Adobe Acrobat Reader : OVAL Definitions - Class: Vulnerability

Filter: Compliance Inventory Patch Vulnerability All Family: All Windows Unix IOS Pixos
Title Definition Id Class Family
A JavaScript API in Adobe Reader and Acrobat 9.x before 9.5.5, 10.x before 10.1.7, and 11.x before 11.0.03 allows attack... oval:org.mitre.oval:def:16864 Vulnerability windows
Adobe Acrobat Reader Plugin before 8.0.0 for the Firefox, Internet Explorer, and Opera web browsers allows remote attack... oval:org.mitre.oval:def:10042 Vulnerability unix
Adobe Acrobat Reader .ETD Document Code Execution Vulnerability oval:org.mitre.oval:def:2919 Vulnerability windows
Adobe Flash Player before 9.0.289.0 and 10.x before 10.1.102.64 on Windows, Mac OS X, Linux, and Solaris and 10.1.95.1 o... oval:org.mitre.oval:def:13294 Vulnerability windows
Adobe Flash Player before 10.2.154.27 on Windows, Mac OS X, Linux, and Solaris and 10.2.156.12 and earlier on Android; A... oval:org.mitre.oval:def:14175 Vulnerability windows
Adobe Flash Player, Acrobat, Adobe Reader and AIR Cross Domain Request Vulnerability oval:org.mitre.oval:def:8518 Vulnerability windows
Adobe Flash Player, Acrobat Reader, and Acrobat Remote Code Execution Vulnerability oval:org.mitre.oval:def:6852 Vulnerability windows
Adobe Flash Player, Acrobat Reader, and Acrobat 'authplay.dll' Remote Code Execution Vulnerability oval:org.mitre.oval:def:7116 Vulnerability windows
Adobe Reader 11.0.06 allows attackers to bypass a PDF sandbox protection mechanism via unspecified vectors oval:org.mitre.oval:def:24538 Vulnerability windows
Adobe Reader 9.3.1 on Windows does not restrict the contents of one text field in the Launch File warning dialog oval:org.mitre.oval:def:7466 Vulnerability windows
Adobe Reader and Acrobat Cross-site Scripting Vulnerability oval:org.mitre.oval:def:6986 Vulnerability windows
Adobe Reader and Acrobat 8.x before 8.3.1, 9.x before 9.4.6, and 10.x before 10.1.1 allow attackers to execute arbitrary... oval:org.mitre.oval:def:14022 Vulnerability windows
Adobe Reader and Acrobat 9.x before 9.5.5, 10.x before 10.1.7, and 11.x before 11.0.03 do not properly handle operating-... oval:org.mitre.oval:def:16063 Vulnerability windows
Adobe Reader and Acrobat 9.x before 9.5.2 and 10.x before 10.1.4 on Windows and Mac OS X allow attackers to execute arbi... oval:org.mitre.oval:def:16265 Vulnerability windows
Adobe Reader and Acrobat might allow remote attackers to execute arbitrary code via unknown vectors. oval:org.mitre.oval:def:5557 Vulnerability windows
Adobe Reader and Acrobat Memory Corruption Vulnerability oval:org.mitre.oval:def:6930 Vulnerability windows
Adobe Reader and Acrobat 9.x before 9.5.3, 10.x before 10.1.5, and 11.x before 11.0.1 allow attackers to execute arbitra... oval:org.mitre.oval:def:16413 Vulnerability windows
Adobe Reader and Acrobat cause DoS and Arbitrary Execution oval:org.mitre.oval:def:6145 Vulnerability windows
Adobe Reader and Acrobat Memory Corruption Code Execution Vulnerability. oval:org.mitre.oval:def:7225 Vulnerability windows
Adobe Reader and Acrobat Null Pointer Dereference Denial of Service Vulnerability oval:org.mitre.oval:def:7975 Vulnerability windows
Adobe Reader and Acrobat CoolType.dll Font Parsing Buffer Overflow Vulnerability oval:org.mitre.oval:def:11586 Vulnerability windows
Adobe Reader and Acrobat 9.x before 9.5.3, 10.x before 10.1.5, and 11.x before 11.0.1 allow attackers to execute arbitra... oval:org.mitre.oval:def:15499 Vulnerability windows
Adobe Reader and Acrobat cause Denial of Service Vulnerability oval:org.mitre.oval:def:6483 Vulnerability windows
Adobe Reader and Acrobat Denial of Service Vulnerability oval:org.mitre.oval:def:7046 Vulnerability windows
Adobe Reader and Acrobat 9.x before 9.5.5, 10.x before 10.1.7, and 11.x before 11.0.03 allow attackers to execute arbitr... oval:org.mitre.oval:def:16145 Vulnerability windows
Adobe Reader and Acrobat 9.x before 9.5.3, 10.x before 10.1.5, and 11.x before 11.0.1 allow attackers to execute arbitra... oval:org.mitre.oval:def:16266 Vulnerability windows
Adobe Reader and Acrobat memory corruption or possibly execute arbitrary code via unspecified vectors oval:org.mitre.oval:def:5560 Vulnerability windows
Adobe Reader and Acrobat Memory Corruption Vulnerability oval:org.mitre.oval:def:6957 Vulnerability windows
Adobe Reader and Acrobat allow attackers to execute arbitrary code via unspecified vectors oval:org.mitre.oval:def:6156 Vulnerability windows
Adobe Reader and Acrobat ActiveX Multiple Input Validation Code Execution Vulnerabilities. oval:org.mitre.oval:def:7348 Vulnerability windows
Total number of results : 425
Page : 1 (This Page) 2 3 4 5 6 7 8 9 10 11 12 13 14 15

OVAL Definitions By Referenced Objects

How does it work?   User agreement and privacy statement   About & Contact
CVE is a registred trademark of the MITRE Corporation and the authoritive source of CVE content is MITRE's CVE web site. CWE is a registred trademark of the MITRE Corporation and the authoritive source of CWE content is MITRE's CWE web site. OVAL is a registered trademark of The MITRE Corporation and the authoritive source of OVAL content is MITRE's OVAL web site.
Warning: This site and all data are provided as is. It is not guaranteed that all information is accurate and complete. Use any information provided on this site at your own risk. By using this site you accept that you know that these data are provided as is and not guaranteed to be accurate, correct or complete. All trademarks appearing on this site are the property of their respective owners in the US or other countries. It is the responsibility of user to evaluate the accuracy, completeness or usefulness of any information, opinion, advice or other content. EACH USER WILL BE SOLELY RESPONSIBLE FOR ANY consequences of his or her direct or indirect use of this web site. ALL WARRANTIES OF ANY KIND ARE EXPRESSLY DISCLAIMED. This site will NOT BE LIABLE FOR ANY DIRECT, INDIRECT or any other kind of loss. PLEASE SEE nvd.nist.gov and oval.mitre.org for more details about OVAL language and definitions.
The information within this database may change without notice. Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. In no event shall the author/distributor/web site owner/maintainer be held liable for any damages whatsoever arising out of or in connection with the use or spread of this information.
Use of OVAL and all related data is subject to terms of use defined by Mitre at http://oval.mitre.org/oval/about/termsofuse.html