Show plain JSON{"id": "CVE-2009-4764", "cveTags": [], "metrics": {"cvssMetricV2": [{"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"version": "2.0", "baseScore": 9.3, "accessVector": "NETWORK", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "authentication": "NONE", "integrityImpact": "COMPLETE", "accessComplexity": "MEDIUM", "availabilityImpact": "COMPLETE", "confidentialityImpact": "COMPLETE"}, "acInsufInfo": false, "impactScore": 10.0, "baseSeverity": "HIGH", "obtainAllPrivilege": false, "exploitabilityScore": 8.6, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false}]}, "published": "2010-04-05T15:30:01.093", "references": [{"url": "http://lists.immunitysec.com/pipermail/dailydave/2010-April/006072.html", "source": "cve@mitre.org"}, {"url": "http://lists.immunitysec.com/pipermail/dailydave/2010-April/006074.html", "source": "cve@mitre.org"}, {"url": "http://www.metasploit.com/redmine/projects/framework/repository/revisions/8379/changes/modules/exploits/windows/fileformat/adobe_pdf_embedded_exe.rb", "source": "cve@mitre.org"}, {"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/57994", "source": "cve@mitre.org"}, {"url": "https://forum.immunityinc.com/board/thread/1199/exploiting-pdf-files-without-vulnerabili/?page=1#post-1199", "source": "cve@mitre.org"}, {"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6976", "source": "cve@mitre.org"}, {"url": "http://lists.immunitysec.com/pipermail/dailydave/2010-April/006072.html", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://lists.immunitysec.com/pipermail/dailydave/2010-April/006074.html", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.metasploit.com/redmine/projects/framework/repository/revisions/8379/changes/modules/exploits/windows/fileformat/adobe_pdf_embedded_exe.rb", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/57994", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://forum.immunityinc.com/board/thread/1199/exploiting-pdf-files-without-vulnerabili/?page=1#post-1199", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6976", "source": "af854a3a-2127-422b-91ae-364da2661108"}], "vulnStatus": "Deferred", "weaknesses": [{"type": "Primary", "source": "nvd@nist.gov", "description": [{"lang": "en", "value": "CWE-94"}]}], "descriptions": [{"lang": "en", "value": "Adobe Reader 8.x and 9.x on Windows is able to execute EXE files that are embedded in a PDF document, which makes it easier for remote attackers to trick users into executing arbitrary code via a crafted document."}, {"lang": "es", "value": "Adobe Reader v8.x y v9.x para Windows puede ejecutar ficheros EXE que est\u00e9n incrustado en un documento PDF, esto facilita a los atacantes remotos enga\u00f1ar a los usuarios para que ejecuten c\u00f3digo de su elecci\u00f3n mediante un fichero manipulado."}], "lastModified": "2025-04-11T00:51:21.963", "configurations": [{"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:a:adobe:acrobat_reader:8.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "996EB48E-D2A8-49E4-915A-EBDE26A9FB94"}, {"criteria": "cpe:2.3:a:adobe:acrobat_reader:8.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "97E20936-EE31-4CEB-A710-3165A28BAD69"}, {"criteria": "cpe:2.3:a:adobe:acrobat_reader:8.1.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "5BD9952C-A1D0-4DFB-A292-9B86D7EAE5FD"}, {"criteria": "cpe:2.3:a:adobe:acrobat_reader:8.1.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C5BEA847-A71E-4336-AB67-B3C38847C1C3"}, {"criteria": "cpe:2.3:a:adobe:acrobat_reader:8.1.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "39F6994B-6969-485B-9286-2592B11A47BF"}, {"criteria": "cpe:2.3:a:adobe:acrobat_reader:8.1.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "FC533775-B52E-43F0-BF19-1473BE36232D"}, {"criteria": "cpe:2.3:a:adobe:acrobat_reader:8.1.6:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "18D1C85E-42CC-46F2-A7B6-DAC3C3995330"}, {"criteria": "cpe:2.3:a:adobe:acrobat_reader:8.1.7:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C4670451-511E-496C-A78A-887366E1E992"}, {"criteria": "cpe:2.3:a:adobe:acrobat_reader:9.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "562772F1-1627-438E-A6B8-7D1AA5536086"}, {"criteria": "cpe:2.3:a:adobe:acrobat_reader:9.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "27D5AF92-A8E1-41BD-B20A-EB26BB6AD4DE"}, {"criteria": "cpe:2.3:a:adobe:acrobat_reader:9.1.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F25C9167-C6D4-4264-9197-50878EDA2D96"}, {"criteria": "cpe:2.3:a:adobe:acrobat_reader:9.1.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "DD1D7308-09E9-42B2-8836-DC2326C62A9E"}, {"criteria": "cpe:2.3:a:adobe:acrobat_reader:9.1.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B5C251D2-4C9B-4029-8BED-0FCAED3B8E89"}, {"criteria": "cpe:2.3:a:adobe:acrobat_reader:9.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "2432AC17-5378-4C61-A775-5172FD44EC03"}, {"criteria": "cpe:2.3:a:adobe:acrobat_reader:9.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B6BA82F4-470D-4A46-89B2-D2F3C8FA31C8"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "2CF61F35-5905-4BA9-AD7E-7DB261D2F256"}], "operator": "OR"}], "operator": "AND"}], "sourceIdentifier": "cve@mitre.org"}