The host is installed with Adobe Reader 9.x before 9.3.3 or 8.x before 8.2.3 and is prone to memory corruption vulnerability. A flaw is present in the application, which fails to properly handle memory. Successful exploitation allows attackers to execute arbitrary code or cause a denial of service.
The host is installed with Adobe Reader 9.x before 9.3.3 or 8.x before 8.2.3 and is prone to memory corruption vulnerability. A flaw is present in the application, which fails to properly handle memory. Successful exploitation allows remote attackers to execute arbitrary code or cause a denial of service.
The host is installed with Adobe Reader 9.x before 9.3.3 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle crafted data. Successful exploitation allows remote attackers to execute arbitrary code or crash the service.
The host is installed with Adobe Reader 9.x before 9.3.3 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle crafted data. Successful exploitation allows remote attackers to execute arbitrary code or crash the service.
The host is installed with Adobe Reader 9.x before 9.3.3 or 8.x before 8.2.3 and is prone to memory corruption vulnerability. A flaw is present in the application, which fails to properly handle memory. Successful exploitation allows attackers to execute arbitrary code or cause a denial of service.
The host is installed with Adobe Reader 9.x before 9.3.3 or 8.x before 8.2.3 and is prone to memory corruption vulnerability. A flaw is present in the application, which fails to properly handle memory. Successful exploitation allows remote attackers to execute arbitrary code or cause a denial of service.
Adobe Reader and Acrobat 9.x before 9.3.3, and 8.x before 8.2.3 on Windows and Mac OS X, allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2010-1295, CVE-2010-2202, CVE-2010-2207, CVE-2010-2209, CVE-2010-2210, and CVE-2010-2212.
Buffer overflow in Adobe Reader and Acrobat 9.x before 9.3.3, and 8.x before 8.2.3 on Windows and Mac OS X, allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via a PDF file containing Flash content with a crafted #1023 (3FFh) tag, a different vulnerability than CVE-2010-1295, CVE-2010-2202, CVE-2010-2207, CVE-2010-2209, CVE-2010-2210, and CVE-2010-2211.
The host is installed with Adobe Reader 9.x before 9.3.3 or 8.x before 8.2.3 and is prone to memory corruption vulnerability. A flaw is present in the application, which fails to properly handle a PDF file containing Flash content with a crafted #1023 (3FFh) tag. Successful exploitation allows attackers to execute arbitrary code or cause a denial of service.
The host is installed with Adobe Reader 9.x before 9.3.3 or 8.x before 8.2.3 and is prone to memory corruption vulnerability. A flaw is present in the application, which fails to properly handle memory. Successful exploitation allows remote attackers to execute arbitrary code or cause a denial of service.