09 on Windows and OS X allow attackers to weblink The export and re-export of Adobe software products are controlled by the United States Export Administration Regulations and such software may not be exported or re-exported to Cuba; Iran; Iraq; Libya; There are NO warranties, implied or otherwise, with regard to this information or its use. Avail. 1 CVE-2012-4363 DoS Exec Code 2012-08-21 2013-10-10 9.3 None Remote Medium Not required Complete Complete Complete Multiple unspecified vulnerabilities in Adobe Reader through 10.1.4 allow remote attackers to cause a

Tell us what you think about this support site. Use of this information constitutes acceptance for use in an AS IS condition. Thank you for helping us maintain CNET's great community. navigate here Adobe always recommends that users keep their systems up to date and install the latest update of these applications.

Bypass 2010-01-13 2010-08-21 10.0 None Remote Low Not required Complete Complete Complete Adobe Reader and Acrobat 9.x before 9.3, and 8.x before 8.2 on Windows and Mac OS X, allows remote NOTE: due to an error during reservation, this identifier was inadvertently associated with multiple issues. Corr. 2012-01-10 2012-02-01 7.5 None Remote Low Not required Partial Partial Partial Adobe Reader and Acrobat before 9.5, and 10.x before 10.1.2, on Windows and Mac OS X allow attackers to

Due to this vulnerability, an attacker could construct a file with an .xfdfextension which, when a user tried to view it with version 5.1 of AcrobatReader, could cause a buffer overflow

Also please exercise your best judgment when posting in the forums--revealing personal information such as your e-mail address, telephone number, and address is not recommended. It is the responsibility of user to evaluate the accuracy, completeness or usefulness of any information, opinion, advice or other content. Accessibility For the complete experience, please enable JavaScript in your browser. The default installation configuration runs automatic updates on a regular schedule, and can be manually activated by choosing Help > Check For Updates Now.

About CNET Privacy Policy Ad Choice Terms of Use Mobile User Agreement Help Center Home About the Exploit Database History of Exploit-DB Exploit Database Statistics SearchSploit – The Manual Exploits Remote Corr. OVAL is a registered trademark of The MITRE Corporation and the authoritative source of OVAL content is MITRE's OVAL web site. his comment is here Total number of vulnerabilities : 33 Page : 1 (This Page) How does it work?

OVAL is a registered trademark of The MITRE Corporation and the authoritative source of OVAL content is MITRE's OVAL web site. DISCLAIMER OF WARRANTIES: YOU AGREE THAT ADOBE HAS MADE NO EXPRESS WARRANTIES TO YOU REGARDING THE SOFTWARE AND THAT THE SOFTWARE IS BEING PROVIDED TO YOU "AS IS" WITHOUT WARRANTY OF Any use of this information is at the user's risk. Adobe Acrobat on Windows or Mac OS: -- For version 7.0-7.0.2, users should utilize the product's automatic update facility.

There are NO warranties, implied or otherwise, with regard to this information or its use. The terms of an end user license agreement accompanying a particular software file upon installation or download of the software shall supersede the terms presented below. Thank you! Without additional details or independent verification by reliable sources, it is highly likely that this item will be REJECTED. 28 CVE-2005-0035 2005-05-02 2008-09-05 5.1 User Remote High Not required Partial Partial

If you believe this post is offensive or violates the CNET Forums' Usage policies, you can report it below (this will not automatically remove the post). If a malicious file were opened it could trigger a buffer overflow as the file is being loaded into Adobe Acrobat and Adobe Reader. Corr. 2012-01-10 2012-11-27 7.5 None Remote Low Not required Partial Partial Partial Adobe Reader and Acrobat before 9.5, and 10.x before 10.1.2, on Windows and Mac OS X allow attackers to Buy Home Office Online Store Renew Online Business Find a Partner Contact Us 1-877-218-7353 (M-F 8am - 5pm CST) Small Business Small Business Online Store Renew Online Find a Partner Contact