var-201208-0212
Vulnerability from variot

Multiple unspecified vulnerabilities in Adobe Reader through 10.1.4 allow remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted PDF document, related to "sixteen more crashes affecting Windows, OS X, or both systems.". Adobe Acrobat and Reader are prone to multiple unspecified remote code-execution vulnerabilities. Successful attacks will result in arbitrary code execution in the context of the user running the affected application; failed attacks may cause denial-of-service conditions. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Gentoo Linux Security Advisory GLSA 201308-03


                                        http://security.gentoo.org/

Severity: High Title: Adobe Reader: Multiple vulnerabilities Date: August 22, 2013 Bugs: #431732, #451058, #469960 ID: 201308-03


Synopsis

Multiple vulnerabilities have been found in Adobe Reader, including potential remote execution of arbitrary code and local privilege escalation.

Background

Adobe Reader is a closed-source PDF reader. Please review the CVE identifiers referenced below for details. A local attacker could gain privileges via unspecified vectors.

Workaround

There is no known workaround at this time.

Resolution

All Adobe Reader users should upgrade to the latest version:

# emerge --sync # emerge --ask --oneshot --verbose ">=app-text/acroread-9.5.5"

References

[ 1 ] CVE-2012-1525 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1525 [ 2 ] CVE-2012-1530 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1530 [ 3 ] CVE-2012-2049 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2049 [ 4 ] CVE-2012-2050 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2050 [ 5 ] CVE-2012-2051 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2051 [ 6 ] CVE-2012-4147 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4147 [ 7 ] CVE-2012-4148 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4748 [ 8 ] CVE-2012-4149 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4149 [ 9 ] CVE-2012-4150 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4150 [ 10 ] CVE-2012-4151 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4151 [ 11 ] CVE-2012-4152 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4152 [ 12 ] CVE-2012-4153 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4153 [ 13 ] CVE-2012-4154 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4154 [ 14 ] CVE-2012-4155 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4155 [ 15 ] CVE-2012-4156 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4156 [ 16 ] CVE-2012-4157 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4157 [ 17 ] CVE-2012-4158 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4158 [ 18 ] CVE-2012-4159 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4159 [ 19 ] CVE-2012-4160 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4160 [ 20 ] CVE-2012-4363 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4363 [ 21 ] CVE-2013-0601 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0601 [ 22 ] CVE-2013-0602 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0602 [ 23 ] CVE-2013-0603 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0603 [ 24 ] CVE-2013-0604 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0604 [ 25 ] CVE-2013-0605 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0605 [ 26 ] CVE-2013-0606 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0606 [ 27 ] CVE-2013-0607 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0607 [ 28 ] CVE-2013-0608 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0608 [ 29 ] CVE-2013-0609 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0609 [ 30 ] CVE-2013-0610 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0610 [ 31 ] CVE-2013-0611 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0611 [ 32 ] CVE-2013-0612 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0612 [ 33 ] CVE-2013-0613 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0613 [ 34 ] CVE-2013-0614 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0614 [ 35 ] CVE-2013-0615 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0615 [ 36 ] CVE-2013-0616 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0616 [ 37 ] CVE-2013-0617 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0617 [ 38 ] CVE-2013-0618 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0618 [ 39 ] CVE-2013-0619 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0619 [ 40 ] CVE-2013-0620 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0620 [ 41 ] CVE-2013-0621 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0621 [ 42 ] CVE-2013-0622 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0622 [ 43 ] CVE-2013-0623 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0623 [ 44 ] CVE-2013-0624 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0624 [ 45 ] CVE-2013-0626 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0626 [ 46 ] CVE-2013-0627 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0627 [ 47 ] CVE-2013-0640 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0640 [ 48 ] CVE-2013-0641 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0641 [ 49 ] CVE-2013-2549 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2549 [ 50 ] CVE-2013-2550 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2550 [ 51 ] CVE-2013-2718 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2718 [ 52 ] CVE-2013-2719 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2719 [ 53 ] CVE-2013-2720 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2720 [ 54 ] CVE-2013-2721 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2721 [ 55 ] CVE-2013-2722 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2722 [ 56 ] CVE-2013-2723 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2723 [ 57 ] CVE-2013-2724 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2724 [ 58 ] CVE-2013-2725 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2725 [ 59 ] CVE-2013-2726 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2726 [ 60 ] CVE-2013-2727 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2727 [ 61 ] CVE-2013-2729 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2729 [ 62 ] CVE-2013-2730 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2730 [ 63 ] CVE-2013-2731 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2731 [ 64 ] CVE-2013-2732 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2732 [ 65 ] CVE-2013-2733 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2733 [ 66 ] CVE-2013-2734 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2734 [ 67 ] CVE-2013-2735 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2735 [ 68 ] CVE-2013-2736 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2736 [ 69 ] CVE-2013-2737 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2737 [ 70 ] CVE-2013-3337 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-3337 [ 71 ] CVE-2013-3338 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-3338 [ 72 ] CVE-2013-3339 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-3339 [ 73 ] CVE-2013-3340 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-3340 [ 74 ] CVE-2013-3341 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-3341 [ 75 ] CVE-2013-3342 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-3342

