Adobe Reader could allow a remote attacker to execute arbitrary executables caused by an unspecified vulnerability. If a remote attacker has knowledge of complete application names and paths the attacker could send a specially-crafted PDF document containing JavaScript to execute arbitrary executables on the targeted system.