VAR-201412-0494
Vulnerability from variot - Updated: 2023-12-18 13:09Heap-based buffer overflow in Adobe Reader and Acrobat 10.x before 10.1.13 and 11.x before 11.0.10 on Windows and OS X allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2014-8457 and CVE-2014-9159. This vulnerability CVE-2014-8457 and CVE-2014-9159 Is a different vulnerability.An attacker could execute arbitrary code. Failed exploit attempts likely result in denial-of-service conditions. The affected products are: Adobe Reader 11.x versions prior to 11.0.10 Adobe Reader 10.x versions prior to 10.1.13 Adobe Acrobat 11.x versions prior to 11.0.10 Adobe Acrobat 10.x versions prior to 10.1.13. Adobe Reader is a free PDF file reader, and Acrobat is a PDF file editing and conversion tool
Show details on source website{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"configurations": {
"@id": "https://www.variotdbs.pl/ref/configurations"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-201412-0494",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "acrobat",
"scope": "eq",
"trust": 1.6,
"vendor": "adobe",
"version": "11.0.4"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 1.6,
"vendor": "adobe",
"version": "10.1.10"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 1.6,
"vendor": "adobe",
"version": "11.0.3"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 1.6,
"vendor": "adobe",
"version": "11.0.2"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 1.6,
"vendor": "adobe",
"version": "11.0.6"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 1.6,
"vendor": "adobe",
"version": "10.1.12"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 1.6,
"vendor": "adobe",
"version": "10.1.11"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 1.6,
"vendor": "adobe",
"version": "11.0.1"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 1.6,
"vendor": "adobe",
"version": "11.0.5"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 1.6,
"vendor": "adobe",
"version": "11.0"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 1.3,
"vendor": "adobe",
"version": "10.1.3"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 1.3,
"vendor": "adobe",
"version": "10.1.2"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 1.3,
"vendor": "adobe",
"version": "10.1.1"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 1.3,
"vendor": "adobe",
"version": "10.1"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 1.3,
"vendor": "adobe",
"version": "10.0.3"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 1.3,
"vendor": "adobe",
"version": "10.0.2"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 1.3,
"vendor": "adobe",
"version": "10.0.1"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 1.3,
"vendor": "adobe",
"version": "10.0"
},
{
"model": "acrobat reader",
"scope": "eq",
"trust": 1.0,
"vendor": "adobe",
"version": "10.0"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 1.0,
"vendor": "adobe",
"version": "11.0.9"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 1.0,
"vendor": "adobe",
"version": "10.1.4"
},
{
"model": "acrobat reader",
"scope": "eq",
"trust": 1.0,
"vendor": "adobe",
"version": "10.1.4"
},
{
"model": "acrobat reader",
"scope": "eq",
"trust": 1.0,
"vendor": "adobe",
"version": "10.0.2"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 1.0,
"vendor": "adobe",
"version": "10.1.8"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 1.0,
"vendor": "adobe",
"version": "10.1.9"
},
{
"model": "acrobat reader",
"scope": "eq",
"trust": 1.0,
"vendor": "adobe",
"version": "10.0.3"
},
{
"model": "acrobat reader",
"scope": "eq",
"trust": 1.0,
"vendor": "adobe",
"version": "10.1.9"
},
{
"model": "acrobat reader",
"scope": "eq",
"trust": 1.0,
"vendor": "adobe",
"version": "10.1.8"
},
{
"model": "acrobat reader",
"scope": "eq",
"trust": 1.0,
"vendor": "adobe",
"version": "10.1.10"
},
{
"model": "acrobat reader",
"scope": "eq",
"trust": 1.0,
"vendor": "adobe",
"version": "11.0.0"
},
{
"model": "windows",
"scope": "eq",
"trust": 1.0,
"vendor": "microsoft",
"version": "*"
},
{
"model": "acrobat reader",
"scope": "eq",
"trust": 1.0,
"vendor": "adobe",
"version": "11.0.08"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 1.0,
"vendor": "adobe",
"version": "10.1.5"
},
{
"model": "acrobat reader",
"scope": "eq",
"trust": 1.0,
"vendor": "adobe",
"version": "10.1.5"
},
{
"model": "acrobat reader",
"scope": "eq",
"trust": 1.0,
"vendor": "adobe",
"version": "11.0.05"
},
{
"model": "acrobat reader",
"scope": "eq",
"trust": 1.0,
"vendor": "adobe",
"version": "11.0.01"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 1.0,
"vendor": "adobe",
"version": "11.0.8"
},
{
"model": "acrobat reader",
"scope": "eq",
"trust": 1.0,
"vendor": "adobe",
"version": "10.1.3"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 1.0,
"vendor": "adobe",
"version": "10.1.7"
},
{
"model": "acrobat reader",
"scope": "eq",
"trust": 1.0,
