← Volver a CVEs
CVE-2014-0514
N/ADescripcion
The Adobe Reader Mobile application before 11.2 for Android does not properly restrict use of JavaScript, which allows remote attackers to execute arbitrary code via a crafted PDF document, a related issue to CVE-2012-6636.
Detalles CVE
Puntuacion CVSS v3.1N/A
Publicado4/15/2014
Ultima modificacion4/12/2025
Fuentenvd
Avistamientos honeypot0
Productos afectados
adobe:adobe_reader
Debilidades (CWE)
CWE-264
Referencias
http://packetstormsecurity.com/files/127113/Adobe-Reader-for-Android-addJavascriptInterface-Exploit.html(psirt@adobe.com)
http://seclists.org/fulldisclosure/2014/Apr/192(psirt@adobe.com)
http://www.exploit-db.com/exploits/32884(psirt@adobe.com)
http://www.exploit-db.com/exploits/33791(psirt@adobe.com)
http://www.osvdb.org/105781(psirt@adobe.com)
http://www.securify.nl/advisory/SFY20140401/adobe_reader_for_android_exposes_insecure_javascript_interfaces.html(psirt@adobe.com)
http://www.securityfocus.com/archive/1/531831/100/0/threaded(psirt@adobe.com)
http://www.securityfocus.com/bid/66798(psirt@adobe.com)
http://helpx.adobe.com/security/products/reader-mobile/apsb14-12.html(af854a3a-2127-422b-91ae-364da2661108)
http://packetstormsecurity.com/files/127113/Adobe-Reader-for-Android-addJavascriptInterface-Exploit.html(af854a3a-2127-422b-91ae-364da2661108)
http://seclists.org/fulldisclosure/2014/Apr/192(af854a3a-2127-422b-91ae-364da2661108)
http://www.exploit-db.com/exploits/32884(af854a3a-2127-422b-91ae-364da2661108)
http://www.exploit-db.com/exploits/33791(af854a3a-2127-422b-91ae-364da2661108)
http://www.osvdb.org/105781(af854a3a-2127-422b-91ae-364da2661108)
http://www.securify.nl/advisory/SFY20140401/adobe_reader_for_android_exposes_insecure_javascript_interfaces.html(af854a3a-2127-422b-91ae-364da2661108)
http://www.securityfocus.com/archive/1/531831/100/0/threaded(af854a3a-2127-422b-91ae-364da2661108)
http://www.securityfocus.com/bid/66798(af854a3a-2127-422b-91ae-364da2661108)
Correlaciones IOC
Sin correlaciones registradas
This product uses data from the NVD API but is not endorsed or certified by the NVD.