Vulmon
Recent Vulnerabilities
Product List
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
adobe reader 11.0.10 vulnerabilities and exploits
(subscribe to this query)
6.4
CVSSv2
CVE-2018-16042
Adobe Acrobat and Reader versions 2019.008.20081 and previous versions, 2019.008.20080 and previous versions, 2019.008.20081 and previous versions, 2017.011.30106 and previous versions version, 2017.011.30105 and previous versions version, 2015.006.30457 and previous versions, an...
Adobe Acrobat Dc
Adobe Acrobat Reader Dc
Adobe Reader 11.0.10
Adobe Reader 11.0.23
Iskysoft Pdf Editor 6 6.4.2.3521
Iskysoft Pdfelement6 6.8.0.3523
Iskysoft Pdfelement6 6.8.4.3921
Iskysoft Pdf Editor 6 6.6.2.3315
Iskysoft Pdf Editor 6 6.7.6.3399
Iskysoft Pdfelement6 6.7.1.3355
Iskysoft Pdfelement6 6.7.6.3399
10
CVSSv2
CVE-2014-8449
Integer overflow in Adobe Reader and Acrobat 10.x prior to 10.1.13 and 11.x prior to 11.0.10 on Windows and OS X allows malicious users to execute arbitrary code via unspecified vectors.
Adobe Acrobat Reader 10.0
Adobe Acrobat Reader 10.0.1
Adobe Acrobat Reader 10.0.2
Adobe Acrobat Reader 10.0.3
Adobe Acrobat Reader 10.1
Adobe Acrobat Reader 10.1.1
Adobe Acrobat Reader 10.1.2
Adobe Acrobat Reader 10.1.3
Adobe Acrobat Reader 10.1.4
Adobe Acrobat Reader 10.1.5
Adobe Acrobat Reader 10.1.6
Adobe Acrobat Reader 10.1.7
Adobe Acrobat Reader 10.1.8
Adobe Acrobat Reader 10.1.9
Adobe Acrobat Reader 10.1.10
Adobe Acrobat Reader 10.1.11
Adobe Acrobat Reader 10.1.12
Adobe Acrobat Reader 11.0.0
Adobe Acrobat Reader 11.0.01
Adobe Acrobat Reader 11.0.02
Adobe Acrobat Reader 11.0.03
Adobe Acrobat Reader 11.0.04
5
CVSSv2
CVE-2014-8453
Adobe Reader and Acrobat 10.x prior to 10.1.13 and 11.x prior to 11.0.10 on Windows and OS X allow remote malicious users to bypass the Same Origin Policy via unspecified vectors.
Adobe Acrobat 10.0
Adobe Acrobat 10.0.1
Adobe Acrobat 10.0.2
Adobe Acrobat 10.0.3
Adobe Acrobat 10.1
Adobe Acrobat 10.1.1
Adobe Acrobat 10.1.2
Adobe Acrobat 10.1.3
Adobe Acrobat 10.1.4
Adobe Acrobat 10.1.5
Adobe Acrobat 10.1.6
Adobe Acrobat 10.1.7
Adobe Acrobat 10.1.8
Adobe Acrobat 10.1.9
Adobe Acrobat 10.1.10
Adobe Acrobat 10.1.11
Adobe Acrobat 10.1.12
Adobe Acrobat 11.0
Adobe Acrobat 11.0.1
Adobe Acrobat 11.0.2
Adobe Acrobat 11.0.3
Adobe Acrobat 11.0.4
5
CVSSv2
CVE-2014-8448
An unspecified JavaScript API in Adobe Reader and Acrobat 10.x prior to 10.1.13 and 11.x prior to 11.0.10 on Windows and OS X allows malicious users to obtain sensitive information via unknown vectors, a different vulnerability than CVE-2014-8451.
