Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
adobe acrobat reader 8.2.3 vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2010-2862
Integer overflow in CoolType.dll in Adobe Reader 8.2.3 and 9.3.3, and Acrobat 9.3.3, allows remote malicious users to execute arbitrary code via a TrueType font with a large maxCompositePoints value in a Maximum Profile (maxp) table.
Adobe Acrobat Reader 8.2.3
Adobe Acrobat Reader 9.3.3
Adobe Acrobat 9.3.3
1 EDB exploit
1 Article
NA
CVE-2010-3619
Adobe Reader and Acrobat 9.x prior to 9.4, and 8.x prior to 8.2.5 on Windows and Mac OS X, allow malicious users to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2010-2890, CVE-2010-3621, CVE-20...
Adobe Acrobat 8.1
Adobe Acrobat 8.1.5
Adobe Acrobat 8.1.6
Adobe Acrobat Reader 8.1.5
Adobe Acrobat Reader 8.2
Adobe Acrobat Reader 8.1.1
Adobe Acrobat Reader 8.2.2
Adobe Acrobat 8.1.3
Adobe Acrobat 8.2.3
Adobe Acrobat 8.2.1
Adobe Acrobat 8.2
Adobe Acrobat Reader 8.1.7
Adobe Acrobat Reader 8.2.3
Adobe Acrobat 8.0
Adobe Acrobat 8.1.2
Adobe Acrobat 8.1.7
Adobe Acrobat Reader 8.1.4
Adobe Acrobat Reader 8.0
Adobe Acrobat Reader 8.1.2
Adobe Acrobat Reader 8.2.1
Adobe Acrobat 8.1.1
Adobe Acrobat 8.1.4
NA
CVE-2010-3620
Unspecified vulnerability in Adobe Reader and Acrobat 9.x prior to 9.4, and 8.x prior to 8.2.5 on Windows and Mac OS X, allows malicious users to execute arbitrary code via a crafted image, a different vulnerability than CVE-2010-3629.
Adobe Acrobat 8.1.4
Adobe Acrobat 8.1.3
Adobe Acrobat 8.2.3
Adobe Acrobat 8.2.2
Adobe Acrobat 8.2.1
Adobe Acrobat Reader 8.1
Adobe Acrobat Reader 8.1.7
Adobe Acrobat 8.1.7
Adobe Acrobat 8.1.5
Adobe Acrobat Reader 8.0
Adobe Acrobat Reader 8.1.5
Adobe Acrobat Reader 8.2.1
Adobe Acrobat Reader 8.1.1
Adobe Acrobat 8.0
Adobe Acrobat 8.1.2
Adobe Acrobat 8.2
Adobe Acrobat Reader 8.1.4
Adobe Acrobat Reader 8.2.3
Adobe Acrobat Reader 8.1.2
Adobe Acrobat 8.1
Adobe Acrobat 8.1.1
Adobe Acrobat 8.1.6
NA
CVE-2010-3621
Adobe Reader and Acrobat 9.x prior to 9.4, and 8.x prior to 8.2.5 on Windows and Mac OS X, allow malicious users to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2010-2890, CVE-2010-3619, CVE-20...
Adobe Acrobat 8.1.4
Adobe Acrobat 8.1.3
Adobe Acrobat 8.2.4
Adobe Acrobat 8.2.2
Adobe Acrobat Reader 8.1.6
Adobe Acrobat Reader 8.1
Adobe Acrobat Reader 8.1.7
Adobe Acrobat 8.1
Adobe Acrobat 8.1.1
Adobe Acrobat 8.1.5
Adobe Acrobat 8.1.6
Adobe Acrobat Reader 8.1.5
Adobe Acrobat Reader 8.2
Adobe Acrobat Reader 8.2.2
Adobe Acrobat Reader 8.2.4
Adobe Acrobat 8.1.2
Adobe Acrobat 8.1.7
Adobe Acrobat Reader 8.1.4
Adobe Acrobat Reader 8.0
Adobe Acrobat Reader 8.2.1
Adobe Acrobat Reader 8.1.1
Adobe Acrobat 8.2.3
NA
CVE-2010-3624
Unspecified vulnerability in Adobe Reader and Acrobat 8.x prior to 8.2.5 and 9.x prior to 9.4 on Mac OS X allows malicious users to execute arbitrary code via a crafted image.
Adobe Acrobat 8.1
Adobe Acrobat 8.1.1
Adobe Acrobat 8.1.5
Adobe Acrobat 8.1.6
Adobe Acrobat Reader 8.2
Adobe Acrobat Reader 8.1.6
Adobe Acrobat Reader 8.2.2
Adobe Acrobat Reader 8.2.4
Adobe Acrobat 8.1.2
Adobe Acrobat 8.1.7
Adobe Acrobat Reader 8.0
Adobe Acrobat Reader 8.1.5
Adobe Acrobat Reader 8.2.1
Adobe Acrobat Reader 8.1.1
Adobe Acrobat 8.2.3
Adobe Acrobat 8.0
Adobe Acrobat 8.2
Adobe Acrobat Reader 8.1.4
Adobe Acrobat Reader 8.2.3
Adobe Acrobat Reader 8.1.2
Adobe Acrobat 8.1.4
Adobe Acrobat 8.1.3
NA
CVE-2010-3625
Adobe Reader and Acrobat 9.x prior to 9.4, and 8.x prior to 8.2.5 on Windows and Mac OS X, allow malicious users to execute arbitrary code via unspecified vectors, related to a "prefix protocol handler vulnerability."
