Summary
Detail | |||
---|---|---|---|
Vendor | Adobe | First view | 2009-04-30 |
Product | Acrobat | Last view | 2025-03-11 |
Version | 9.1 | Type | Application |
Update | - | ||
Edition | pro | ||
Language | * | ||
Sofware Edition | * | ||
Target Software | * | ||
Target Hardware | * | ||
Other | * | ||
CPE Product | cpe:2.3:a:adobe:acrobat |
Activity : Overall
Related : CVE
Date | Alert | Description | |
---|---|---|---|
7.8 | 2025-03-11 | CVE-2025-27174 | Acrobat Reader versions 24.001.30225, 20.005.30748, 25.001.20428 and earlier are affected by a Use After Free vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. |
0 | 2025-03-11 | CVE-2025-27164 | Acrobat Reader versions 24.001.30225, 20.005.30748, 25.001.20428 and earlier are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file. |
0 | 2025-03-11 | CVE-2025-27163 | Acrobat Reader versions 24.001.30225, 20.005.30748, 25.001.20428 and earlier are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file. |
7.8 | 2025-03-11 | CVE-2025-27162 | Acrobat Reader versions 24.001.30225, 20.005.30748, 25.001.20428 and earlier are affected by an Access of Uninitialized Pointer vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. |
7.8 | 2025-03-11 | CVE-2025-27161 | Acrobat Reader versions 24.001.30225, 20.005.30748, 25.001.20428 and earlier are affected by an out-of-bounds read vulnerability when parsing a crafted file, which could result in a read past the end of an allocated memory structure. An attacker could leverage this vulnerability to execute code in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. |
7.8 | 2025-03-11 | CVE-2025-27160 | Acrobat Reader versions 24.001.30225, 20.005.30748, 25.001.20428 and earlier are affected by a Use After Free vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. |
7.8 | 2025-03-11 | CVE-2025-27159 | Acrobat Reader versions 24.001.30225, 20.005.30748, 25.001.20428 and earlier are affected by a Use After Free vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. |
0 | 2025-03-11 | CVE-2025-27158 | Acrobat Reader versions 24.001.30225, 20.005.30748, 25.001.20428 and earlier are affected by an Access of Uninitialized Pointer vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. |
5.5 | 2025-03-11 | CVE-2025-24431 | Acrobat Reader versions 24.001.30225, 20.005.30748, 25.001.20428 and earlier are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file. |
5.5 | 2024-12-19 | CVE-2023-21586 | Adobe Acrobat Reader versions 22.003.20282 (and earlier), 22.003.20281 (and earlier) and 20.005.30418 (and earlier) are affected by a NULL Pointer Dereference vulnerability. An unauthenticated attacker could leverage this vulnerability to achieve an application denial-of-service in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. |
7.8 | 2024-12-19 | CVE-2022-44520 | Acrobat Reader DC version 22.001.20085 (and earlier), 20.005.3031x (and earlier) and 17.012.30205 (and earlier) are affected by a use-after-free vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. |
5.5 | 2024-12-19 | CVE-2022-44519 | Acrobat Reader DC version 22.001.20085 (and earlier), 20.005.3031x (and earlier) and 17.012.30205 (and earlier) are affected by a use-after-free vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file. |
