Executive Summary
Summary | |
---|---|
Title | Adobe Reader: Multiple vulnerabilities |
Informations | |||
---|---|---|---|
Name | GLSA-201009-05 | First vendor Publication | 2010-09-07 |
Vendor | Gentoo | Last vendor Modification | 2010-09-07 |
Severity (Vendor) | Normal | Revision | N/A |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:N/AC:L/Au:N/C:C/I:C/A:C) | |||
---|---|---|---|
Cvss Base Score | 10 | Attack Range | Network |
Cvss Impact Score | 10 | Attack Complexity | Low |
Cvss Expoit Score | 10 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
Synopsis Multiple vulnerabilities in Adobe Reader might result in the execution of arbitrary code or other attacks. Background Description Impact Workaround Resolution References Availability http://security.gentoo.org/glsa/glsa-201009-05.xml |
Original Source
Url : http://security.gentoo.org/glsa/glsa-201009-05.xml |
CWE : Common Weakness Enumeration
% | Id | Name |
---|---|---|
60 % | CWE-119 | Failure to Constrain Operations within the Bounds of a Memory Buffer |
17 % | CWE-94 | Failure to Control Generation of Code ('Code Injection') |
13 % | CWE-399 | Resource Management Errors |
3 % | CWE-189 | Numeric Errors (CWE/SANS Top 25) |
3 % | CWE-79 | Failure to Preserve Web Page Structure ('Cross-site Scripting') (CWE/SANS Top 25) |
3 % | CWE-20 | Improper Input Validation |
OVAL Definitions
Definition Id: oval:org.mitre.oval:def:14495 | |||
Oval ID: | oval:org.mitre.oval:def:14495 | ||
Title: | DEPRECATED: Adobe Reader and Acrobat 9.x before 9.3.3 on UNIX allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors. | ||
Description: | Adobe Reader and Acrobat 9.x before 9.3.3 on UNIX allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors. | ||
Family: | windows | Class: | vulnerability |
Reference(s): | CVE-2010-2203 | Version: | 9 |
Platform(s): | Microsoft Windows 7 Microsoft Windows Server 2008 Microsoft Windows Vista Microsoft Windows Server 2003 Microsoft Windows XP Microsoft Windows 2000 | Product(s): | Adobe Acrobat Adobe Reader |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:21374 | |||
Oval ID: | oval:org.mitre.oval:def:21374 | ||
Title: | RHSA-2010:0037: acroread security and bug fix update (Critical) | ||
Description: | Use-after-free vulnerability in the Doc.media.newPlayer method in Multimedia.api in Adobe Reader and Acrobat 9.x before 9.3, and 8.x before 8.2 on Windows and Mac OS X, allows remote attackers to execute arbitrary code via a crafted PDF file using ZLib compressed streams, as exploited in the wild in December 2009. | ||
Family: | unix | Class: | patch |
Reference(s): | RHSA-2010:0037-01 CVE-2009-3953 CVE-2009-3954 CVE-2009-3955 CVE-2009-3956 CVE-2009-3959 CVE-2009-4324 | Version: | 81 |
Platform(s): | Red Hat Enterprise Linux 5 | Product(s): | acroread |
Definition Synopsis: | |||
Definition Id: oval:org.mitre.oval:def:22063 | |||
Oval ID: | oval:org.mitre.oval:def:22063 | ||
Title: | RHSA-2010:0349: acroread security update (Critical) | ||
Description: | Heap-based buffer overflow in the custom heap management system in Adobe Reader and Acrobat 9.x before 9.3.2, and 8.x before 8.2.2 on Windows and Mac OS X, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted PDF document, aka FG-VD-10-005. | ||
Family: | unix | Class: | patch |
Reference(s): | RHSA-2010:0349-01 CVE-2010-0190 CVE-2010-0191 CVE-2010-0192 CVE-2010-0193 CVE-2010-0194 CVE-2010-0195 CVE-2010-0196 CVE-2010-0197 CVE-2010-0198 CVE-2010-0199 CVE-2010-0201 CVE-2010-0202 CVE-2010-0203 CVE-2010-0204 CVE-2010-1241 | Version: | 198 |
Platform(s): | Red Hat Enterprise Linux 5 | Product(s): | acroread |
Definition Synopsis: | |||
Definition Id: oval:org.mitre.oval:def:22083 | |||
Oval ID: | oval:org.mitre.oval:def:22083 | ||
Title: | ELSA-2010:0114: acroread security and bug fix update (Critical) | ||
Description: | Unspecified vulnerability in Adobe Reader and Acrobat 8.x before 8.2.1 and 9.x before 9.3.1 allows attackers to cause a denial of service (application crash) or possibly execute arbitrary code via unknown vectors. | ||
Family: | unix | Class: | patch |
Reference(s): | ELSA-2010:0114-01 CVE-2010-0186 CVE-2010-0188 | Version: | 13 |
Platform(s): | Oracle Linux 5 | Product(s): | acroread |
Definition Synopsis: | |||
Definition Id: oval:org.mitre.oval:def:22136 | |||
Oval ID: | oval:org.mitre.oval:def:22136 | ||
Title: | RHSA-2010:0114: acroread security and bug fix update (Critical) | ||
Description: | Unspecified vulnerability in Adobe Reader and Acrobat 8.x before 8.2.1 and 9.x before 9.3.1 allows attackers to cause a denial of service (application crash) or possibly execute arbitrary code via unknown vectors. | ||
Family: | unix | Class: | patch |
Reference(s): | RHSA-2010:0114-01 CVE-2010-0186 CVE-2010-0188 | Version: | 29 |
Platform(s): | Red Hat Enterprise Linux 5 | Product(s): | acroread |
Definition Synopsis: | |||
Definition Id: oval:org.mitre.oval:def:22247 | |||
Oval ID: | oval:org.mitre.oval:def:22247 | ||
Title: | RHSA-2010:0503: acroread security update (Critical) | ||
Description: | Buffer overflow in Adobe Reader and Acrobat 9.x before 9.3.3, and 8.x before 8.2.3 on Windows and Mac OS X, allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via a PDF file containing Flash content with a crafted #1023 (3FFh) tag, a different vulnerability than CVE-2010-1295, CVE-2010-2202, CVE-2010-2207, CVE-2010-2209, CVE-2010-2210, and CVE-2010-2211. | ||
Family: | unix | Class: | patch |
Reference(s): | RHSA-2010:0503-01 CVE-2010-1240 CVE-2010-1285 CVE-2010-1295 CVE-2010-1297 CVE-2010-2168 CVE-2010-2201 CVE-2010-2202 CVE-2010-2203 CVE-2010-2204 CVE-2010-2205 CVE-2010-2206 CVE-2010-2207 CVE-2010-2208 CVE-2010-2209 CVE-2010-2210 CVE-2010-2211 CVE-2010-2212 | Version: | 224 |
Platform(s): | Red Hat Enterprise Linux 5 | Product(s): | acroread |
Definition Synopsis: | |||
Definition Id: oval:org.mitre.oval:def:22734 | |||
Oval ID: | oval:org.mitre.oval:def:22734 | ||
Title: | ELSA-2010:0349: acroread security update (Critical) | ||
Description: | Heap-based buffer overflow in the custom heap management system in Adobe Reader and Acrobat 9.x before 9.3.2, and 8.x before 8.2.2 on Windows and Mac OS X, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted PDF document, aka FG-VD-10-005. | ||
Family: | unix | Class: | patch |
Reference(s): | ELSA-2010:0349-01 CVE-2010-0190 CVE-2010-0191 CVE-2010-0192 CVE-2010-0193 CVE-2010-0194 CVE-2010-0195 CVE-2010-0196 CVE-2010-0197 CVE-2010-0198 CVE-2010-0199 CVE-2010-0201 CVE-2010-0202 CVE-2010-0203 CVE-2010-0204 CVE-2010-1241 | Version: | 65 |
Platform(s): | Oracle Linux 5 | Product(s): | acroread |
Definition Synopsis: | |||
Definition Id: oval:org.mitre.oval:def:22917 | |||
Oval ID: | oval:org.mitre.oval:def:22917 | ||
Title: | ELSA-2010:0037: acroread security and bug fix update (Critical) | ||
Description: | Use-after-free vulnerability in the Doc.media.newPlayer method in Multimedia.api in Adobe Reader and Acrobat 9.x before 9.3, and 8.x before 8.2 on Windows and Mac OS X, allows remote attackers to execute arbitrary code via a crafted PDF file using ZLib compressed streams, as exploited in the wild in December 2009. | ||
Family: | unix | Class: | patch |
Reference(s): | ELSA-2010:0037-01 CVE-2009-3953 CVE-2009-3954 CVE-2009-3955 CVE-2009-3956 CVE-2009-3959 CVE-2009-4324 | Version: | 29 |
Platform(s): | Oracle Linux 5 | Product(s): | acroread |
Definition Synopsis: | |||
Definition Id: oval:org.mitre.oval:def:22991 | |||
Oval ID: | oval:org.mitre.oval:def:22991 | ||
Title: | ELSA-2010:0503: acroread security update (Critical) | ||
Description: | Buffer overflow in Adobe Reader and Acrobat 9.x before 9.3.3, and 8.x before 8.2.3 on Windows and Mac OS X, allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via a PDF file containing Flash content with a crafted #1023 (3FFh) tag, a different vulnerability than CVE-2010-1295, CVE-2010-2202, CVE-2010-2207, CVE-2010-2209, CVE-2010-2210, and CVE-2010-2211. | ||
Family: | unix | Class: | patch |
Reference(s): | ELSA-2010:0503-01 CVE-2010-1240 CVE-2010-1285 CVE-2010-1295 CVE-2010-1297 CVE-2010-2168 CVE-2010-2201 CVE-2010-2202 CVE-2010-2203 CVE-2010-2204 CVE-2010-2205 CVE-2010-2206 CVE-2010-2207 CVE-2010-2208 CVE-2010-2209 CVE-2010-2210 CVE-2010-2211 CVE-2010-2212 | Version: | 73 |
Platform(s): | Oracle Linux 5 | Product(s): | acroread |
Definition Synopsis: | |||
Definition Id: oval:org.mitre.oval:def:6725 | |||
Oval ID: | oval:org.mitre.oval:def:6725 | ||
Title: | Adobe Reader and Acrobat Invalid Pointer Vulnerability | ||
Description: | Adobe Reader and Acrobat 9.x before 9.3.3, and 8.x before 8.2.3 on Windows and Mac OS X, allow attackers to execute arbitrary code via unspecified manipulations involving the newclass (0x58) operator and an "invalid pointer vulnerability" that triggers memory corruption, a different vulnerability than CVE-2010-2168 and CVE-2010-2201. | ||
Family: | windows | Class: | vulnerability |
Reference(s): | CVE-2010-1285 | Version: | 18 |
Platform(s): | Microsoft Windows 2000 Microsoft Windows XP Microsoft Windows Vista Microsoft Windows Server 2003 Microsoft Windows Server 2008 Microsoft Windows 7 | Product(s): | Adobe Reader Adobe Acrobat |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:6729 | |||
Oval ID: | oval:org.mitre.oval:def:6729 | ||
Title: | Adobe Reader and Acrobat Prefix Protocol Handler Vulnerability | ||
Description: | Adobe Reader and Acrobat 9.x before 9.3.2, and 8.x before 8.2.2 on Windows and Mac OS X, allow attackers to execute arbitrary code via unspecified vectors, related to a "prefix protocol handler vulnerability." | ||
Family: | windows | Class: | vulnerability |
Reference(s): | CVE-2010-0191 | Version: | 18 |
Platform(s): | Microsoft Windows 2000 Microsoft Windows XP Microsoft Windows Vista Microsoft Windows Server 2003 Microsoft Windows Server 2008 Microsoft Windows 7 | Product(s): | Adobe Reader Adobe Acrobat |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:6733 | |||
