Total vulnerabilities in the database
Untrusted search path vulnerability in Adobe Reader and Acrobat 8.1.2 and earlier on Unix and Linux allows attackers to gain privileges via a Trojan Horse program in an unspecified directory that is associated with an insecure RPATH.
Software | From | Fixed in |
---|---|---|
adobe / acrobat | - | 8.1.2.x |
adobe / acrobat | 8.1.1-unknown | 8.1.1-unknown.x |
adobe / acrobat | 8.1.1 | 8.1.1.x |
adobe / acrobat_reader | - | 8.0.x |