Availability

This GLSA and any updates to it are available for viewing at the Gentoo Security Website:

http://security.gentoo.org/glsa/glsa-201308-03.xml

Concerns?

Security is a primary focus of Gentoo Linux and ensuring the confidentiality and security of our users' machines is of utmost importance to us. Any security concerns should be addressed to security@gentoo.org or alternatively, you may file a bug at https://bugs.gentoo.org.

License

Copyright 2013 Gentoo Foundation, Inc; referenced text belongs to its owner(s).

The contents of this document are licensed under the Creative Commons - Attribution / Share Alike license.

http://creativecommons.org/licenses/by-sa/2.5

Show details on source website


{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-201208-0212",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "acrobat reader",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "adobe",
        "version": "10.1.2"
      },
      {
        "model": "acrobat reader",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "adobe",
        "version": "8.2.6"
      },
      {
        "model": "acrobat reader",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "adobe",
        "version": "4.0.5a"
      },
      {
        "model": "acrobat reader",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "adobe",
        "version": "4.0.5c"
      },
      {
        "model": "acrobat reader",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "adobe",
        "version": "10.1"
      },
      {
        "model": "acrobat reader",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "adobe",
        "version": "3.0"
      },
      {
        "model": "acrobat reader",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "adobe",
        "version": "10.1.1"
      },
      {
        "model": "acrobat reader",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "adobe",
        "version": "3.02"
      },
      {
        "model": "acrobat reader",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "adobe",
        "version": "8.1.4"
      },
      {
        "model": "acrobat reader",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "adobe",
        "version": "3.01"
      },
      {
        "model": "acrobat reader",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "adobe",
        "version": "4.0.5"
      },
      {
        "model": "acrobat reader",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "adobe",
        "version": "10.1.3"
      },
      {
        "model": "acrobat reader",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "adobe",
        "version": "7.0.3"
      },
      {
        "model": "acrobat reader",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "adobe",
        "version": "9.1.2"
      },
      {
        "model": "acrobat reader",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "adobe",
        "version": "9.3.1"
      },
      {
        "model": "acrobat reader",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "adobe",
        "version": "6.0"
      },
      {
        "model": "acrobat reader",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "adobe",
        "version": "8.1"
      },
      {
        "model": "acrobat reader",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "adobe",
        "version": "9.0"
      },
      {
        "model": "acrobat reader",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "adobe",
        "version": "8.1.7"
      },
      {
        "model": "acrobat reader",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "adobe",
        "version": "5.0"
      },
      {
        "model": "acrobat reader",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "adobe",
        "version": "9.4.7"
      },
      {
        "model": "acrobat reader",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "adobe",
        "version": "8.0"
      },
      {
        "model": "acrobat reader",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "adobe",
        "version": "8.1.3"
      },
      {
        "model": "acrobat reader",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "adobe",
        "version": "9.2"
      },
      {
        "model": "acrobat reader",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "adobe",
        "version": "9.3.2"
      },
      {
        "model": "acrobat reader",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "adobe",
        "version": "9.3.3"
      },
      {
        "model": "acrobat reader",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "adobe",
        "version": "9.4.2"
      },
      {
        "model": "acrobat reader",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "adobe",
        "version": "9.4.3"
      },
      {
        "model": "acrobat reader",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "adobe",
        "version": "8.2.1"
      },
      {
        "model": "acrobat reader",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "adobe",
        "version": "7.0.5"
      },
      {
        "model": "acrobat reader",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "adobe",
        "version": "4.0"
      },
      {
        "model": "acrobat reader",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "adobe",
        "version": "9.4.4"
      },
      {
        "model": "acrobat reader",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "adobe",
        "version": "8.3"
      },
      {
        "model": "acrobat reader",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "adobe",
        "version": "7.0.8"
      },
      {
        "model": "acrobat reader",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "adobe",
        "version": "5.0.5"
      },
      {
        "model": "acrobat reader",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "adobe",
        "version": "9.1"
      },
      {
        "model": "acrobat reader",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "adobe",
        "version": "9.4"
      },
      {
        "model": "acrobat reader",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "adobe",
        "version": "9.5.2"
      },
      {
        "model": "acrobat reader",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "adobe",
        "version": "7.0"
      },
      {
        "model": "acrobat reader",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "adobe",
        "version": "5.0.6"
      },
      {
        "model": "acrobat reader",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "adobe",