"vendor": "adobe",
"version": "10.1.12"
},
{
"model": "acrobat reader",
"scope": "eq",
"trust": 1.0,
"vendor": "adobe",
"version": "10.1.11"
},
{
"model": "acrobat reader",
"scope": "eq",
"trust": 1.0,
"vendor": "adobe",
"version": "10.1"
},
{
"model": "acrobat reader",
"scope": "eq",
"trust": 1.0,
"vendor": "adobe",
"version": "11.0.02"
},
{
"model": "acrobat reader",
"scope": "eq",
"trust": 1.0,
"vendor": "adobe",
"version": "10.1.7"
},
{
"model": "acrobat reader",
"scope": "eq",
"trust": 1.0,
"vendor": "adobe",
"version": "10.1.1"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 1.0,
"vendor": "adobe",
"version": "11.0.7"
},
{
"model": "acrobat reader",
"scope": "eq",
"trust": 1.0,
"vendor": "adobe",
"version": "11.0.03"
},
{
"model": "acrobat reader",
"scope": "eq",
"trust": 1.0,
"vendor": "adobe",
"version": "11.0.06"
},
{
"model": "acrobat reader",
"scope": "eq",
"trust": 1.0,
"vendor": "adobe",
"version": "11.0.09"
},
{
"model": "acrobat reader",
"scope": "eq",
"trust": 1.0,
"vendor": "adobe",
"version": "11.0.07"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 1.0,
"vendor": "adobe",
"version": "10.1.6"
},
{
"model": "acrobat reader",
"scope": "eq",
"trust": 1.0,
"vendor": "adobe",
"version": "10.1.6"
},
{
"model": "acrobat reader",
"scope": "eq",
"trust": 1.0,
"vendor": "adobe",
"version": "10.0.1"
},
{
"model": "mac os x",
"scope": "eq",
"trust": 1.0,
"vendor": "apple",
"version": "*"
},
{
"model": "acrobat reader",
"scope": "eq",
"trust": 1.0,
"vendor": "adobe",
"version": "10.1.2"
},
{
"model": "acrobat reader",
"scope": "eq",
"trust": 1.0,
"vendor": "adobe",
"version": "11.0.04"
},
{
"model": "reader",
"scope": "lt",
"trust": 0.8,
"vendor": "adobe",
"version": "11.x (windows macintosh)"
},
{
"model": "reader",
"scope": "lt",
"trust": 0.8,
"vendor": "adobe",
"version": "10.x (windows macintosh)"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.8,
"vendor": "adobe",
"version": "x (10.1.13)"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.8,
"vendor": "adobe",
"version": "x (10.1.13)"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.8,
"vendor": "adobe",
"version": "xi (11.0.10)"
},
{
"model": "acrobat",
"scope": "lt",
"trust": 0.8,
"vendor": "adobe",
"version": "11.x (windows macintosh)"
},
{
"model": "acrobat",
"scope": "lt",
"trust": 0.8,
"vendor": "adobe",
"version": "10.x (windows macintosh)"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.8,
"vendor": "adobe",
"version": "xi (11.0.10)"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1.3"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1.2"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1.1"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.0.3"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.0.2"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.0.1"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.0"
}
],
"sources": [
{
"db": "BID",
"id": "71579"
},
{
"db": "JVNDB",
"id": "JVNDB-2014-005935"
},
{
"db": "NVD",
"id": "CVE-2014-8460"
},
{
"db": "CNNVD",
"id": "CNNVD-201412-235"
}
]
},
"configurations": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/configurations#",
"children": {
"@container": "@list"
},
"cpe_match": {
"@container": "@list"
},
"data": {
"@container": "@list"
},
"nodes": {
"@container": "@list"
}
},
"data": [
{
"CVE_data_version": "4.0",
"nodes": [
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:adobe:acrobat_reader:10.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:adobe:acrobat_reader:10.0.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:adobe:acrobat_reader:10.1.10:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:adobe:acrobat_reader:10.1.11:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:adobe:acrobat_reader:10.1.12:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:adobe:acrobat_reader:11.0.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:adobe:acrobat_reader:10.0.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:adobe:acrobat_reader:10.1.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:adobe:acrobat_reader:10.1.6:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:adobe:acrobat_reader:10.1.8:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:adobe:acrobat_reader:11.0.02:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:adobe:acrobat_reader:11.0.04:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:adobe:acrobat_reader:10.1.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:adobe:acrobat_reader:10.1.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:adobe:acrobat_reader:10.1.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:adobe:acrobat_reader:10.1.5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:adobe:acrobat_reader:11.0.05:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:adobe:acrobat_reader:11.0.06:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:adobe:acrobat_reader:11.0.07:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:adobe:acrobat_reader:11.0.08:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:adobe:acrobat_reader:11.0.09:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:adobe:acrobat_reader:10.0.