fkie_cve-2009-3459
Vulnerability from fkie_nvd
Published
2009-10-13 10:30
Modified
2025-04-09 00:30
Severity ?
Summary
Heap-based buffer overflow in Adobe Reader and Acrobat 7.x before 7.1.4, 8.x before 8.1.7, and 9.x before 9.2 allows remote attackers to execute arbitrary code via a crafted PDF file that triggers memory corruption, as exploited in the wild in October 2009. NOTE: some of these details are obtained from third party information.
References
Impacted products
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:adobe:acrobat:*:*:*:*:*:*:*:*",
"matchCriteriaId": "84209F08-D75D-4C02-94E4-5942B244E632",
"versionEndIncluding": "9.1.3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:acrobat:3.0:*:*:*:*:*:*:*",
"matchCriteriaId": "465F9134-DD86-4F13-8C39-949BE6E7389A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:acrobat:3.1:*:*:*:*:*:*:*",
"matchCriteriaId": "BB041EDF-EFF8-4AA6-8D59-411975547534",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:acrobat:4.0:*:*:*:*:*:*:*",
"matchCriteriaId": "4C05F6A5-0FB3-489B-9B8B-64C569C03D7A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:acrobat:4.0.5:*:*:*:*:*:*:*",
"matchCriteriaId": "AABA4FE3-662B-4956-904D-45086E000890",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:acrobat:4.0.5a:*:*:*:*:*:*:*",
"matchCriteriaId": "998CD79C-458E-46A8-8261-1C40C53D9FA5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:acrobat:4.0.5c:*:*:*:*:*:*:*",
"matchCriteriaId": "0155FB0B-7FAD-4388-96C8-A8543B4FDFD9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:acrobat:5.0:*:*:*:*:*:*:*",
"matchCriteriaId": "201F059D-33D1-4D9F-9C6F-FC8EB49E4735",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:acrobat:5.0.5:*:*:*:*:*:*:*",
"matchCriteriaId": "B025E795-5713-485E-8A15-EBE4451A1A46",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:acrobat:5.0.6:*:*:*:*:*:*:*",
"matchCriteriaId": "B453FA1D-0FE9-4324-9644-E167561926C2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:acrobat:5.0.10:*:*:*:*:*:*:*",
"matchCriteriaId": "FDEA946E-B6D2-463B-89D0-F2F37278089E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:acrobat:6.0:*:*:*:*:*:*:*",
"matchCriteriaId": "183B5940-2310-4D2E-99F0-9792A801A442",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:acrobat:6.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "4F8BB13E-2732-4F9E-A588-EA1C00893C8B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:acrobat:6.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "E5FCDCBF-597B-439C-8D8B-2819FC70C567",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:acrobat:6.0.3:*:*:*:*:*:*:*",
"matchCriteriaId": "440B890A-90E9-4456-B92A-856CD17F0C78",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:acrobat:6.0.4:*:*:*:*:*:*:*",
"matchCriteriaId": "79BD9D8D-39DA-403E-915D-E1B6A46A6BAB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:acrobat:6.0.5:*:*:*:*:*:*:*",
"matchCriteriaId": "8976A7DC-1314-4C4A-A7C5-AA789D2DAB9C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:acrobat:7.0:*:*:*:*:*:*:*",
"matchCriteriaId": "FECFC942-4F04-420C-A9B4-AE0C0590317F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:acrobat:7.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "F81817F2-1E3A-4A52-88F1-6B614A2A1F0A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:acrobat:7.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "CFFFFF0D-A80F-4B67-BEE2-86868EF7AA37",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:acrobat:7.0.3:*:*:*:*:*:*:*",
"matchCriteriaId": "1DC97A87-2652-4AD6-8E10-419A9AC9C245",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:acrobat:7.0.4:*:*:*:*:*:*:*",
"matchCriteriaId": "3E1F71AE-3591-499E-B09F-AAC4E38F1CF2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:acrobat:7.0.5:*:*:*:*:*:*:*",
"matchCriteriaId": "2D75174C-EBF9-4117-9E66-80E847012853",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:acrobat:7.0.6:*:*:*:*:*:*:*",
"matchCriteriaId": "69B0305A-51D3-4E09-B96C-54B0ED921DA3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:acrobat:7.0.7:*:*:*:*:*:*:*",
