Adobe

Acrobat

1356 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 20.76%
  • Veröffentlicht 28.09.2004 04:00:00
  • Zuletzt bearbeitet 03.04.2025 01:03:51

Buffer overflow in the ActiveX component (pdf.ocx) for Adobe Acrobat 5.0.5 and Acrobat Reader, and possibly other versions, allows remote attackers to execute arbitrary code via a URI for a PDF file with a null terminator (%00) followed by a long str...

  • EPSS 23.15%
  • Veröffentlicht 27.07.2004 04:00:00
  • Zuletzt bearbeitet 03.04.2025 01:03:51

Adobe Reader 6.0 does not properly handle null characters when splitting a filename path into components, which allows remote attackers to execute arbitrary code via a file with a long extension that is not normally handled by Reader, triggering a bu...

  • EPSS 29.87%
  • Veröffentlicht 24.07.2003 04:00:00
  • Zuletzt bearbeitet 03.04.2025 01:03:51

Various PDF viewers including (1) Adobe Acrobat 5.06 and (2) Xpdf 1.01 allow remote attackers to execute arbitrary commands via shell metacharacters in an embedded hyperlink.

  • EPSS 1.22%
  • Veröffentlicht 16.06.2003 04:00:00
  • Zuletzt bearbeitet 03.04.2025 01:03:51

Adobe Acrobat 5 does not properly validate JavaScript in PDF files, which allows remote attackers to write arbitrary files into the Plug-ins folder that spread to other PDF documents, as demonstrated by the W32.Yourde virus.

  • EPSS 0.22%
  • Veröffentlicht 02.04.2003 05:00:00
  • Zuletzt bearbeitet 03.04.2025 01:03:51

The digital signature mechanism for the Adobe Acrobat PDF viewer only verifies the PE header of executable code for a plug-in, which can allow attackers to execute arbitrary code in certified mode by making the plug-in appear to be signed by Adobe.

  • EPSS 5.13%
  • Veröffentlicht 20.10.2000 04:00:00
  • Zuletzt bearbeitet 03.04.2025 01:03:51

Buffer overflow in Adobe Acrobat 4.05, Reader, Business Tools, and Fill In products that handle PDF files allows attackers to execute arbitrary commands via a long /Registry or /Ordering specifier.