Adobe Reader and Acrobat 10.x before 10.1.11 and 11.x before 11.0.08 on Windows allow attackers to bypass a sandbox protection mechanism, and consequently execute native code in a privileged context, via unspecified vectors.
References
Link | Resource |
---|---|
http://helpx.adobe.com/security/products/reader/apsb14-19.html | Patch Vendor Advisory |
http://www.securitytracker.com/id/1030711 | Broken Link Third Party Advisory VDB Entry |
http://helpx.adobe.com/security/products/reader/apsb14-19.html | Patch Vendor Advisory |
http://www.securitytracker.com/id/1030711 | Broken Link Third Party Advisory VDB Entry |
Configurations
Configuration 1 (hide)
AND |
|
History
21 Nov 2024, 02:02
Type | Values Removed | Values Added |
---|---|---|
References | () http://helpx.adobe.com/security/products/reader/apsb14-19.html - Patch, Vendor Advisory | |
References | () http://www.securitytracker.com/id/1030711 - Broken Link, Third Party Advisory, VDB Entry |
28 Jun 2024, 17:28
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:adobe:acrobat_reader:11.0:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat_reader:10.1.2:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat_reader:11.0.7:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat_reader:10.0.3:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat:10.0.2:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat_reader:11.0.3:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat_reader:10.1.1:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat:11.0.2:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat_reader:10.1.4:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat:10.1.1:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat:11.0.7:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat:10.1.3:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat:11.0:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat:10.1:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat_reader:10.1.10:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat_reader:10.1.8:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat_reader:10.1.5:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat:10.1.10:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat:11.0.4:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat_reader:11.0.2:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat_reader:10.0.2:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat_reader:10.1:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat:11.0.6:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat_reader:10.0:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat_reader:11.0.4:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat:10.1.6:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat:10.0.3:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat_reader:10.0.1:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat_reader:10.1.7:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat_reader:11.0.5:-:*:*:*:windows:*:* cpe:2.3:a:adobe:acrobat:10.0:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat:10.1.5:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat_reader:10.1.3:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat:10.1.7:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat:11.0.5:-:*:*:*:windows:*:* cpe:2.3:a:adobe:acrobat:11.0.1:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat_reader:10.1.6:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat:10.1.2:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat_reader:10.1.9:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat:10.1.8:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat_reader:11.0.1:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat:10.0.1:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat:11.0.3:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat_reader:11.0.6:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat:10.1.9:*:*:*:*:*:*:* |
cpe:2.3:a:adobe:acrobat_reader:*:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat:*:*:*:*:*:*:*:* |
CVSS |
v2 : v3 : |
v2 : 10.0
v3 : 9.8 |
References | () http://www.securitytracker.com/id/1030711 - Broken Link, Third Party Advisory, VDB Entry |
Information
Published : 2014-08-12 21:55
Updated : 2024-11-21 02:02
NVD link : CVE-2014-0546
Mitre link : CVE-2014-0546
CVE.ORG link : CVE-2014-0546
JSON object : View
Products Affected
adobe
- acrobat_reader
- acrobat
microsoft
- windows
CWE