"matchCriteriaId": "9762FE57-837B-4FFA-9813-AC038450EB2B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:acrobat:7.0.8:*:*:*:*:*:*:*",
"matchCriteriaId": "0055A38C-E421-40A1-8BC7-11856A20B8F0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:acrobat:7.0.9:*:*:*:*:*:*:*",
"matchCriteriaId": "758CC9EE-8929-405B-A845-83BAAECCB2AD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:acrobat:7.1.3:*:*:*:*:*:*:*",
"matchCriteriaId": "21AC1961-12F7-456F-9CE4-9AAF116CF141",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:acrobat:8.0:*:*:*:*:*:*:*",
"matchCriteriaId": "26AE76F7-D7F6-4AF2-A5C6-708B5642C288",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:acrobat:8.1:*:*:*:*:*:*:*",
"matchCriteriaId": "749FFB51-65D4-4A4B-95F3-742440276897",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:acrobat:8.1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "C8665E53-EC1E-4B95-9064-2565BC12113E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:acrobat:8.1.2:*:*:*:*:*:*:*",
"matchCriteriaId": "24218FDA-F9DA-465A-B5D5-76A55C7EE04E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:acrobat:8.1.3:*:*:*:*:*:*:*",
"matchCriteriaId": "E2C5F1C5-85CD-47B9-897F-E51D6902AF72",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:acrobat:8.1.4:*:*:*:*:*:*:*",
"matchCriteriaId": "E0E190FF-3EBC-44AB-8072-4D964E843E8A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:acrobat:8.1.6:*:*:*:*:*:*:*",
"matchCriteriaId": "B95C0A99-42E4-40A9-BF61-507E4E4DC052",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:acrobat:9:*:*:*:*:*:*:*",
"matchCriteriaId": "37AF9870-B9F0-42D2-B2D1-4A7E569A4C73",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:acrobat:9.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "5FF485FB-3317-4C89-B636-F22FF19B00BE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:acrobat:9.1:*:*:*:*:*:*:*",
"matchCriteriaId": "C7EC46E3-77B7-4455-B3E0-A45C6B69B3DC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:acrobat:9.1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "4F475858-DCE2-4C93-A51A-04718DF17593",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:acrobat:9.1.2:*:*:*:*:*:*:*",
"matchCriteriaId": "88687272-4CD0-42A2-B727-C322ABDE3549",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:adobe:acrobat_reader:*:*:*:*:*:*:*:*",
"matchCriteriaId": "840D37C8-F30C-4A91-9B34-39AF1E4E34C8",
"versionEndIncluding": "9.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:reader:3.0:*:*:*:*:*:*:*",
"matchCriteriaId": "DA4A65AB-75F1-4F6B-83E4-354E7D1EAE3C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:reader:4.0:*:*:*:*:*:*:*",
"matchCriteriaId": "5AD49BF0-E8BC-4716-8B13-DF39267D9303",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:reader:4.0.5:*:*:*:*:*:*:*",
"matchCriteriaId": "71FC1CDB-DF7C-45FF-973D-8C9310121B0C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:reader:4.0.5a:*:*:*:*:*:*:*",
"matchCriteriaId": "5C8951B8-0DF2-48C9-9EAC-9EDCCD389958",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:reader:4.0.5c:*:*:*:*:*:*:*",
"matchCriteriaId": "DCCCF8E6-2117-4665-AC71-8F05771CDB15",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:reader:4.5:*:*:*:*:*:*:*",
"matchCriteriaId": "99E14042-AF3B-4609-8CFE-6E02B3DF5CF2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:reader:5.0:*:*:*:*:*:*:*",
"matchCriteriaId": "822D6CAA-4CF7-41BE-B2AC-E7CBAB6229C9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:reader:5.0.5:*:*:*:*:*:*:*",
"matchCriteriaId": "73579E5C-BDB2-4F9C-BB87-E3752B9030B7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:reader:5.0.6:*:*:*:*:*:*:*",
"matchCriteriaId": "8A57B3C8-B127-4A52-AB08-A1B6F7830914",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:reader:5.0.7:*:*:*:*:*:*:*",
"matchCriteriaId": "F131F390-EA28-41C2-A054-42E6B070FA8E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:reader:5.0.9:*:*:*:*:*:*:*",
"matchCriteriaId": "E26DE5FE-729C-4C3A-80FB-0FAFC90A8BEB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:reader:5.0.10:*:*:*:*:*:*:*",
