Free and open-source vulnerability scanner

Mageni eases for you the vulnerability scanning, assessment, and management process. It is free and open-source.

Install Now

Available for macOS, Windows, and Linux

App screenshot

CVE-2012-0774

CVE information

Published

12 years ago

Last Modified

6 years ago

CVSSv2.0 Severity

High

Impact Analysis

Description

Integer overflow in Adobe Reader and Acrobat 9.x before 9.5.1 and 10.x before 10.1.3 allows attackers to execute arbitrary code via a crafted TrueType font..

CVSSv2.0 Score

Severity
High
Base Score
10/10
Exploit Score
10/10
Access Vector
Network
Access Complexity
Low
Authentication Required
None
Impact Score
10/10
Confidentiality Impact
Complete
Availability Impact
Complete
Integrity Impact
Complete

Products Affected

CPE Affected Vulnerable Excluding Edit
cpe:2.3:a:adobe:acrobat_reader:9.4.3:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:adobe:acrobat_reader:9.2:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:adobe:acrobat_reader:9.1:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:adobe:acrobat_reader:9.4.6:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:adobe:acrobat_reader:9.1.3:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:adobe:acrobat_reader:9.1.2:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:adobe:acrobat_reader:9.3.3:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:adobe:acrobat_reader:9.4.2:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:adobe:acrobat_reader:9.1.1:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:adobe:acrobat_reader:9.4.5:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:adobe:acrobat_reader:9.3.4:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:adobe:acrobat_reader:9.3:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:adobe:acrobat_reader:9.0:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:adobe:acrobat_reader:9.4:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:adobe:acrobat_reader:9.3.2:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:adobe:acrobat_reader:9.5:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:adobe:acrobat_reader:9.4.7:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:adobe:acrobat_reader:9.4.4:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:adobe:acrobat_reader:9.3.1:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:adobe:acrobat_reader:9.4.1:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:adobe:acrobat:9.3.3:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:adobe:acrobat:9.4.2:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:adobe:acrobat:9.2:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:adobe:acrobat:9.5:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:adobe:acrobat:9.1:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:adobe:acrobat:9.1:-:pro:*:*:*:*:*
  Yes
- -
cpe:2.3:a:adobe:acrobat:9.4.3:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:adobe:acrobat:9.4.4:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:adobe:acrobat:9.0:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:adobe:acrobat:9.3.4:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:adobe:acrobat:9.4.1:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:adobe:acrobat:9.3.2:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:adobe:acrobat:9.4.6:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:adobe:acrobat:9.1.1:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:adobe:acrobat:9.3:-:pro:*:*:*:*:*
  Yes
- -
cpe:2.3:a:adobe:acrobat:9.0:-:pro:*:*:*:*:*
  Yes
- -
cpe:2.3:a:adobe:acrobat:9.3.1:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:adobe:acrobat:9.4.7:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:adobe:acrobat:9.1.2:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:adobe:acrobat:9.1.3:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:adobe:acrobat:9.4.5:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:adobe:acrobat:9.4:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:adobe:acrobat:9.3:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:adobe:acrobat:10.1:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:adobe:acrobat:10.0:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:adobe:acrobat:10.0.3:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:adobe:acrobat:10.1.1:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:adobe:acrobat:10.0:-:pro:*:*:*:*:*
  Yes
- -
cpe:2.3:a:adobe:acrobat:10.0.1:-:pro:*:*:*:*:*
  Yes
- -
cpe:2.3:a:adobe:acrobat:10.1.2:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:adobe:acrobat:10.0.2:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:adobe:acrobat:10.0.1:*:*:*:*:*:*:*
  Yes
- -