Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
adobe acrobat reader 10.0.2 vulnerabilities and exploits
(subscribe to this query)
8.8
CVSSv3
CVE-2011-0611
Adobe Flash Player prior to 10.2.154.27 on Windows, Mac OS X, Linux, and Solaris and 10.2.156.12 and previous versions on Android; Adobe AIR prior to 2.6.19140; and Authplay.dll (aka AuthPlayLib.bundle) in Adobe Reader 9.x prior to 9.4.4 and 10.x up to and including 10.0.1 on Win...
Adobe Flash Player
Adobe Acrobat Reader
Adobe Adobe Air
Adobe Acrobat
Google Chrome
Suse Linux Enterprise Desktop 11
Opensuse Opensuse 11.4
Opensuse Opensuse 11.2
Opensuse Opensuse 11.3
Suse Linux Enterprise Desktop 10
2 EDB exploits
3 Github repositories
4 Articles
NA
CVE-2014-9161
CoolType.dll in Adobe Reader and Acrobat 10.x prior to 10.1.13 and 11.x prior to 11.0.10 on Windows, and 10.x up to and including 10.1.13 and 11.x up to and including 11.0.10 on OS X, allows remote malicious users to cause a denial of service (out-of-bounds read) or possibly have...
Adobe Acrobat Reader 10.1.13
Adobe Acrobat Reader 11.0.10
Adobe Acrobat 10.0
Adobe Acrobat 10.0.1
Adobe Acrobat 10.1.5
Adobe Acrobat 10.1.6
Adobe Acrobat 11.0
Adobe Acrobat 11.0.1
Adobe Acrobat 11.0.8
Adobe Acrobat 11.0.9
Adobe Acrobat 10.1.3
Adobe Acrobat 10.1.4
Adobe Acrobat 10.1.11
Adobe Acrobat 10.1.12
Adobe Acrobat 11.0.6
Adobe Acrobat 11.0.7
Adobe Acrobat 10.0.2
Adobe Acrobat 10.0.3
Adobe Acrobat 10.1
Adobe Acrobat 10.1.7
Adobe Acrobat 10.1.8
Adobe Acrobat 11.0.2
NA
CVE-2014-8445
Adobe Reader and Acrobat 10.x prior to 10.1.13 and 11.x prior to 11.0.10 on Windows and OS X allow malicious users to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2014-8446, CVE-2014-8447, CVE-...
Adobe Acrobat 10.1.6
Adobe Acrobat 10.1.7
Adobe Acrobat 10.1.8
Adobe Acrobat 10.1.9
Adobe Acrobat 10.1.10
Adobe Acrobat 10.0.1
Adobe Acrobat 10.1.2
Adobe Acrobat 10.1.4
Adobe Acrobat 10.1.11
Adobe Acrobat 11.0
Adobe Acrobat 11.0.7
Adobe Acrobat 11.0.9
Adobe Acrobat 10.0.2
Adobe Acrobat 10.0.3
Adobe Acrobat 10.1
Adobe Acrobat 10.1.1
Adobe Acrobat 11.0.2
Adobe Acrobat 11.0.3
Adobe Acrobat 11.0.4
Adobe Acrobat 11.0.5
Adobe Acrobat 10.0
Adobe Acrobat 10.1.3
NA
CVE-2014-8447
Adobe Reader and Acrobat 10.x prior to 10.1.13 and 11.x prior to 11.0.10 on Windows and OS X allow malicious users to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2014-8445, CVE-2014-8446, CVE-...
