Note:
This project will be discontinued after December 13, 2021. [more]
Product:
Acrobat_reader
(Adobe)Repositories |
Unknown: This might be proprietary software. |
#Vulnerabilities | 1014 |
Date | Id | Summary | Products | Score | Patch | Annotated |
---|---|---|---|---|---|---|
2017-08-11 | CVE-2017-11230 | Adobe Acrobat Reader 2017.009.20058 and earlier, 2017.008.30051 and earlier, 2015.006.30306 and earlier, and 11.0.20 and earlier has an exploitable memory corruption vulnerability in the JPEG 2000 engine. Successful exploitation could lead to arbitrary code execution. | Acrobat, Acrobat_dc, Acrobat_reader, Acrobat_reader_dc, Reader | 6.5 | ||
2017-08-11 | CVE-2017-11229 | Adobe Acrobat Reader 2017.009.20058 and earlier, 2017.008.30051 and earlier, 2015.006.30306 and earlier, and 11.0.20 and earlier has a security bypass vulnerability when manipulating Forms Data Format (FDF). | Acrobat, Acrobat_dc, Acrobat_reader, Acrobat_reader_dc, Reader | 8.8 | ||
2017-08-11 | CVE-2017-11217 | Adobe Acrobat Reader 2017.009.20058 and earlier, 2017.008.30051 and earlier, 2015.006.30306 and earlier, and 11.0.20 and earlier has an exploitable memory corruption vulnerability in the image conversion engine when processing Enhanced Metafile Format (EMF) data related to drawing of Unicode text strings. Successful exploitation could lead to arbitrary code execution. | Acrobat, Acrobat_dc, Acrobat_reader, Acrobat_reader_dc, Reader | 6.5 | ||
2017-08-11 | CVE-2017-11210 | Adobe Acrobat Reader 2017.009.20058 and earlier, 2017.008.30051 and earlier, 2015.006.30306 and earlier, and 11.0.20 and earlier has an exploitable memory corruption vulnerability in the font parsing, where the font is embedded in the XML Paper Specification (XPS) file. Successful exploitation could lead to arbitrary code execution. | Acrobat, Acrobat_dc, Acrobat_reader, Acrobat_reader_dc, Reader | 6.5 | ||
2017-08-11 | CVE-2017-11209 | Adobe Acrobat Reader 2017.009.20058 and earlier, 2017.008.30051 and earlier, 2015.006.30306 and earlier, and 11.0.20 and earlier has an exploitable memory corruption vulnerability that occurs when reading a JPEG file embedded within XML Paper Specification (XPS) file. Successful exploitation could lead to arbitrary code execution. | Acrobat, Acrobat_dc, Acrobat_reader, Acrobat_reader_dc, Reader | 6.5 | ||
2009-02-20 | CVE-2009-0658 | Buffer overflow in Adobe Reader 9.0 and earlier, and Acrobat 9.0 and earlier, allows remote attackers to execute arbitrary code via a crafted PDF document, related to a non-JavaScript function call and possibly an embedded JBIG2 image stream, as exploited in the wild in February 2009 by Trojan.Pidief.E. | Acrobat, Acrobat_reader | N/A | ||
2018-07-09 | CVE-2018-4999 | Adobe Acrobat and Reader versions 2018.009.20050 and earlier, 2017.011.30070 and earlier, and 2015.006.30394 and earlier have an Out-of-bounds read vulnerability. Successful exploitation could lead to arbitrary code execution in the context of the current user. | Acrobat, Acrobat_dc, Acrobat_reader, Acrobat_reader_dc | 6.5 | ||
2018-07-09 | CVE-2018-4998 | Adobe Acrobat and Reader versions 2018.009.20050 and earlier, 2017.011.30070 and earlier, and 2015.006.30394 and earlier have a Memory corruption vulnerability. Successful exploitation could lead to arbitrary code execution in the context of the current user. | Acrobat, Acrobat_dc, Acrobat_reader, Acrobat_reader_dc | 8.8 | ||
2018-07-09 | CVE-2018-4997 | Adobe Acrobat and Reader versions 2018.009.20050 and earlier, 2017.011.30070 and earlier, and 2015.006.30394 and earlier have an Out-of-bounds write vulnerability. Successful exploitation could lead to arbitrary code execution in the context of the current user. | Acrobat, Acrobat_dc, Acrobat_reader, Acrobat_reader_dc | 8.8 | ||
2018-02-27 | CVE-2018-4916 | An issue was discovered in Adobe Acrobat Reader 2018.009.20050 and earlier versions, 2017.011.30070 and earlier versions, 2015.006.30394 and earlier versions. The vulnerability is caused by the computation that writes data past the end of the intended buffer; the computation is part of the image conversion module that handless TIFF data. An attacker can potentially leverage the vulnerability to corrupt sensitive data or execute arbitrary code. | Acrobat, Acrobat_dc, Acrobat_reader, Acrobat_reader_dc | 8.8 |