Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
adobe acrobat reader 11.0.10 vulnerabilities and exploits
(subscribe to this query)
6.5
CVSSv3
CVE-2018-16042
Adobe Acrobat and Reader versions 2019.008.20081 and previous versions, 2019.008.20080 and previous versions, 2019.008.20081 and previous versions, 2017.011.30106 and previous versions version, 2017.011.30105 and previous versions version, 2015.006.30457 and previous versions, an...
Adobe Acrobat Dc
Adobe Acrobat Reader Dc
Adobe Reader 11.0.10
Adobe Reader 11.0.23
Iskysoft Pdf Editor 6 6.4.2.3521
Iskysoft Pdfelement6 6.8.0.3523
Iskysoft Pdfelement6 6.8.4.3921
Iskysoft Pdf Editor 6 6.6.2.3315
Iskysoft Pdf Editor 6 6.7.6.3399
Iskysoft Pdfelement6 6.7.1.3355
Iskysoft Pdfelement6 6.7.6.3399
NA
CVE-2014-8449
Integer overflow in Adobe Reader and Acrobat 10.x prior to 10.1.13 and 11.x prior to 11.0.10 on Windows and OS X allows malicious users to execute arbitrary code via unspecified vectors.
Adobe Acrobat Reader 10.0
Adobe Acrobat Reader 10.0.2
Adobe Acrobat Reader 10.1.3
Adobe Acrobat Reader 10.1.5
Adobe Acrobat Reader 10.1.12
Adobe Acrobat Reader 11.0.01
Adobe Acrobat Reader 11.0.08
Adobe Acrobat Reader 10.0.3
Adobe Acrobat Reader 10.1
Adobe Acrobat Reader 10.1.1
Adobe Acrobat Reader 10.1.2
Adobe Acrobat Reader 11.0.03
Adobe Acrobat Reader 11.0.04
Adobe Acrobat Reader 11.0.05
Adobe Acrobat Reader 11.0.06
Adobe Acrobat Reader 10.1.7
Adobe Acrobat Reader 10.1.8
Adobe Acrobat Reader 10.1.9
Adobe Acrobat Reader 10.1.10
Adobe Acrobat Reader 10.1.11
Adobe Acrobat Reader 10.0.1
Adobe Acrobat Reader 10.1.4
NA
CVE-2014-8453
Adobe Reader and Acrobat 10.x prior to 10.1.13 and 11.x prior to 11.0.10 on Windows and OS X allow remote malicious users to bypass the Same Origin Policy via unspecified vectors.
Adobe Acrobat 10.1
Adobe Acrobat 10.1.2
Adobe Acrobat 10.1.9
Adobe Acrobat 10.1.11
Adobe Acrobat 11.0.3
Adobe Acrobat 11.0.5
Adobe Acrobat 11.0.7
Adobe Acrobat 10.0
Adobe Acrobat 10.0.1
Adobe Acrobat 10.0.2
Adobe Acrobat 10.0.3
Adobe Acrobat 10.1.12
Adobe Acrobat 11.0
Adobe Acrobat 11.0.1
Adobe Acrobat 11.0.2
Adobe Acrobat 10.1.4
Adobe Acrobat 10.1.5
Adobe Acrobat 10.1.6
Adobe Acrobat 10.1.7
Adobe Acrobat 11.0.8
Adobe Acrobat 11.0.9
Adobe Acrobat 10.1.1
NA
CVE-2014-8448
An unspecified JavaScript API in Adobe Reader and Acrobat 10.x prior to 10.1.13 and 11.x prior to 11.0.10 on Windows and OS X allows malicious users to obtain sensitive information via unknown vectors, a different vulnerability than CVE-2014-8451.