Adobe Acrobat 10.0
Adobe Acrobat 10.0.1
Adobe Acrobat 10.0.2
Adobe Acrobat 10.0.3
Adobe Acrobat 10.1.12
Adobe Acrobat 11.0
Adobe Acrobat 11.0.1
Adobe Acrobat 11.0.2
Adobe Acrobat 10.1.1
Adobe Acrobat 10.1.3
Adobe Acrobat 10.1.8
Adobe Acrobat 10.1.10
Adobe Acrobat 11.0.4
Adobe Acrobat 11.0.6
Adobe Acrobat 10.1.4
Adobe Acrobat 10.1.5
Adobe Acrobat 10.1.6
Adobe Acrobat 10.1.7
Adobe Acrobat 11.0.7
Adobe Acrobat 11.0.8
Adobe Acrobat 11.0.9
Adobe Acrobat 10.1
NA
CVE-2014-8449
Integer overflow in Adobe Reader and Acrobat 10.x prior to 10.1.13 and 11.x prior to 11.0.10 on Windows and OS X allows malicious users to execute arbitrary code via unspecified vectors.
Adobe Acrobat Reader 10.0
Adobe Acrobat Reader 10.0.2
Adobe Acrobat Reader 10.1.3
Adobe Acrobat Reader 10.1.5
Adobe Acrobat Reader 10.1.12
Adobe Acrobat Reader 11.0.01
Adobe Acrobat Reader 11.0.08
Adobe Acrobat Reader 10.0.3
Adobe Acrobat Reader 10.1
Adobe Acrobat Reader 10.1.1
Adobe Acrobat Reader 10.1.2
Adobe Acrobat Reader 11.0.03
Adobe Acrobat Reader 11.0.04
Adobe Acrobat Reader 11.0.05
Adobe Acrobat Reader 11.0.06
Adobe Acrobat Reader 10.1.7
Adobe Acrobat Reader 10.1.8
Adobe Acrobat Reader 10.1.9
Adobe Acrobat Reader 10.1.10
Adobe Acrobat Reader 10.1.11
Adobe Acrobat Reader 10.0.1
Adobe Acrobat Reader 10.1.4
NA
CVE-2014-8453
Adobe Reader and Acrobat 10.x prior to 10.1.13 and 11.x prior to 11.0.10 on Windows and OS X allow remote malicious users to bypass the Same Origin Policy via unspecified vectors.
Adobe Acrobat 10.1
Adobe Acrobat 10.1.2
Adobe Acrobat 10.1.9
Adobe Acrobat 10.1.11
Adobe Acrobat 11.0.3
Adobe Acrobat 11.0.5
Adobe Acrobat 11.0.7
Adobe Acrobat 10.0
Adobe Acrobat 10.0.1
Adobe Acrobat 10.0.2
Adobe Acrobat 10.0.3
Adobe Acrobat 10.1.12
Adobe Acrobat 11.0
Adobe Acrobat 11.0.1
Adobe Acrobat 11.0.2
Adobe Acrobat 10.1.4
Adobe Acrobat 10.1.5
Adobe Acrobat 10.1.6
Adobe Acrobat 10.1.7
Adobe Acrobat 11.0.8
Adobe Acrobat 11.0.9
Adobe Acrobat 10.1.1
NA
CVE-2014-8455
Use-after-free vulnerability in Adobe Reader and Acrobat 10.x prior to 10.1.13 and 11.x prior to 11.0.10 on Windows and OS X allows malicious users to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2014-8454 and CVE-2014-9165.
Adobe Acrobat Reader 10.1.1
Adobe Acrobat Reader 10.1.3
Adobe Acrobat Reader 10.1.8
Adobe Acrobat Reader 10.1.10
Adobe Acrobat Reader 10.1.12
Adobe Acrobat Reader 11.0.04
Adobe Acrobat Reader 11.0.06
Adobe Acrobat Reader 10.1.4
Adobe Acrobat Reader 10.1.5
Adobe Acrobat Reader 10.1.6
Adobe Acrobat Reader 10.1.7
Adobe Acrobat Reader 11.0.08
Adobe Acrobat Reader 11.0.09
Adobe Acrobat Reader 10.0
Adobe Acrobat Reader 10.0.1
Adobe Acrobat Reader 10.0.2
Adobe Acrobat Reader 10.0.3
Adobe Acrobat Reader 11.0.0
Adobe Acrobat Reader 11.0.01
Adobe Acrobat Reader 11.0.02
Adobe Acrobat Reader 11.0.03
Adobe Acrobat Reader 10.1
NA
CVE-2014-8456
Adobe Reader and Acrobat 10.x prior to 10.1.13 and 11.x prior to 11.0.10 on Windows and OS X allow malicious users to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2014-8445, CVE-2014-8446, CVE-...