        "version": "6.0.3"
      },
      {
        "model": "acrobat reader",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "adobe",
        "version": "7.0.4"
      },
      {
        "model": "acrobat reader",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "adobe",
        "version": "5.0.10"
      },
      {
        "model": "acrobat reader",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "adobe",
        "version": "8.1.2"
      },
      {
        "model": "acrobat reader",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "adobe",
        "version": "8.2.2"
      },
      {
        "model": "acrobat reader",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "adobe",
        "version": "9.5.1"
      },
      {
        "model": "acrobat reader",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "adobe",
        "version": "9.4.6"
      },
      {
        "model": "acrobat reader",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "adobe",
        "version": "7.0.6"
      },
      {
        "model": "acrobat reader",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "adobe",
        "version": "8.2.3"
      },
      {
        "model": "acrobat reader",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "adobe",
        "version": "8.2"
      },
      {
        "model": "acrobat reader",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "adobe",
        "version": "9.3"
      },
      {
        "model": "acrobat reader",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "adobe",
        "version": "10.1.4"
      },
      {
        "model": "acrobat reader",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "adobe",
        "version": "9.5"
      },
      {
        "model": "acrobat reader",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "adobe",
        "version": "6.0.2"
      },
      {
        "model": "acrobat reader",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "adobe",
        "version": "6.0.4"
      },
      {
        "model": "acrobat reader",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "adobe",
        "version": "8.1.5"
      },
      {
        "model": "acrobat reader",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "adobe",
        "version": "6.0.1"
      },
      {
        "model": "acrobat reader",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "adobe",
        "version": "7.0.7"
      },
      {
        "model": "acrobat reader",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "adobe",
        "version": "7.0.1"
      },
      {
        "model": "acrobat reader",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "adobe",
        "version": "7.1.0"
      },
      {
        "model": "acrobat reader",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "adobe",
        "version": "4.5"
      },
      {
        "model": "acrobat reader",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "adobe",
        "version": "7.0.9"
      },
      {
        "model": "acrobat reader",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "adobe",
        "version": "8.2.4"
      },
      {
        "model": "acrobat reader",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "adobe",
        "version": "8.1.6"
      },
      {
        "model": "acrobat reader",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "adobe",
        "version": "7.0.2"
      },
      {
        "model": "acrobat reader",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "adobe",
        "version": "9.1.1"
      },
      {
        "model": "acrobat reader",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "adobe",
        "version": "9.1.3"
      },
      {
        "model": "acrobat reader",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "adobe",
        "version": "5.0.11"
      },
      {
        "model": "acrobat reader",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "adobe",
        "version": "5.1"
      },
      {
        "model": "acrobat reader",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "adobe",
        "version": "5.0.9"
      },
      {
        "model": "acrobat reader",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "adobe",
        "version": "6.0.5"
      },
      {
        "model": "acrobat reader",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "adobe",
        "version": "8.1.1"
      },
      {
        "model": "acrobat reader",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "adobe",
        "version": "9.4.1"
      },
      {
        "model": "acrobat reader",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "adobe",
        "version": "9.4.5"
      },
      {
        "model": "acrobat reader",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "adobe",
        "version": "9.3.4"
      },
      {
        "model": "acrobat reader",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "adobe",
        "version": "5.0.7"
      },
      {
        "model": "reader",
        "scope": "lte",
        "trust": 0.8,
        "vendor": "adobe",
        "version": "10.1.4"
      },
      {
        "model": "linux",
        "scope": null,
        "trust": 0.3,
        "vendor": "gentoo",
        "version": null
      },
      {
        "model": "reader",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "adobe",
        "version": "10.1.3"
      },
      {
        "model": "reader",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "adobe",
        "version": "10.1.2"
      },
      {
        "model": "reader",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "adobe",
        "version": "10.1.1"
      },
      {
        "model": "reader",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "adobe",
        "version": "9.4.7"
      },
      {
        "model": "reader",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "adobe",
        "version": "9.4.6"
      },
      {
        "model": "reader",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "adobe",
        "version": "9.5.1"
      },
      {
        "model": "reader",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "adobe",
        "version": "9.5"
      },
      {
        "model": "reader",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "adobe",
        "version": "9.4.5"
      },
      {
        "model": "reader",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "adobe",
        "version": "9.4.4"
      },
      {
