Vulnerabilities > Adobe > Acrobat Reader > 4.0
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2009-03-25 | CVE-2009-0928 | Improper Restriction of Operations Within the Bounds of A Memory Buffer vulnerability in Adobe Acrobat and Acrobat Reader Heap-based buffer overflow in Adobe Acrobat Reader and Acrobat Professional 7.1.0, 8.1.3, 9.0.0, and other versions allows remote attackers to execute arbitrary code via a PDF file containing a JBIG2 stream with a size inconsistency related to an unspecified table. | 10.0 |
2008-11-05 | CVE-2008-4817 | Improper Input Validation vulnerability in Adobe Acrobat and Acrobat Reader The Download Manager in Adobe Acrobat Professional and Reader 8.1.2 and earlier allows remote attackers to execute arbitrary code via a crafted PDF document that calls an AcroJS function with a long string argument, triggering heap corruption. | 9.3 |
2008-11-05 | CVE-2008-4816 | Unspecified vulnerability in Adobe Acrobat and Acrobat Reader Unspecified vulnerability in the Download Manager in Adobe Reader 8.1.2 and earlier on Windows allows remote attackers to change Internet Security options on a client machine via unknown vectors. | 4.3 |
2008-11-05 | CVE-2008-4815 | Permissions, Privileges, and Access Controls vulnerability in Adobe Acrobat and Acrobat Reader Untrusted search path vulnerability in Adobe Reader and Acrobat 8.1.2 and earlier on Unix and Linux allows attackers to gain privileges via a Trojan Horse program in an unspecified directory that is associated with an insecure RPATH. | 7.5 |
2008-11-05 | CVE-2008-4814 | Improper Input Validation vulnerability in Adobe Acrobat and Acrobat Reader Unspecified vulnerability in a JavaScript method in Adobe Reader and Acrobat 8.1.2 and earlier, and before 7.1.1, allows remote attackers to execute arbitrary code via unknown vectors, related to an "input validation issue." | 9.3 |
2008-11-05 | CVE-2008-4813 | Resource Management Errors vulnerability in Adobe Acrobat and Acrobat Reader Adobe Reader and Acrobat 8.1.2 and earlier, and before 7.1.1, allow remote attackers to execute arbitrary code via a crafted PDF document that (1) performs unspecified actions on a Collab object that trigger memory corruption, related to a GetCosObj method; or (2) contains a malformed PDF object that triggers memory corruption during parsing. | 9.3 |
2008-11-05 | CVE-2008-4812 | Improper Input Validation vulnerability in Adobe Acrobat and Acrobat Reader Array index error in Adobe Reader and Acrobat, and the Explorer extension (aka AcroRd32Info), 8.1.2, 8.1.1, and earlier allows remote attackers to execute arbitrary code via a crafted PDF document that triggers an out-of-bounds write, related to parsing of Type 1 fonts. | 9.3 |
2008-11-04 | CVE-2008-2992 | Improper Restriction of Operations Within the Bounds of A Memory Buffer vulnerability in Adobe Acrobat and Acrobat Reader Stack-based buffer overflow in Adobe Acrobat and Reader 8.1.2 and earlier allows remote attackers to execute arbitrary code via a PDF file that calls the util.printf JavaScript function with a crafted format string argument, a related issue to CVE-2008-1104. | 9.3 |
2008-06-25 | CVE-2008-2641 | Remote Code Execution vulnerability in Adobe Acrobat 3D and Acrobat Reader Unspecified vulnerability in Adobe Reader and Acrobat 7.0.9 and earlier, and 8.0 through 8.1.2, allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via unknown vectors, related to an "input validation issue in a JavaScript method." | 10.0 |
2008-06-04 | CVE-2008-2549 | Remote Denial Of Service vulnerability in Adobe Reader Adobe Acrobat Reader 8.1.2 and earlier, and before 7.1.1, allows remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via a malformed PDF document, as demonstrated by 2008-HI2.pdf. network adobe | 4.3 |