Note:
This project will be discontinued after December 13, 2021. [more]
Product:
Acrobat_reader
(Adobe)Repositories |
Unknown: This might be proprietary software. |
#Vulnerabilities | 1014 |
Date | Id | Summary | Products | Score | Patch | Annotated |
---|---|---|---|---|---|---|
2020-11-05 | CVE-2020-24438 | Acrobat Reader DC versions 2020.012.20048 (and earlier), 2020.001.30005 (and earlier) and 2017.011.30175 (and earlier) are affected by a use-after-free vulnerability that could result in a memory address leak. Exploitation of this issue requires user interaction in that a victim must open a malicious file. | Acrobat, Acrobat_dc, Acrobat_reader, Acrobat_reader_dc | 3.3 | ||
2021-02-11 | CVE-2021-21036 | Acrobat Reader DC versions versions 2020.013.20074 (and earlier), 2020.001.30018 (and earlier) and 2017.011.30188 (and earlier) are affected by an Integer Overflow vulnerability. An unauthenticated attacker could leverage this vulnerability to achieve arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. | Acrobat, Acrobat_dc, Acrobat_reader, Acrobat_reader_dc | 7.8 | ||
2021-02-11 | CVE-2021-21037 | Acrobat Reader DC versions versions 2020.013.20074 (and earlier), 2020.001.30018 (and earlier) and 2017.011.30188 (and earlier) are affected by a Path Traversal vulnerability. An unauthenticated attacker could leverage this vulnerability to achieve arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. | Acrobat, Acrobat_dc, Acrobat_reader, Acrobat_reader_dc | 7.8 | ||
2021-02-11 | CVE-2021-21039 | Acrobat Reader DC versions versions 2020.013.20074 (and earlier), 2020.001.30018 (and earlier) and 2017.011.30188 (and earlier) are affected by a Use After Free vulnerability. An unauthenticated attacker could leverage this vulnerability to achieve arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. | Acrobat, Acrobat_dc, Acrobat_reader, Acrobat_reader_dc | 7.8 | ||
2021-02-11 | CVE-2021-21038 | Acrobat Reader DC versions versions 2020.013.20074 (and earlier), 2020.001.30018 (and earlier) and 2017.011.30188 (and earlier) are affected by an Out-of-bounds Write vulnerability when parsing a crafted jpeg file. An unauthenticated attacker could leverage this vulnerability to achieve arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. | Acrobat, Acrobat_dc, Acrobat_reader, Acrobat_reader_dc | 7.8 | ||
2021-02-11 | CVE-2021-21040 | Acrobat Reader DC versions versions 2020.013.20074 (and earlier), 2020.001.30018 (and earlier) and 2017.011.30188 (and earlier) are affected by a Use After Free vulnerability. An unauthenticated attacker could leverage this vulnerability to achieve arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. | Acrobat, Acrobat_dc, Acrobat_reader, Acrobat_reader_dc | 7.8 | ||
2021-02-11 | CVE-2021-21041 | Acrobat Reader DC versions versions 2020.013.20074 (and earlier), 2020.001.30018 (and earlier) and 2017.011.30188 (and earlier) are affected by a use-after-free vulnerability. An unauthenticated attacker could leverage this vulnerability to achieve arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. | Acrobat, Acrobat_dc, Acrobat_reader, Acrobat_reader_dc | 7.8 | ||
2021-02-11 | CVE-2021-21057 | Acrobat Reader DC versions versions 2020.013.20074 (and earlier), 2020.001.30018 (and earlier) and 2017.011.30188 (and earlier) are affected by a null pointer dereference vulnerability when parsing a specially crafted PDF file. An unauthenticated attacker could leverage this vulnerability to achieve denial of service in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. | Acrobat, Acrobat_dc, Acrobat_reader, Acrobat_reader_dc | 6.6 | ||
2021-02-11 | CVE-2021-21060 | Adobe Acrobat Pro DC versions 2020.013.20074 (and earlier), 2020.001.30018 (and earlier) and 2017.011.30188 (and earlier) are affected by an improper input validation vulnerability. An unauthenticated attacker could leverage this vulnerability to disclose sensitive information in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. | Acrobat, Acrobat_dc, Acrobat_reader, Acrobat_reader_dc | 4.6 | ||
2021-04-01 | CVE-2021-28545 | Acrobat Reader DC versions versions 2020.013.20074 (and earlier), 2020.001.30018 (and earlier) and 2017.011.30188 (and earlier) are missing support for an integrity check. An unauthenticated attacker would have the ability to completely manipulate data in a certified PDF without invalidating the original certification. Exploitation of this issue requires user interaction in that a victim must open the tampered file. | Acrobat, Acrobat_dc, Acrobat_reader, Acrobat_reader_dc | 8.1 |