Oval ID: | oval:org.mitre.oval:def:6733 | ||
Title: | Adobe Reader and Acrobat Buffer Overflow Vulnerability | ||
Description: | Buffer overflow in Adobe Reader and Acrobat 9.x before 9.3.2, and 8.x before 8.2.2 on Windows and Mac OS X, allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2010-0198, CVE-2010-0199, and CVE-2010-0203. | ||
Family: | windows | Class: | vulnerability |
Reference(s): | CVE-2010-0202 | Version: | 18 |
Platform(s): | Microsoft Windows 2000 Microsoft Windows XP Microsoft Windows Vista Microsoft Windows Server 2003 Microsoft Windows Server 2008 Microsoft Windows 7 | Product(s): | Adobe Reader Adobe Acrobat |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:6795 | |||
Oval ID: | oval:org.mitre.oval:def:6795 | ||
Title: | Adobe Reader and Acrobat Unspecified Code Execution Vulnerability | ||
Description: | Use-after-free vulnerability in the Doc.media.newPlayer method in Multimedia.api in Adobe Reader and Acrobat 9.x before 9.3, and 8.x before 8.2 on Windows and Mac OS X, allows remote attackers to execute arbitrary code via a crafted PDF file using ZLib compressed streams, as exploited in the wild in December 2009. | ||
Family: | windows | Class: | vulnerability |
Reference(s): | CVE-2009-4324 | Version: | 16 |
Platform(s): | Microsoft Windows 2000 Microsoft Windows XP Microsoft Windows Vista Microsoft Windows Server 2003 Microsoft Windows Server 2008 Microsoft Windows 7 | Product(s): | Adobe Reader Adobe Acrobat |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:6798 | |||
Oval ID: | oval:org.mitre.oval:def:6798 | ||
Title: | Adobe Reader and Acrobat Memory Corruption Vulnerability | ||
Description: | Buffer overflow in Adobe Reader and Acrobat 9.x before 9.3.3, and 8.x before 8.2.3 on Windows and Mac OS X, allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via a PDF file containing Flash content with a crafted #1023 (3FFh) tag, a different vulnerability than CVE-2010-1295, CVE-2010-2202, CVE-2010-2207, CVE-2010-2209, CVE-2010-2210, and CVE-2010-2211. | ||
Family: | windows | Class: | vulnerability |
Reference(s): | CVE-2010-2212 | Version: | 18 |
Platform(s): | Microsoft Windows 2000 Microsoft Windows XP Microsoft Windows Vista Microsoft Windows Server 2003 Microsoft Windows Server 2008 Microsoft Windows 7 | Product(s): | Adobe Reader Adobe Acrobat |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:6823 | |||
Oval ID: | oval:org.mitre.oval:def:6823 | ||
Title: | Adobe Reader and Acrobat Memory Corruption Vulnerability | ||
Description: | Adobe Reader and Acrobat 9.x before 9.3.2, and 8.x before 8.2.2 on Windows and Mac OS X, allow attackers to cause a denial of service (memory corruption) or execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2010-0197, CVE-2010-0201, and CVE-2010-0204. | ||
Family: | windows | Class: | vulnerability |
Reference(s): | CVE-2010-0194 | Version: | 18 |
Platform(s): | Microsoft Windows 2000 Microsoft Windows XP Microsoft Windows Vista Microsoft Windows Server 2003 Microsoft Windows Server 2008 Microsoft Windows 7 | Product(s): | Adobe Reader Adobe Acrobat |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:6849 | |||
Oval ID: | oval:org.mitre.oval:def:6849 | ||
Title: | Adobe Reader and Acrobat Memory Corruption Vulnerability | ||
Description: | Adobe Reader and Acrobat 9.x before 9.3.3, and 8.x before 8.2.3 on Windows and Mac OS X, allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2010-1295, CVE-2010-2202, CVE-2010-2209, CVE-2010-2210, CVE-2010-2211, and CVE-2010-2212. | ||
Family: | windows | Class: | vulnerability |
Reference(s): | CVE-2010-2207 | Version: | 18 |
Platform(s): | Microsoft Windows 2000 Microsoft Windows XP Microsoft Windows Vista Microsoft Windows Server 2003 Microsoft Windows Server 2008 Microsoft Windows 7 | Product(s): | Adobe Reader Adobe Acrobat |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:6854 | |||
Oval ID: | oval:org.mitre.oval:def:6854 | ||
Title: | Adobe Reader and Acrobat Invalid Pointer Vulnerability | ||
Description: | Adobe Reader and Acrobat 9.x before 9.3.3, and 8.x before 8.2.3 on Windows and Mac OS X, allow attackers to execute arbitrary code via a PDF file with crafted Flash content involving the (1) pushstring (0x2C) operator, (2) debugfile (0xF1) operator, and an "invalid pointer vulnerability" that triggers memory corruption, a different vulnerability than CVE-2010-1285 and CVE-2010-2168. | ||
Family: | windows | Class: | vulnerability |
Reference(s): | CVE-2010-2201 | Version: | 18 |
Platform(s): | Microsoft Windows 2000 Microsoft Windows XP Microsoft Windows Vista Microsoft Windows Server 2003 Microsoft Windows Server 2008 Microsoft Windows 7 | Product(s): | Adobe Reader Adobe Acrobat |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:6900 | |||
Oval ID: | oval:org.mitre.oval:def:6900 | ||
Title: | Adobe Reader and Acrobat Buffer Overflow Vulnerability | ||
Description: | Buffer overflow in Adobe Reader and Acrobat 9.x before 9.3.2, and 8.x before 8.2.2 on Windows and Mac OS X, allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2010-0198, CVE-2010-0202, and CVE-2010-0203. | ||
Family: | windows | Class: | vulnerability |
Reference(s): | CVE-2010-0199 | Version: | 18 |
Platform(s): | Microsoft Windows 2000 Microsoft Windows XP Microsoft Windows Vista Microsoft Windows Server 2003 Microsoft Windows Server 2008 Microsoft Windows 7 | Product(s): | Adobe Reader Adobe Acrobat |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:6929 | |||
Oval ID: | oval:org.mitre.oval:def:6929 | ||
Title: | Adobe Reader and Acrobat Memory Corruption Vulnerability | ||
Description: | Adobe Reader and Acrobat 9.x before 9.3.3, and 8.x before 8.2.3 on Windows and Mac OS X, allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2010-1295, CVE-2010-2202, CVE-2010-2207, CVE-2010-2209, CVE-2010-2211, and CVE-2010-2212. | ||
Family: | windows | Class: | vulnerability |
Reference(s): | CVE-2010-2210 | Version: | 18 |
Platform(s): | Microsoft Windows 2000 Microsoft Windows XP Microsoft Windows Vista Microsoft Windows Server 2003 Microsoft Windows Server 2008 Microsoft Windows 7 | Product(s): | Adobe Reader Adobe Acrobat |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:6930 | |||
Oval ID: | oval:org.mitre.oval:def:6930 | ||
Title: | Adobe Reader and Acrobat Memory Corruption Vulnerability | ||
Description: | Adobe Reader and Acrobat 9.x before 9.3.3, and 8.x before 8.2.3 on Windows and Mac OS X, allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2010-1295, CVE-2010-2202, CVE-2010-2207, CVE-2010-2209, CVE-2010-2210, and CVE-2010-2212. | ||
Family: | windows | Class: | vulnerability |
Reference(s): | CVE-2010-2211 | Version: | 18 |
Platform(s): | Microsoft Windows 2000 Microsoft Windows XP Microsoft Windows Vista Microsoft Windows Server 2003 Microsoft Windows Server 2008 Microsoft Windows 7 | Product(s): | Adobe Reader Adobe Acrobat |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:6940 | |||
Oval ID: | oval:org.mitre.oval:def:6940 | ||
Title: | Adobe Reader and Acrobat Heap-based Overflow Vulnerability | ||
Description: | Heap-based buffer overflow in the custom heap management system in Adobe Reader and Acrobat 9.x before 9.3.2, and 8.x before 8.2.2 on Windows and Mac OS X, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted PDF document, aka FG-VD-10-005. | ||
Family: | windows | Class: | vulnerability |
Reference(s): | CVE-2010-1241 | Version: | 18 |
Platform(s): | Microsoft Windows 2000 Microsoft Windows XP Microsoft Windows Vista Microsoft Windows Server 2003 Microsoft Windows Server 2008 Microsoft Windows 7 | Product(s): | Adobe Reader Adobe Acrobat |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:6957 | |||
Oval ID: | oval:org.mitre.oval:def:6957 | ||
Title: | Adobe Reader and Acrobat Memory Corruption Vulnerability | ||
Description: | Adobe Reader and Acrobat 9.x before 9.3.3, and 8.x before 8.2.3 on Windows and Mac OS X, allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2010-1295, CVE-2010-2202, CVE-2010-2207, CVE-2010-2210, CVE-2010-2211, and CVE-2010-2212. | ||
Family: | windows | Class: | vulnerability |
Reference(s): | CVE-2010-2209 | Version: | 18 |
Platform(s): | Microsoft Windows 2000 Microsoft Windows XP Microsoft Windows Vista Microsoft Windows Server 2003 Microsoft Windows Server 2008 Microsoft Windows 7 | Product(s): | Adobe Reader Adobe Acrobat |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:6986 | |||
Oval ID: | oval:org.mitre.oval:def:6986 | ||
Title: | Adobe Reader and Acrobat Cross-site Scripting Vulnerability | ||
Description: | Cross-site scripting (XSS) vulnerability in Adobe Reader and Acrobat 9.x before 9.3.2, and 8.x before 8.2.2 on Windows and Mac OS X, allows remote attackers to inject arbitrary web script or HTML via unspecified vectors. | ||
Family: | windows | Class: | vulnerability |
Reference(s): | CVE-2010-0190 | Version: | 18 |
Platform(s): | Microsoft Windows 2000 Microsoft Windows XP Microsoft Windows Vista Microsoft Windows Server 2003 Microsoft Windows Server 2008 Microsoft Windows 7 | Product(s): | Adobe Reader Adobe Acrobat |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:7046 | |||
Oval ID: | oval:org.mitre.oval:def:7046 | ||
Title: | Adobe Reader and Acrobat Denial of Service Vulnerability | ||
Description: | Unspecified vulnerability in Adobe Reader and Acrobat 9.x before 9.3.2, and 8.x before 8.2.2 on Windows and Mac OS X, allows attackers to cause a denial of service or possibly execute arbitrary code via unknown vectors, a different vulnerability than CVE-2010-0193 and CVE-2010-0196. | ||
Family: | windows | Class: | vulnerability |
Reference(s): | CVE-2010-0192 | Version: | 18 |