7.8 | 2024-12-19 | CVE-2022-44518 | Acrobat Reader DC version 22.001.20085 (and earlier), 20.005.3031x (and earlier) and 17.012.30205 (and earlier) are affected by a use-after-free vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. |
5.5 | 2024-12-19 | CVE-2022-44517 | Acrobat Reader DC version 22.001.20085 (and earlier), 20.005.3031x (and earlier) and 17.012.30205 (and earlier) are affected by an out-of-bounds read vulnerability when parsing a crafted file, which could result in a read past the end of an allocated memory structure. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file. |
5.5 | 2024-12-19 | CVE-2022-44516 | Acrobat Reader DC version 22.001.20085 (and earlier), 20.005.3031x (and earlier) and 17.012.30205 (and earlier) are affected by an out-of-bounds read vulnerability when parsing a crafted file, which could result in a read past the end of an allocated memory structure. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file. |
5.5 | 2024-12-19 | CVE-2022-44515 | Acrobat Reader DC version 22.001.20085 (and earlier), 20.005.3031x (and earlier) and 17.012.30205 (and earlier) are affected by an out-of-bounds read vulnerability when parsing a crafted file, which could result in a read past the end of an allocated memory structure. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file. |
7.8 | 2024-12-19 | CVE-2022-44514 | Acrobat Reader DC version 22.001.20085 (and earlier), 20.005.3031x (and earlier) and 17.012.30205 (and earlier) are affected by a use-after-free vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. |
7.8 | 2024-12-19 | CVE-2022-44513 | Acrobat Reader DC version 22.001.20085 (and earlier), 20.005.3031x (and earlier) and 17.012.30205 (and earlier) are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. |
7.8 | 2024-12-19 | CVE-2022-44512 | Acrobat Reader DC version 22.001.20085 (and earlier), 20.005.3031x (and earlier) and 17.012.30205 (and earlier) are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. |
6.3 | 2024-12-10 | CVE-2024-49535 | Acrobat Reader versions 24.005.20307, 24.001.30213, 24.001.30193, 20.005.30730, 20.005.30710 and earlier are affected by an Improper Restriction of XML External Entity Reference ('XXE') vulnerability that allows an attacker to provide malicious XML input containing a reference to an external entity, potentially leading to unauthorized read access outside the Acrobat sandbox. Exploitation of this issue requires user interaction in that a victim must process a malicious XML document. |
5.5 | 2024-12-10 | CVE-2024-49534 | Acrobat Reader versions 24.005.20307, 24.001.30213, 24.001.30193, 20.005.30730, 20.005.30710 and earlier are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file. |
5.5 | 2024-12-10 | CVE-2024-49533 | Acrobat Reader versions 24.005.20307, 24.001.30213, 24.001.30193, 20.005.30730, 20.005.30710 and earlier are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file. |
5.5 | 2024-12-10 | CVE-2024-49532 | Acrobat Reader versions 24.005.20307, 24.001.30213, 24.001.30193, 20.005.30730, 20.005.30710 and earlier are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file. |
