Zero-friction vulnerability management platform

Mageni eases for you the vulnerability scanning, assessment, and management process. It is free and open-source.

Install Now

Available for macOS, Windows, and Linux

App screenshot

CVE-2012-0777

CVE information

Published

10 years ago

Last Modified

4 years ago

CVSSv2.0 Severity

High

Impact Analysis

Description

The JavaScript API in Adobe Reader and Acrobat 9.x before 9.5.1 and 10.x before 10.1.3 on Mac OS X and Linux allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors..

CVSSv2.0 Score

Severity
High
Base Score
7.5/10
Exploit Score
10/10
Access Vector
Network
Access Complexity
Low
Authentication Required
None
Impact Score
6.4/10
Confidentiality Impact
Partial
Availability Impact
Partial
Integrity Impact
Partial

Products Affected

CPE Affected Vulnerable Excluding Edit
cpe:2.3:a:adobe:acrobat_reader:9.4.3:*:*:*:*:*:*:*
  Yes
-
cpe:2.3:a:adobe:acrobat_reader:9.2:*:*:*:*:*:*:*
  Yes
-
cpe:2.3:a:adobe:acrobat_reader:9.1:*:*:*:*:*:*:*
  Yes
-
cpe:2.3:a:adobe:acrobat_reader:9.4.6:*:*:*:*:*:*:*
  Yes
-
cpe:2.3:a:adobe:acrobat_reader:9.1.3:*:*:*:*:*:*:*
  Yes
-
cpe:2.3:a:adobe:acrobat_reader:9.1.2:*:*:*:*:*:*:*
  Yes
-
cpe:2.3:a:adobe:acrobat_reader:9.3.3:*:*:*:*:*:*:*
  Yes
-
cpe:2.3:a:adobe:acrobat_reader:9.4.2:*:*:*:*:*:*:*
  Yes
-
cpe:2.3:a:adobe:acrobat_reader:9.1.1:*:*:*:*:*:*:*
  Yes
-
cpe:2.3:a:adobe:acrobat_reader:9.4.4:*:*:*:*:*:*:*
  Yes
-
cpe:2.3:a:adobe:acrobat_reader:9.3.1:*:*:*:*:*:*:*
  Yes
-
cpe:2.3:a:adobe:acrobat_reader:9.4.7:*:*:*:*:*:*:*
  Yes
-
cpe:2.3:a:adobe:acrobat_reader:9.4.1:*:*:*:*:*:*:*
  Yes
-
cpe:2.3:a:adobe:acrobat_reader:9.0:*:*:*:*:*:*:*
  Yes
-
cpe:2.3:a:adobe:acrobat_reader:9.3:*:*:*:*:*:*:*
  Yes
-
cpe:2.3:a:adobe:acrobat_reader:9.3.2:*:*:*:*:*:*:*
  Yes
-
cpe:2.3:a:adobe:acrobat_reader:9.3.4:*:*:*:*:*:*:*
  Yes
-
cpe:2.3:a:adobe:acrobat_reader:9.4:*:*:*:*:*:*:*
  Yes
-
cpe:2.3:a:adobe:acrobat_reader:9.5:*:*:*:*:*:*:*
  Yes
-
cpe:2.3:a:adobe:acrobat_reader:9.4.5:*:*:*:*:*:*:*
  Yes
-
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
  No
-
cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*
  No
-
cpe:2.3:a:adobe:acrobat:9.3.3:*:*:*:*:*:*:*
  Yes
-
cpe:2.3:a:adobe:acrobat:9.4.2:*:*:*:*:*:*:*
  Yes
-
cpe:2.3:a:adobe:acrobat:9.2:*:*:*:*:*:*:*
  Yes
-
cpe:2.3:a:adobe:acrobat:9.5:*:*:*:*:*:*:*
  Yes
-
cpe:2.3:a:adobe:acrobat:9.1:*:*:*:*:*:*:*
  Yes
-
cpe:2.3:a:adobe:acrobat:9.1:-:pro:*:*:*:*:*
  Yes
-
cpe:2.3:a:adobe:acrobat:9.4.3:*:*:*:*:*:*:*
  Yes
-
cpe:2.3:a:adobe:acrobat:9.4.4:*:*:*:*:*:*:*
  Yes
-
cpe:2.3:a:adobe:acrobat:9.0:*:*:*:*:*:*:*
  Yes
-
cpe:2.3:a:adobe:acrobat:9.4.7:*:*:*:*:*:*:*
  Yes
-
cpe:2.3:a:adobe:acrobat:9.4.6:*:*:*:*:*:*:*
  Yes
-
cpe:2.3:a:adobe:acrobat:9.3:-:pro:*:*:*:*:*
  Yes
-
cpe:2.3:a:adobe:acrobat:9.4.5:*:*:*:*:*:*:*
  Yes
-
cpe:2.3:a:adobe:acrobat:9.3.4:*:*:*:*:*:*:*
  Yes
-
cpe:2.3:a:adobe:acrobat:9.1.3:*:*:*:*:*:*:*
  Yes
-
cpe:2.3:a:adobe:acrobat:9.4:*:*:*:*:*:*:*
  Yes
-
cpe:2.3:a:adobe:acrobat:9.1.2:*:*:*:*:*:*:*
  Yes
-
cpe:2.3:a:adobe:acrobat:9.4.1:*:*:*:*:*:*:*
  Yes
-
cpe:2.3:a:adobe:acrobat:9.3.2:*:*:*:*:*:*:*
  Yes
-
cpe:2.3:a:adobe:acrobat:9.0:-:pro:*:*:*:*:*
  Yes
-
cpe:2.3:a:adobe:acrobat:9.3:*:*:*:*:*:*:*
  Yes
-
cpe:2.3:a:adobe:acrobat:9.3.1:*:*:*:*:*:*:*
  Yes
-
cpe:2.3:a:adobe:acrobat:9.1.1:*:*:*:*:*:*:*
  Yes
-
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
  No
-
cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*
  No
-
cpe:2.3:a:adobe:acrobat:10.1:*:*:*:*:*:*:*
  Yes
-
cpe:2.3:a:adobe:acrobat:10.0:*:*:*:*:*:*:*
  Yes
-
cpe:2.3:a:adobe:acrobat:10.0.3:*:*:*:*:*:*:*
  Yes
-
cpe:2.3:a:adobe:acrobat:10.1.1:*:*:*:*:*:*:*
  Yes
-
cpe:2.3:a:adobe:acrobat:10.0:-:pro:*:*:*:*:*
  Yes
-
cpe:2.3:a:adobe:acrobat:10.0.1:-:pro:*:*:*:*:*
  Yes
-
cpe:2.3:a:adobe:acrobat:10.1.2:*:*:*:*:*:*:*
  Yes
-
cpe:2.3:a:adobe:acrobat:10.0.2:*:*:*:*:*:*:*
  Yes
-
cpe:2.3:a:adobe:acrobat:10.0.1:*:*:*:*:*:*:*
  Yes
-
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
  No
-
cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*
  No
-