Platform(s): | Microsoft Windows 2000 Microsoft Windows XP Microsoft Windows Vista Microsoft Windows Server 2003 Microsoft Windows Server 2008 Microsoft Windows 7 | Product(s): | Adobe Reader Adobe Acrobat |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:7056 | |||
Oval ID: | oval:org.mitre.oval:def:7056 | ||
Title: | Adobe Reader and Acrobat Memory Corruption Vulnerability | ||
Description: | Adobe Reader and Acrobat 9.x before 9.3.2, and 8.x before 8.2.2 on Windows and Mac OS X, allow attackers to cause a denial of service (memory corruption) or execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2010-0194, CVE-2010-0197, and CVE-2010-0204. | ||
Family: | windows | Class: | vulnerability |
Reference(s): | CVE-2010-0201 | Version: | 18 |
Platform(s): | Microsoft Windows 2000 Microsoft Windows XP Microsoft Windows Vista Microsoft Windows Server 2003 Microsoft Windows Server 2008 Microsoft Windows 7 | Product(s): | Adobe Reader Adobe Acrobat |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:7064 | |||
Oval ID: | oval:org.mitre.oval:def:7064 | ||
Title: | Adobe Reader and Acrobat Denial of Service Vulnerability | ||
Description: | Unspecified vulnerability in Adobe Reader and Acrobat 9.x before 9.3.2, and 8.x before 8.2.2 on Windows and Mac OS X, allows attackers to cause a denial of service or possibly execute arbitrary code via unknown vectors, a different vulnerability than CVE-2010-0192 and CVE-2010-0193. | ||
Family: | windows | Class: | vulnerability |
Reference(s): | CVE-2010-0196 | Version: | 18 |
Platform(s): | Microsoft Windows 2000 Microsoft Windows XP Microsoft Windows Vista Microsoft Windows Server 2003 Microsoft Windows Server 2008 Microsoft Windows 7 | Product(s): | Adobe Reader Adobe Acrobat |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:7070 | |||
Oval ID: | oval:org.mitre.oval:def:7070 | ||
Title: | Adobe Reader and Acrobat Uninitialized Memory Vulnerability | ||
Description: | Adobe Reader and Acrobat 9.x before 9.3.3, and 8.x before 8.2.3 on Windows and Mac OS X, access uninitialized memory, which allows attackers to execute arbitrary code via unspecified vectors. | ||
Family: | windows | Class: | vulnerability |
Reference(s): | CVE-2010-2205 | Version: | 18 |
Platform(s): | Microsoft Windows 2000 Microsoft Windows XP Microsoft Windows Vista Microsoft Windows Server 2003 Microsoft Windows Server 2008 Microsoft Windows 7 | Product(s): | Adobe Reader Adobe Acrobat |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:7106 | |||
Oval ID: | oval:org.mitre.oval:def:7106 | ||
Title: | Adobe Reader and Acrobat Buffer Overflow Vulnerability | ||
Description: | Buffer overflow in Adobe Reader and Acrobat 9.x before 9.3.2, and 8.x before 8.2.2 on Windows and Mac OS X, allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2010-0199, CVE-2010-0202, and CVE-2010-0203. | ||
Family: | windows | Class: | vulnerability |
Reference(s): | CVE-2010-0198 | Version: | 18 |
Platform(s): | Microsoft Windows 2000 Microsoft Windows XP Microsoft Windows Vista Microsoft Windows Server 2003 Microsoft Windows Server 2008 Microsoft Windows 7 | Product(s): | Adobe Reader Adobe Acrobat |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:7116 | |||
Oval ID: | oval:org.mitre.oval:def:7116 | ||
Title: | Adobe Flash Player, Acrobat Reader, and Acrobat 'authplay.dll' Remote Code Execution Vulnerability | ||
Description: | Adobe Flash Player before 9.0.277.0 and 10.x before 10.1.53.64; Adobe AIR before 2.0.2.12610; and Adobe Reader and Acrobat 9.x before 9.3.3, and 8.x before 8.2.3 on Windows and Mac OS X, allow remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via crafted SWF content, related to authplay.dll and the ActionScript Virtual Machine 2 (AVM2) newfunction instruction, as exploited in the wild in June 2010. | ||
Family: | windows | Class: | vulnerability |
Reference(s): | CVE-2010-1297 | Version: | 30 |
Platform(s): | Microsoft Windows 2000 Microsoft Windows XP Microsoft Windows Vista Microsoft Windows Server 2003 Microsoft Windows Server 2008 Microsoft Windows 7 Microsoft Windows Server 2008 R2 Microsoft Windows 8 Microsoft Windows Server 2012 Microsoft Windows 8.1 Microsoft Windows Server 2012 R2 | Product(s): | Adobe Flash Player Adobe Reader Adobe Acrobat |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:7167 | |||
Oval ID: | oval:org.mitre.oval:def:7167 | ||
Title: | Adobe Reader and Acrobat Invalid Pointer Vulnerability | ||
Description: | Adobe Reader and Acrobat 9.x before 9.3.3, and 8.x before 8.2.3 on Windows and Mac OS X, allow attackers to execute arbitrary code via a PDF file with crafted Flash content, involving the newfunction (0x44) operator and an "invalid pointer vulnerability" that triggers memory corruption, a different vulnerability than CVE-2010-1285 and CVE-2010-2201. | ||
Family: | windows | Class: | vulnerability |
Reference(s): | CVE-2010-2168 | Version: | 18 |
Platform(s): | Microsoft Windows 2000 Microsoft Windows XP Microsoft Windows Vista Microsoft Windows Server 2003 Microsoft Windows Server 2008 Microsoft Windows 7 | Product(s): | Adobe Reader Adobe Acrobat |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:7188 | |||
Oval ID: | oval:org.mitre.oval:def:7188 | ||
Title: | Adobe Reader and Acrobat Dereference Deleted Heap Object Vulnerability | ||
Description: | Adobe Reader and Acrobat 9.x before 9.3.3, and 8.x before 8.2.3 on Windows and Mac OS X, dereference a heap object after this object's deletion, which allows attackers to execute arbitrary code via unspecified vectors. | ||
Family: | windows | Class: | vulnerability |
Reference(s): | CVE-2010-2208 | Version: | 18 |
Platform(s): | Microsoft Windows 2000 Microsoft Windows XP Microsoft Windows Vista Microsoft Windows Server 2003 Microsoft Windows Server 2008 Microsoft Windows 7 | Product(s): | Adobe Reader Adobe Acrobat |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:7200 | |||
Oval ID: | oval:org.mitre.oval:def:7200 | ||
Title: | Adobe Reader and Acrobat Array-indexing Error Vulnerability | ||
Description: | Array index error in AcroForm.api in Adobe Reader and Acrobat 9.x before 9.3.3, and 8.x before 8.2.3 on Windows and Mac OS X, allows remote attackers to execute arbitrary code via a crafted GIF image in a PDF file, which bypasses a size check and triggers a heap-based buffer overflow. | ||
Family: | windows | Class: | vulnerability |
Reference(s): | CVE-2010-2206 | Version: | 18 |
Platform(s): | Microsoft Windows 2000 Microsoft Windows XP Microsoft Windows Vista Microsoft Windows Server 2003 Microsoft Windows Server 2008 Microsoft Windows 7 | Product(s): | Adobe Reader Adobe Acrobat |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:7242 | |||
Oval ID: | oval:org.mitre.oval:def:7242 | ||
Title: | Adobe Reader and Acrobat Denial of Service Vulnerability | ||
Description: | Unspecified vulnerability in Adobe Reader and Acrobat 9.x before 9.3.3, and 8.x before 8.2.3 on Windows and Mac OS X, allows attackers to cause a denial of service or possibly execute arbitrary code via unknown vectors. | ||
Family: | windows | Class: | vulnerability |
Reference(s): | CVE-2010-2204 | Version: | 18 |
Platform(s): | Microsoft Windows 2000 Microsoft Windows XP Microsoft Windows Vista Microsoft Windows Server 2003 Microsoft Windows Server 2008 Microsoft Windows 7 | Product(s): | Adobe Reader Adobe Acrobat |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:7298 | |||
Oval ID: | oval:org.mitre.oval:def:7298 | ||
Title: | Adobe Reader and Acrobat Memory Corruption Vulnerability | ||
Description: | Adobe Reader and Acrobat 9.x before 9.3.2, and 8.x before 8.2.2 on Windows and Mac OS X, allow attackers to cause a denial of service (memory corruption) or execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2010-0194, CVE-2010-0201, and CVE-2010-0204. | ||
Family: | windows | Class: | vulnerability |
Reference(s): | CVE-2010-0197 | Version: | 18 |
Platform(s): | Microsoft Windows 2000 Microsoft Windows XP Microsoft Windows Vista Microsoft Windows Server 2003 Microsoft Windows Server 2008 Microsoft Windows 7 | Product(s): | Adobe Reader Adobe Acrobat |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:7336 | |||
Oval ID: | oval:org.mitre.oval:def:7336 | ||
Title: | Adobe Reader and Acrobat Memory Corruption Vulnerability | ||
Description: | Adobe Reader and Acrobat 9.x before 9.3.3, and 8.x before 8.2.3 on Windows and Mac OS X, allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2010-1295, CVE-2010-2207, CVE-2010-2209, CVE-2010-2210, CVE-2010-2211, and CVE-2010-2212. | ||
Family: | windows | Class: | vulnerability |
Reference(s): | CVE-2010-2202 | Version: | 18 |
Platform(s): | Microsoft Windows 2000 Microsoft Windows XP Microsoft Windows Vista Microsoft Windows Server 2003 Microsoft Windows Server 2008 Microsoft Windows 7 | Product(s): | Adobe Reader Adobe Acrobat |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:7352 | |||
Oval ID: | oval:org.mitre.oval:def:7352 | ||
Title: | Adobe Reader and Acrobat Denial of Service Vulnerability | ||
Description: | Unspecified vulnerability in Adobe Reader and Acrobat 9.x before 9.3.2, and 8.x before 8.2.2 on Windows and Mac OS X, allows attackers to cause a denial of service or possibly execute arbitrary code via unknown vectors, a different vulnerability than CVE-2010-0192 and CVE-2010-0196. | ||
Family: | windows | Class: | vulnerability |
Reference(s): | CVE-2010-0193 | Version: | 18 |
Platform(s): | Microsoft Windows 2000 Microsoft Windows XP Microsoft Windows Vista Microsoft Windows Server 2003 Microsoft Windows Server 2008 Microsoft Windows 7 | Product(s): | Adobe Reader Adobe Acrobat |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:7387 | |||
Oval ID: | oval:org.mitre.oval:def:7387 | ||
Title: | Adobe Reader and Acrobat Memory Corruption Vulnerability | ||