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:adobe:acrobat_reader:10.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:adobe:acrobat_reader:10.1.7:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:adobe:acrobat_reader:10.1.9:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:adobe:acrobat_reader:11.0.01:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:adobe:acrobat_reader:11.0.03:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:adobe:acrobat:10.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:adobe:acrobat:10.0.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:adobe:acrobat:10.0.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:adobe:acrobat:10.1.11:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:adobe:acrobat:10.1.12:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:adobe:acrobat:11.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:adobe:acrobat:11.0.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:adobe:acrobat:11.0.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:adobe:acrobat:10.0.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:adobe:acrobat:10.1.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:adobe:acrobat:10.1.8:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:adobe:acrobat:10.1.10:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:adobe:acrobat:11.0.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:adobe:acrobat:11.0.6:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:adobe:acrobat:10.1.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:adobe:acrobat:10.1.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:adobe:acrobat:10.1.5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:adobe:acrobat:10.1.6:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:adobe:acrobat:11.0.7:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:adobe:acrobat:11.0.8:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:adobe:acrobat:11.0.9:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:adobe:acrobat:10.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:adobe:acrobat:10.1.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:adobe:acrobat:10.1.7:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:adobe:acrobat:10.1.9:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:adobe:acrobat:11.0.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:adobe:acrobat:11.0.5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
}
]
}
],
"sources": [
{
"db": "NVD",
"id": "CVE-2014-8460"
}
]
},
"credits": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/credits#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Mateusz Jurczyk of Google Project Zero and Gynvael Coldwind of Google Security Team.",
"sources": [
{
"db": "BID",
"id": "71579"
}
],
"trust": 0.3
},
"cve": "CVE-2014-8460",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [
{
"acInsufInfo": true,
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "NVD",
"availabilityImpact": "COMPLETE",
"baseScore": 10.0,
"confidentialityImpact": "COMPLETE",
"exploitabilityScore": 10.0,
"impactScore": 10.0,
"integrityImpact": "COMPLETE",
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "HIGH",
"trust": 1.0,
"userInteractionRequired": false,
"vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
{
"acInsufInfo": null,
"accessComplexity": "Low",
"accessVector": "Network",
"authentication": "None",
"author": "NVD",
"availabilityImpact": "Complete",
"baseScore": 10.0,
"confidentialityImpact": "Complete",
"exploitabilityScore": null,
"id": "CVE-2014-8460",
"impactScore": null,
"integrityImpact": "Complete",
"obtainAllPrivilege": null,
"obtainOtherPrivilege": null,
"obtainUserPrivilege": null,
"severity": "High",
"trust": 0.8,
"userInteractionRequired": null,
"vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "VULHUB",
"availabilityImpact": "COMPLETE",
"baseScore": 10.0,
"confidentialityImpact": "COMPLETE",
"exploitabilityScore": 10.0,
"id": "VHN-76405",
"impactScore": 10.0,
"integrityImpact": "COMPLETE",
"severity": "HIGH",
"trust": 0.1,
"vectorString": "AV:N/AC:L/AU:N/C:C/I:C/A:C",
"version": "2.0"
}
],
"cvssV3": [],
"severity": [
{
"author": "NVD",
"id": "CVE-2014-8460",
"trust": 1.8,
"value": "HIGH"
},
{
"author": "CNNVD",
"id": "CNNVD-201412-235",
"trust": 0.6,
"value": "CRITICAL"
},
{
"author": "VULHUB",
"id": "VHN-76405",
"trust": 0.1,
"value": "HIGH"
}
]
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-76405"
},
{
"db": "JVNDB",
"id": "JVNDB-2014-005935"
},
{
"db": "NVD",
"id": "CVE-2014-8460"
},
{
"db": "CNNVD",
