Download
| Alert*
oval:org.secpod.oval:def:505420
Adobe Reader allows users to view and print documents in Portable Document Format . This update fixes multiple security flaws in Adobe Reader. These flaws are detailed in the Adobe Security bulletin APSB13-15, listed in the References section. A specially-crafted PDF file could cause Adobe Reader to ... oval:org.secpod.oval:def:11125 The host is installed with Adobe Reader before 9.5.5 and is prone to unspecified vulnerability. A flaw is present in the applications, which fail to properly handle memory. Successful exploitation allows attackers to execute arbitrary code. oval:org.secpod.oval:def:11099 The host is installed with Adobe Reader or Acrobat before 11.0.03, before 10.1.7 or before 9.5.5 and is prone to unspecified vulnerability. A flaw is present in the applications, which fail to properly handle memory. Successful exploitation allows attackers to execute arbitrary code. oval:org.secpod.oval:def:11079 The host is installed with Adobe Reader or Acrobat before 11.0.03, before 10.1.7 or before 9.5.5 and is prone to information disclosure vulnerability. A flaw is present in the applications, which fail to properly handle Javascript API. Successful exploitation allows attackers to obtain sensitive inf ... oval:org.secpod.oval:def:11105 The host is installed with Adobe Reader before 9.5.5 and is prone to information disclosure vulnerability. A flaw is present in the application, which fails to properly handle Javascript API. Successful exploitation allows attackers to obtain sensitive information via unspecified vectors. oval:org.secpod.oval:def:11053 The host is installed with Adobe Reader or Acrobat before 11.0.03, before 10.1.7 or before 9.5.5 and is prone to information disclosure vulnerability. A flaw is present in the applications, which fail to properly handle Javascript API. Successful exploitation allows attackers to obtain sensitive inf ... oval:org.secpod.oval:def:11130 The host is missing a security update according to Adobe advisory, APSB13-15. The update is required to fix multiple vulnerabilities. The flaws are present in the application, which fails to properly handle certain vectors related to memory. Successful exploitation allows attackers to execute remote ... |