Description: | Adobe Reader and Acrobat 9.x before 9.3.2, and 8.x before 8.2.2 on Windows and Mac OS X, allow attackers to cause a denial of service (memory corruption) or execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2010-0194, CVE-2010-0197, and CVE-2010-0201. | ||
Family: | windows | Class: | vulnerability |
Reference(s): | CVE-2010-0204 | Version: | 18 |
Platform(s): | Microsoft Windows 2000 Microsoft Windows XP Microsoft Windows Vista Microsoft Windows Server 2003 Microsoft Windows Server 2008 Microsoft Windows 7 | Product(s): | Adobe Reader Adobe Acrobat |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:7420 | |||
Oval ID: | oval:org.mitre.oval:def:7420 | ||
Title: | Adobe Reader and Acrobat Font Handling Vulnerability | ||
Description: | Adobe Reader and Acrobat 9.x before 9.3.2, and 8.x before 8.2.2 on Windows and Mac OS X, do not properly handle fonts, which allows attackers to execute arbitrary code via unspecified vectors. | ||
Family: | windows | Class: | vulnerability |
Reference(s): | CVE-2010-0195 | Version: | 18 |
Platform(s): | Microsoft Windows 2000 Microsoft Windows XP Microsoft Windows Vista Microsoft Windows Server 2003 Microsoft Windows Server 2008 Microsoft Windows 7 | Product(s): | Adobe Reader Adobe Acrobat |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:7494 | |||
Oval ID: | oval:org.mitre.oval:def:7494 | ||
Title: | Adobe Reader and Acrobat Buffer Overflow Vulnerability | ||
Description: | Buffer overflow in Adobe Reader and Acrobat 9.x before 9.3.2, and 8.x before 8.2.2 on Windows and Mac OS X, allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2010-0198, CVE-2010-0199, and CVE-2010-0202. | ||
Family: | windows | Class: | vulnerability |
Reference(s): | CVE-2010-0203 | Version: | 18 |
Platform(s): | Microsoft Windows 2000 Microsoft Windows XP Microsoft Windows Vista Microsoft Windows Server 2003 Microsoft Windows Server 2008 Microsoft Windows 7 | Product(s): | Adobe Reader Adobe Acrobat |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:7504 | |||
Oval ID: | oval:org.mitre.oval:def:7504 | ||
Title: | Adobe Reader and Acrobat Memory Corruption Vulnerability | ||
Description: | Adobe Reader and Acrobat 9.x before 9.3.3, and 8.x before 8.2.3 on Windows and Mac OS X, allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2010-2202, CVE-2010-2207, CVE-2010-2209, CVE-2010-2210, CVE-2010-2211, and CVE-2010-2212. | ||
Family: | windows | Class: | vulnerability |
Reference(s): | CVE-2010-1295 | Version: | 18 |
Platform(s): | Microsoft Windows 2000 Microsoft Windows XP Microsoft Windows Vista Microsoft Windows Server 2003 Microsoft Windows Server 2008 Microsoft Windows 7 | Product(s): | Adobe Reader Adobe Acrobat |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:8242 | |||
Oval ID: | oval:org.mitre.oval:def:8242 | ||
Title: | Adobe Reader and Acrobat U3D Remote Code Execution Vulnerability | ||
Description: | The U3D implementation in Adobe Reader and Acrobat 9.x before 9.3, 8.x before 8.2 on Windows and Mac OS X, and 7.x before 7.1.4 allows remote attackers to execute arbitrary code via malformed U3D data in a PDF document, related to a CLODProgressiveMeshDeclaration "array boundary issue," a different vulnerability than CVE-2009-2994. | ||
Family: | windows | Class: | vulnerability |
Reference(s): | CVE-2009-3953 | Version: | 16 |
Platform(s): | Microsoft Windows 2000 Microsoft Windows XP Microsoft Windows Vista Microsoft Windows Server 2003 Microsoft Windows Server 2008 Microsoft Windows 7 | Product(s): | Adobe Reader Adobe Acrobat |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:8518 | |||
Oval ID: | oval:org.mitre.oval:def:8518 | ||
Title: | Adobe Flash Player, Acrobat, Adobe Reader and AIR Cross Domain Request Vulnerability | ||
Description: | Cross-domain vulnerability in Adobe Flash Player before 10.0.45.2, Adobe AIR before 1.5.3.9130, and Adobe Reader and Acrobat 8.x before 8.2.1 and 9.x before 9.3.1 allows remote attackers to bypass intended sandbox restrictions and make cross-domain requests via unspecified vectors. | ||
Family: | windows | Class: | vulnerability |
Reference(s): | CVE-2010-0186 | Version: | 27 |
Platform(s): | Microsoft Windows 2000 Microsoft Windows XP Microsoft Windows Vista Microsoft Windows Server 2003 Microsoft Windows Server 2008 Microsoft Windows 7 Microsoft Windows Server 2008 R2 Microsoft Windows 8 Microsoft Windows Server 2012 Microsoft Windows 8.1 Microsoft Windows Server 2012 R2 | Product(s): | Adobe Flash Player Adobe AIR Adobe Reader Adobe Acrobat |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:8697 | |||
Oval ID: | oval:org.mitre.oval:def:8697 | ||
Title: | Adobe Reader and Acrobat Null Pointer Dereference Denial of Service Vulnerability | ||
Description: | Unspecified vulnerability in Adobe Reader and Acrobat 8.x before 8.2.1 and 9.x before 9.3.1 allows attackers to cause a denial of service (application crash) or possibly execute arbitrary code via unknown vectors. | ||
Family: | windows | Class: | vulnerability |
Reference(s): | CVE-2010-0188 | Version: | 16 |
Platform(s): | Microsoft Windows 2000 Microsoft Windows XP Microsoft Windows Vista Microsoft Windows Server 2003 Microsoft Windows Server 2008 Microsoft Windows 7 | Product(s): | Adobe Reader Adobe Acrobat |
Definition Synopsis: | |||
|
CPE : Common Platform Enumeration
SAINT Exploits
Description | Link |
---|---|
Adobe Reader media.newPlayer Use-After-Free Code Execution | More info here |
Adobe Reader Libtiff TIFFFetchShortPair Stack Buffer Overflow | More info here |
Adobe Reader authplay.dll newfunction Memory Corruption | More info here |
ExploitDB Exploits
id | Description |
---|---|
2010-09-25 | Adobe Flash Player "newfunction" Invalid Pointer Use |
2010-09-20 | Adobe Flash Player "newfunction" Invalid Pointer Use |
2010-09-23 | MOAUB #23 - Adobe Acrobat Reader and Flash 'newfunction' Remote Code Executio... |
2010-09-12 | MOAUB #12 - Adobe Acrobat and Reader "pushstring" Memory Corruption |
2010-09-01 | MOAUB #1 - Adobe Acrobat Reader and Flash Player |
2010-06-29 | Adobe Reader 9.3.2 (CoolType.dll) Remote Memory Corruption / DoS Vulnerability |
2010-06-09 | Adobe Flash and Reader - 0day Exploit PoC (from the wild) |
2009-12-23 | Adobe Reader and Acrobat (CVE-2009-4324) Exploit |
OpenVAS Exploits
Date | Description |
---|---|
2011-09-07 | Name : Mac OS X v10.6.4 Multiple Vulnerabilities (2010-007) File : nvt/gb_macosx_su10-007.nasl |
2011-03-09 | Name : Gentoo Security Advisory GLSA 201101-09 (adobe-flash) File : nvt/glsa_201101_09.nasl |
2011-03-09 | Name : Gentoo Security Advisory GLSA 201009-05 (acroread) File : nvt/glsa_201009_05.nasl |
2010-07-12 | Name : SuSE Update for acroread SUSE-SA:2010:029 File : nvt/gb_suse_2010_029.nasl |
2010-07-12 | Name : Adobe Reader Multiple Vulnerabilities -July10 (Linux) File : nvt/gb_adobe_reader_mult_vuln_july10_lin.nasl |
2010-07-12 | Name : Adobe Acrobat and Reader Multiple Vulnerabilities -July10 (Windows) File : nvt/gb_adobe_prdts_mult_vuln_july10_win.nasl |
2010-07-06 | Name : FreeBSD Ports: linux-flashplugin File : nvt/freebsd_linux-flashplugin8.nasl |
2010-06-23 | Name : SuSE Update for flash-player SUSE-SA:2010:024 File : nvt/gb_suse_2010_024.nasl |
2010-06-22 | Name : Adobe Flash Player/Air Multiple Vulnerabilities - June10 (Win) File : nvt/secpod_adobe_prdts_mult_vuln_jun10_win.nasl |
2010-06-22 | Name : Adobe Flash Player/Air Multiple Vulnerabilities - June10 (Linux) File : nvt/secpod_adobe_prdts_mult_vuln_jun10_lin.nasl |
2010-06-15 | Name : Adobe Products Remote Code Execution Vulnerability - jun10 (Linux) File : nvt/gb_adobe_prdts_code_exec_vuln_lin_jun10.nasl |
2010-06-15 | Name : Adobe Products Remote Code Execution Vulnerability - jun10 (Win) File : nvt/gb_adobe_prdts_code_exec_vuln_win_jun10.nasl |
2010-04-29 | Name : SuSE Update for acroread SUSE-SA:2010:022 File : nvt/gb_suse_2010_022.nasl |
2010-04-16 | Name : Adobe Acrobat and Reader PDF Handling Multiple Vulnerabilities (Windows) File : nvt/secpod_adobe_prdts_mult_vuln_apr10_win.nasl |
2010-04-16 | Name : Adobe Acrobat and Reader PDF Handling Multiple Vulnerabilities (Linux) File : nvt/secpod_adobe_prdts_mult_vuln_apr10_lin.nasl |
2010-04-07 | Name : Adobe Reader PDF Handling Denial Of Service Vulnerability (Linux) File : nvt/gb_adobe_reader_pdf_doc_dos_vuln_lin.nasl |
2010-04-07 | Name : Adobe Reader PDF Handling Multiple Vulnerabilities (Win) File : nvt/gb_adobe_reader_pdf_doc_mult_vuln_win.nasl |
2010-02-26 | Name : Adobe Acrobat and Reader PDF Handling Code Execution Vulnerability (Linux) File : nvt/secpod_adobe_prdts_code_exec_vuln_feb10_lin.nasl |
2010-02-26 | Name : Adobe Acrobat and Reader PDF Handling Code Execution Vulnerability (Windows) File : nvt/secpod_adobe_prdts_code_exec_vuln_feb10_win.nasl |
2010-02-19 | Name : Adobe Flash Player/Air Multiple Vulnerabilities -feb10 (Win) File : nvt/gb_adobe_prdts_mult_vuln_feb10_win.nasl |
2010-02-19 | Name : Adobe Flash Player/Air Multiple Vulnerabilities -feb10 (Linux) File : nvt/gb_adobe_prdts_mult_vuln_feb10_lin.nasl |
2010-02-18 | Name : FreeBSD Ports: linux-flashplugin File : nvt/freebsd_linux-flashplugin7.nasl |
2010-01-29 | Name : SuSE Update for acroread SUSE-SA:2010:008 File : nvt/gb_suse_2010_008.nasl |
2010-01-16 | Name : Adobe Reader/Acrobat Multiple Vulnerabilities - Jan10 (Win) File : nvt/gb_adobe_prdts_mult_vuln_jan10_win.nasl |
2010-01-16 | Name : Adobe Reader Multiple Vulnerabilities -jan10 (Linux) File : nvt/gb_adobe_reader_mult_vuln_jan10_lin.nasl |
2009-12-21 | Name : Adobe Reader Multimeda Doc.media.newPlayer Code Execution Vulnerability (Linux) File : nvt/gb_adobe_prdts_media_obj_remote_code_exec_vuln_dec09_lin.nasl |
2009-12-21 | Name : Adobe Reader/Acrobat Multimedia Doc.media.newPlayer Code Execution Vulnerabil... File : nvt/gb_adobe_prdts_media_obj_remote_code_exec_vuln_dec09_win.nasl |
Open Source Vulnerability Database (OSVDB)
Id | Description |
---|---|