        "model": "reader",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "adobe",
        "version": "9.4.3"
      },
      {
        "model": "reader",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "adobe",
        "version": "9.4.2"
      },
      {
        "model": "reader",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "adobe",
        "version": "9.4.1"
      },
      {
        "model": "reader",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "adobe",
        "version": "9.4"
      },
      {
        "model": "reader",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "adobe",
        "version": "10.1"
      },
      {
        "model": "acrobat",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "adobe",
        "version": "10.1.3"
      },
      {
        "model": "acrobat",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "adobe",
        "version": "10.1.2"
      },
      {
        "model": "acrobat",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "adobe",
        "version": "10.1.1"
      },
      {
        "model": "acrobat",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "adobe",
        "version": "9.5.1"
      },
      {
        "model": "acrobat",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "adobe",
        "version": "9.5"
      },
      {
        "model": "acrobat",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "adobe",
        "version": "10.1"
      },
      {
        "model": "acrobat",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "adobe",
        "version": "10.0.3"
      },
      {
        "model": "acrobat",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "adobe",
        "version": "10.0.2"
      },
      {
        "model": "acrobat",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "adobe",
        "version": "10.0.1"
      },
      {
        "model": "acrobat",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "adobe",
        "version": "10.0"
      }
    ],
    "sources": [
      {
        "db": "BID",
        "id": "55055"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2012-003790"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201208-362"
      },
      {
        "db": "NVD",
        "id": "CVE-2012-4363"
      }
    ]
  },
  "configurations": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/configurations#",
      "children": {
        "@container": "@list"
      },
      "cpe_match": {
        "@container": "@list"
      },
      "data": {
        "@container": "@list"
      },
      "nodes": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "cpe_match": [
              {
                "cpe22Uri": "cpe:/a:adobe:acrobat_reader",
                "vulnerable": true
              }
            ],
            "operator": "OR"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2012-003790"
      }
    ]
  },
  "credits": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/credits#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Mateusz ???j00ru??? Jurczyk and Gynvael Coldwind",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201208-305"
      }
    ],
    "trust": 0.6
  },
  "cve": "CVE-2012-4363",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "nvd@nist.gov",
            "availabilityImpact": "COMPLETE",
            "baseScore": 9.3,
            "confidentialityImpact": "COMPLETE",
            "exploitabilityScore": 8.6,
            "id": "CVE-2012-4363",
            "impactScore": 10.0,
            "integrityImpact": "COMPLETE",
            "severity": "HIGH",
            "trust": 1.9,
            "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
            "version": "2.0"
          },
          {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "VULHUB",
            "availabilityImpact": "COMPLETE",
            "baseScore": 9.3,
            "confidentialityImpact": "COMPLETE",
            "exploitabilityScore": 8.6,
            "id": "VHN-57644",
            "impactScore": 10.0,
            "integrityImpact": "COMPLETE",
            "severity": "HIGH",
            "trust": 0.1,
            "vectorString": "AV:N/AC:M/AU:N/C:C/I:C/A:C",
            "version": "2.0"
          }
        ],
        "cvssV3": [],
        "severity": [
          {
            "author": "nvd@nist.gov",
            "id": "CVE-2012-4363",
            "trust": 1.0,
            "value": "HIGH"
          },
          {
            "author": "NVD",
            "id": "CVE-2012-4363",
            "trust": 0.8,
            "value": "High"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-201208-362",
            "trust": 0.6,
            "value": "CRITICAL"
          },
          {
            "author": "VULHUB",
            "id": "VHN-57644",
            "trust": 0.1,
            "value": "HIGH"
          },
          {
            "author": "VULMON",
            "id": "CVE-2012-4363",
            "trust": 0.1,
            "value": "HIGH"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-57644"
      },
      {
        "db": "VULMON",
        "id": "CVE-2012-4363"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2012-003790"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201208-362"
      },
      {
        "db": "NVD",
        "id": "CVE-2012-4363"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Multiple unspecified vulnerabilities in Adobe Reader through 10.1.4 allow remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted PDF document, related to \"sixteen more crashes affecting Windows, OS X, or both systems.\". Adobe Acrobat and Reader are prone to multiple unspecified remote code-execution vulnerabilities. \nSuccessful attacks will result in arbitrary code execution in the context of the user running the affected application; failed attacks may cause denial-of-service conditions. