First published: Mon Oct 19 2009(Updated: )
Adobe Reader and Acrobat 7.x before 7.1.4, 8.x before 8.1.7, and 9.x before 9.2 do not properly validate input, which might allow attackers to bypass intended Trust Manager restrictions via unspecified vectors.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Adobe Acrobat Reader | =8.0 | |
Adobe Acrobat Reader | =8.1.2 | |
Adobe Acrobat Reader | =7.0.2 | |
Adobe Acrobat Reader | =7.0.3 | |
Adobe Acrobat Reader | =7.1.0 | |
Adobe Acrobat Reader | =7.0.8 | |
Adobe Acrobat Reader | =7.1.1 | |
Adobe Acrobat Reader | =8.1.1 | |
Adobe Acrobat Reader | =8.1 | |
Adobe Acrobat Reader | =9.0 | |
Adobe Acrobat Reader | =7.0.6 | |
Adobe Acrobat Reader | =7.0.7 | |
Adobe Acrobat Reader | =9.1.1 | |
Adobe Acrobat Reader | =7.1.3 | |
Adobe Acrobat Reader | =8.1.4 | |
Adobe Acrobat Reader | <=9.1.3 | |
Adobe Acrobat Reader | =7.0.1 | |
Adobe Acrobat Reader | =7.0.5 | |
Adobe Acrobat Reader | =7.0.4 | |
Adobe Acrobat Reader | =9.1.2 | |
Adobe Acrobat Reader | =7.0.9 | |
Adobe Acrobat Reader | =8.1.6 | |
Adobe Acrobat Reader | =7.0 | |
Adobe Acrobat Reader | =8.1.3 | |
Adobe Acrobat Reader | =7.0.9 | |
Adobe Acrobat Reader | <=9.1.3 | |
Adobe Acrobat Reader | =8.1.6 | |
Adobe Acrobat Reader | =7.1.3 | |
Adobe Acrobat Reader | =7.0.5 | |
Adobe Acrobat Reader | =7.0.6 | |
Adobe Acrobat Reader | =7.1.0 | |
Adobe Acrobat Reader | =9.1 | |
Adobe Acrobat Reader | =7.0.8 | |
Adobe Acrobat Reader | =8.0 | |
Adobe Acrobat Reader | =7.0.7 | |
Adobe Acrobat Reader | =9.1.2 | |
Adobe Acrobat Reader | =8.1.5 | |
Adobe Acrobat Reader | =7.0.3 | |
Adobe Acrobat Reader | =9.1.1 | |
Adobe Acrobat Reader | =7.0.1 | |
Adobe Acrobat Reader | =7.0.2 | |
Adobe Acrobat Reader | =7.0 | |
Adobe Acrobat Reader | =8.1.4 | |
Adobe Acrobat Reader | =8.1.2 | |
Adobe Acrobat Reader | =9.0 | |
Adobe Acrobat Reader | =8.1.1 | |
Adobe Acrobat Reader | =8.1 | |
Adobe Acrobat Reader | =8.1.3 | |
Adobe Acrobat Reader | =7.1.1 | |
Adobe Acrobat Reader | =7.0.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.