5.5 | 2024-12-10 | CVE-2024-49531 | Acrobat Reader versions 24.005.20307, 24.001.30213, 24.001.30193, 20.005.30730, 20.005.30710 and earlier are affected by a NULL Pointer Dereference vulnerability that could result in an application denial-of-service. An attacker could exploit this vulnerability to crash the application, leading to a denial-of-service condition. Exploitation of this issue requires user interaction in that a victim must open a malicious file. |
7.8 | 2024-12-10 | CVE-2024-49530 | Acrobat Reader versions 24.005.20307, 24.001.30213, 24.001.30193, 20.005.30730, 20.005.30710 and earlier are affected by a Use After Free vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. |
CWE : Common Weakness Enumeration
% | id | Name |
---|---|---|
35% (345) | CWE-119 | Failure to Constrain Operations within the Bounds of a Memory Buffer |
21% (210) | CWE-416 | Use After Free |
17% (168) | CWE-125 | Out-of-bounds Read |
9% (90) | CWE-787 | Out-of-bounds Write |
2% (27) | CWE-200 | Information Exposure |
1% (17) | CWE-20 | Improper Input Validation |
1% (15) | CWE-476 | NULL Pointer Dereference |
1% (11) | CWE-190 | Integer Overflow or Wraparound |
1% (10) | CWE-284 | Access Control (Authorization) Issues |
0% (9) | CWE-189 | Numeric Errors |
0% (7) | CWE-772 | Missing Release of Resource after Effective Lifetime |
0% (7) | CWE-399 | Resource Management Errors |
0% (5) | CWE-704 | Incorrect Type Conversion or Cast |
0% (5) | CWE-122 | Heap-based Buffer Overflow |
0% (5) | CWE-94 | Failure to Control Generation of Code ('Code Injection') |
0% (4) | CWE-264 | Permissions, Privileges, and Access Controls |
0% (3) | CWE-427 | Uncontrolled Search Path Element |
0% (3) | CWE-367 | Time-of-check Time-of-use (TOCTOU) Race Condition |
0% (3) | CWE-269 | Improper Privilege Management |
0% (3) | CWE-121 | Stack-based Buffer Overflow |
0% (3) | CWE-120 | Buffer Copy without Checking Size of Input ('Classic Buffer Overflo... |
0% (3) | CWE-22 | Improper Limitation of a Pathname to a Restricted Directory ('Path ... |
0% (2) | CWE-379 | Creation of Temporary File in Directory with Incorrect Permissions |
0% (2) | CWE-353 | Failure to Add Integrity Check Value |
0% (2) | CWE-347 | Improper Verification of Cryptographic Signature |
SAINT Exploits
Description | Link |
---|---|
Adobe Reader CoolType.dll buffer overflow | More info here |
Adobe Reader Flash AVM2 Memory Corruption | More info here |
Adobe Reader FlateDecode filter TIFF Predictor integer overflow | More info here |
Adobe Reader Javascript API getAnnots method vulnerability | More info here |
Adobe Reader Libtiff TIFFFetchShortPair Stack Buffer Overflow | More info here |
Adobe Reader media.newPlayer Use-After-Free Code Execution | More info here |
Adobe Acrobat Reader U3D CLODMeshContinuation Code Execution | More info here |
Adobe Reader U3D Heap Overflow | More info here |
Adobe Flash Player authplay.dll vulnerability | More info here |
Adobe Flash Player callMethod Bytecode Memory Corruption | More info here |
Open Source Vulnerability Database (OSVDB)
id | Description |
---|---|
78248 | Adobe Reader/Acrobat Unspecified Memory Corruption (2011-4373) |
78247 | Adobe Reader/Acrobat rt3d.dll PDF Embedded BMP Image Handling Overflow |
78246 | Adobe Reader/Acrobat Unspecified Heap Memory Corruption |
78245 | Adobe Reader/Acrobat Unspecified Memory Corruption (2011-4370) |
77529 | Adobe Reader / Acrobat U3D Data Handling Remote Memory Corruption |