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\nGentoo Linux Security Advisory                           GLSA 201308-03\n- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\n                                            http://security.gentoo.org/\n- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\n\n Severity: High\n    Title: Adobe Reader: Multiple vulnerabilities\n     Date: August 22, 2013\n     Bugs: #431732, #451058, #469960\n       ID: 201308-03\n\n- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\n\nSynopsis\n========\n\nMultiple vulnerabilities have been found in Adobe Reader, including\npotential remote execution of arbitrary code and local privilege\nescalation. \n\nBackground\n==========\n\nAdobe Reader is a closed-source PDF reader. Please\nreview the CVE identifiers referenced below for details. A local attacker could gain privileges via\nunspecified vectors. \n\nWorkaround\n==========\n\nThere is no known workaround at this time. \n\nResolution\n==========\n\nAll Adobe Reader users should upgrade to the latest version:\n\n  # emerge --sync\n  # emerge --ask --oneshot --verbose \"\u003e=app-text/acroread-9.5.5\"\n\nReferences\n==========\n\n[  1 ] CVE-2012-1525\n       http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1525\n[  2 ] CVE-2012-1530\n       http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1530\n[  3 ] CVE-2012-2049\n       http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2049\n[  4 ] CVE-2012-2050\n       http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2050\n[  5 ] CVE-2012-2051\n       http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2051\n[  6 ] CVE-2012-4147\n       http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4147\n[  7 ] CVE-2012-4148\n       http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4748\n[  8 ] CVE-2012-4149\n       http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4149\n[  9 ] CVE-2012-4150\n       http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4150\n[ 10 ] CVE-2012-4151\n       http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4151\n[ 11 ] CVE-2012-4152\n       http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4152\n[ 12 ] CVE-2012-4153\n       http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4153\n[ 13 ] CVE-2012-4154\n       http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4154\n[ 14 ] CVE-2012-4155\n       http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4155\n[ 15 ] CVE-2012-4156\n       http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4156\n[ 16 ] CVE-2012-4157\n       http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4157\n[ 17 ] CVE-2012-4158\n       http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4158\n[ 18 ] CVE-2012-4159\n       http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4159\n[ 19 ] CVE-2012-4160\n       http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4160\n[ 20 ] CVE-2012-4363\n       http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4363\n[ 21 ] CVE-2013-0601\n       http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0601\n[ 22 ] CVE-2013-0602\n       http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0602\n[ 23 ] CVE-2013-0603\n       http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0603\n[ 24 ] CVE-2013-0604\n       http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0604\n[ 25 ] CVE-2013-0605\n       http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0605\n[ 26 ] CVE-2013-0606\n       http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0606\n[ 27 ] CVE-2013-0607\n       http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0607\n[ 28 ] CVE-2013-0608\n       http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0608\n[ 29 ] CVE-2013-0609\n       http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0609\n[ 30 ] CVE-2013-0610\n       http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0610\n[ 31 ] CVE-2013-0611\n       http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0611\n[ 32 ] CVE-2013-0612\n       http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0612\n[ 33 ] CVE-2013-0613\n       http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0613\n[ 34 ] CVE-2013-0614\n       http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0614\n[ 35 ] CVE-2013-0615\n       http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0615\n[ 36 ] CVE-2013-0616\n       http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0616\n[ 37 ] CVE-2013-0617\n       http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0617\n[ 38 ] CVE-2013-0618\n       http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0618\n[ 39 ] CVE-2013-0619\n       http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0619\n[ 40 ] CVE-2013-0620\n       http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0620\n[ 41 ] CVE-2013-0621\n       http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0621\n[ 42 ] CVE-2013-0622\n       http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0622\n[ 43 ] CVE-2013-0623\n       http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0623\n[ 44 ] CVE-2013-0624\n       http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0624\n[ 45 ] CVE-2013-0626\n       http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0626\n[ 46 ] CVE-2013-0627\n       http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0627\n[ 47 ] CVE-2013-0640\n       http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0640\n[ 48 ] CVE-2013-0641\n       http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0641\n[ 49 ] CVE-2013-2549\n       http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2549\n[ 50 ] CVE-2013-2550\n       http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2550\n[ 51 ] CVE-2013-2718\n       http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2718\n[ 52 ] CVE-2013-2719\n       http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2719\n[ 53 ] CVE-2013-2720\n       http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2720\n[ 54 ] CVE-2013-2721\n       http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2721\n[ 55 ] CVE-2013-2722\n       http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2722\n[ 56 ] CVE-2013-2723\n       http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2723\n[ 57 ] CVE-2013-2724\n       http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2724\n[ 58 ] CVE-2013-2725\n       http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2725\n[ 59 ] CVE-2013-2726\n       http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2726\n[ 60 ] CVE-2013-2727\n       http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2727\n[ 61 ] CVE-2013-2729\n       http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2729\n[ 62 ] CVE-2013-2730\n       http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2730\n[ 63 ] CVE-2013-2731\n       http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2731\n[ 64 ] CVE-2013-2732\n       http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2732\n[ 65 ] CVE-2013-2733\n       http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2733\n[ 