Adobe Acrobat 10.0.2
Adobe Acrobat 10.0.3
Adobe Acrobat 10.1
Adobe Acrobat 10.1.1
Adobe Acrobat 11.0.2
Adobe Acrobat 11.0.3
Adobe Acrobat 11.0.4
Adobe Acrobat 11.0.5
Adobe Acrobat 10.0
Adobe Acrobat 10.1.3
Adobe Acrobat 10.1.5
Adobe Acrobat 10.1.12
Adobe Acrobat 11.0.1
Adobe Acrobat 11.0.6
Adobe Acrobat 11.0.8
Adobe Acrobat 10.1.7
Adobe Acrobat 10.1.8
Adobe Acrobat 10.1.9
Adobe Acrobat 10.1.10
Adobe Acrobat 10.0.1
Adobe Acrobat 10.1.2
Adobe Acrobat 10.1.4
NA
CVE-2014-8451
An unspecified JavaScript API in Adobe Reader and Acrobat 10.x prior to 10.1.13 and 11.x prior to 11.0.10 on Windows and OS X allows malicious users to obtain sensitive information via unknown vectors, a different vulnerability than CVE-2014-8448.
Adobe Acrobat 10.0.2
Adobe Acrobat 10.1
Adobe Acrobat 10.1.5
Adobe Acrobat 10.1.7
Adobe Acrobat 11.0.1
Adobe Acrobat 11.0.3
Adobe Acrobat 10.0
Adobe Acrobat 10.1.9
Adobe Acrobat 10.1.10
Adobe Acrobat 10.1.11
Adobe Acrobat 10.1.12
Adobe Acrobat 11.0
Adobe Acrobat 10.1.1
Adobe Acrobat 10.1.2
Adobe Acrobat 10.1.3
Adobe Acrobat 10.1.4
Adobe Acrobat 11.0.5
Adobe Acrobat 11.0.6
Adobe Acrobat 11.0.7
Adobe Acrobat 11.0.8
Adobe Acrobat 10.0.1
Adobe Acrobat 10.0.3
NA
CVE-2014-9165
Use-after-free vulnerability in Adobe Reader and Acrobat 10.x prior to 10.1.13 and 11.x prior to 11.0.10 on Windows and OS X allows malicious users to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2014-8454 and CVE-2014-8455.
Adobe Acrobat Reader 10.1.2
Adobe Acrobat Reader 10.1.4
Adobe Acrobat Reader 10.1.9
Adobe Acrobat Reader 10.1.11
Adobe Acrobat Reader 11.0.05
Adobe Acrobat Reader 11.0.07
Adobe Acrobat Reader 10.1.5
Adobe Acrobat Reader 10.1.6
Adobe Acrobat Reader 10.1.7
Adobe Acrobat Reader 10.1.8
Adobe Acrobat Reader 11.0.08
Adobe Acrobat Reader 11.0.09
Adobe Acrobat Reader 10.0
Adobe Acrobat Reader 10.0.1
Adobe Acrobat Reader 10.0.2
Adobe Acrobat Reader 10.0.3
Adobe Acrobat Reader 10.1
Adobe Acrobat Reader 11.0.0
Adobe Acrobat Reader 11.0.01
Adobe Acrobat Reader 11.0.02
Adobe Acrobat Reader 11.0.03
Adobe Acrobat Reader 10.1.1
NA
CVE-2014-9159
Heap-based buffer overflow in Adobe Reader and Acrobat 10.x prior to 10.1.13 and 11.x prior to 11.0.10 on Windows and OS X allows malicious users to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2014-8457 and CVE-2014-8460.
Adobe Acrobat 10.0.2
Adobe Acrobat 10.1
Adobe Acrobat 10.1.7
Adobe Acrobat 10.1.9
Adobe Acrobat 11.0.1
Adobe Acrobat 11.0.3
Adobe Acrobat 11.0.5
Adobe Acrobat 10.1.2
Adobe Acrobat 10.1.3
Adobe Acrobat 10.1.4
Adobe Acrobat 10.1.5
Adobe Acrobat 11.0.6
Adobe Acrobat 11.0.7
Adobe Acrobat 11.0.8
Adobe Acrobat 11.0.9
Adobe Acrobat 10.0
Adobe Acrobat 10.0.1
Adobe Acrobat 10.1.10
Adobe Acrobat 10.1.11
Adobe Acrobat 10.1.12
Adobe Acrobat 11.0
Adobe Acrobat 10.0.3
NA
CVE-2014-8455
Use-after-free vulnerability in Adobe Reader and Acrobat 10.x prior to 10.1.13 and 11.x prior to 11.0.10 on Windows and OS X allows malicious users to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2014-8454 and CVE-2014-9165.