"id": "CNNVD-201412-235"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Heap-based buffer overflow in Adobe Reader and Acrobat 10.x before 10.1.13 and 11.x before 11.0.10 on Windows and OS X allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2014-8457 and CVE-2014-9159. This vulnerability CVE-2014-8457 and CVE-2014-9159 Is a different vulnerability.An attacker could execute arbitrary code. Failed exploit attempts likely result in denial-of-service conditions. \nThe affected products are:\nAdobe Reader 11.x versions prior to 11.0.10\nAdobe Reader 10.x versions prior to 10.1.13\nAdobe Acrobat 11.x versions prior to 11.0.10\nAdobe Acrobat 10.x versions prior to 10.1.13. Adobe Reader is a free PDF file reader, and Acrobat is a PDF file editing and conversion tool",
"sources": [
{
"db": "NVD",
"id": "CVE-2014-8460"
},
{
"db": "JVNDB",
"id": "JVNDB-2014-005935"
},
{
"db": "BID",
"id": "71579"
},
{
"db": "VULHUB",
"id": "VHN-76405"
}
],
"trust": 1.98
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "NVD",
"id": "CVE-2014-8460",
"trust": 2.8
},
{
"db": "JVNDB",
"id": "JVNDB-2014-005935",
"trust": 0.8
},
{
"db": "CNNVD",
"id": "CNNVD-201412-235",
"trust": 0.7
},
{
"db": "BID",
"id": "71579",
"trust": 0.4
},
{
"db": "VULHUB",
"id": "VHN-76405",
"trust": 0.1
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-76405"
},
{
"db": "BID",
"id": "71579"
},
{
"db": "JVNDB",
"id": "JVNDB-2014-005935"
},
{
"db": "NVD",
"id": "CVE-2014-8460"
},
{
"db": "CNNVD",
"id": "CNNVD-201412-235"
}
]
},
"id": "VAR-201412-0494",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "VULHUB",
"id": "VHN-76405"
}
],
"trust": 0.01
},
"last_update_date": "2023-12-18T13:09:17.261000Z",
"patch": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/patch#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"title": "APSB14-28",
"trust": 0.8,
"url": "http://helpx.adobe.com/security/products/reader/apsb14-28.html"
},
{
"title": "APSB14-28",
"trust": 0.8,
"url": "http://helpx.adobe.com/jp/security/products/reader/apsb14-28.html"
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2014-005935"
}
]
},
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "CWE-119",
"trust": 1.9
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-76405"
},
{
"db": "JVNDB",
"id": "JVNDB-2014-005935"
},
{
"db": "NVD",
"id": "CVE-2014-8460"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 1.7,
"url": "http://helpx.adobe.com/security/products/reader/apsb14-28.html"
},
{
"trust": 0.8,
"url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-8460"
},
{
"trust": 0.8,
"url": "http://www.ipa.go.jp/security/ciadr/vul/20141210-adobereader.html"
},
{
"trust": 0.8,
"url": "http://www.jpcert.or.jp/at/2014/at140053.html"
},
{
"trust": 0.8,
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2014-8460"
},
{
"trust": 0.8,
"url": "http://www.npa.go.jp/cyberpolice/topics/?seq=15071"
},
{
"trust": 0.3,
"url": "http://www.adobe.com/products/acrobat/"
},
{
"trust": 0.3,
"url": "http://www.adobe.com"
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-76405"
},
{
"db": "BID",
"id": "71579"
},
{
"db": "JVNDB",
"id": "JVNDB-2014-005935"
},
{
"db": "NVD",
"id": "CVE-2014-8460"
},
{
"db": "CNNVD",
"id": "CNNVD-201412-235"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "VULHUB",
"id": "VHN-76405"
},
{
"db": "BID",
"id": "71579"
},
{
"db": "JVNDB",
"id": "JVNDB-2014-005935"
},
{
"db": "NVD",
"id": "CVE-2014-8460"
},
{
"db": "CNNVD",
"id": "CNNVD-201412-235"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2014-12-10T00:00:00",
"db": "VULHUB",
"id": "VHN-76405"
},
{
"date": "2014-12-09T00:00:00",
"db": "BID",
"id": "71579"
},
{
"date": "2014-12-12T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2014-005935"
},
{
"date": "2014-12-10T21:59:30.790000",
"db": "NVD",
"id": "CVE-2014-8460"
},
{
"date": "2014-12-11T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201412-235"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2014-12-12T00:00:00",
"db": "VULHUB",
"id": "VHN-76405"
},
{
"date": "2014-12-09T00:00:00",
"db": "BID",
"id": "71579"
},
{
"date": "2014-12-12T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2014-005935"
},
{
"date": "2014-12-12T01:36:58.823000",
"db": "NVD",
"id": "CVE-2014-8460"
},
{
"date": "2014-12-11T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201412-235"
}
]
},
"threat_type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/threat_type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "remote",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201412-235"
}
],
"trust": 0.6
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Windows and Mac OS X Run on Adobe Reader and Acrobat Heap-based buffer overflow vulnerability",
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2014-005935"
}
],
"trust": 0.8
},
"type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "buffer overflow",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201412-235"
}
],
"trust": 0.6
}
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…