65923 | Adobe Reader / Acrobat PDF Flash Content 3FFh Tag Processing Overflow |
65922 | Adobe Reader / Acrobat Unspecified Arbitrary Code Execution (2010-2211) |
65921 | Adobe Reader / Acrobat Unspecified Arbitrary Code Execution (2010-2210) |
65920 | Adobe Reader / Acrobat Unspecified Arbitrary Code Execution (2010-2209) |
65919 | Adobe Reader / Acrobat Heap Object Deletion Dereference Arbitrary Code Execut... |
65918 | Adobe Reader / Acrobat Unspecified Arbitrary Code Execution (2010-2207) |
65917 | Adobe Reader / Acrobat AcroForm.api GIF Image Parsing Array Index Error Arbit... |
65916 | Adobe Reader / Acrobat AcroForm.api JPEG Image Handling Uninitialized Memory ... |
65915 | Adobe Reader / Acrobat Unspecified DoS (2010-2204) Acrobat and Reader contain a flaw that may allow a local denial of service. The issue is triggered by a malformed PDF file, and will result in loss of availability for the application. |
65914 | Adobe Reader / Acrobat on UNIX Unspecified Arbitrary Code Execution (2010-2203) |
65913 | Adobe Reader / Acrobat PDF CLOD Progressive Mesh Continuation Resolution Upda... |
65912 | Adobe Reader / Acrobat PDF Flash Content pushstring / debugfile Operators Pro... |
65911 | Adobe Reader / Acrobat PDF Flash Content newfunction Operator Processing Memo... |
65910 | Adobe Reader / Acrobat Unspecified Arbitrary Code Execution (2010-1295) |
65909 | Adobe Reader / Acrobat PDF Flash Content newclass Operator Processing Memory ... |
65141 | Adobe Multiple Products SWF Handling Arbitrary Code Execution |
63764 | Adobe Reader / Acrobat Unspecified Memory Corruption (2010-0204) |
63763 | Adobe Reader / Acrobat BMP Image Data Handling Overflow |
63762 | Adobe Reader / Acrobat GIF Image Data Handling Overflow |
63761 | Adobe Reader / Acrobat Unspecified Memory Corruption (2010-0201) |
63760 | Adobe Reader / Acrobat JPEG Image Data Handling Overflow |
63759 | Adobe Reader / Acrobat PNG Image Data Handling Overflow |
63758 | Adobe Reader / Acrobat Unspecified Memory Corruption (2010-0197) |
63757 | Adobe Reader / Acrobat UU3D CLODMeshDeclaration Shading Count Memory Corruption |
63756 | Adobe Reader / Acrobat PDF Document Embedded TrueType Font Handling Arbitrary... |
63755 | Adobe Reader / Acrobat PDF DeviceRGB Subtype Handling Memory Corruption |
63754 | Adobe Reader / Acrobat Unspecified DoS (2010-0193) |
63753 | Adobe Reader / Acrobat Unspecified DoS (2010-0192) |
63752 | Adobe Reader / Acrobat Prefix Protocol Handler Arbitrary Code Execution (2010... |
63751 | Adobe Reader / Acrobat Unspecified XSS |
63618 | Adobe Reader Custom Heap Management System CFF Encoding Handling Memory Corru... |
62526 | Adobe Reader / Acrobat LibTiff Overflow |
62300 | Adobe Flash Player Cross-domain Sandbox Restriction Bypass An unspecified vulnerability makes it possible to bypass the cross-domain restrictions. This would allow an attacker to perform cross-domain requests in violation of the same-origin policy and might allow to obtain or modify information from a different domain. |
61690 | Adobe Reader / Acrobat U3D Implementation Array Boundary Arbitrary Code Execu... |
60980 | Adobe Reader / Acrobat Doc.media.newPlayer Use-After-Free Arbitrary Code Exec... Acrobat and Reader contain a flaw that may allow an attacker to execute arbitrary code. The issue is triggered by a use-after-free condition in Doc.media.newPlayer when parsing a specially crafted PDF file. |
Snort® IPS/IDS
Date | Description |
---|---|
2015-04-30 | Nuclear exploit kit obfuscated file download RuleID : 33983 - Revision : 5 - Type : EXPLOIT-KIT |
2015-04-30 | Nuclear exploit kit landing page detected RuleID : 33982 - Revision : 3 - Type : EXPLOIT-KIT |
2015-02-26 | Adobe Acrobat Reader newfunction memory corruption attempt RuleID : 33214 - Revision : 4 - Type : FILE-PDF |
2015-02-26 | Adobe Acrobat Reader newfunction memory corruption attempt RuleID : 33213 - Revision : 4 - Type : FILE-PDF |
2014-11-16 | Adobe Acrobat Reader U3D CLODMeshDeceleration code execution attempt RuleID : 31555 - Revision : 4 - Type : FILE-PDF |
2014-01-30 | Stamp exploit kit PDF exploit retrieval attempt RuleID : 29131 - Revision : 2 - Type : EXPLOIT-KIT |
2014-01-30 | Stamp exploit kit malicious payload download attempt RuleID : 29130 - Revision : 2 - Type : EXPLOIT-KIT |
2014-01-30 | Stamp exploit kit jar exploit download - specific structure RuleID : 29129 - Revision : 2 - Type : EXPLOIT-KIT |
2014-01-30 | Stamp exploit kit plugin detection page RuleID : 29128 - Revision : 2 - Type : EXPLOIT-KIT |
2014-01-10 | Adobe Acrobat Reader malformed TIFF remote code execution attempt RuleID : 28890 - Revision : 2 - Type : FILE-PDF |
2014-01-10 | Adobe Acrobat Reader malformed TIFF remote code execution attempt RuleID : 28889 - Revision : 2 - Type : FILE-PDF |
2014-01-10 | Adobe Acrobat Reader malformed TIFF remote code execution attempt RuleID : 28888 - Revision : 2 - Type : FILE-PDF |
2014-01-10 | Adobe Acrobat Reader malformed TIFF remote code execution attempt RuleID : 28887 - Revision : 2 - Type : FILE-PDF |
2014-01-10 | Adobe Acrobat Reader media.newPlayer memory corruption attempt RuleID : 28743 - Revision : 5 - Type : FILE-PDF |
2014-01-10 | Adobe Acrobat Reader media.newPlayer memory corruption attempt RuleID : 28742 - Revision : 5 - Type : FILE-PDF |
2014-01-10 | Adobe Acrobat Reader media.newPlayer memory corruption attempt RuleID : 28741 - Revision : 5 - Type : FILE-PDF |
2014-01-10 | Adobe Acrobat Reader media.newPlayer memory corruption attempt RuleID : 28740 - Revision : 5 - Type : FILE-PDF |
2014-01-10 | Adobe Acrobat Reader media.newPlayer memory corruption attempt RuleID : 28739 - Revision : 5 - Type : FILE-PDF |
2014-01-10 | Adobe Acrobat Reader media.newPlayer memory corruption attempt RuleID : 28738 - Revision : 5 - Type : FILE-PDF |
2014-01-10 | Adobe Acrobat Reader media.newPlayer memory corruption attempt RuleID : 28737 - Revision : 5 - Type : FILE-PDF |
2014-01-10 | Adobe Acrobat Reader media.newPlayer memory corruption attempt RuleID : 28736 - Revision : 5 - Type : FILE-PDF |
2014-01-10 | Adobe Acrobat Reader media.newPlayer memory corruption attempt RuleID : 28735 - Revision : 5 - Type : FILE-PDF |
2014-01-10 | Adobe Acrobat Reader media.newPlayer memory corruption attempt RuleID : 28734 - Revision : 5 - Type : FILE-PDF |
2014-01-10 | Adobe Acrobat Reader media.newPlayer memory corruption attempt RuleID : 28733 - Revision : 5 - Type : FILE-PDF |
2014-01-10 | Adobe Acrobat Reader media.newPlayer memory corruption attempt RuleID : 28732 - Revision : 5 - Type : FILE-PDF |
2014-01-10 | Adobe Acrobat Reader media.newPlayer memory corruption attempt RuleID : 28731 - Revision : 6 - Type : FILE-PDF |
2014-01-10 | Adobe Acrobat Reader media.newPlayer memory corruption attempt RuleID : 28730 - Revision : 5 - Type : FILE-PDF |
2014-01-10 | Adobe Acrobat Reader media.newPlayer memory corruption attempt RuleID : 28729 - Revision : 5 - Type : FILE-PDF |
2014-01-10 | Adobe Acrobat Reader media.newPlayer memory corruption attempt RuleID : 28728 - Revision : 6 - Type : FILE-PDF |
2014-01-10 | Adobe Acrobat Reader memory corruption attempt RuleID : 28721 - Revision : 6 - Type : FILE-PDF |
2014-01-10 | Adobe Acrobat Reader memory corruption attempt RuleID : 28720 - Revision : 6 - Type : FILE-PDF |
2014-01-10 | Adobe Acrobat Reader memory corruption attempt RuleID : 28719 - Revision : 6 - Type : FILE-PDF |
2014-01-10 | Adobe Acrobat Reader memory corruption attempt RuleID : 28718 - Revision : 6 - Type : FILE-PDF |
2014-01-10 | Adobe Flash Player newfunction memory corruption attempt RuleID : 28676 - Revision : 5 - Type : FILE-FLASH |
2014-01-10 | Adobe Flash Player newfunction memory corruption attempt RuleID : 28675 - Revision : 5 - Type : FILE-FLASH |
2014-01-10 | Adobe Flash Player newfunction memory corruption attempt RuleID : 28674 - Revision : 5 - Type : FILE-FLASH |
2014-01-10 | Adobe Flash Player newfunction memory corruption attempt RuleID : 28673 - Revision : 5 - Type : FILE-FLASH |
2014-01-10 | Adobe Acrobat TrueType font handling remote code execution attempt RuleID : 28643 - Revision : 7 - Type : FILE-PDF |
2014-01-10 | Adobe Acrobat TrueType font handling remote code execution attempt RuleID : 28642 - Revision : 7 - Type : FILE-PDF |
2014-01-10 | Adobe Acrobat Reader compressed media.newPlayer memory corruption attempt RuleID : 28454 - Revision : 5 - Type : FILE-PDF |
2014-01-10 | Adobe Acrobat TrueType font handling remote code execution attempt RuleID : 28389 - Revision : 7 - Type : FILE-PDF |
2014-01-10 | Adobe Acrobat TrueType font handling remote code execution attempt RuleID : 28388 - Revision : 7 - Type : FILE-PDF |
2014-01-10 | Himan exploit kit payload - Adobe Reader compromise RuleID : 28308 - Revision : 2 - Type : EXPLOIT-KIT |
2014-01-10 | Himan exploit kit landing page RuleID : 28307 - Revision : 2 - Type : EXPLOIT-KIT |
2014-01-10 | Teletubbies exploit kit payload download RuleID : 27889 - Revision : 2 - Type : EXPLOIT-KIT |
2014-01-10 | Teletubbies exploit kit payload download RuleID : 27888 - Revision : 2 - Type : EXPLOIT-KIT |
2014-01-10 | Teletubbies exploit kit payload download RuleID : 27886 - Revision : 2 - Type : EXPLOIT-KIT |
2014-01-10 | Teletubbies exploit kit exploit attempt for Adobe Flash Player RuleID : 27881 - Revision : 2 - Type : EXPLOIT-KIT |
2014-01-10 | Teletubbies exploit kit exploit attempt for Adobe Acrobat Reader 9 RuleID : 27880 - Revision : 2 - Type : EXPLOIT-KIT |
2014-01-10 | Teletubbies exploit kit exploit attempt for Adobe Acrobat Reader 8 RuleID : 27879 - Revision : 2 - Type : EXPLOIT-KIT |
2014-01-10 | Private exploit kit outbound traffic RuleID : 27144-community - Revision : 3 - Type : EXPLOIT-KIT |
2014-01-10 | Private exploit kit outbound traffic RuleID : 27144 - Revision : 3 - Type : EXPLOIT-KIT |
2014-01-10 | Private exploit kit landing page RuleID : 27143 - Revision : 3 - Type : EXPLOIT-KIT |