72723 | Adobe Flash Player Unspecified XSS |
71686 | Adobe Flash ActionScript Predefined Class Prototype Addition Remote Code Exec... |
71254 | Adobe Flash AVM2 Action Script Virtual Machine Memory Corruption |
67849 | Adobe Reader / Acrobat CoolType.dll SING (Smart INdependent Glyphlets) Font u... |
62526 | Adobe Reader / Acrobat LibTiff Overflow |
62300 | Adobe Flash Player Cross-domain Sandbox Restriction Bypass |
61695 | Adobe Reader / Acrobat U3D Implementation Unspecified Overflow |
61694 | Adobe Reader / Acrobat Unspecified NULL Dereference DoS |
61693 | Adobe Reader / Acrobat Enhanced Security Feature Default Configuration Modifi... |
61692 | Adobe Reader / Acrobat PDF JpxDecode Encoded Jp2c Stream Handling Memory Corr... |
61691 | Adobe Reader / Acrobat 3D Implementation DLL-loading Unspecified Arbitrary Co... |
61690 | Adobe Reader / Acrobat U3D Implementation Array Boundary Arbitrary Code Execu... |
61688 | Adobe getPlus DLM gp.ocx ActiveX Multiple Overflows |
60980 | Adobe Reader / Acrobat Doc.media.newPlayer Use-After-Free Arbitrary Code Exec... |
58929 | Adobe Reader / Acrobat Unspecified ActiveX Input Handling DoS |
58928 | Adobe Reader / Acrobat Unspecified Trust Manager Restriction Bypass |
58927 | Adobe Reader / Acrobat Multiple Unspecified Heap Overflows |
58926 | Adobe Reader / Acrobat U3D Processing Heap Corruption |
58925 | Adobe Reader Plug-in for Mozilla Unloading Use-after-free Arbitrary Code Exec... |
58924 | Adobe Reader / Acrobat on Unix Debug Mode Arbitrary Code Execution |
ExploitDB Exploits
id | Description |
---|---|
29881 | Adobe Acrobat Reader - ASLR/DEP Bypass Exploit with SANDBOX BYPASS |
18366 | Adobe Reader U3D Memory Corruption Vulnerability |
17473 | Adobe Reader X Atom Type Confusion Vulnerability Exploit |
17175 | Adobe Flash Player 10.2.153.1 SWF Memory Corruption Vulnerability |
17027 | Adobe Flash Player AVM Bytecode Verification |
16619 | Adobe CoolType SING Table "uniqueName" Stack Buffer Overflow |
16494 | Adobe CoolType SING Table "uniqueName" Stack Buffer Overflow |
10618 | Adobe Reader and Acrobat (CVE-2009-4324) Exploit |
9865 | Adobe Acrobat Reader 7-9 U3D BoF |
OpenVAS Exploits
id | Description |
---|---|
2012-12-13 | Name : SuSE Update for update openSUSE-SU-2012:0512-1 (update) File : nvt/gb_suse_2012_0512_1.nasl |
2012-08-20 | Name : Adobe Reader Multiple Vulnerabilities - Windows File : nvt/gb_adobe_prdts_mult_vuln_aug12_win.nasl |
2012-08-20 | Name : Adobe Reader Multiple Vulnerabilities - Mac OS X File : nvt/gb_adobe_prdts_mult_vuln_aug12_macosx.nasl |
2012-08-20 | Name : Adobe Acrobat Multiple Vulnerabilities - Windows File : nvt/gb_adobe_acrobat_mult_vuln_aug12_win.nasl |
2012-08-20 | Name : Adobe Acrobat Multiple Vulnerabilities - Mac OS X File : nvt/gb_adobe_acrobat_mult_vuln_aug12_macosx.nasl |
2012-08-10 | Name : Gentoo Security Advisory GLSA 201206-14 (acroread) File : nvt/glsa_201206_14.nasl |
2012-08-02 | Name : SuSE Update for acroread openSUSE-SU-2012:0087-1 (acroread) File : nvt/gb_suse_2012_0087_1.nasl |
2012-04-17 | Name : Adobe Reader Multiple Vulnerabilities April-2012 (Mac OS X) File : nvt/gb_adobe_prdts_mult_vuln_apr12_macosx.nasl |
2012-04-16 | Name : Adobe Reader Multiple Vulnerabilities April-2012 (Windows) File : nvt/gb_adobe_prdts_mult_vuln_apr12_win.nasl |