Adobe Acrobat 8.1
Adobe Acrobat 8.0
Adobe Acrobat 8.1.2
Adobe Acrobat 8.1.7
Adobe Acrobat Reader 8.1.4
Adobe Acrobat Reader 8.0
Adobe Acrobat Reader 8.1.2
Adobe Acrobat Reader 8.2.1
Adobe Acrobat 8.1.3
Adobe Acrobat 8.2.3
Adobe Acrobat 8.2.1
Adobe Acrobat 8.2
Adobe Acrobat Reader 8.1.7
Adobe Acrobat Reader 8.2.3
Adobe Acrobat 8.1.5
Adobe Acrobat 8.1.6
Adobe Acrobat Reader 8.1.5
Adobe Acrobat Reader 8.2
Adobe Acrobat Reader 8.1.1
Adobe Acrobat Reader 8.2.2
Adobe Acrobat 8.1.1
Adobe Acrobat 8.1.4
NA
CVE-2010-3627
Unspecified vulnerability in Adobe Reader and Acrobat 9.x prior to 9.4, and 8.x prior to 8.2.5 on Windows and Mac OS X, allows malicious users to execute arbitrary code via unknown vectors.
Adobe Acrobat 8.2.3
Adobe Acrobat 8.0
Adobe Acrobat 8.2.1
Adobe Acrobat 8.2
Adobe Acrobat Reader 8.1.7
Adobe Acrobat Reader 8.2.3
Adobe Acrobat Reader 8.1.2
Adobe Acrobat 8.1.4
Adobe Acrobat 8.1.3
Adobe Acrobat 8.2.4
Adobe Acrobat 8.2.2
Adobe Acrobat Reader 8.1.6
Adobe Acrobat Reader 8.1
Adobe Acrobat 8.1.2
Adobe Acrobat 8.1.7
Adobe Acrobat Reader 8.1.4
Adobe Acrobat Reader 8.0
Adobe Acrobat Reader 8.2.1
Adobe Acrobat Reader 8.1.1
Adobe Acrobat 8.1
Adobe Acrobat 8.1.1
Adobe Acrobat 8.1.5
NA
CVE-2010-3628
Adobe Reader and Acrobat 9.x prior to 9.4, and 8.x prior to 8.2.5 on Windows and Mac OS X, allow malicious users to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2010-2890, CVE-2010-3619, CVE-20...
Adobe Acrobat 8.0
Adobe Acrobat 8.1.2
Adobe Acrobat 8.2
Adobe Acrobat Reader 8.1.4
Adobe Acrobat Reader 8.1.2
Adobe Acrobat Reader 8.2.1
Adobe Acrobat 8.1.1
Adobe Acrobat 8.1.4
Adobe Acrobat 8.1.6
Adobe Acrobat 8.2.4
Adobe Acrobat Reader 8.2
Adobe Acrobat Reader 8.1.6
Adobe Acrobat Reader 8.1
Adobe Acrobat Reader 8.2.4
Adobe Acrobat 8.1.3
Adobe Acrobat 8.2.3
Adobe Acrobat 8.2.2
Adobe Acrobat 8.2.1
Adobe Acrobat Reader 8.1.7
Adobe Acrobat Reader 8.2.3
Adobe Acrobat 8.1
Adobe Acrobat 8.1.7
NA
CVE-2010-3629
Unspecified vulnerability in Adobe Reader and Acrobat 9.x prior to 9.4, and 8.x prior to 8.2.5 on Windows and Mac OS X, allows malicious users to execute arbitrary code via a crafted image, a different vulnerability than CVE-2010-3620.
Adobe Acrobat 8.2.3
Adobe Acrobat 8.0
Adobe Acrobat 8.2.1
Adobe Acrobat 8.2
Adobe Acrobat Reader 8.1.4
Adobe Acrobat Reader 8.2.3
Adobe Acrobat Reader 8.1.2
Adobe Acrobat 8.1
Adobe Acrobat 8.1.1
Adobe Acrobat 8.1.5
Adobe Acrobat 8.1.6
Adobe Acrobat Reader 8.2
Adobe Acrobat Reader 8.1.6
Adobe Acrobat Reader 8.2.2
Adobe Acrobat Reader 8.2.4
Adobe Acrobat 8.1.4
Adobe Acrobat 8.1.3
Adobe Acrobat 8.2.4
Adobe Acrobat 8.2.2
Adobe Acrobat Reader 8.1
Adobe Acrobat Reader 8.1.7
Adobe Acrobat 8.1.2
NA
CVE-2010-3630
Unspecified vulnerability in Adobe Reader and Acrobat 9.x prior to 9.4, and 8.x prior to 8.2.5 on Windows and Mac OS X, allows malicious users to cause a denial of service or possibly execute arbitrary code via unknown vectors.
Adobe Acrobat 8.1.3
Adobe Acrobat 8.2.3
Adobe Acrobat 8.2.1
Adobe Acrobat 8.2
Adobe Acrobat Reader 8.1.7
Adobe Acrobat Reader 8.2.3
Adobe Acrobat 8.1
Adobe Acrobat 8.1.7
Adobe Acrobat 8.1.5
Adobe Acrobat Reader 8.1.5
Adobe Acrobat Reader 8.2
Adobe Acrobat Reader 8.1.1
Adobe Acrobat Reader 8.2.2
Adobe Acrobat 8.1.1
Adobe Acrobat 8.1.4
Adobe Acrobat 8.1.6
Adobe Acrobat 8.2.4
Adobe Acrobat 8.2.2
Adobe Acrobat Reader 8.1.6
Adobe Acrobat Reader 8.1
Adobe Acrobat Reader 8.2.4
Adobe Acrobat 8.0
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-3201
CVE-2024-4779
CVE-2024-35090
CVE-2024-5084
hard-coded
CVE-2024-4985
HTML injection
CVE-2024-33655
local file inclusion
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
3
4
5
NEXT »