2014-01-10 | Private exploit kit landing page RuleID : 27142 - Revision : 3 - Type : EXPLOIT-KIT |
2014-01-10 | Private exploit kit landing page RuleID : 27141 - Revision : 4 - Type : EXPLOIT-KIT |
2014-01-10 | Private exploit kit numerically named exe file dowload RuleID : 27140 - Revision : 4 - Type : EXPLOIT-KIT |
2014-01-10 | Blackholev2 exploit kit JNLP request RuleID : 27070 - Revision : 2 - Type : EXPLOIT-KIT |
2014-01-10 | Blackholev2 exploit kit landing page - specific structure RuleID : 27067 - Revision : 4 - Type : EXPLOIT-KIT |
2014-01-10 | Sweet Orange exploit kit landing page in.php base64 uri RuleID : 26834-community - Revision : 5 - Type : EXPLOIT-KIT |
2014-01-10 | Sweet Orange exploit kit landing page in.php base64 uri RuleID : 26834 - Revision : 5 - Type : EXPLOIT-KIT |
2014-01-10 | Sweet Orange exploit kit landing page RuleID : 26804 - Revision : 3 - Type : EXPLOIT-KIT |
2014-01-10 | iFramer injection - specific structure RuleID : 26617 - Revision : 4 - Type : EXPLOIT-KIT |
2014-01-10 | Impact/Stamp exploit kit landing page RuleID : 26600 - Revision : 2 - Type : EXPLOIT-KIT |
2014-01-10 | Impact/Stamp exploit kit landing page RuleID : 26599 - Revision : 2 - Type : EXPLOIT-KIT |
2014-01-10 | Multiple exploit kit successful redirection - jnlp bypass RuleID : 26541 - Revision : 5 - Type : EXPLOIT-KIT |
2014-01-10 | iFramer injection - specific structure RuleID : 26540 - Revision : 4 - Type : EXPLOIT-KIT |
2014-01-10 | Stamp exploit kit landing page RuleID : 26536 - Revision : 4 - Type : EXPLOIT-KIT |
2014-01-10 | Multiple exploit kit landing page - specific structure RuleID : 26535 - Revision : 6 - Type : EXPLOIT-KIT |
2014-01-10 | Cool exploit kit java payload detection RuleID : 26512 - Revision : 4 - Type : EXPLOIT-KIT |
2014-01-10 | Sakura exploit kit redirection structure RuleID : 26511 - Revision : 6 - Type : EXPLOIT-KIT |
2014-01-10 | Cool exploit kit pdf payload detection RuleID : 26510 - Revision : 5 - Type : EXPLOIT-KIT |
2014-01-10 | Multiple exploit kit java payload detection RuleID : 26509 - Revision : 4 - Type : EXPLOIT-KIT |
2014-01-10 | Cool exploit kit landing page - specific structure RuleID : 26507 - Revision : 4 - Type : EXPLOIT-KIT |
2014-01-10 | Cool exploit kit jar file redirection RuleID : 26506 - Revision : 6 - Type : EXPLOIT-KIT |
2014-01-10 | Cool exploit kit malicious jar download RuleID : 26256 - Revision : 4 - Type : EXPLOIT-KIT |
2014-01-10 | Cool exploit kit redirection page RuleID : 26254 - Revision : 4 - Type : EXPLOIT-KIT |
2014-01-10 | Impact exploit kit landing page RuleID : 26252 - Revision : 3 - Type : EXPLOIT-KIT |
2014-01-10 | Sweet Orange exploit kit landing page RuleID : 26233 - Revision : 3 - Type : EXPLOIT-KIT |
2014-01-10 | Sweet Orange exploit kit landing page RuleID : 26232 - Revision : 3 - Type : EXPLOIT-KIT |
2014-01-10 | Cool exploit kit MyApplet class retrieval RuleID : 26229 - Revision : 4 - Type : EXPLOIT-KIT |
2014-01-10 | Cool exploit kit redirection page RuleID : 26228 - Revision : 4 - Type : EXPLOIT-KIT |
2014-01-10 | Sweet Orange exploit kit landing page RuleID : 26094 - Revision : 3 - Type : EXPLOIT-KIT |
2014-01-10 | Cool exploit kit landing page RuleID : 26091 - Revision : 3 - Type : EXPLOIT-KIT |
2014-01-10 | Cool exploit kit Portable Executable download RuleID : 26056 - Revision : 7 - Type : EXPLOIT-KIT |
2014-01-10 | Cool exploit kit malicious class file download RuleID : 26055 - Revision : 6 - Type : EXPLOIT-KIT |
2014-01-10 | Cool exploit kit malicious class file download RuleID : 26054 - Revision : 6 - Type : EXPLOIT-KIT |
2014-01-10 | Cool exploit kit malicious class file download RuleID : 26053 - Revision : 6 - Type : EXPLOIT-KIT |
2014-01-10 | Cool exploit kit malicious class file download RuleID : 26052 - Revision : 6 - Type : EXPLOIT-KIT |
2014-01-10 | Cool exploit kit malicious jar file download RuleID : 26051 - Revision : 7 - Type : EXPLOIT-KIT |
2014-01-10 | Cool exploit kit SWF file download RuleID : 26050 - Revision : 7 - Type : EXPLOIT-KIT |
2014-01-10 | Cool exploit kit EOT file download RuleID : 26049 - Revision : 7 - Type : EXPLOIT-KIT |
2014-01-10 | Cool exploit kit PDF exploit RuleID : 26048 - Revision : 8 - Type : EXPLOIT-KIT |
2014-01-10 | Cool exploit kit redirection structure RuleID : 26047 - Revision : 5 - Type : EXPLOIT-KIT |
2014-01-10 | Cool exploit kit landing page RuleID : 26046 - Revision : 5 - Type : EXPLOIT-KIT |
2014-01-10 | Blackholev2 exploit kit iframe redirection attempt RuleID : 26033 - Revision : 5 - Type : EXPLOIT-KIT |
2014-01-10 | Blackholev2 exploit kit landing page RuleID : 26031 - Revision : 4 - Type : EXPLOIT-KIT |
2014-01-10 | Cool exploit kit Portable Executable download RuleID : 25968 - Revision : 7 - Type : EXPLOIT-KIT |
2014-01-10 | Cool exploit kit malicious class file download RuleID : 25967 - Revision : 5 - Type : EXPLOIT-KIT |
2014-01-10 | Cool exploit kit malicious class file download RuleID : 25966 - Revision : 5 - Type : EXPLOIT-KIT |
2014-01-10 | Cool exploit kit malicious class file download RuleID : 25965 - Revision : 5 - Type : EXPLOIT-KIT |
2014-01-10 | Cool exploit kit malicious class file download RuleID : 25964 - Revision : 5 - Type : EXPLOIT-KIT |
2014-01-10 | Cool exploit kit SWF file download RuleID : 25963 - Revision : 7 - Type : EXPLOIT-KIT |
2014-01-10 | Cool exploit kit EOT file download RuleID : 25962 - Revision : 6 - Type : EXPLOIT-KIT |
2014-01-10 | Cool exploit kit former location - has been removed RuleID : 25960 - Revision : 5 - Type : EXPLOIT-KIT |
2014-01-10 | Cool exploit kit malicious class file download RuleID : 25959 - Revision : 6 - Type : EXPLOIT-KIT |
2014-01-10 | Cool exploit kit malicious class file download RuleID : 25958 - Revision : 6 - Type : EXPLOIT-KIT |
2014-01-10 | Cool exploit kit malicious class file download RuleID : 25957 - Revision : 6 - Type : EXPLOIT-KIT |
2014-01-10 | Cool exploit kit malicious class file download RuleID : 25956 - Revision : 6 - Type : EXPLOIT-KIT |
2014-01-10 | Cool exploit kit malicious jar file download RuleID : 25955 - Revision : 7 - Type : EXPLOIT-KIT |
2014-01-10 | Cool exploit kit SWF file download RuleID : 25954 - Revision : 8 - Type : EXPLOIT-KIT |
2014-01-10 | Cool exploit kit landing page RuleID : 25953 - Revision : 5 - Type : EXPLOIT-KIT |
2014-01-10 | Cool exploit kit landing page RuleID : 25952 - Revision : 5 - Type : EXPLOIT-KIT |
2014-01-10 | Cool exploit kit EOT file download RuleID : 25951 - Revision : 7 - Type : EXPLOIT-KIT |
2014-01-10 | Cool exploit kit PDF exploit RuleID : 25950 - Revision : 8 - Type : EXPLOIT-KIT |
2014-01-10 | Cool exploit kit java exploit retrieval RuleID : 25862 - Revision : 5 - Type : EXPLOIT-KIT |
2014-01-10 | Cool exploit kit java exploit retrieval RuleID : 25861 - Revision : 5 - Type : EXPLOIT-KIT |
2014-01-10 | Cool exploit kit landing page RuleID : 25860 - Revision : 5 - Type : EXPLOIT-KIT |
2014-01-10 | Cool exploit kit malicious jar file download RuleID : 25859 - Revision : 8 - Type : EXPLOIT-KIT |
2014-01-10 | Cool exploit kit Java exploit download RuleID : 25858 - Revision : 5 - Type : EXPLOIT-KIT |
2014-01-10 | Cool exploit kit PDF exploit RuleID : 25857 - Revision : 9 - Type : EXPLOIT-KIT |
2014-01-10 | Cool exploit kit EOT file download RuleID : 25598 - Revision : 6 - Type : EXPLOIT-KIT |
2014-01-10 | Cool exploit kit EOT file download RuleID : 25597 - Revision : 6 - Type : EXPLOIT-KIT |
2014-01-10 | Cool exploit kit EOT file download RuleID : 25596 - Revision : 6 - Type : EXPLOIT-KIT |
2014-01-10 | Cool exploit kit java exploit retrieval RuleID : 25595 - Revision : 6 - Type : EXPLOIT-KIT |
2014-01-10 | Cool exploit kit java exploit retrieval RuleID : 25594 - Revision : 6 - Type : EXPLOIT-KIT |
2014-01-10 | Cool exploit kit java exploit retrieval RuleID : 25593 - Revision : 6 - Type : EXPLOIT-KIT |
2014-01-10 | Blackhole exploit kit landing page - specific structure RuleID : 25591 - Revision : 5 - Type : EXPLOIT-KIT |
2014-01-10 | Blackholev2 exploit kit landing page - specific structure RuleID : 25590 - Revision : 5 - Type : EXPLOIT-KIT |
2014-01-10 | Cool Exploit Kit SWF file download RuleID : 25576 - Revision : 2 - Type : EXPLOIT-KIT |
2014-01-10 | Cool Exploit Kit SWF file download RuleID : 25575 - Revision : 2 - Type : EXPLOIT-KIT |
2014-01-10 | Cool Exploit Kit SWF file download RuleID : 25574 - Revision : 2 - Type : EXPLOIT-KIT |
2014-01-10 | Cool Exploit Kit SWF file download RuleID : 25573 - Revision : 2 - Type : EXPLOIT-KIT |
2014-01-10 | Cool exploit kit java exploit retrieval RuleID : 25510 - Revision : 9 - Type : EXPLOIT-KIT |
2014-01-10 | Cool exploit kit pdf exploit retrieval RuleID : 25509 - Revision : 9 - Type : EXPLOIT-KIT |
2014-01-10 | Cool exploit kit java exploit retrieval RuleID : 25508 - Revision : 9 - Type : EXPLOIT-KIT |
2014-01-10 | Cool exploit kit pdf exploit retrieval RuleID : 25507 - Revision : 9 - Type : EXPLOIT-KIT |
2014-01-10 | Cool exploit kit EOT file download RuleID : 25506 - Revision : 7 - Type : EXPLOIT-KIT |
2014-01-10 | Cool exploit kit EOT file download RuleID : 25505 - Revision : 8 - Type : EXPLOIT-KIT |
2014-01-10 | JavaScript contained in an xml template embedded in a pdf attempt RuleID : 25475 - Revision : 8 - Type : FILE-PDF |
2014-01-10 | Sweet Orange exploit kit obfuscated payload download RuleID : 25391 - Revision : 5 - Type : EXPLOIT-KIT |
2014-01-10 | Sweet Orange exploit kit landing page - specific structure RuleID : 25390 - Revision : 2 - Type : EXPLOIT-KIT |
2014-01-10 | Sweet Orange exploit kit landing page - specific structure RuleID : 25389 - Revision : 2 - Type : EXPLOIT-KIT |
2014-01-10 | Cool exploit kit java exploit retrieval RuleID : 25328 - Revision : 9 - Type : EXPLOIT-KIT |
2014-01-10 | Cool exploit kit pdf exploit retrieval RuleID : 25327 - Revision : 9 - Type : EXPLOIT-KIT |