Adobe Acrobat 10.0
Adobe Acrobat 10.0.1
Adobe Acrobat 10.0.2
Adobe Acrobat 10.0.3
Adobe Acrobat 10.1
Adobe Acrobat 10.1.1
Adobe Acrobat 10.1.2
Adobe Acrobat 10.1.3
Adobe Acrobat 10.1.4
Adobe Acrobat 10.1.5
Adobe Acrobat 10.1.6
Adobe Acrobat 10.1.7
Adobe Acrobat 10.1.8
Adobe Acrobat 10.1.9
Adobe Acrobat 10.1.10
Adobe Acrobat 10.1.11
Adobe Acrobat 10.1.12
Adobe Acrobat 11.0
Adobe Acrobat 11.0.1
Adobe Acrobat 11.0.2
Adobe Acrobat 11.0.3
Adobe Acrobat 11.0.4
5
CVSSv2
CVE-2014-8451
An unspecified JavaScript API in Adobe Reader and Acrobat 10.x prior to 10.1.13 and 11.x prior to 11.0.10 on Windows and OS X allows malicious users to obtain sensitive information via unknown vectors, a different vulnerability than CVE-2014-8448.
Adobe Acrobat 10.0
Adobe Acrobat 10.0.1
Adobe Acrobat 10.0.2
Adobe Acrobat 10.0.3
Adobe Acrobat 10.1
Adobe Acrobat 10.1.1
Adobe Acrobat 10.1.2
Adobe Acrobat 10.1.3
Adobe Acrobat 10.1.4
Adobe Acrobat 10.1.5
Adobe Acrobat 10.1.6
Adobe Acrobat 10.1.7
Adobe Acrobat 10.1.8
Adobe Acrobat 10.1.9
Adobe Acrobat 10.1.10
Adobe Acrobat 10.1.11
Adobe Acrobat 10.1.12
Adobe Acrobat 11.0
Adobe Acrobat 11.0.1
Adobe Acrobat 11.0.2
Adobe Acrobat 11.0.3
Adobe Acrobat 11.0.4
10
CVSSv2
CVE-2014-8460
Heap-based buffer overflow in Adobe Reader and Acrobat 10.x prior to 10.1.13 and 11.x prior to 11.0.10 on Windows and OS X allows malicious users to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2014-8457 and CVE-2014-9159.
Adobe Acrobat Reader 10.0
Adobe Acrobat Reader 10.0.1
Adobe Acrobat Reader 10.0.2
Adobe Acrobat Reader 10.0.3
Adobe Acrobat Reader 10.1
Adobe Acrobat Reader 10.1.1
Adobe Acrobat Reader 10.1.2
Adobe Acrobat Reader 10.1.3
Adobe Acrobat Reader 10.1.4
Adobe Acrobat Reader 10.1.5
Adobe Acrobat Reader 10.1.6
Adobe Acrobat Reader 10.1.7
Adobe Acrobat Reader 10.1.8
Adobe Acrobat Reader 10.1.9
Adobe Acrobat Reader 10.1.10
Adobe Acrobat Reader 10.1.11
Adobe Acrobat Reader 10.1.12
Adobe Acrobat Reader 11.0.0
Adobe Acrobat Reader 11.0.01
Adobe Acrobat Reader 11.0.02
Adobe Acrobat Reader 11.0.03
Adobe Acrobat Reader 11.0.04
10
CVSSv2
CVE-2014-8457
Heap-based buffer overflow in Adobe Reader and Acrobat 10.x prior to 10.1.13 and 11.x prior to 11.0.10 on Windows and OS X allows malicious users to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2014-8460 and CVE-2014-9159.
Adobe Acrobat 10.0
Adobe Acrobat 10.0.1
Adobe Acrobat 10.0.2
Adobe Acrobat 10.0.3
Adobe Acrobat 10.1
Adobe Acrobat 10.1.1
Adobe Acrobat 10.1.2
Adobe Acrobat 10.1.3
Adobe Acrobat 10.1.4
Adobe Acrobat 10.1.5
Adobe Acrobat 10.1.6
Adobe Acrobat 10.1.7
Adobe Acrobat 10.1.8
Adobe Acrobat 10.1.9
Adobe Acrobat 10.1.10
Adobe Acrobat 10.1.11
Adobe Acrobat 10.1.12
Adobe Acrobat 11.0
Adobe Acrobat 11.0.1
Adobe Acrobat 11.0.2
Adobe Acrobat 11.0.3
Adobe Acrobat 11.0.4
10
CVSSv2
CVE-2014-8454
Use-after-free vulnerability in Adobe Reader and Acrobat 10.x prior to 10.1.13 and 11.x prior to 11.0.10 on Windows and OS X allows malicious users to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2014-8455 and CVE-2014-9165.