2012-04-16 | Name : Adobe Reader Multiple Vulnerabilities April-2012 (Linux) File : nvt/gb_adobe_reader_mult_vuln_apr12_lin.nasl |
2012-02-12 | Name : Gentoo Security Advisory GLSA 201201-19 (acroread) File : nvt/glsa_201201_19.nasl |
2012-02-12 | Name : FreeBSD Ports: acroread9 File : nvt/freebsd_acroread9.nasl |
2012-02-12 | Name : Gentoo Security Advisory GLSA 201110-11 (Adobe Flash Player) File : nvt/glsa_201110_11.nasl |
2012-01-23 | Name : Adobe Reader Integer Overflow Vulnerability - Jan 12 (Linux) File : nvt/gb_adobe_reader_int_overflow_vuln_lin_jan12.nasl |
2012-01-16 | Name : Adobe Reader/Acrobat Multiple Memory Corruption Vulnerabilities - MAC OS X File : nvt/gb_adobe_prdts_mult_mem_crptn_vuln_macosx.nasl |
2012-01-16 | Name : Adobe Reader/Acrobat Multiple Memory Corruption Vulnerabilities - Windows File : nvt/gb_adobe_prdts_mult_mem_crptn_vuln_win.nasl |
2011-12-09 | Name : Adobe Reader 'U3D' Component Memory Corruption Vulnerability - Linux File : nvt/gb_adobe_reader_u3d_mem_crptn_vuln_lin.nasl |
2011-12-09 | Name : Adobe Reader/Acrobat 'U3D' Component Memory Corruption Vulnerability - Windows File : nvt/gb_adobe_prdts_u3d_mem_crptn_vuln_win.nasl |
2011-12-09 | Name : Adobe Reader/Acrobat 'U3D' Component Memory Corruption Vulnerability - Mac OS X File : nvt/gb_adobe_prdts_u3d_mem_crptn_vuln_macosx.nasl |
2011-08-03 | Name : FreeBSD Ports: linux-flashplugin File : nvt/freebsd_linux-flashplugin16.nasl |
2011-06-13 | Name : Adobe Flash Player Unspecified Cross-Site Scripting Vulnerability June-2011 (... File : nvt/gb_adobe_flash_player_xss_vuln_lin_jun11.nasl |
2011-06-13 | Name : Adobe Products Unspecified Cross-Site Scripting Vulnerability June-2011 (Wind... File : nvt/gb_adobe_prdts_xss_vuln_win_jun11.nasl |
2011-05-12 | Name : FreeBSD Ports: linux-flashplugin File : nvt/freebsd_linux-flashplugin14.nasl |
2011-05-12 | Name : FreeBSD Ports: linux-flashplugin File : nvt/freebsd_linux-flashplugin13.nasl |
2011-04-22 | Name : Adobe Flash Player Arbitrary Code Execution Vulnerability (Linux) File : nvt/gb_adobe_flash_player_code_execution_vuln_apr11_lin.nasl |
Information Assurance Vulnerability Management (IAVM)
id | Description |
---|---|
2015-A-0151 | Multiple Vulnerabilities in Adobe Reader and Acrobat Severity: Category I - VMSKEY: V0061075 |
2014-A-0002 | Multiple Vulnerabilities in Adobe Reader and Acrobat Severity: Category I - VMSKEY: V0043407 |
2012-B-0048 | Multiple Vulnerabilities in HP Systems Insight Manager Severity: Category I - VMSKEY: V0032178 |
Snort® IPS/IDS
Date | Description |
---|---|
2020-01-16 | Adobe Acrobat Reader and Acrobat TTF SING table parsing remote code execution... RuleID : 52484 - Type : FILE-PDF - Revision : 1 |
2020-01-16 | Adobe Acrobat Reader and Acrobat TTF SING table parsing remote code execution... RuleID : 52483 - Type : FILE-PDF - Revision : 1 |
2019-12-10 | Adobe Acrobat Reader and Acrobat TTF SING table parsing remote code execution... RuleID : 52125 - Type : FILE-PDF - Revision : 2 |
2019-12-10 | Adobe Acrobat Reader and Acrobat TTF SING table parsing remote code execution... RuleID : 52124 - Type : FILE-PDF - Revision : 2 |
2019-07-16 | Adobe Acrobat TIFF heap buffer overflow attempt RuleID : 50444 - Type : FILE-IMAGE - Revision : 2 |
