Vulnerabilities > Adobe > Acrobat > 5.0

DATE CVE VULNERABILITY TITLE RISK
2008-02-12 CVE-2007-5666 Code Injection vulnerability in Adobe Acrobat and Acrobat Reader
Untrusted search path vulnerability in Adobe Reader and Acrobat 8.1.1 and earlier allows local users to execute arbitrary code via a malicious Security Provider library in the reader's current working directory.
local
high complexity
adobe CWE-94
6.2
2008-02-12 CVE-2007-5663 Code Injection vulnerability in Adobe Acrobat and Acrobat Reader
Adobe Reader and Acrobat 8.1.1 and earlier allows remote attackers to execute arbitrary code via a crafted PDF file that calls an insecure JavaScript method in the EScript.api plug-in.
network
adobe CWE-94
critical
9.3
2008-02-12 CVE-2007-5659 Improper Restriction of Operations Within the Bounds of A Memory Buffer vulnerability in Adobe Acrobat and Acrobat Reader
Multiple buffer overflows in Adobe Reader and Acrobat 8.1.1 and earlier allow remote attackers to execute arbitrary code via a PDF file with long arguments to unspecified JavaScript methods.
network
adobe CWE-119
critical
9.3
2008-02-07 CVE-2008-0655 Arbitrary Code Execution and Security vulnerability in Adobe Acrobat and Reader
Multiple unspecified vulnerabilities in Adobe Reader and Acrobat before 8.1.2 have unknown impact and attack vectors.
network
adobe
critical
9.3
2006-12-31 CVE-2006-5857 Resource Management Errors vulnerability in Adobe Acrobat and Acrobat Reader
Adobe Reader and Acrobat 7.0.8 and earlier allows user-assisted remote attackers to execute code via a crafted PDF file that triggers memory corruption and overwrites a subroutine pointer during rendering.
network
adobe CWE-399
critical
9.3
2006-07-12 CVE-2006-3452 Local Privilege Escalation vulnerability in Adobe Acrobat / Adobe Reader
Adobe Reader and Acrobat 6.0.4 and earlier, on Mac OSX, has insecure file and directory permissions, which allows local users to gain privileges by overwriting program files.
local
low complexity
adobe
4.6
2006-02-02 CVE-2006-0525 Permissions, Privileges, and Access Controls vulnerability in Adobe products
Multiple Adobe products, including (1) Photoshop CS2, (2) Illustrator CS2, and (3) Adobe Help Center, install a large number of .EXE and .DLL files with write-access permission for the Everyone group, which allows local users to gain privileges via Trojan horse programs.
local
low complexity
adobe CWE-264
4.6
2005-08-16 CVE-2005-2470 Remote Buffer Overflow vulnerability in Adobe Acrobat and Adobe Reader
Buffer overflow in a "core application plug-in" for Adobe Reader 5.1 through 7.0.2 and Acrobat 5.0 through 7.0.2 allows attackers to cause a denial of service (crash) and possibly execute arbitrary code via unknown vectors.
network
low complexity
adobe
7.5
2004-09-28 CVE-2004-0629 Buffer Overflow vulnerability in Adobe Acrobat/Acrobat Reader ActiveX Control URI Request Heap
Buffer overflow in the ActiveX component (pdf.ocx) for Adobe Acrobat 5.0.5 and Acrobat Reader, and possibly other versions, allows remote attackers to execute arbitrary code via a URI for a PDF file with a null terminator (%00) followed by a long string.
network
low complexity
adobe
7.5
2003-06-16 CVE-2003-0284 Remote Security vulnerability in Adobe Acrobat 5.0
Adobe Acrobat 5 does not properly validate JavaScript in PDF files, which allows remote attackers to write arbitrary files into the Plug-ins folder that spread to other PDF documents, as demonstrated by the W32.Yourde virus.
network
low complexity
adobe
7.5