Adobe Acrobat Reader 10.0
Adobe Acrobat Reader 10.0.2
Adobe Acrobat Reader 10.1.3
Adobe Acrobat Reader 10.1.5
Adobe Acrobat Reader 10.1.12
Adobe Acrobat Reader 11.0.01
Adobe Acrobat Reader 11.0.08
Adobe Acrobat Reader 10.0.3
Adobe Acrobat Reader 10.1
Adobe Acrobat Reader 10.1.1
Adobe Acrobat Reader 10.1.2
Adobe Acrobat Reader 11.0.02
Adobe Acrobat Reader 11.0.03
Adobe Acrobat Reader 11.0.04
Adobe Acrobat Reader 11.0.05
Adobe Acrobat Reader 11.0.06
Adobe Acrobat Reader 10.1.7
Adobe Acrobat Reader 10.1.8
Adobe Acrobat Reader 10.1.9
Adobe Acrobat Reader 10.1.10
Adobe Acrobat Reader 10.0.1
Adobe Acrobat Reader 10.1.4
NA
CVE-2014-8461
Adobe Reader and Acrobat 10.x prior to 10.1.13 and 11.x prior to 11.0.10 on Windows and OS X allow malicious users to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2014-8445, CVE-2014-8446, CVE-...
Adobe Acrobat Reader 10.0
Adobe Acrobat Reader 10.0.1
Adobe Acrobat Reader 10.0.2
Adobe Acrobat Reader 10.0.3
Adobe Acrobat Reader 11.0.0
Adobe Acrobat Reader 11.0.01
Adobe Acrobat Reader 11.0.02
Adobe Acrobat Reader 11.0.03
Adobe Acrobat Reader 10.1.1
Adobe Acrobat Reader 10.1.3
Adobe Acrobat Reader 10.1.10
Adobe Acrobat Reader 10.1.12
Adobe Acrobat Reader 11.0.04
Adobe Acrobat Reader 11.0.06
Adobe Acrobat Reader 10.1.5
Adobe Acrobat Reader 10.1.6
Adobe Acrobat Reader 10.1.7
Adobe Acrobat Reader 10.1.8
Adobe Acrobat Reader 11.0.08
Adobe Acrobat Reader 11.0.09
Adobe Acrobat Reader 10.1
Adobe Acrobat Reader 10.1.2
NA
CVE-2014-8457
Heap-based buffer overflow in Adobe Reader and Acrobat 10.x prior to 10.1.13 and 11.x prior to 11.0.10 on Windows and OS X allows malicious users to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2014-8460 and CVE-2014-9159.
Adobe Acrobat 10.0.2
Adobe Acrobat 10.1
Adobe Acrobat 10.1.7
Adobe Acrobat 10.1.9
Adobe Acrobat 11.0.1
Adobe Acrobat 11.0.3
Adobe Acrobat 10.1.1
Adobe Acrobat 10.1.2
Adobe Acrobat 10.1.3
Adobe Acrobat 10.1.4
Adobe Acrobat 10.1.5
Adobe Acrobat 11.0.5
Adobe Acrobat 11.0.6
Adobe Acrobat 11.0.7
Adobe Acrobat 11.0.8
Adobe Acrobat 10.0
Adobe Acrobat 10.1.10
Adobe Acrobat 10.1.11
Adobe Acrobat 10.1.12
Adobe Acrobat 11.0
Adobe Acrobat 10.0.1
Adobe Acrobat 10.0.3
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
camera
bypass
CVE-2024-3592
CVE-2024-37383
CVE-2024-24919
CVE-2024-27822
CVE-2024-36788
CVE-2024-36789
man-in-the-middle
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
3
4
5
NEXT »