2014-01-10 | Cool exploit kit java exploit retrieval RuleID : 25326 - Revision : 10 - Type : EXPLOIT-KIT |
2014-01-10 | Cool exploit kit pdf exploit retrieval RuleID : 25325 - Revision : 9 - Type : EXPLOIT-KIT |
2014-01-10 | Cool exploit kit landing page detected RuleID : 25324 - Revision : 5 - Type : EXPLOIT-KIT |
2014-01-10 | Cool exploit kit EOT file download RuleID : 25323 - Revision : 10 - Type : EXPLOIT-KIT |
2014-01-10 | Cool exploit kit EOT file download RuleID : 25322 - Revision : 9 - Type : EXPLOIT-KIT |
2014-01-10 | Cool exploit kit 32-bit font file download RuleID : 25056 - Revision : 5 - Type : EXPLOIT-KIT |
2014-01-10 | Cool exploit kit 64-bit font file download RuleID : 25055 - Revision : 4 - Type : EXPLOIT-KIT |
2014-01-10 | Cool exploit kit requesting payload RuleID : 25045 - Revision : 5 - Type : EXPLOIT-KIT |
2014-01-10 | Sweet Orange exploit kit landing page - specific structure RuleID : 25044 - Revision : 3 - Type : EXPLOIT-KIT |
2014-01-10 | Nuclear exploit kit landing page detected RuleID : 24888 - Revision : 5 - Type : EXPLOIT-KIT |
2014-01-10 | Blackholev2 exploit kit landing page in an email RuleID : 24865 - Revision : 6 - Type : EXPLOIT-KIT |
2014-01-10 | Blackholev2 exploit kit landing page - specific-structure RuleID : 24864 - Revision : 6 - Type : EXPLOIT-KIT |
2014-01-10 | Blackholev2 exploit kit landing page in an email RuleID : 24863 - Revision : 6 - Type : EXPLOIT-KIT |
2014-01-10 | Blackholev2 exploit kit landing page - specific-structure RuleID : 24862 - Revision : 6 - Type : EXPLOIT-KIT |
2014-01-10 | Blackholev2 exploit kit landing page in an email RuleID : 24861 - Revision : 6 - Type : EXPLOIT-KIT |
2014-01-10 | Blackholev2 exploit kit landing page - specific-structure RuleID : 24860 - Revision : 6 - Type : EXPLOIT-KIT |
2014-01-10 | Sweet Orange exploit kit landing page - JAR redirection RuleID : 24840 - Revision : 4 - Type : EXPLOIT-KIT |
2014-01-10 | Sweet Orange exploit kit landing page - specific structure RuleID : 24839 - Revision : 4 - Type : EXPLOIT-KIT |
2014-01-10 | Sweet Orange User-Agent - contype RuleID : 24838 - Revision : 2 - Type : EXPLOIT-KIT |
2014-01-10 | Sweet Orange initial landing page RuleID : 24837 - Revision : 6 - Type : EXPLOIT-KIT |
2014-01-10 | Cool exploit kit 64-bit font file download RuleID : 24784 - Revision : 6 - Type : EXPLOIT-KIT |
2014-01-10 | Cool exploit kit 32-bit font file download RuleID : 24783 - Revision : 7 - Type : EXPLOIT-KIT |
2014-01-10 | Cool exploit kit outbound request RuleID : 24782 - Revision : 7 - Type : EXPLOIT-KIT |
2014-01-10 | Cool exploit kit outbound request RuleID : 24781 - Revision : 6 - Type : EXPLOIT-KIT |
2014-01-10 | Cool exploit kit - PDF Exploit RuleID : 24780 - Revision : 9 - Type : EXPLOIT-KIT |
2014-01-10 | Cool exploit kit - PDF Exploit RuleID : 24779 - Revision : 8 - Type : EXPLOIT-KIT |
2014-01-10 | Cool exploit kit landing page - Title RuleID : 24778 - Revision : 6 - Type : EXPLOIT-KIT |
2014-01-10 | JavaScript contained in an xml template embedded in a pdf attempt RuleID : 23612 - Revision : 11 - Type : FILE-PDF |
2014-01-10 | JavaScript contained in an xml template embedded in a pdf attempt RuleID : 23611 - Revision : 10 - Type : FILE-PDF |
2014-01-10 | Adobe Flash Player newfunction memory corruption exploit attempt RuleID : 23592 - Revision : 7 - Type : FILE-FLASH |
2014-01-10 | Adobe Flash Player newfunction memory corruption attempt RuleID : 23591 - Revision : 7 - Type : FILE-FLASH |
2014-01-10 | Adobe Flash use-after-free attack attempt RuleID : 23579 - Revision : 6 - Type : FILE-FLASH |
2014-01-10 | Adobe Acrobat Reader malformed TIFF remote code execution attempt RuleID : 23524 - Revision : 5 - Type : FILE-PDF |
2014-01-10 | Adobe Acrobat Reader malformed TIFF remote code execution attempt RuleID : 23523 - Revision : 5 - Type : FILE-PDF |
2014-01-10 | Adobe Acrobat Reader malicious TIFF remote code execution attempt RuleID : 23522 - Revision : 5 - Type : FILE-PDF |
2014-01-10 | Possible unknown malicious PDF RuleID : 23521 - Revision : 5 - Type : FILE-PDF |
2014-01-10 | Possible unknown malicious PDF RuleID : 23520 - Revision : 5 - Type : FILE-PDF |
2014-01-10 | Possible malicious pdf cve-2010-0188 string RuleID : 23519 - Revision : 3 - Type : FILE-PDF |
2014-01-10 | Adobe Acrobat Reader libtiff TIFFFetchShortPair stack buffer overflow attempt RuleID : 23518 - Revision : 5 - Type : FILE-PDF |
2014-01-10 | Adobe Acrobat Reader libtiff TIFFFetchShortPair stack buffer overflow attempt RuleID : 23517 - Revision : 5 - Type : FILE-PDF |
2014-01-10 | Adobe flash player newfunction memory corruption attempt RuleID : 23512 - Revision : 5 - Type : FILE-PDF |
2014-01-10 | Adobe Acrobat Reader authplay.dll vulnerability exploit attempt RuleID : 23511 - Revision : 7 - Type : FILE-PDF |
2014-01-10 | Adobe Acrobat Reader File containing Flash use-after-free attack attempt RuleID : 23510 - Revision : 7 - Type : FILE-PDF |
2014-01-10 | Adobe Acrobat Reader malformed Richmedia annotation exploit attempt RuleID : 23509 - Revision : 5 - Type : FILE-PDF |
2014-01-10 | Adobe Acrobat Reader media.newPlayer memory corruption attempt RuleID : 23506 - Revision : 5 - Type : FILE-PDF |
2014-01-10 | Adobe Acrobat Reader compressed media.newPlayer memory corruption attempt RuleID : 23505 - Revision : 6 - Type : FILE-PDF |
2014-01-10 | Adobe Flash Player newfunction memory corruption attempt RuleID : 23265 - Revision : 11 - Type : FILE-FLASH |
2014-01-10 | Adobe Flash Player newfunction memory corruption attempt RuleID : 23264 - Revision : 10 - Type : FILE-FLASH |
2014-01-10 | Adobe flash player newfunction memory corruption attempt RuleID : 23263 - Revision : 9 - Type : FILE-PDF |
2014-01-10 | Phoenix exploit kit post-compromise behavior RuleID : 21860 - Revision : 5 - Type : MALWARE-CNC |
2014-01-10 | Phoenix exploit kit landing page RuleID : 21640 - Revision : 6 - Type : EXPLOIT-KIT |
2014-01-10 | Possible malicious pdf cve-2010-0188 string RuleID : 21537 - Revision : 4 - Type : FILE-PDF |
2014-01-10 | Possible unknown malicious PDF RuleID : 21453 - Revision : 7 - Type : FILE-PDF |
2014-01-10 | Possible unknown malicious PDF RuleID : 21429 - Revision : 10 - Type : FILE-PDF |
2014-01-10 | Eleanore exploit kit post-exploit page request RuleID : 21071 - Revision : 5 - Type : EXPLOIT-KIT |
2014-01-10 | Eleanore exploit kit pdf exploit page request RuleID : 21070 - Revision : 4 - Type : EXPLOIT-KIT |
2014-01-10 | Eleanore exploit kit exploit fetch request RuleID : 21069 - Revision : 4 - Type : EXPLOIT-KIT |
2014-01-10 | Eleanore exploit kit landing page RuleID : 21068 - Revision : 4 - Type : EXPLOIT-KIT |
2014-01-10 | Adobe Acrobat Reader malicious TIFF remote code execution attempt RuleID : 20577 - Revision : 13 - Type : FILE-PDF |
2014-01-10 | Adobe Acrobat Reader U3D CLODMeshDeceleration code execution attempt RuleID : 20429 - Revision : 12 - Type : FILE-PDF |
2014-01-10 | Adobe Flash Player newfunction memory corruption exploit attempt RuleID : 19408 - Revision : 12 - Type : FILE-FLASH |
2014-01-10 | attempted download of a PDF with embedded Flash RuleID : 19269 - Revision : 14 - Type : FILE-PDF |
2014-01-10 | attempted download of a PDF with embedded Flash RuleID : 19268 - Revision : 14 - Type : FILE-PDF |
2014-01-10 | Adobe Flash Player newfunction memory corruption attempt RuleID : 19145 - Revision : 13 - Type : FILE-FLASH |
2014-01-10 | Adobe Acrobat Reader malformed TIFF remote code execution attempt RuleID : 18585 - Revision : 13 - Type : FILE-PDF |
2014-01-10 | Adobe Acrobat Reader libtiff TIFFFetchShortPair stack buffer overflow attempt RuleID : 17215 - Revision : 12 - Type : FILE-PDF |
2014-01-10 | Adobe Acrobat Reader libtiff TIFFFetchShortPair stack buffer overflow attempt RuleID : 17214 - Revision : 12 - Type : FILE-PDF |
2014-01-10 | Adobe Acrobat Reader CoolType.dll remote memory corruption denial of service ... RuleID : 16801 - Revision : 13 - Type : FILE-PDF |
2014-01-10 | Adobe Acrobat Reader authplay.dll vulnerability exploit attempt RuleID : 16664 - Revision : 12 - Type : FILE-PDF |
2014-01-10 | Adobe Flash use-after-free attack attempt RuleID : 16634 - Revision : 16 - Type : FILE-FLASH |
2014-01-10 | Adobe Acrobat Reader File containing Flash use-after-free attack attempt RuleID : 16633 - Revision : 19 - Type : FILE-PDF |
2014-01-10 | Adobe Acrobat Reader Linux malformed U3D mesh deceleration block exploit attempt RuleID : 16603 - Revision : 14 - Type : FILE-PDF |
2014-01-10 | Adobe Acrobat Reader/Acrobat Pro CFF font parsing heap overflow attempt RuleID : 16546 - Revision : 12 - Type : FILE-PDF |
2014-01-10 | Adobe Acrobat Reader malformed Richmedia annotation exploit attempt RuleID : 16545 - Revision : 21 - Type : FILE-PDF |
2015-05-28 | Adobe Reader Linux malformed U3D mesh deceleration block exploit attempt RuleID : 16544 - Revision : 6 - Type : WEB-CLIENT |
2014-01-10 | Adobe Acrobat Reader malformed TIFF remote code execution attempt RuleID : 16490 - Revision : 15 - Type : FILE-PDF |
2014-01-10 | Adobe Acrobat Reader compressed media.newPlayer memory corruption attempt RuleID : 16334 - Revision : 18 - Type : FILE-PDF |
2014-01-10 | Adobe Acrobat Reader media.newPlayer memory corruption attempt RuleID : 16333 - Revision : 18 - Type : FILE-PDF |
2014-01-10 | attempted download of a PDF with embedded Flash RuleID : 15727 - Revision : 27 - Type : FILE-PDF |
Nessus® Vulnerability Scanner
Date | Description |
---|---|
2013-01-24 | Name : The remote Red Hat host is missing a security update. File : redhat-RHSA-2010-0470.nasl - Type : ACT_GATHER_INFO |
2013-01-24 | Name : The remote Red Hat host is missing a security update. File : redhat-RHSA-2010-0464.nasl - Type : ACT_GATHER_INFO |
2013-01-24 | Name : The remote Red Hat host is missing a security update. File : redhat-RHSA-2010-0103.nasl - Type : ACT_GATHER_INFO |
