Vulnerabilities > Adobe > Acrobat > 3.1
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2008-02-12 | CVE-2007-5666 | Code Injection vulnerability in Adobe Acrobat and Acrobat Reader Untrusted search path vulnerability in Adobe Reader and Acrobat 8.1.1 and earlier allows local users to execute arbitrary code via a malicious Security Provider library in the reader's current working directory. | 6.2 |
2008-02-12 | CVE-2007-5663 | Code Injection vulnerability in Adobe Acrobat and Acrobat Reader Adobe Reader and Acrobat 8.1.1 and earlier allows remote attackers to execute arbitrary code via a crafted PDF file that calls an insecure JavaScript method in the EScript.api plug-in. | 9.3 |
2008-02-12 | CVE-2007-5659 | Improper Restriction of Operations Within the Bounds of A Memory Buffer vulnerability in Adobe Acrobat and Acrobat Reader Multiple buffer overflows in Adobe Reader and Acrobat 8.1.1 and earlier allow remote attackers to execute arbitrary code via a PDF file with long arguments to unspecified JavaScript methods. | 9.3 |
2008-02-07 | CVE-2008-0655 | Arbitrary Code Execution and Security vulnerability in Adobe Acrobat and Reader Multiple unspecified vulnerabilities in Adobe Reader and Acrobat before 8.1.2 have unknown impact and attack vectors. | 9.3 |
2006-12-31 | CVE-2006-5857 | Resource Management Errors vulnerability in Adobe Acrobat and Acrobat Reader Adobe Reader and Acrobat 7.0.8 and earlier allows user-assisted remote attackers to execute code via a crafted PDF file that triggers memory corruption and overwrites a subroutine pointer during rendering. | 9.3 |
2006-07-12 | CVE-2006-3452 | Local Privilege Escalation vulnerability in Adobe Acrobat / Adobe Reader Adobe Reader and Acrobat 6.0.4 and earlier, on Mac OSX, has insecure file and directory permissions, which allows local users to gain privileges by overwriting program files. | 4.6 |
2006-02-02 | CVE-2006-0525 | Permissions, Privileges, and Access Controls vulnerability in Adobe products Multiple Adobe products, including (1) Photoshop CS2, (2) Illustrator CS2, and (3) Adobe Help Center, install a large number of .EXE and .DLL files with write-access permission for the Everyone group, which allows local users to gain privileges via Trojan horse programs. | 4.6 |