Adobe Acrobat Reader 10.1.1
Adobe Acrobat Reader 10.1.3
Adobe Acrobat Reader 10.1.8
Adobe Acrobat Reader 10.1.10
Adobe Acrobat Reader 10.1.12
Adobe Acrobat Reader 11.0.04
Adobe Acrobat Reader 11.0.06
Adobe Acrobat Reader 10.1.4
Adobe Acrobat Reader 10.1.5
Adobe Acrobat Reader 10.1.6
Adobe Acrobat Reader 10.1.7
Adobe Acrobat Reader 11.0.08
Adobe Acrobat Reader 11.0.09
Adobe Acrobat Reader 10.0
Adobe Acrobat Reader 10.0.1
Adobe Acrobat Reader 10.0.2
Adobe Acrobat Reader 10.0.3
Adobe Acrobat Reader 11.0.0
Adobe Acrobat Reader 11.0.01
Adobe Acrobat Reader 11.0.02
Adobe Acrobat Reader 11.0.03
Adobe Acrobat Reader 10.1
NA
CVE-2014-8460
Heap-based buffer overflow in Adobe Reader and Acrobat 10.x prior to 10.1.13 and 11.x prior to 11.0.10 on Windows and OS X allows malicious users to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2014-8457 and CVE-2014-9159.
Adobe Acrobat Reader 10.0
Adobe Acrobat Reader 10.0.1
Adobe Acrobat Reader 10.1.10
Adobe Acrobat Reader 10.1.11
Adobe Acrobat Reader 10.1.12
Adobe Acrobat Reader 11.0.0
Adobe Acrobat Reader 10.0.3
Adobe Acrobat Reader 10.1.1
Adobe Acrobat Reader 10.1.6
Adobe Acrobat Reader 10.1.8
Adobe Acrobat Reader 11.0.02
Adobe Acrobat Reader 11.0.04
Adobe Acrobat Reader 10.1.2
Adobe Acrobat Reader 10.1.3
Adobe Acrobat Reader 10.1.4
Adobe Acrobat Reader 10.1.5
Adobe Acrobat Reader 11.0.05
Adobe Acrobat Reader 11.0.06
Adobe Acrobat Reader 11.0.07
Adobe Acrobat Reader 11.0.08
Adobe Acrobat Reader 11.0.09
Adobe Acrobat Reader 10.0.2
NA
CVE-2014-8454
Use-after-free vulnerability in Adobe Reader and Acrobat 10.x prior to 10.1.13 and 11.x prior to 11.0.10 on Windows and OS X allows malicious users to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2014-8455 and CVE-2014-9165.
Adobe Acrobat 10.0.1
Adobe Acrobat 10.0.3
Adobe Acrobat 10.1.6
Adobe Acrobat 10.1.8
Adobe Acrobat 11.0.2
Adobe Acrobat 11.0.4
Adobe Acrobat 11.0.9
Adobe Acrobat 10.1.1
Adobe Acrobat 10.1.2
Adobe Acrobat 10.1.3
Adobe Acrobat 10.1.4
Adobe Acrobat 11.0.5
Adobe Acrobat 11.0.6
Adobe Acrobat 11.0.7
Adobe Acrobat 11.0.8
Adobe Acrobat 10.0
Adobe Acrobat 10.1.10
Adobe Acrobat 10.1.11
Adobe Acrobat 10.1.12
Adobe Acrobat 11.0
Adobe Acrobat 10.0.2
Adobe Acrobat 10.1
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
NULL pointer dereference
CVE-2023-52689
CVE-2024-23803
client side
CVE-2023-52696
information disclosure
CVE-2024-35843
CVE-2024-27130
CVE-2023-52697
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
NEXT »