Vulnerabilities > CVE-2011-4222 - Unspecified vulnerability in Investintech Able2Extract and Able2Extract Server
Attack vector
NETWORK Attack complexity
MEDIUM Privileges required
NONE Confidentiality impact
COMPLETE Integrity impact
COMPLETE Availability impact
COMPLETE Summary
Unspecified vulnerability in Investintech.com Able2Extract and Able2Extract Server allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted document.
Vulnerable Configurations
Part | Description | Count |
---|---|---|
Application | 2 |
Exploit-Db
description Able2Doc and Able2Doc Professional 6.0 - Memory Corruption. CVE-2011-4220,CVE-2011-4221,CVE-2011-4222. Dos exploit for windows platform id EDB-ID:19393 last seen 2016-02-02 modified 2012-06-25 published 2012-06-25 reporter Carlos Mario Penagos Hollmann source https://www.exploit-db.com/download/19393/ title Able2Doc and Able2Doc Professional 6.0 - Memory Corruption description Slimpdf Reader 1.0 Memory Corruption. CVE-2011-4220,CVE-2011-4221,CVE-2011-4222. Dos exploit for windows platform id EDB-ID:19391 last seen 2016-02-02 modified 2012-06-25 published 2012-06-25 reporter Carlos Mario Penagos Hollmann source https://www.exploit-db.com/download/19391/ title Slimpdf Reader 1.0 Memory Corruption description Able2Extract and Able2Extract Server 6.0 - Memory Corruption. CVE-2011-4220,CVE-2011-4221,CVE-2011-4222. Dos exploit for windows platform id EDB-ID:19392 last seen 2016-02-02 modified 2012-06-25 published 2012-06-25 reporter Carlos Mario Penagos Hollmann source https://www.exploit-db.com/download/19392/ title Able2Extract and Able2Extract Server 6.0 - Memory Corruption
Nessus
NASL family | Windows |
NASL id | INVESTINTECH_ABLE2EXTRACT_7_0_8_22.NASL |
description | The remote host has a version of Investintech Able2Extract that is earlier than 7.0.8.22 and is, therefore, affected by multiple, unspecified vulnerabilities. These vulnerabilities could allow an attacker to cause a denial of service condition or execute arbitrary code on the remote host by tricking a victim into opening a specially crafted PDF document. |
last seen | 2020-06-01 |
modified | 2020-06-02 |
plugin id | 62623 |
published | 2012-10-18 |
reporter | This script is Copyright (C) 2012-2018 Tenable Network Security, Inc. |
source | https://www.tenable.com/plugins/nessus/62623 |
title | Investintech Able2Extract < 7.0.8.22 Multiple Vulnerabilities |
code |
|
Packetstorm
data source | https://packetstormsecurity.com/files/download/114155/able2extractserver-corrupt.txt |
id | PACKETSTORM:114155 |
last seen | 2016-12-05 |
published | 2012-06-25 |
reporter | Carlos Mario Penagos Hollmann |
source | https://packetstormsecurity.com/files/114155/Able2Extract-6.0-Memory-Corruption.html |
title | Able2Extract 6.0 Memory Corruption |
Seebug
bulletinFamily | exploit |
description | No description provided by source. |
id | SSV:73325 |
last seen | 2017-11-19 |
modified | 2014-07-01 |
published | 2014-07-01 |
reporter | Root |
source | https://www.seebug.org/vuldb/ssvid-73325 |
title | Able2Extract and Able2Extract Server 6.0 - Memory Corruption |