Adobe

Acrobat Reader

1076 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 4.48%
  • Veröffentlicht 08.05.2008 00:20:00
  • Zuletzt bearbeitet 09.04.2025 00:30:58

The Javascript API in Adobe Acrobat Professional 7.0.9 and possibly 8.1.1 exposes a dangerous method, which allows remote attackers to execute arbitrary commands or trigger a buffer overflow via a crafted PDF file that invokes app.checkForUpdate with...

  • EPSS 0.09%
  • Veröffentlicht 06.03.2008 00:44:00
  • Zuletzt bearbeitet 09.04.2025 00:30:58

acroread in Adobe Acrobat Reader 8.1.2 allows local users to overwrite arbitrary files via a symlink attack on temporary files related to SSL certificate handling.

  • EPSS 8.4%
  • Veröffentlicht 12.02.2008 20:00:00
  • Zuletzt bearbeitet 09.04.2025 00:30:58

Integer overflow in Adobe Reader and Acrobat 8.1.1 and earlier allows remote attackers to execute arbitrary code via crafted arguments to the printSepsWithParams, which triggers memory corruption.

Warnung
  • EPSS 93.28%
  • Veröffentlicht 12.02.2008 19:00:00
  • Zuletzt bearbeitet 22.10.2025 01:15:32

Multiple buffer overflows in Adobe Reader and Acrobat 8.1.1 and earlier allow remote attackers to execute arbitrary code via a PDF file with long arguments to unspecified JavaScript methods. NOTE: this issue might be subsumed by CVE-2008-0655.

  • EPSS 40.72%
  • Veröffentlicht 12.02.2008 19:00:00
  • Zuletzt bearbeitet 09.04.2025 00:30:58

Adobe Reader and Acrobat 8.1.1 and earlier allows remote attackers to execute arbitrary code via a crafted PDF file that calls an insecure JavaScript method in the EScript.api plug-in. NOTE: this issue might be subsumed by CVE-2008-0655.

  • EPSS 0.31%
  • Veröffentlicht 12.02.2008 19:00:00
  • Zuletzt bearbeitet 09.04.2025 00:30:58

Untrusted search path vulnerability in Adobe Reader and Acrobat 8.1.1 and earlier allows local users to execute arbitrary code via a malicious Security Provider library in the reader's current working directory. NOTE: this issue might be subsumed by...

  • EPSS 40.36%
  • Veröffentlicht 11.02.2008 21:00:00
  • Zuletzt bearbeitet 09.04.2025 00:30:58

The DOC.print function in the Adobe JavaScript API, as used by Adobe Acrobat and Reader before 8.1.2, allows remote attackers to configure silent non-interactive printing, and trigger the printing of an arbitrary number of copies of a document. NOTE...

Warnung Exploit
  • EPSS 64.92%
  • Veröffentlicht 07.02.2008 21:00:00
  • Zuletzt bearbeitet 12.11.2025 15:15:34

Multiple unspecified vulnerabilities in Adobe Reader and Acrobat before 8.1.2 have unknown impact and attack vectors.

  • EPSS 36.91%
  • Veröffentlicht 21.09.2007 18:17:00
  • Zuletzt bearbeitet 09.04.2025 00:30:58

Unspecified vulnerability in Adobe Acrobat and Reader 8.1 on Windows allows remote attackers to execute arbitrary code via a crafted PDF file, related to the mailto: option and Internet Explorer 7 on Windows XP. NOTE: this information is based upon ...

Exploit
  • EPSS 17.21%
  • Veröffentlicht 10.03.2007 00:19:00
  • Zuletzt bearbeitet 09.04.2025 00:30:58

AcroPDF.DLL in Adobe Reader 8.0, when accessed from Mozilla Firefox, Netscape, or Opera, allows remote attackers to cause a denial of service (unspecified resource consumption) via a .pdf URL with an anchor identifier that begins with search= followe...