Download
| Alert*
oval:org.secpod.oval:def:1541
The host is installed with Adobe Reader and Adobe Acrobat and is prone to heap-based buffer overflow vulnerability. A flaw is present in the applications which fails in properly handling the memory. Successful exploitation allows remote attacker to execute arbitrary code. oval:org.secpod.oval:def:505812 Adobe Reader allows users to view and print documents in Portable Document Format . This update fixes multiple security flaws in Adobe Reader. These flaws are detailed on the Adobe security page APSB11-24, listed in the References section. A specially-crafted PDF file could cause Adobe Reader to cra ... oval:org.secpod.oval:def:1528 The host is installed with Adobe Reader or Acrobat and is prone to heap-based buffer overflow vulnerability. A flaw is present in the application which fails in properly handling the memory. Successful exploitation allows remote attacker to execute arbitrary code. oval:org.secpod.oval:def:5304 The host is missing a critical security update, according to Adobe advisory APSB11-16. The update is required to fix denial of service vulnerabilities. The flaws are present in the application, which fails to sanitize user supplied input. Successful exploitation could allow attackers to crash the se ... oval:org.secpod.oval:def:18579 The host is installed with Adobe Reader 9.x before 9.4.6 and is prone to a heap overflow vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation could allow attackers to execute arbitrary code. oval:org.secpod.oval:def:4426 The host is missing a critical security update according to Adobe advisory, APSB11-16. The update is required to fix a buffer overflow vulnerability. A flaw is present in the applications which fail in proper handling of memory. Successful exploitation allows remote attacker to execute arbitrary cod ... oval:org.secpod.oval:def:18587 The host is missing a critical security update according to Adobe advisory, APSB11-16. The update is required to fix multiple vulnerabilities. The flaws are present in the application, which fails to properly handle crafted data. Successful exploitation could allow attackers to execute arbitrary cod ... |