2019-07-16 | Adobe Acrobat TIFF heap buffer overflow attempt RuleID : 50443 - Type : FILE-IMAGE - Revision : 2 |
2019-07-16 | Adobe Acrobat TIFF heap buffer overflow attempt RuleID : 50442 - Type : FILE-IMAGE - Revision : 2 |
2019-07-16 | Adobe Acrobat TIFF heap buffer overflow attempt RuleID : 50441 - Type : FILE-IMAGE - Revision : 2 |
2019-03-12 | Adobe Acrobat TIFF heap buffer overflow attempt RuleID : 49125 - Type : FILE-IMAGE - Revision : 2 |
2019-03-12 | Adobe Acrobat TIFF heap buffer overflow attempt RuleID : 49124 - Type : FILE-IMAGE - Revision : 2 |
2019-03-12 | Adobe Acrobat TIFF heap buffer overflow attempt RuleID : 49123 - Type : FILE-IMAGE - Revision : 2 |
2019-03-12 | Adobe Acrobat TIFF heap buffer overflow attempt RuleID : 49122 - Type : FILE-IMAGE - Revision : 2 |
2018-05-01 | Adobe Acrobat Pro JPEG embedded XPS file heap overflow attempt RuleID : 46118 - Type : FILE-OTHER - Revision : 1 |
2018-05-01 | Adobe Acrobat Pro JPEG embedded XPS file heap overflow attempt RuleID : 46117 - Type : FILE-OTHER - Revision : 1 |
2018-04-27 | Adobe Acrobat EMF malformed Object record out-of-bounds access attempt RuleID : 46054 - Type : FILE-OTHER - Revision : 1 |
2018-04-27 | Adobe Acrobat EMF malformed Object record out-of-bounds access attempt RuleID : 46053 - Type : FILE-OTHER - Revision : 1 |
2018-04-19 | Adobe Acrobat Pro path element out of bounds memory access attempt RuleID : 45990 - Type : FILE-OTHER - Revision : 1 |
2018-04-19 | Adobe Acrobat Pro path element out of bounds memory access attempt RuleID : 45989 - Type : FILE-OTHER - Revision : 1 |
2018-04-11 | Adobe Acrobat Reader getAnnotsRichMedia return type confusion attempt RuleID : 45869 - Type : FILE-PDF - Revision : 1 |
2018-04-11 | Adobe Acrobat Reader getAnnotsRichMedia return type confusion attempt RuleID : 45868 - Type : FILE-PDF - Revision : 1 |
2018-04-11 | Adobe Acrobat Reader invalid trailer memory corruption attempt RuleID : 45867 - Type : FILE-PDF - Revision : 2 |
2018-04-11 | Adobe Acrobat Reader invalid trailer memory corruption attempt RuleID : 45866 - Type : FILE-PDF - Revision : 1 |
2018-04-11 | Adobe Acrobat Reader bookmarkRoot memory corruption attempt RuleID : 45865 - Type : FILE-PDF - Revision : 1 |
2018-04-11 | Adobe Acrobat Reader bookmarkRoot memory corruption attempt RuleID : 45864 - Type : FILE-PDF - Revision : 1 |
2018-04-11 | Adobe Acrobat Reader bookmarkRoot memory corruption attempt RuleID : 45863 - Type : FILE-PDF - Revision : 1 |
Nessus® Vulnerability Scanner
id | Description |
---|---|
2018-02-15 | Name: The version of Adobe Acrobat installed on the remote Windows host is affected... File: adobe_acrobat_apsb18-02.nasl - Type: ACT_GATHER_INFO |
2018-02-15 | Name: The version of Adobe Reader installed on the remote Windows host is affected ... File: adobe_reader_apsb18-02.nasl - Type: ACT_GATHER_INFO |
2018-02-15 | Name: The version of Adobe Acrobat installed on the remote host is affected by mult... File: macosx_adobe_acrobat_apsb18-02.nasl - Type: ACT_GATHER_INFO |
2018-02-15 | Name: The version of Adobe Reader installed on the remote host is affected by multi... File: macosx_adobe_reader_apsb18-02.nasl - Type: ACT_GATHER_INFO |
2017-11-17 | Name: The version of Adobe Acrobat installed on the remote host is affected by mult... File: macosx_adobe_acrobat_apsb17-36.nasl - Type: ACT_GATHER_INFO |