66 ] CVE-2013-2734\n       http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2734\n[ 67 ] CVE-2013-2735\n       http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2735\n[ 68 ] CVE-2013-2736\n       http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2736\n[ 69 ] CVE-2013-2737\n       http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2737\n[ 70 ] CVE-2013-3337\n       http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-3337\n[ 71 ] CVE-2013-3338\n       http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-3338\n[ 72 ] CVE-2013-3339\n       http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-3339\n[ 73 ] CVE-2013-3340\n       http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-3340\n[ 74 ] CVE-2013-3341\n       http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-3341\n[ 75 ] CVE-2013-3342\n       http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-3342\n\nAvailability\n============\n\nThis GLSA and any updates to it are available for viewing at\nthe Gentoo Security Website:\n\n http://security.gentoo.org/glsa/glsa-201308-03.xml\n\nConcerns?\n=========\n\nSecurity is a primary focus of Gentoo Linux and ensuring the\nconfidentiality and security of our users\u0027 machines is of utmost\nimportance to us. Any security concerns should be addressed to\nsecurity@gentoo.org or alternatively, you may file a bug at\nhttps://bugs.gentoo.org. \n\nLicense\n=======\n\nCopyright 2013 Gentoo Foundation, Inc; referenced text\nbelongs to its owner(s). \n\nThe contents of this document are licensed under the\nCreative Commons - Attribution / Share Alike license. \n\nhttp://creativecommons.org/licenses/by-sa/2.5\n",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2012-4363"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2012-003790"
      },
      {
        "db": "BID",
        "id": "55055"
      },
      {
        "db": "VULHUB",
        "id": "VHN-57644"
      },
      {
        "db": "VULMON",
        "id": "CVE-2012-4363"
      },
      {
        "db": "PACKETSTORM",
        "id": "122930"
      }
    ],
    "trust": 2.16
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "NVD",
        "id": "CVE-2012-4363",
        "trust": 3.0
      },
      {
        "db": "BID",
        "id": "55055",
        "trust": 1.0
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2012-003790",
        "trust": 0.8
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201208-362",
        "trust": 0.7
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201208-305",
        "trust": 0.6
      },
      {
        "db": "VULHUB",
        "id": "VHN-57644",
        "trust": 0.1
      },
      {
        "db": "VULMON",
        "id": "CVE-2012-4363",
        "trust": 0.1
      },
      {
        "db": "PACKETSTORM",
        "id": "122930",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-57644"
      },
      {
        "db": "VULMON",
        "id": "CVE-2012-4363"
      },
      {
        "db": "BID",
        "id": "55055"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2012-003790"
      },
      {
        "db": "PACKETSTORM",
        "id": "122930"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201208-305"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201208-362"
      },
      {
        "db": "NVD",
        "id": "CVE-2012-4363"
      }
    ]
  },
  "id": "VAR-201208-0212",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-57644"
      }
    ],
    "trust": 0.01
  },
  "last_update_date": "2024-08-14T12:18:06.471000Z",
  "patch": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/patch#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "title": "Top Page",
        "trust": 0.8,
        "url": "http://www.adobe.com/"
      },
      {
        "title": "GLSA 201308-03",
        "trust": 0.8,
        "url": "http://www.gentoo.org/security/en/glsa/glsa-201308-03.xml"
      },
      {
        "title": "Multiple Cryptographic Issues vulnerabilities in Ruby",
        "trust": 0.8,
        "url": "https://blogs.oracle.com/sunsecurity/entry/multiple_cryptographic_issues_vulnerabilities_in"
      },
      {
        "title": "",
        "trust": 0.1,
        "url": "https://github.com/0xCyberY/CVE-T4PDF "
      }
    ],
    "sources": [
      {
        "db": "VULMON",
        "id": "CVE-2012-4363"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2012-003790"
      }
    ]
  },
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "NVD-CWE-noinfo",
        "trust": 1.0
      }
    ],
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2012-4363"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 2.6,
        "url": "http://gynvael.coldwind.pl/?id=483"
      },
      {
        "trust": 2.6,
        "url": "http://j00ru.vexillium.org/?p=1175"
      },
      {
        "trust": 1.8,
        "url": "http://vexillium.org/dl.php?ar_callstack.txt"
      },
      {
        "trust": 1.3,
        "url": "http://security.gentoo.org/glsa/glsa-201308-03.xml"
      },
      {
        "trust": 1.2,
        "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/78587"
      },
      {
        "trust": 0.8,
        "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2012-4363"
      },
      {
        "trust": 0.8,
        "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2012-4363"
      },
      {
        "trust": 0.6,
        "url": "http://www.securityfocus.com/bid/55055"
      },
      {
        "trust": 0.3,
        "url": "http://www.adobe.com"
      },
      {
        "trust": 0.1,
        "url": "https://cwe.mitre.org/data/definitions/.html"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov"
      },
      {
        "trust": 0.1,
        "url": "https://github.com/0xcybery/cve-t4pdf"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2012-4363"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2012-4160"
      },
      {
        "trust": 0.1,
        "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-3338"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2012-4147"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2012-4155"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2012-4149"
      },
      {
        "trust": 0.1,
        "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-0626"
      },
      {
        "trust": 0.1,
        "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-4152"
      },
      {
        "trust": 0.1,
