Adobe Reader and Acrobat 10.x before 10.1.11 and 11.x before 11.0.08 on Windows allow attackers to bypass a sandbox protection mechanism, and consequently execute native code in a privileged context, via unspecified vectors.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Acrobat_reader | Adobe | 10.0 (including) | 10.0 (including) |
Acrobat_reader | Adobe | 10.0.1 (including) | 10.0.1 (including) |
Acrobat_reader | Adobe | 10.0.2 (including) | 10.0.2 (including) |
Acrobat_reader | Adobe | 10.0.3 (including) | 10.0.3 (including) |
Acrobat_reader | Adobe | 10.1 (including) | 10.1 (including) |
Acrobat_reader | Adobe | 10.1.1 (including) | 10.1.1 (including) |
Acrobat_reader | Adobe | 10.1.2 (including) | 10.1.2 (including) |
Acrobat_reader | Adobe | 10.1.3 (including) | 10.1.3 (including) |
Acrobat_reader | Adobe | 10.1.4 (including) | 10.1.4 (including) |
Acrobat_reader | Adobe | 10.1.5 (including) | 10.1.5 (including) |
Acrobat_reader | Adobe | 10.1.6 (including) | 10.1.6 (including) |
Acrobat_reader | Adobe | 10.1.7 (including) | 10.1.7 (including) |
Acrobat_reader | Adobe | 10.1.8 (including) | 10.1.8 (including) |
Acrobat_reader | Adobe | 10.1.9 (including) | 10.1.9 (including) |
Acrobat_reader | Adobe | 10.1.10 (including) | 10.1.10 (including) |
Acrobat_reader | Adobe | 11.0 (including) | 11.0 (including) |
Acrobat_reader | Adobe | 11.0.1 (including) | 11.0.1 (including) |
Acrobat_reader | Adobe | 11.0.2 (including) | 11.0.2 (including) |
Acrobat_reader | Adobe | 11.0.3 (including) | 11.0.3 (including) |
Acrobat_reader | Adobe | 11.0.4 (including) | 11.0.4 (including) |
Acrobat_reader | Adobe | 11.0.5 (including) | 11.0.5 (including) |
Acrobat_reader | Adobe | 11.0.6 (including) | 11.0.6 (including) |
Acrobat_reader | Adobe | 11.0.7 (including) | 11.0.7 (including) |