Adobe Acrobat 10.0
Adobe Acrobat 10.0.1
Adobe Acrobat 10.0.2
Adobe Acrobat 10.0.3
Adobe Acrobat 10.1
Adobe Acrobat 10.1.1
Adobe Acrobat 10.1.2
Adobe Acrobat 10.1.3
Adobe Acrobat 10.1.4
Adobe Acrobat 10.1.5
Adobe Acrobat 10.1.6
Adobe Acrobat 10.1.7
Adobe Acrobat 10.1.8
Adobe Acrobat 10.1.9
Adobe Acrobat 10.1.10
Adobe Acrobat 10.1.11
Adobe Acrobat 10.1.12
Adobe Acrobat 11.0
Adobe Acrobat 11.0.1
Adobe Acrobat 11.0.2
Adobe Acrobat 11.0.3
Adobe Acrobat 11.0.4
10
CVSSv2
CVE-2014-8455
Use-after-free vulnerability in Adobe Reader and Acrobat 10.x prior to 10.1.13 and 11.x prior to 11.0.10 on Windows and OS X allows malicious users to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2014-8454 and CVE-2014-9165.
Adobe Acrobat Reader 10.0
Adobe Acrobat Reader 10.0.1
Adobe Acrobat Reader 10.0.2
Adobe Acrobat Reader 10.0.3
Adobe Acrobat Reader 10.1
Adobe Acrobat Reader 10.1.1
Adobe Acrobat Reader 10.1.2
Adobe Acrobat Reader 10.1.3
Adobe Acrobat Reader 10.1.4
Adobe Acrobat Reader 10.1.5
Adobe Acrobat Reader 10.1.6
Adobe Acrobat Reader 10.1.7
Adobe Acrobat Reader 10.1.8
Adobe Acrobat Reader 10.1.9
Adobe Acrobat Reader 10.1.10
Adobe Acrobat Reader 10.1.11
Adobe Acrobat Reader 10.1.12
Adobe Acrobat Reader 11.0.0
Adobe Acrobat Reader 11.0.01
Adobe Acrobat Reader 11.0.02
Adobe Acrobat Reader 11.0.03
Adobe Acrobat Reader 11.0.04
10
CVSSv2
CVE-2014-9165
Use-after-free vulnerability in Adobe Reader and Acrobat 10.x prior to 10.1.13 and 11.x prior to 11.0.10 on Windows and OS X allows malicious users to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2014-8454 and CVE-2014-8455.
Adobe Acrobat Reader 10.0
Adobe Acrobat Reader 10.0.1
Adobe Acrobat Reader 10.0.2
Adobe Acrobat Reader 10.0.3
Adobe Acrobat Reader 10.1
Adobe Acrobat Reader 10.1.1
Adobe Acrobat Reader 10.1.2
Adobe Acrobat Reader 10.1.3
Adobe Acrobat Reader 10.1.4
Adobe Acrobat Reader 10.1.5
Adobe Acrobat Reader 10.1.6
Adobe Acrobat Reader 10.1.7
Adobe Acrobat Reader 10.1.8
Adobe Acrobat Reader 10.1.9
Adobe Acrobat Reader 10.1.10
Adobe Acrobat Reader 10.1.11
Adobe Acrobat Reader 10.1.12
Adobe Acrobat Reader 11.0.0
Adobe Acrobat Reader 11.0.01
Adobe Acrobat Reader 11.0.02
Adobe Acrobat Reader 11.0.03
Adobe Acrobat Reader 11.0.04
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-23692
CVE-2012-1823
memory leak
CVE-2024-0627
CVE-2024-31402
privilege escalation
CVE-2024-36418
remote code execution
CVE-2024-27844
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
NEXT »