Adobe Reader and Acrobat 9.x prior to 9.5.5, 10.x prior to 10.1.7, and 11.x prior to 11.0.03 allow malicious users to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2013-2718, CVE-2013-2719, CVE-2013-2720, CVE-2013-2721, CVE-2013-2722, CVE-2013-2723, CVE-2013-2725, CVE-2013-2726, CVE-2013-2731, CVE-2013-2732, CVE-2013-2734, CVE-2013-2735, CVE-2013-2736, CVE-2013-3337, CVE-2013-3338, CVE-2013-3339, CVE-2013-3340, and CVE-2013-3341.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
adobe acrobat 11.0.2 |
||
adobe acrobat 10.0 |
||
adobe acrobat 10.1.2 |
||
adobe acrobat 10.1.3 |
||
adobe acrobat 9.5.1 |
||
adobe acrobat 9.5 |
||
adobe acrobat 9.4.4 |
||
adobe acrobat 9.4.3 |
||
adobe acrobat 9.3.4 |
||
adobe acrobat 9.3.3 |
||
adobe acrobat 9.2 |
||
adobe acrobat 9.1 |
||
adobe acrobat 9.0 |
||
adobe acrobat 10.0.2 |
||
adobe acrobat 10.0.3 |
||
adobe acrobat 10.1.6 |
||
adobe acrobat 9.5.4 |
||
adobe acrobat 9.4.6 |
||
adobe acrobat 9.4.5 |
||
adobe acrobat 9.4.1 |
||
adobe acrobat 9.3.1 |
||
adobe acrobat 9.1.2 |
||
adobe acrobat 9.1.1 |
||
adobe acrobat 10.0.1 |
||
adobe acrobat 10.1.4 |
||
adobe acrobat 10.1.5 |
||
adobe acrobat 9.4.7 |
||
adobe acrobat 9.4.2 |
||
adobe acrobat 9.3.2 |
||
adobe acrobat 9.1.3 |
||
adobe acrobat 11.0 |
||
adobe acrobat 11.0.1 |
||
adobe acrobat 10.1 |
||
adobe acrobat 10.1.1 |
||
adobe acrobat 9.5.3 |
||
adobe acrobat 9.5.2 |
||
adobe acrobat 9.4 |
||
adobe acrobat 9.3 |
||
adobe acrobat reader 10.1.5 |
||
adobe acrobat reader 10.1.4 |
||
adobe acrobat reader 10.0.1 |
||
adobe acrobat reader 10.0 |
||
adobe acrobat reader 9.4.5 |
||
adobe acrobat reader 9.4.4 |
||
adobe acrobat reader 9.3.2 |
||
adobe acrobat reader 9.3.1 |
||
adobe acrobat reader 9.0 |
||
adobe acrobat reader 11.0.1 |
||
adobe acrobat reader 11.0.2 |
||
adobe acrobat reader 10.1.1 |
||
adobe acrobat reader 10.1 |
||
adobe acrobat reader 9.5.2 |
||
adobe acrobat reader 9.5.1 |
||
adobe acrobat reader 9.4.1 |
||
adobe acrobat reader 9.4 |
||
adobe acrobat reader 9.1.3 |
||
adobe acrobat reader 9.1.2 |
||
adobe acrobat reader 11.0 |
||
adobe acrobat reader 10.1.3 |
||
adobe acrobat reader 10.1.2 |
||
adobe acrobat reader 9.5.4 |
||
adobe acrobat reader 9.5.3 |
||
adobe acrobat reader 9.4.3 |
||
adobe acrobat reader 9.4.2 |
||
adobe acrobat reader 9.3 |
||
adobe acrobat reader 9.2 |
||
adobe acrobat reader 11.0.3 |
||
adobe acrobat reader 10.1.6 |
||
adobe acrobat reader 10.0.3 |
||
adobe acrobat reader 10.0.2 |
||
adobe acrobat reader 9.5 |
||
adobe acrobat reader 9.4.7 |
||
adobe acrobat reader 9.4.6 |
||
adobe acrobat reader 9.3.4 |
||
adobe acrobat reader 9.3.3 |
||
adobe acrobat reader 9.1.1 |
||
adobe acrobat reader 9.1 |
PDF version In July we published our in-depth analysis into a targeted attack campaign that we dubbed ‘Crouching Yeti’. This campaign is also known as ‘Energetic Bear’. This campaign, which has been active since late 2010, has so far targeted the following sectors: industrial/machinery, manufacturing, pharmaceutical, construction, education and information technology. So far there have been more than 2,800 victims worldwide, and we have been able to identify 101 different organisatio...