The host is installed with Adobe Reader 8.x before 8.2.5 and 9.x before 9.4 and is prone to multiple vulnerabilities. A flaw is present in the application, which fails to validate user supplied data. Successful exploitation could allow an attacker to execute arbitrary code or crash the service.
The host is installed with Adobe Reader 8.x before 8.2.5 or 9.x before 9.4 and is prone to an unspecified vulnerability. A flaw is present in the application which fails to parse an image properly. Successful exploitation could allow an attacker to execute arbitrary code or lead to unspecified impact.
The host is installed with Adobe Reader 8.x before 8.2.5 and 9.x before 9.4 and is prone to an array-indexing vulnerability. A flaw is present in the application, which fails to handle an array-index error. Successful exploitation could allow an attacker to execute arbitrary code.
The host is missing a critical security update according to APSA10-02. The update is required to fix stack-based buffer overflow vulnerability. A flaw is present in the application, which fails to handle a PDF document with a long field in a Smart INdependent Glyphlets (SING) table in a TTF font. Successful exploitation allows remote attackers to execute arbitrary code or cause a denial of service ...
The host is missing a critical security update according to APSA10-02. The update is required to fix stack-based buffer overflow vulnerability. A flaw is present in the application, which fails to handle a PDF document with a long field in a Smart Independent Glyphlets (SING) table in a TTF font. Successful exploitation allows remote attackers to execute arbitrary code or cause a denial of service ...
The host is installed with Adobe Reader 9.x through 9.3.4 or 8.x before 8.2.5 and is prone to stack-based buffer overflow vulnerability. A flaw is present in the application, which fails to properly handle CoolType.dll. Successful exploitation allows remote attackers to execute arbitrary code or cause a denial of service.
The host is installed with Adobe Shockwave Player before 11.5.8.612 and is prone to memory corruption vulnerability. A flaw is present in the application, which fails to properly parse .dir files. Successful exploitation allows remote attackers to cause a denial of service or execute arbitrary code.
IML32.dll in Adobe Shockwave Player before 11.5.8.612 does not properly parse .dir files, which allows remote attackers to cause a denial of service (memory corruption) or execute arbitrary code via a malformed file containing an invalid value, as demonstrated by a value at position 0x3712 of a certain file.
DIRAPIX.dll in Adobe Shockwave Player before 11.5.8.612 does not properly validate a certain chunk size in the mmap chunk in a Director movie, which allows remote attackers to cause a denial of service (heap memory corruption) or execute arbitrary code via a crafted movie.
The host is installed with Adobe Shockwave Player before 11.5.8.612 and is prone to memory corruption vulnerability. A flaw is present in the application, which fails to properly validate a certain chunk size in the mmap chunk in a Director movie. Successful exploitation allows remote attackers to cause a denial of service or execute arbitrary code.