Vulnerabilities > Adobe > Acrobat Reader > 4.5

DATE CVE VULNERABILITY TITLE RISK
2009-10-19 CVE-2009-2982 Cryptographic Issues vulnerability in Adobe Acrobat and Acrobat Reader
An unspecified certificate in Adobe Reader and Acrobat 9.x before 9.2, 8.x before 8.1.7, and possibly 7.x through 7.1.4 might allow remote attackers to conduct a "social engineering attack" via unknown vectors.
network
adobe CWE-310
critical
9.3
2009-10-19 CVE-2009-2981 Improper Input Validation vulnerability in Adobe Acrobat and Acrobat Reader
Adobe Reader and Acrobat 7.x before 7.1.4, 8.x before 8.1.7, and 9.x before 9.2 do not properly validate input, which might allow attackers to bypass intended Trust Manager restrictions via unspecified vectors.
network
adobe CWE-20
critical
9.3
2009-10-19 CVE-2009-2980 Numeric Errors vulnerability in Adobe Acrobat and Acrobat Reader
Integer overflow in Adobe Reader and Acrobat 7.x before 7.1.4, 8.x before 8.1.7, and 9.x before 9.2 allows attackers to cause a denial of service or possibly execute arbitrary code via unspecified vectors.
network
adobe CWE-189
critical
9.3
2009-10-19 CVE-2009-2979 Remote vulnerability in RETIRED: Adobe Reader and Acrobat October 2009
Adobe Reader and Acrobat 9.x before 9.2, 8.x before 8.1.7, and possibly 7.x through 7.1.4 do not properly perform XMP-XML entity expansion, which allows remote attackers to cause a denial of service via a crafted document.
network
adobe
4.3
2009-10-13 CVE-2009-3459 Improper Restriction of Operations Within the Bounds of A Memory Buffer vulnerability in Adobe Acrobat, Acrobat Reader and Reader
Heap-based buffer overflow in Adobe Reader and Acrobat 7.x before 7.1.4, 8.x before 8.1.7, and 9.x before 9.2 allows remote attackers to execute arbitrary code via a crafted PDF file that triggers memory corruption, as exploited in the wild in October 2009.
network
adobe CWE-119
critical
9.3
2009-03-25 CVE-2009-1062 Improper Input Validation vulnerability in Adobe Acrobat, Acrobat Reader and Reader
Adobe Acrobat Reader 9 before 9.1, 8 before 8.1.4, and 7 before 7.1.1 might allow remote attackers to trigger memory corruption and possibly execute arbitrary code via unknown attack vectors related to JBIG2, a different vulnerability than CVE-2009-0193 and CVE-2009-1061.
network
adobe CWE-20
critical
9.3
2009-03-25 CVE-2009-0928 Improper Restriction of Operations Within the Bounds of A Memory Buffer vulnerability in Adobe Acrobat and Acrobat Reader
Heap-based buffer overflow in Adobe Acrobat Reader and Acrobat Professional 7.1.0, 8.1.3, 9.0.0, and other versions allows remote attackers to execute arbitrary code via a PDF file containing a JBIG2 stream with a size inconsistency related to an unspecified table.
network
low complexity
adobe CWE-119
critical
10.0
2008-11-05 CVE-2008-4817 Improper Input Validation vulnerability in Adobe Acrobat and Acrobat Reader
The Download Manager in Adobe Acrobat Professional and Reader 8.1.2 and earlier allows remote attackers to execute arbitrary code via a crafted PDF document that calls an AcroJS function with a long string argument, triggering heap corruption.
network
adobe CWE-20
critical
9.3
2008-11-05 CVE-2008-4816 Unspecified vulnerability in Adobe Acrobat and Acrobat Reader
Unspecified vulnerability in the Download Manager in Adobe Reader 8.1.2 and earlier on Windows allows remote attackers to change Internet Security options on a client machine via unknown vectors.
network
microsoft adobe
4.3
2008-11-05 CVE-2008-4815 Permissions, Privileges, and Access Controls vulnerability in Adobe Acrobat and Acrobat Reader
Untrusted search path vulnerability in Adobe Reader and Acrobat 8.1.2 and earlier on Unix and Linux allows attackers to gain privileges via a Trojan Horse program in an unspecified directory that is associated with an insecure RPATH.
network
low complexity
unix adobe CWE-264
7.5