Download
| Alert*
oval:org.secpod.oval:def:18595
The host is installed with Adobe Reader 9.x through 9.3.4 and is prone to an input validation vulnerability. A flaw is present in the application, which fails to properly handle crafted data. Successful exploitation allows remote attackers to execute arbitrary code or cause a denial of service. oval:org.secpod.oval:def:5428 The host is installed with Adobe Reader 8.x through 8.2.4 or 9.x through 9.3.4 and is prone to image-parsing input validation vulnerability. A flaw is present in the application, which fails to handle a crafted image. Successful exploitation allows remote attackers to execute arbitrary code. oval:org.mitre.oval:def:7589 Unspecified vulnerability in Adobe Reader and Acrobat 9.x before 9.4, and 8.x before 8.2.5 on Windows and Mac OS X, allows attackers to execute arbitrary code via a crafted image, a different vulnerability than CVE-2010-3629. oval:org.secpod.oval:def:5424 The host is missing a critical security update according to APSB10-21. The update is required to fix multiple vulnerabilities. The flaws are present in the application, which fails to properly handle memory and validate user input. Successful exploitation allows remote attackers to execute arbitrary ... oval:org.secpod.oval:def:400041 Specially crafted PDF documents could crash acroread or lead to execution of arbitrary code. acroread was updated to version 9.4 which addresses the issues oval:org.secpod.oval:def:18608 The host missing a security update according to Adobe advisory, APSB10-21. The update is required to fix multiple vulnerabilities. The flaws are present in the application, which fails to properly handle crafted data. Successful exploitation allows remote attackers to execute arbitrary code or cause ... oval:org.secpod.oval:def:10015 The host is missing a critical security update according to APSB10-21. The update is required to fix multiple vulnerabilities. The flaws are present in the applications, which fail to properly handle memory and validate user input. Successful exploitation allows remote attackers to execute arbitrary ... |