2017-11-17 | Name: The version of Adobe Reader installed on the remote host is affected by multi... File: macosx_adobe_reader_apsb17-36.nasl - Type: ACT_GATHER_INFO |
2017-11-16 | Name: The version of Adobe Acrobat installed on the remote Windows host is affected... File: adobe_acrobat_apsb17-36.nasl - Type: ACT_GATHER_INFO |
2017-11-16 | Name: The version of Adobe Reader installed on the remote Windows host is affected ... File: adobe_reader_apsb17-36.nasl - Type: ACT_GATHER_INFO |
2017-11-06 | Name: The remote Debian host is missing a security update. File: debian_DLA-1161.nasl - Type: ACT_GATHER_INFO |
2017-08-11 | Name: The version of Adobe Acrobat installed on the remote Windows host is affected... File: adobe_acrobat_apsb17-24.nasl - Type: ACT_GATHER_INFO |
2017-08-11 | Name: The version of Adobe Reader installed on the remote Windows host is affected ... File: adobe_reader_apsb17-24.nasl - Type: ACT_GATHER_INFO |
2017-08-11 | Name: The version of Adobe Acrobat installed on the remote host is affected by mult... File: macosx_adobe_acrobat_apsb17-24.nasl - Type: ACT_GATHER_INFO |
2017-08-11 | Name: The version of Adobe Reader installed on the remote host is affected by multi... File: macosx_adobe_reader_apsb17-24.nasl - Type: ACT_GATHER_INFO |
2017-04-14 | Name: The version of Adobe Acrobat installed on the remote Windows host is affected... File: adobe_acrobat_apsb17-11.nasl - Type: ACT_GATHER_INFO |
2017-04-14 | Name: The version of Adobe Reader installed on the remote Windows host is affected ... File: adobe_reader_apsb17-11.nasl - Type: ACT_GATHER_INFO |
2017-04-14 | Name: The version of Adobe Acrobat installed on the remote host is affected by mult... File: macosx_adobe_acrobat_apsb17-11.nasl - Type: ACT_GATHER_INFO |
2017-04-14 | Name: The version of Adobe Reader installed on the remote host is affected by multi... File: macosx_adobe_reader_apsb17-11.nasl - Type: ACT_GATHER_INFO |
2017-01-12 | Name: The version of Adobe Acrobat installed on the remote Windows host is affected... File: adobe_acrobat_apsb17-01.nasl - Type: ACT_GATHER_INFO |
2017-01-12 | Name: The version of Adobe Reader installed on the remote Windows host is affected ... File: adobe_reader_apsb17-01.nasl - Type: ACT_GATHER_INFO |
2017-01-12 | Name: The version of Adobe Acrobat installed on the remote macOS or Mac OS X host i... File: macosx_adobe_acrobat_apsb17-01.nasl - Type: ACT_GATHER_INFO |
2017-01-12 | Name: The version of Adobe Reader installed on the remote macOS or Mac OS X host is... File: macosx_adobe_reader_apsb17-01.nasl - Type: ACT_GATHER_INFO |
2016-10-14 | Name: The version of Adobe Acrobat installed on the remote Windows host is affected... File: adobe_acrobat_apsb16-33.nasl - Type: ACT_GATHER_INFO |
2016-10-14 | Name: The version of Adobe Reader installed on the remote Windows host is affected ... File: adobe_reader_apsb16-33.nasl - Type: ACT_GATHER_INFO |
2016-10-14 | Name: The version of Adobe Acrobat installed on the remote macOS or Mac OS X host i... File: macosx_adobe_acrobat_apsb16-33.nasl - Type: ACT_GATHER_INFO |
2016-10-14 | Name: The version of Adobe Reader installed on the remote macOS or Mac OS X host is... File: macosx_adobe_reader_apsb16-33.nasl - Type: ACT_GATHER_INFO |