Vulnerabilities > Adobe
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2008-11-10 | CVE-2008-4820 | Information Exposure vulnerability in Adobe Flash Player Unspecified vulnerability in the Flash Player ActiveX control in Adobe Flash Player 9.0.124.0 and earlier on Windows allows attackers to obtain sensitive information via unknown vectors. | 7.1 |
2008-11-10 | CVE-2008-4819 | Multiple Security vulnerability in Adobe Flash Player Unspecified vulnerability in Adobe Flash Player 9.0.124.0 and earlier makes it easier for remote attackers to conduct DNS rebinding attacks via unknown vectors. network adobe | 6.8 |
2008-11-10 | CVE-2008-4818 | Cross-Site Scripting vulnerability in Adobe Flash Player Cross-site scripting (XSS) vulnerability in Adobe Flash Player 9.0.124.0 and earlier allows remote attackers to inject arbitrary web script or HTML via vectors involving HTTP response headers. | 4.3 |
2008-11-05 | CVE-2008-4817 | Improper Input Validation vulnerability in Adobe Acrobat and Acrobat Reader The Download Manager in Adobe Acrobat Professional and Reader 8.1.2 and earlier allows remote attackers to execute arbitrary code via a crafted PDF document that calls an AcroJS function with a long string argument, triggering heap corruption. | 9.3 |
2008-11-05 | CVE-2008-4816 | Unspecified vulnerability in Adobe Acrobat and Acrobat Reader Unspecified vulnerability in the Download Manager in Adobe Reader 8.1.2 and earlier on Windows allows remote attackers to change Internet Security options on a client machine via unknown vectors. | 4.3 |
2008-11-05 | CVE-2008-4815 | Permissions, Privileges, and Access Controls vulnerability in Adobe Acrobat and Acrobat Reader Untrusted search path vulnerability in Adobe Reader and Acrobat 8.1.2 and earlier on Unix and Linux allows attackers to gain privileges via a Trojan Horse program in an unspecified directory that is associated with an insecure RPATH. | 7.5 |
2008-11-05 | CVE-2008-4814 | Improper Input Validation vulnerability in Adobe Acrobat and Acrobat Reader Unspecified vulnerability in a JavaScript method in Adobe Reader and Acrobat 8.1.2 and earlier, and before 7.1.1, allows remote attackers to execute arbitrary code via unknown vectors, related to an "input validation issue." | 9.3 |
2008-11-05 | CVE-2008-4813 | Resource Management Errors vulnerability in Adobe Acrobat and Acrobat Reader Adobe Reader and Acrobat 8.1.2 and earlier, and before 7.1.1, allow remote attackers to execute arbitrary code via a crafted PDF document that (1) performs unspecified actions on a Collab object that trigger memory corruption, related to a GetCosObj method; or (2) contains a malformed PDF object that triggers memory corruption during parsing. | 9.3 |
2008-11-05 | CVE-2008-4812 | Improper Input Validation vulnerability in Adobe Acrobat and Acrobat Reader Array index error in Adobe Reader and Acrobat, and the Explorer extension (aka AcroRd32Info), 8.1.2, 8.1.1, and earlier allows remote attackers to execute arbitrary code via a crafted PDF document that triggers an out-of-bounds write, related to parsing of Type 1 fonts. | 9.3 |
2008-11-04 | CVE-2008-2992 | Out-of-bounds Write vulnerability in multiple products Stack-based buffer overflow in Adobe Acrobat and Reader 8.1.2 and earlier allows remote attackers to execute arbitrary code via a PDF file that calls the util.printf JavaScript function with a crafted format string argument, a related issue to CVE-2008-1104. | 7.8 |