        "url": "http://creativecommons.org/licenses/by-sa/2.5"
      },
      {
        "trust": 0.1,
        "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-2729"
      },
      {
        "trust": 0.1,
        "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-4160"
      },
      {
        "trust": 0.1,
        "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-2718"
      },
      {
        "trust": 0.1,
        "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-0605"
      },
      {
        "trust": 0.1,
        "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-0611"
      },
      {
        "trust": 0.1,
        "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-4159"
      },
      {
        "trust": 0.1,
        "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-2719"
      },
      {
        "trust": 0.1,
        "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-2722"
      },
      {
        "trust": 0.1,
        "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-4147"
      },
      {
        "trust": 0.1,
        "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-0624"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2012-4152"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2012-2051"
      },
      {
        "trust": 0.1,
        "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-0620"
      },
      {
        "trust": 0.1,
        "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-2725"
      },
      {
        "trust": 0.1,
        "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-0602"
      },
      {
        "trust": 0.1,
        "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-2721"
      },
      {
        "trust": 0.1,
        "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-0603"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2012-1525"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2012-4153"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2013-0607"
      },
      {
        "trust": 0.1,
        "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-0617"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2012-4151"
      },
      {
        "trust": 0.1,
        "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-0615"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2013-0605"
      },
      {
        "trust": 0.1,
        "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-0601"
      },
      {
        "trust": 0.1,
        "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-1525"
      },
      {
        "trust": 0.1,
        "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-3340"
      },
      {
        "trust": 0.1,
        "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-2735"
      },
      {
        "trust": 0.1,
        "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-0607"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2013-0606"
      },
      {
        "trust": 0.1,
        "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-0618"
      },
      {
        "trust": 0.1,
        "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-2726"
      },
      {
        "trust": 0.1,
        "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-2737"
      },
      {
        "trust": 0.1,
        "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-4156"
      },
      {
        "trust": 0.1,
        "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-2549"
      },
      {
        "trust": 0.1,
        "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-4158"
      },
      {
        "trust": 0.1,
        "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-4154"
      },
      {
        "trust": 0.1,
        "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-4363"
      },
      {
        "trust": 0.1,
        "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-2727"
      },
      {
        "trust": 0.1,
        "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-0608"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2013-0602"
      },
      {
        "trust": 0.1,
        "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-4157"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2012-1530"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2012-4159"
      },
      {
        "trust": 0.1,
        "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-0622"
      },
      {
        "trust": 0.1,
        "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-2734"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2012-4157"
      },
      {
        "trust": 0.1,
        "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-4153"
      },
      {
        "trust": 0.1,
        "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-4150"
      },
      {
        "trust": 0.1,
        "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-3339"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2012-4156"
      },
      {
        "trust": 0.1,
        "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-3342"
      },
      {
        "trust": 0.1,
        "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-0641"
      },
      {
        "trust": 0.1,
        "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-2051"
      },
      {
        "trust": 0.1,
        "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-0610"
      },
      {
        "trust": 0.1,
        "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-2731"
      },
      {
        "trust": 0.1,
        "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-0623"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2012-2049"
      },
      {
        "trust": 0.1,
        "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-4149"
      },
      {
        "trust": 0.1,
        "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-2733"
      },
      {
        "trust": 0.1,
        "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-2736"
      },
      {
        "trust": 0.1,
        "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-4748"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2012-4748"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2012-4158"
      },
      {
        "trust": 0.1,
        "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-3337"
      },
      {
        "trust": 0.1,
        "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-2050"
      },
