Keyword: adobe reader and acrobat .pdf vulnerability
76969 Total Search   |   Showing Results : 161 - 180
drop malicious files: Adobe Reader and Acrobat .PDF Vulnerability It executes the dropped file(s). As a result, malicious routines of the dropped files are exhibited on the affected system. Other Details
software vulnerabilities to drop malicious files: Adobe Reader and Acrobat .PDF Vulnerability It executes the dropped file(s). As a result, malicious routines of the dropped files are exhibited on the
\ Adobe Acrobat\10.0 HKEY_CURRENT_USER\Software\Adobe\ Adobe Synchronizer\10.0 HKEY_LOCAL_MACHINE\System\Acrobatbrokerserverdispatchercpp789 HKEY_CURRENT_USER\Software\Adobe\ Acrobat Reader\10.0\Installer
%Application Data%\Adobe\Acrobat\10.0\SharedDataEvents-journal (Note: %User Temp% is the user's temporary folder, where it usually is C:\Documents and Settings\{user name}\Local Settings\Temp on Windows 2000,
%Application Data%\Adobe\Acrobat\10.0\SharedDataEvents-journal (Note: %User Temp% is the user's temporary folder, where it usually is C:\Documents and Settings\{user name}\Local Settings\Temp on Windows 2000,
\ReaderMessages-journal %Application Data%\Adobe\Acrobat\10.0\SharedDataEvents-journal (Note: %User Temp% is the user's temporary folder, where it usually is C:\Documents and Settings\{user name}\Local Settings\Temp on
2003, or C:\Users\{user name} on Windows Vista and 7.) It adds the following registry keys: HKEY_CURRENT_USER\Software\Adobe\ Adobe Acrobat\10.0 HKEY_CURRENT_USER\Software\Adobe\ Adobe Synchronizer\10.0
Adobe Acrobat and Reader are prone to an unspecified heap overflow vulnerability. Attackers can exploit the vulnerability to do code corruption, control-flow hijack, or information leak attack. Apply
Adobe Acrobat and Reader are prone to an unspecified memory corruption vulnerability. Attackers can exploit the vulnerability to do code corruption, control-flow hijack, or information leak attack.
Adobe Acrobat and Reader are prone to an unspecified memory corruption vulnerability. Attackers can exploit the vulnerability to do code corruption, control-flow hijack, or information leak attack.
Adobe Acrobat and Reader are prone to an unspecified memory corruption vulnerability. Attackers can exploit the vulnerability to do code corruption, control-flow hijack, or information leak attack.
Adobe Acrobat and Reader are prone to an unspecified memory corruption vulnerability. Attackers can exploit the vulnerability to do code corruption, control-flow hijack, or information leak attack.
Adobe Acrobat and Reader are prone to an unspecified memory corruption vulnerability. Attackers can exploit the vulnerability to do code corruption, control-flow hijack, or information leak attack.
Adobe Acrobat and Reader are prone to an unspecified memory corruption vulnerability. Attackers can exploit the vulnerability to do code corruption, control-flow hijack, or information leak attack.
Adobe Acrobat and Reader are prone to an unspecified memory corruption vulnerability. Attackers can exploit the vulnerability to do code corruption, control-flow hijack, or information leak attack.
Adobe Acrobat and Reader are prone to an unspecified memory corruption vulnerability. Attackers can exploit the vulnerability to do code corruption, control-flow hijack, or information leak attack.
Adobe Acrobat and Reader are prone to an unspecified memory corruption vulnerability. Attackers can exploit the vulnerability to do code corruption, control-flow hijack, or information leak attack.
\ReaderMessages-journal %Application Data%\Adobe\Acrobat\10.0\SharedDataEvents-journal (Note: %User Temp% is the user's temporary folder, where it usually is C:\Documents and Settings\{user name}\Local Settings\Temp on
\Adobe\Acrobat\10.0\SharedDataEvents-journal (Note: %User Profile% is the current user's profile folder, which is usually C:\Documents and Settings\{user name} on Windows 2000, XP, and Server 2003, or C:
\Adobe\Acrobat\10.0\SharedDataEvents-journal (Note: %User Profile% is a user's profile folder, where it usually is C:\Documents and Settings\{user name} on Windows 2000, Windows Server 2003, and Windows XP