Vulnerabilities > Adobe > Digital Editions > Medium
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2017-02-15 | CVE-2017-2978 | Out-of-bounds Read vulnerability in Adobe Digital Editions Adobe Digital Editions versions 4.5.3 and earlier have an exploitable buffer over-read vulnerability. | 5.0 |
2017-02-15 | CVE-2017-2977 | Out-of-bounds Read vulnerability in Adobe Digital Editions Adobe Digital Editions versions 4.5.3 and earlier have an exploitable buffer over-read vulnerability. | 5.0 |
2017-02-15 | CVE-2017-2976 | Out-of-bounds Read vulnerability in Adobe Digital Editions Adobe Digital Editions versions 4.5.3 and earlier have an exploitable buffer over-read vulnerability. | 5.0 |
2017-02-15 | CVE-2017-2975 | Out-of-bounds Read vulnerability in Adobe Digital Editions Adobe Digital Editions versions 4.5.3 and earlier have an exploitable buffer over-read vulnerability. | 5.0 |
2017-02-15 | CVE-2017-2974 | Out-of-bounds Read vulnerability in Adobe Digital Editions Adobe Digital Editions versions 4.5.3 and earlier have an exploitable buffer over-read vulnerability. | 5.0 |
2016-12-15 | CVE-2016-7889 | Information Exposure vulnerability in Adobe Digital Editions Adobe Digital Editions versions 4.5.2 and earlier has an issue with parsing crafted XML entries that could lead to information disclosure. | 5.0 |
2016-12-15 | CVE-2016-7888 | Information Exposure vulnerability in Adobe Digital Editions Adobe Digital Editions versions 4.5.2 and earlier has an important vulnerability that could lead to memory address leak. | 5.0 |
2014-10-09 | CVE-2014-8068 | Information Exposure vulnerability in Adobe Digital Editions 4.0 Adobe Digital Editions (DE) 4 does not use encryption for transmission of data to adelogs.adobe.com, which allows remote attackers to obtain sensitive information by sniffing the network, as demonstrated by book-navigation information. | 5.0 |
2002-10-04 | CVE-2002-1016 | Privilege Escalation vulnerability in Adobe Digital Editions 2.2 Adobe eBook Reader allows a user to bypass restrictions for copy, print, lend, and give operations by backing up key data files, performing the operations, and restoring the original data files. | 4.6 |