      {
        "trust": 0.1,
        "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-2720"
      },
      {
        "trust": 0.1,
        "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-0606"
      },
      {
        "trust": 0.1,
        "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-0614"
      },
      {
        "trust": 0.1,
        "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-1530"
      },
      {
        "trust": 0.1,
        "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-2730"
      },
      {
        "trust": 0.1,
        "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-0616"
      },
      {
        "trust": 0.1,
        "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-4151"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2013-0608"
      },
      {
        "trust": 0.1,
        "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-0619"
      },
      {
        "trust": 0.1,
        "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-0627"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2012-4150"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2012-4154"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2013-0603"
      },
      {
        "trust": 0.1,
        "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-0609"
      },
      {
        "trust": 0.1,
        "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-3341"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2013-0604"
      },
      {
        "trust": 0.1,
        "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-2550"
      },
      {
        "trust": 0.1,
        "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-0604"
      },
      {
        "trust": 0.1,
        "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-0640"
      },
      {
        "trust": 0.1,
        "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-4155"
      },
      {
        "trust": 0.1,
        "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-2049"
      },
      {
        "trust": 0.1,
        "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-2732"
      },
      {
        "trust": 0.1,
        "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-2724"
      },
      {
        "trust": 0.1,
        "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-0612"
      },
      {
        "trust": 0.1,
        "url": "http://security.gentoo.org/"
      },
      {
        "trust": 0.1,
        "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-0613"
      },
      {
        "trust": 0.1,
        "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-2723"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2012-2050"
      },
      {
        "trust": 0.1,
        "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-0621"
      },
      {
        "trust": 0.1,
        "url": "https://bugs.gentoo.org."
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2013-0601"
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-57644"
      },
      {
        "db": "VULMON",
        "id": "CVE-2012-4363"
      },
      {
        "db": "BID",
        "id": "55055"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2012-003790"
      },
      {
        "db": "PACKETSTORM",
        "id": "122930"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201208-305"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201208-362"
      },
      {
        "db": "NVD",
        "id": "CVE-2012-4363"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "VULHUB",
        "id": "VHN-57644"
      },
      {
        "db": "VULMON",
        "id": "CVE-2012-4363"
      },
      {
        "db": "BID",
        "id": "55055"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2012-003790"
      },
      {
        "db": "PACKETSTORM",
        "id": "122930"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201208-305"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201208-362"
      },
      {
        "db": "NVD",
        "id": "CVE-2012-4363"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2012-08-21T00:00:00",
        "db": "VULHUB",
        "id": "VHN-57644"
      },
      {
        "date": "2012-08-21T00:00:00",
        "db": "VULMON",
        "id": "CVE-2012-4363"
      },
      {
        "date": "2012-08-16T00:00:00",
        "db": "BID",
        "id": "55055"
      },
      {
        "date": "2012-08-22T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2012-003790"
      },
      {
        "date": "2013-08-23T06:29:02",
        "db": "PACKETSTORM",
        "id": "122930"
      },
      {
        "date": "2012-08-20T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201208-305"
      },
      {
        "date": "2012-08-22T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201208-362"
      },
      {
        "date": "2012-08-21T10:46:10.843000",
        "db": "NVD",
        "id": "CVE-2012-4363"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2017-08-29T00:00:00",
        "db": "VULHUB",
        "id": "VHN-57644"
      },
      {
        "date": "2017-08-29T00:00:00",
        "db": "VULMON",
        "id": "CVE-2012-4363"
      },
      {
        "date": "2013-08-26T08:09:00",
        "db": "BID",
        "id": "55055"
      },
      {
        "date": "2014-01-17T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2012-003790"
      },
      {
        "date": "2012-08-20T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201208-305"
      },
      {
        "date": "2012-09-07T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201208-362"
      },
      {
        "date": "2017-08-29T01:32:16.680000",
        "db": "NVD",
        "id": "CVE-2012-4363"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "remote",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201208-305"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201208-362"
      }
    ],
    "trust": 1.2
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Adobe Reader Service disruption in  ( Application crash ) Vulnerabilities",
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2012-003790"
      }
    ],
    "trust": 0.8
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "lack of information",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201208-362"
      }
    ],
    "trust": 0.6
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading...

Loading...

Loading...
  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.