Zero-friction vulnerability management platform

Mageni eases for you the vulnerability scanning, assessment, and management process. It is free and open-source.

Install Now

Available for macOS, Windows, and Linux

App screenshot

CVE-2014-0562

CVE information

Published

7 years ago

Last Modified

4 years ago

CVSSv2.0 Severity

Medium

Impact Analysis

Description

Cross-site scripting (XSS) vulnerability in Adobe Reader and Acrobat 10.x before 10.1.12 and 11.x before 11.0.09 on OS X allows remote attackers to inject arbitrary web script or HTML via unspecified vectors, aka "Universal XSS (UXSS).".

CVSSv2.0 Score

Severity
Medium
Base Score
4.3/10
Exploit Score
8.6/10
Access Vector
Network
Access Complexity
Medium
Authentication Required
None
Impact Score
2.9/10
Confidentiality Impact
None
Availability Impact
None
Integrity Impact
Partial

Products Affected

CPE Affected Vulnerable Excluding Edit
cpe:2.3:a:adobe:acrobat_reader:11.0.8:*:*:*:*:*:*:*
  Yes
-
cpe:2.3:a:adobe:acrobat_reader:11.0.2:*:*:*:*:*:*:*
  Yes
-
cpe:2.3:a:adobe:acrobat_reader:10.1:*:*:*:*:*:*:*
  Yes
-
cpe:2.3:a:adobe:acrobat_reader:10.0:*:*:*:*:*:*:*
  Yes
-
cpe:2.3:a:adobe:acrobat_reader:10.1.1:*:*:*:*:*:*:*
  Yes
-
cpe:2.3:a:adobe:acrobat_reader:10.1.2:*:*:*:*:*:*:*
  Yes
-
cpe:2.3:a:adobe:acrobat_reader:10.1.3:*:*:*:*:*:*:*
  Yes
-
cpe:2.3:a:adobe:acrobat_reader:10.1.7:*:*:*:*:*:*:*
  Yes
-
cpe:2.3:a:adobe:acrobat_reader:10.0.3:*:*:*:*:*:*:*
  Yes
-
cpe:2.3:a:adobe:acrobat_reader:11.0.6:*:*:*:*:*:*:*
  Yes
-
cpe:2.3:a:adobe:acrobat_reader:11.0.7:*:*:*:*:*:*:*
  Yes
-
cpe:2.3:a:adobe:acrobat_reader:10.1.10:*:*:*:*:*:*:*
  Yes
-
cpe:2.3:a:adobe:acrobat_reader:10.1.11:*:*:*:*:*:*:*
  Yes
-
cpe:2.3:a:adobe:acrobat_reader:11.0.4:*:*:*:*:*:*:*
  Yes
-
cpe:2.3:a:adobe:acrobat_reader:11.0.5:-:*:*:*:windows:*:*
  Yes
-
cpe:2.3:a:adobe:acrobat_reader:10.1.8:*:*:*:*:*:*:*
  Yes
-
cpe:2.3:a:adobe:acrobat_reader:10.1.9:*:*:*:*:*:*:*
  Yes
-
cpe:2.3:a:adobe:acrobat_reader:11.0.3:*:*:*:*:*:*:*
  Yes
-
cpe:2.3:a:adobe:acrobat_reader:10.0.2:*:*:*:*:*:*:*
  Yes
-
cpe:2.3:a:adobe:acrobat_reader:10.1.6:*:*:*:*:*:*:*
  Yes
-
cpe:2.3:a:adobe:acrobat_reader:11.0:*:*:*:*:*:*:*
  Yes
-
cpe:2.3:a:adobe:acrobat_reader:11.0.1:*:*:*:*:*:*:*
  Yes
-
cpe:2.3:a:adobe:acrobat_reader:10.0.1:*:*:*:*:*:*:*
  Yes
-
cpe:2.3:a:adobe:acrobat_reader:10.1.4:*:*:*:*:*:*:*
  Yes
-
cpe:2.3:a:adobe:acrobat_reader:10.1.5:*:*:*:*:*:*:*
  Yes
-
cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*
  No
-
cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*
  No
-
cpe:2.3:a:adobe:acrobat:10.1:*:*:*:*:*:*:*
  Yes
-
cpe:2.3:a:adobe:acrobat:10.1.7:*:*:*:*:*:*:*
  Yes
-
cpe:2.3:a:adobe:acrobat:11.0.1:*:*:*:*:*:*:*
  Yes
-
cpe:2.3:a:adobe:acrobat:11.0.7:*:*:*:*:*:*:*
  Yes
-
cpe:2.3:a:adobe:acrobat:10.1.5:*:*:*:*:*:*:*
  Yes
-
cpe:2.3:a:adobe:acrobat:10.0:*:*:*:*:*:*:*
  Yes
-
cpe:2.3:a:adobe:acrobat:11.0.3:*:*:*:*:*:*:*
  Yes
-
cpe:2.3:a:adobe:acrobat:10.1.6:*:*:*:*:*:*:*
  Yes
-
cpe:2.3:a:adobe:acrobat:10.0.3:*:*:*:*:*:*:*
  Yes
-
cpe:2.3:a:adobe:acrobat:10.0:-:pro:*:*:*:*:*
  Yes
-
cpe:2.3:a:adobe:acrobat:10.0.1:*:*:*:*:*:*:*
  Yes
-
cpe:2.3:a:adobe:acrobat:10.0.1:-:pro:*:*:*:*:*
  Yes
-
cpe:2.3:a:adobe:acrobat:10.1.4:*:*:*:*:*:*:*
  Yes
-
cpe:2.3:a:adobe:acrobat:10.1.2:*:*:*:*:*:*:*
  Yes
-
cpe:2.3:a:adobe:acrobat:10.1.3:*:*:*:*:*:*:*
  Yes
-
cpe:2.3:a:adobe:acrobat:10.1.10:*:*:*:*:*:*:*
  Yes
-
cpe:2.3:a:adobe:acrobat:10.1.11:*:*:*:*:*:*:*
  Yes
-
cpe:2.3:a:adobe:acrobat:11.0.6:*:*:*:*:*:*:*
  Yes
-
cpe:2.3:a:adobe:acrobat:11.0.8:*:*:*:*:*:*:*
  Yes
-
cpe:2.3:a:adobe:acrobat:10.1.1:*:*:*:*:*:*:*
  Yes
-
cpe:2.3:a:adobe:acrobat:10.1.8:*:*:*:*:*:*:*
  Yes
-
cpe:2.3:a:adobe:acrobat:10.1.9:*:*:*:*:*:*:*
  Yes
-
cpe:2.3:a:adobe:acrobat:11.0.4:*:*:*:*:*:*:*
  Yes
-
cpe:2.3:a:adobe:acrobat:11.0.5:-:*:*:*:windows:*:*
  Yes
-
cpe:2.3:a:adobe:acrobat:11.0:*:*:*:*:*:*:*
  Yes
-
cpe:2.3:a:adobe:acrobat:10.0.2:*:*:*:*:*:*:*
  Yes
-
cpe:2.3:a:adobe:acrobat:11.0.2:*:*:*:*:*:*:*
  Yes
-
cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*
  No
-
cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*
  No
-