OVALdb logo

Professional OVAL Repository

Skip Navigation LinksOVAL Items > OVAL Item Details
Id
oval:org.mitre.oval:tst:32952
Version
1
Scheme
http://oval.mitre.org/XMLSchema/oval-definitions-5#linux

Comment
acroread-libs-atk is earlier than 0:1.8.0-1.el3

OVAL item
  • Collapse
    RPMINFO_TEST  (ID = oval:org.mitre.oval:tst:32952)  xmlns=http://oval.mitre.org/XMLSchema/oval-definitions-5#linux, version=1, comment=acroread-libs-atk is earlier than 0:1.8.0-1.el3, check_existence=at_least_one_exists, check=at least one

Referencing Items
Id 
Comment 
Type 
Open filter row popup menu
Open filter row popup menu
Open filter row popup menu
oval:org.mitre.oval:def:9693 Multiple cross-site scripting (XSS) vulnerabilities in Adobe Acrobat Reader Plugin before 8.0.0, and possibly the plugin distributed with Adobe Reader 7.x before 7.1.4, 8.x before 8.1.7, and 9.x before 9.2, for Mozilla Firefox, Microsoft Internet Explorer 6 SP1, Google Chrome, Opera 8.5.4 build 770, and Opera 9.10.8679 on Windows allow remote attackers to inject arbitrary JavaScript and conduct other attacks via a .pdf URL with a javascript: or res: URI with (1) FDF, (2) XML, and (3) XFDF AJAX parameters, or (4) an arbitrarily named name=URI anchor identifier, aka "Universal XSS (UXSS)."vulnerability
oval:org.mitre.oval:def:9684 Double free vulnerability in the Adobe Acrobat Reader Plugin before 8.0.0, as used in Mozilla Firefox 1.5.0.7, allows remote attackers to execute arbitrary code by causing an error via a javascript: URI call to document.write in the (1) FDF, (2) XML, or (3) XFDF AJAX request parameters.vulnerability
oval:org.mitre.oval:def:11698 Adobe Reader and Acrobat 7.0.8 and earlier allows user-assisted remote attackers to execute code via a crafted PDF file that triggers memory corruption and overwrites a subroutine pointer during rendering.vulnerability

company ALTEX-SOFT 2008-2019, © ZAO ALTEX-SOFT , ovaldb@altx-soft.com

OVAL and the OVAL logo are registered trademarks of The MITRE Corporation. Other names may be trademarks of their respective owners.