Vulnerabilities > Adobe

DATE CVE VULNERABILITY TITLE RISK
2010-10-06 CVE-2010-2887 Privilege Escalation vulnerability in Adobe Acrobat and Reader for Linux
Multiple unspecified vulnerabilities in Adobe Reader and Acrobat 9.x before 9.4 on Linux allow attackers to gain privileges via unknown vectors.
network
adobe
critical
9.3
2010-09-15 CVE-2010-2884 Remote Code Execution vulnerability in Adobe Flash Player
Adobe Flash Player 10.1.82.76 and earlier on Windows, Mac OS X, Linux, and Solaris and 10.1.92.10 on Android; authplay.dll in Adobe Reader and Acrobat 9.x before 9.4; and authplay.dll in Adobe Reader and Acrobat 8.x before 8.2.5 on Windows and Mac OS X allow remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, as exploited in the wild in September 2010.
network
adobe google apple microsoft
critical
9.3
2010-09-09 CVE-2010-2883 Improper Restriction of Operations Within the Bounds of A Memory Buffer vulnerability in Adobe Acrobat and Acrobat Reader
Stack-based buffer overflow in CoolType.dll in Adobe Reader and Acrobat 9.x before 9.4, and 8.x before 8.2.5 on Windows and Mac OS X, allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via a PDF document with a long field in a Smart INdependent Glyphlets (SING) table in a TTF font, as exploited in the wild in September 2010.
network
adobe apple microsoft CWE-119
critical
9.3
2010-09-07 CVE-2010-2874 Resource Management Errors vulnerability in Adobe Shockwave Player
Unspecified vulnerability in Adobe Shockwave Player before 11.5.8.612 allows remote attackers to execute arbitrary code via unknown vectors that trigger memory corruption.
network
adobe CWE-399
critical
9.3
2010-08-31 CVE-2010-3191 Unspecified vulnerability in Adobe Captivate 5.0.0.596
Untrusted search path vulnerability in Adobe Captivate 5.0.0.596, and possibly other versions, allows local users, and possibly remote attackers, to execute arbitrary code and conduct DLL hijacking attacks via a Trojan horse dwmapi.dll that is located in the same folder as a .cptx file.
network
adobe
critical
9.3
2010-08-27 CVE-2010-3155 Unspecified vulnerability in Adobe Extendedscript Toolkit CS5 3.5.0.52
Untrusted search path vulnerability in Adobe ExtendScript Toolkit (ESTK) CS5 3.5.0.52 allows local users, and possibly remote attackers, to execute arbitrary code and conduct DLL hijacking attacks via a Trojan horse dwmapi.dll that is located in the same folder as a .jsx file.
network
adobe
critical
9.3
2010-08-27 CVE-2010-3154 Unspecified vulnerability in Adobe Extension Manager CS5 5.0.298
Untrusted search path vulnerability in Adobe Extension Manager CS5 5.0.298 allows local users, and possibly remote attackers, to execute arbitrary code and conduct DLL hijacking attacks via a Trojan horse dwmapi.dll that is located in the same folder as a .mxi or .mxp file.
network
adobe
critical
9.3
2010-08-27 CVE-2010-3153 Unspecified vulnerability in Adobe Indesign CS4 6.0
Untrusted search path vulnerability in Adobe InDesign CS4 6.0, InDesign CS5 7.0.2 and earlier, Adobe InDesign Server CS5 7.0.2 and earlier, and Adobe InCopy CS5 7.0.2 and earlier allows local users, and possibly remote attackers, to execute arbitrary code and conduct DLL hijacking attacks via a Trojan horse ibfs32.dll that is located in the same folder as an .indl, .indp, .indt, or .inx file.
network
adobe
critical
9.3
2010-08-27 CVE-2010-3152 Unspecified vulnerability in Adobe Illustrator 14.0/15.0.1
Untrusted search path vulnerability in Adobe Illustrator CS4 14.0.0, CS5 15.0.1 and earlier, and possibly other versions allows local users, and possibly remote attackers, to execute arbitrary code and conduct DLL hijacking attacks via a Trojan horse dwmapi.dll or aires.dll that is located in the same folder as an .ait or .eps file.
network
adobe
critical
9.3
2010-08-27 CVE-2010-3151 Unspecified vulnerability in Adobe Onlocation CS4 4.0.1/4.0.2/4.0.3
Untrusted search path vulnerability in Adobe On Location CS4 Build 315 allows local users, and possibly remote attackers, to execute arbitrary code and conduct DLL hijacking attacks via a Trojan horse ibfs32.dll that is located in the same folder as an OLPROJ file.
network
adobe
critical
9.3