2013-01-24 | Name : The remote Red Hat host is missing a security update. File : redhat-RHSA-2010-0102.nasl - Type : ACT_GATHER_INFO |
2013-01-24 | Name : The remote Red Hat host is missing a security update. File : redhat-RHSA-2010-0060.nasl - Type : ACT_GATHER_INFO |
2013-01-24 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2010-0038.nasl - Type : ACT_GATHER_INFO |
2013-01-24 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2010-0037.nasl - Type : ACT_GATHER_INFO |
2011-01-27 | Name : The remote SuSE 10 host is missing a security-related patch. File : suse_flash-player-7071.nasl - Type : ACT_GATHER_INFO |
2011-01-27 | Name : The remote SuSE 10 host is missing a security-related patch. File : suse_acroread-6802.nasl - Type : ACT_GATHER_INFO |
2011-01-27 | Name : The remote SuSE 10 host is missing a security-related patch. File : suse_acroread-6803.nasl - Type : ACT_GATHER_INFO |
2011-01-27 | Name : The remote SuSE 10 host is missing a security-related patch. File : suse_acroread-6879.nasl - Type : ACT_GATHER_INFO |
2011-01-27 | Name : The remote SuSE 10 host is missing a security-related patch. File : suse_acroread-6881.nasl - Type : ACT_GATHER_INFO |
2011-01-27 | Name : The remote SuSE 10 host is missing a security-related patch. File : suse_acroread-6993.nasl - Type : ACT_GATHER_INFO |
2011-01-27 | Name : The remote SuSE 10 host is missing a security-related patch. File : suse_acroread-7087.nasl - Type : ACT_GATHER_INFO |
2011-01-27 | Name : The remote SuSE 10 host is missing a security-related patch. File : suse_flash-player-6845.nasl - Type : ACT_GATHER_INFO |
2011-01-27 | Name : The remote SuSE 10 host is missing a security-related patch. File : suse_flash-player-6844.nasl - Type : ACT_GATHER_INFO |
2011-01-27 | Name : The remote SuSE 10 host is missing a security-related patch. File : suse_acroread_ja-7086.nasl - Type : ACT_GATHER_INFO |
2011-01-27 | Name : The remote SuSE 10 host is missing a security-related patch. File : suse_acroread_ja-6995.nasl - Type : ACT_GATHER_INFO |
2011-01-27 | Name : The remote SuSE 10 host is missing a security-related patch. File : suse_acroread_ja-6805.nasl - Type : ACT_GATHER_INFO |
2011-01-27 | Name : The remote SuSE 10 host is missing a security-related patch. File : suse_acroread_ja-6804.nasl - Type : ACT_GATHER_INFO |
2011-01-27 | Name : The remote SuSE 10 host is missing a security-related patch. File : suse_acroread-6994.nasl - Type : ACT_GATHER_INFO |
2011-01-24 | Name : The remote Gentoo host is missing one or more security-related patches. File : gentoo_GLSA-201101-09.nasl - Type : ACT_GATHER_INFO |
2010-12-02 | Name : The remote SuSE 11 host is missing a security update. File : suse_11_acroread_ja-100702.nasl - Type : ACT_GATHER_INFO |
2010-12-02 | Name : The remote SuSE 11 host is missing a security update. File : suse_11_acroread_ja-100419.nasl - Type : ACT_GATHER_INFO |
2010-12-02 | Name : The remote SuSE 11 host is missing one or more security updates. File : suse_11_acroread-100702.nasl - Type : ACT_GATHER_INFO |
2010-12-02 | Name : The remote SuSE 11 host is missing a security update. File : suse_11_flash-player-100611.nasl - Type : ACT_GATHER_INFO |
2010-12-02 | Name : The remote SuSE 11 host is missing one or more security updates. File : suse_11_acroread-100418.nasl - Type : ACT_GATHER_INFO |
2010-11-10 | Name : The remote host is missing a Mac OS X update that fixes security issues. File : macosx_SecUpd2010-007.nasl - Type : ACT_GATHER_INFO |
2010-11-10 | Name : The remote host is missing a Mac OS X update that fixes various security issues. File : macosx_10_6_5.nasl - Type : ACT_GATHER_INFO |
2010-09-08 | Name : The remote Gentoo host is missing one or more security-related patches. File : gentoo_GLSA-201009-05.nasl - Type : ACT_GATHER_INFO |
2010-07-28 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2010-0503.nasl - Type : ACT_GATHER_INFO |
2010-07-09 | Name : The remote openSUSE host is missing a security update. File : suse_11_0_acroread-100708.nasl - Type : ACT_GATHER_INFO |
2010-07-09 | Name : The remote openSUSE host is missing a security update. File : suse_11_1_acroread-100708.nasl - Type : ACT_GATHER_INFO |
2010-07-09 | Name : The remote openSUSE host is missing a security update. File : suse_11_2_acroread-100706.nasl - Type : ACT_GATHER_INFO |
2010-06-30 | Name : The version of Adobe Acrobat on the remote Windows host is affected by multip... File : adobe_acrobat_apsb10-15.nasl - Type : ACT_GATHER_INFO |
2010-06-30 | Name : The version of Adobe Reader on the remote Windows host is affected by multipl... File : adobe_reader_apsb10-15.nasl - Type : ACT_GATHER_INFO |
2010-06-16 | Name : The remote FreeBSD host is missing one or more security-related updates. File : freebsd_pkg_144e524a77eb11dfae06001b2134ef46.nasl - Type : ACT_GATHER_INFO |
2010-06-15 | Name : The remote host is missing a Mac OS X update that fixes a security issue. File : macosx_SecUpd2010-004.nasl - Type : ACT_GATHER_INFO |
2010-06-15 | Name : The remote host is missing a Mac OS X update that fixes various security issues. File : macosx_10_6_4.nasl - Type : ACT_GATHER_INFO |
2010-06-14 | Name : The remote openSUSE host is missing a security update. File : suse_11_0_flash-player-100611.nasl - Type : ACT_GATHER_INFO |
2010-06-14 | Name : The remote openSUSE host is missing a security update. File : suse_11_2_flash-player-100611.nasl - Type : ACT_GATHER_INFO |
2010-06-14 | Name : The remote openSUSE host is missing a security update. File : suse_11_1_flash-player-100611.nasl - Type : ACT_GATHER_INFO |
2010-06-10 | Name : The remote Windows host contains a version of Adobe AIR that is affected by m... File : adobe_air_apsb10-14.nasl - Type : ACT_GATHER_INFO |
2010-06-10 | Name : The remote Windows host contains a browser plug-in that is affected by a code... File : flash_player_apsb10-14.nasl - Type : ACT_GATHER_INFO |
2010-05-11 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2010-0349.nasl - Type : ACT_GATHER_INFO |
2010-04-22 | Name : The remote openSUSE host is missing a security update. File : suse_11_2_acroread-100419.nasl - Type : ACT_GATHER_INFO |
2010-04-22 | Name : The remote openSUSE host is missing a security update. File : suse_11_1_acroread-100418.nasl - Type : ACT_GATHER_INFO |
2010-04-22 | Name : The remote openSUSE host is missing a security update. File : suse_11_0_acroread-100418.nasl - Type : ACT_GATHER_INFO |
2010-04-13 | Name : The version of Adobe Acrobat on the remote Windows host is affected by multip... File : adobe_acrobat_apsb10-09.nasl - Type : ACT_GATHER_INFO |
2010-04-13 | Name : The version of Adobe Reader on the remote Windows host is affected by multipl... File : adobe_reader_apsb10-09.nasl - Type : ACT_GATHER_INFO |
2010-03-04 | Name : The remote openSUSE host is missing a security update. File : suse_11_2_acroread-100225.nasl - Type : ACT_GATHER_INFO |
2010-03-04 | Name : The remote SuSE 11 host is missing one or more security updates. File : suse_11_acroread-100225.nasl - Type : ACT_GATHER_INFO |
2010-03-04 | Name : The remote openSUSE host is missing a security update. File : suse_11_1_acroread-100225.nasl - Type : ACT_GATHER_INFO |
2010-03-04 | Name : The remote openSUSE host is missing a security update. File : suse_11_0_acroread-100225.nasl - Type : ACT_GATHER_INFO |
2010-02-19 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2010-0114.nasl - Type : ACT_GATHER_INFO |
2010-02-17 | Name : The version of Adobe Acrobat on the remote Windows host is affected by multip... File : adobe_acrobat_apsb10-07.nasl - Type : ACT_GATHER_INFO |
2010-02-17 | Name : The version of Adobe Reader on the remote Windows host is affected by multipl... File : adobe_reader_apsb10-07.nasl - Type : ACT_GATHER_INFO |
2010-02-17 | Name : The remote SuSE 11 host is missing a security update. File : suse_11_flash-player-100214.nasl - Type : ACT_GATHER_INFO |
2010-02-17 | Name : The remote openSUSE host is missing a security update. File : suse_11_0_flash-player-100214.nasl - Type : ACT_GATHER_INFO |
2010-02-17 | Name : The remote openSUSE host is missing a security update. File : suse_11_2_flash-player-100214.nasl - Type : ACT_GATHER_INFO |
2010-02-17 | Name : The remote openSUSE host is missing a security update. File : suse_11_1_flash-player-100214.nasl - Type : ACT_GATHER_INFO |
2010-02-15 | Name : The remote FreeBSD host is missing one or more security-related updates. File : freebsd_pkg_ff6519ad18e511df9bdd001b2134ef46.nasl - Type : ACT_GATHER_INFO |
2010-02-12 | Name : The remote Windows host contains a browser plug-in that is affected by multip... File : flash_player_apsb10_06.nasl - Type : ACT_GATHER_INFO |
2010-02-12 | Name : The remote Windows host contains a version of Adobe AIR that is affected by m... File : adobe_air_apsb10-06.nasl - Type : ACT_GATHER_INFO |
2010-02-02 | Name : The remote SuSE 11 host is missing a security update. File : suse_11_acroread_ja-100128.nasl - Type : ACT_GATHER_INFO |
2010-01-25 | Name : The remote openSUSE host is missing a security update. File : suse_11_0_acroread-100122.nasl - Type : ACT_GATHER_INFO |
2010-01-25 | Name : The remote openSUSE host is missing a security update. File : suse_11_1_acroread-100122.nasl - Type : ACT_GATHER_INFO |
2010-01-25 | Name : The remote SuSE 11 host is missing a security update. File : suse_11_acroread-100122.nasl - Type : ACT_GATHER_INFO |
2010-01-25 | Name : The remote openSUSE host is missing a security update. File : suse_11_2_acroread-100122.nasl - Type : ACT_GATHER_INFO |
2010-01-13 | Name : The version of Adobe Acrobat on the remote Windows host is affected by multip... File : adobe_acrobat_apsb10-02.nasl - Type : ACT_GATHER_INFO |
2010-01-13 | Name : The PDF file viewer on the remote Windows host is affected by multiple vulner... File : adobe_reader_apsb10-02.nasl - Type : ACT_GATHER_INFO |
Alert History
Date | Informations |
---|---|
2014-02-17 11:36:55 |
|