"matchCriteriaId": "C85609BE-4385-4728-AC7E-4231B45A3CE1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:reader:5.0.11:*:*:*:*:*:*:*",
"matchCriteriaId": "29BDD58D-3200-48C1-AB30-07808E029061",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:reader:5.1:*:*:*:*:*:*:*",
"matchCriteriaId": "FC93E153-9E21-4012-BFE0-0168488FFC17",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:reader:6.0:*:*:*:*:*:*:*",
"matchCriteriaId": "30D445D4-2B00-451B-8744-CCA9F1E1ADA7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:reader:6.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "53D60FEC-557F-456B-8F35-170078EC5C6F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:reader:6.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "51A7B617-FDB3-4F46-AF1F-F9210FB2793B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:reader:6.0.3:*:*:*:*:*:*:*",
"matchCriteriaId": "4B5D145B-FD5B-430E-8E90-929B00271C44",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:reader:6.0.4:*:*:*:*:*:*:*",
"matchCriteriaId": "40E8FD46-14E2-4D92-8A99-66EC41F38CF7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:reader:6.0.5:*:*:*:*:*:*:*",
"matchCriteriaId": "78BA5B02-F565-4A7F-B9FD-DD08ABF258CE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:reader:7.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "7E3F0A07-7021-4D04-A8F2-1BCAB474CD2A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:reader:7.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "B4C1C3A0-B0DF-42E4-A8AC-D93FCB6526D9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:reader:7.0.3:*:*:*:*:*:*:*",
"matchCriteriaId": "B3B5B11C-6E76-4A03-AC05-840EFE2F8504",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:reader:7.0.5:*:*:*:*:*:*:*",
"matchCriteriaId": "CFF8D072-305A-40B9-9E89-D98BDD951346",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:reader:7.0.7:*:*:*:*:*:*:*",
"matchCriteriaId": "DEF52FAE-B6EF-457D-A61A-95B5E31CEF7D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:reader:7.0.8:*:*:*:*:*:*:*",
"matchCriteriaId": "0A7236C5-85F8-47C5-8A24-D5282F94D77D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:reader:7.0.9:*:*:*:*:*:*:*",
"matchCriteriaId": "718F2E95-E221-4928-B50F-AB840BBA0E9F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:reader:7.1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "123D2B4E-0D05-453C-B598-E41D43FE0E96",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:reader:7.1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "0109ADA4-6BA0-4299-8043-7CD60DAD6DD7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:reader:7.1.3:*:*:*:*:*:*:*",
"matchCriteriaId": "1F00A8EC-10FC-42B6-BB3E-985C903B91DC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:reader:8.1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "98BCBFB5-72DF-4B8A-8F4C-E958B4FAFB37",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:reader:8.1.2:*:*:*:*:*:*:*",
"matchCriteriaId": "71EB6E18-5764-4916-9ECA-F4E880672217",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:reader:8.1.4:*:*:*:*:*:*:*",
"matchCriteriaId": "61151189-E24C-4AB6-BC60-B9AF720E3D4B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:reader:8.1.6:*:*:*:*:*:*:*",
"matchCriteriaId": "1B65F7E5-05A4-45FC-BDC2-670166535721",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:reader:9.0:*:*:*:*:*:*:*",
"matchCriteriaId": "026B1CF8-28A2-415D-A240-C9DF774BF9DD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:reader:9.1:*:*:*:*:*:*:*",
"matchCriteriaId": "FBE16943-CCD8-4A39-832F-F6ED3CF2936B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:reader:9.1.2:*:*:*:*:*:*:*",
"matchCriteriaId": "42A1A800-D0CC-4593-A31A-EE308E63B454",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Heap-based buffer overflow in Adobe Reader and Acrobat 7.x before 7.1.4, 8.x before 8.1.7, and 9.x before 9.2 allows remote attackers to execute arbitrary code via a crafted PDF file that triggers memory corruption, as exploited in the wild in October 2009. NOTE: some of these details are obtained from third party information."
},
{
"lang": "es",
"value": "Un Desbordamiento de b\u00fafer en la regi\u00f3n heap de la memoria en Adobe Reader y Acrobat versi\u00f3n 7.x anterior a versi\u00f3n 7.1.4, versi\u00f3n 8.x anterior a 8.1.7, y versi\u00f3n 9.x anterior a 9.2, permite a los atacantes remotos ejecutar c\u00f3digo arbitrario por medio de un archivo PDF creado que desencadena la corrupci\u00f3n de memoria, tal y como fue explotado \"in the wild\" en octubre de 2009. NOTA: algunos de estos detalles se obtienen de informaci\u00f3n de terceros."
}
],
"id": "CVE-2009-3459",
"lastModified": "2025-04-09T00:30:58.490",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 9.3,
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 10.0,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": true
}
]
},
"published": "2009-10-13T10:30:00.577",
"references": [
{
"source": "psirt@adobe.com",
"tags": [
"Vendor Advisory"
],
"url": "http://blogs.adobe.com/psirt/2009/10/adobe_reader_and_acrobat_issue_1.html"
},
{
"source": "psirt@adobe.com",
"url": "http://isc.sans.org/diary.html?storyid=7300"
},
{
"source": "psirt@adobe.com",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/36983"
},
{
"source": "psirt@adobe.com",
"url": "http://securitytracker.com/id?1023007"
},
{
"source": "psirt@adobe.com",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "http://www.adobe.com/support/security/bulletins/apsb09-15.html"
},
{
"source": "psirt@adobe.com",
"url": "http://www.iss.net/threats/348.html"
},
{
"source": "psirt@adobe.com",
"url": "http://www.securityfocus.com/bid/36600"
},
{
"source": "psirt@adobe.com",
"tags": [
"US Government Resource"
],
"url": "http://www.us-cert.gov/cas/techalerts/TA09-286B.html"
},
{
"source": "psirt@adobe.com",
"tags": [
"Vendor Advisory"
],
"url": "http://www.vupen.com/english/advisories/2009/2851"
},
{
"source": "psirt@adobe.com",
"tags": [
"Vendor Advisory"
],
"url": "http://www.vupen.com/english/advisories/2009/2898"
},
{
"source": "psirt@adobe.com",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/53691"
},
{
"source": "psirt@adobe.com",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6534"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://blogs.adobe.com/psirt/2009/10/adobe_reader_and_acrobat_issue_1.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://isc.sans.org/diary.html?storyid=7300"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/36983"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://securitytracker.com/id?1023007"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "http://www.adobe.com/support/security/bulletins/apsb09-15.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.iss.net/threats/348.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securityfocus.com/bid/36600"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"US Government Resource"
],
"url": "http://www.us-cert.gov/cas/techalerts/TA09-286B.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://www.vupen.com/english/advisories/2009/2851"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://www.vupen.com/english/advisories/2009/2898"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/53691"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6534"
}
],
"sourceIdentifier": "psirt@adobe.com",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-119"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…
Loading…