Note:
This project will be discontinued after December 13, 2021. [more]
Product:
Acrobat_reader
(Adobe)Repositories |
Unknown: This might be proprietary software. |
#Vulnerabilities | 1014 |
Date | Id | Summary | Products | Score | Patch | Annotated |
---|---|---|---|---|---|---|
2018-05-19 | CVE-2017-11308 | Adobe Acrobat and Reader versions 2017.012.20098 and earlier, 2017.011.30066 and earlier, 2015.006.30355 and earlier, 11.0.22 and earlier have an exploitable heap overflow vulnerability. Successful exploitation could lead to arbitrary code execution in the context of the current user. | Acrobat, Acrobat_dc, Acrobat_reader, Acrobat_reader_dc | 9.8 | ||
2018-05-19 | CVE-2018-4918 | Adobe Acrobat and Reader versions 2018.009.20050 and earlier, 2017.011.30070 and earlier, 2015.006.30394 and earlier have an exploitable out-of-bounds write vulnerability. Successful exploitation could lead to arbitrary code execution in the context of the current user. | Acrobat, Acrobat_dc, Acrobat_reader, Acrobat_reader_dc | 9.8 | ||
2020-11-05 | CVE-2020-24427 | Acrobat Reader versions 2020.012.20048 (and earlier), 2020.001.30005 (and earlier) and 2017.011.30175 (and earlier) are affected by an input validation vulnerability when decoding a crafted codec that could result in the disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file. | Acrobat, Acrobat_dc, Acrobat_reader, Acrobat_reader_dc | 3.3 | ||
2020-11-05 | CVE-2020-24428 | Acrobat Reader DC versions 2020.012.20048 (and earlier), 2020.001.30005 (and earlier) and 2017.011.30175 (and earlier) for macOS are affected by a time-of-check time-of-use (TOCTOU) race condition vulnerability that could result in local privilege escalation. Exploitation of this issue requires user interaction in that a victim must open a malicious file. | Acrobat, Acrobat_dc, Acrobat_reader, Acrobat_reader_dc | 7.7 | ||
2020-11-05 | CVE-2020-24429 | Acrobat Reader DC versions 2020.012.20048 (and earlier), 2020.001.30005 (and earlier) and 2017.011.30175 (and earlier) for macOS are affected by a signature verification bypass that could result in local privilege escalation. Exploitation of this issue requires user interaction in that a victim must open a malicious file. | Acrobat, Acrobat_dc, Acrobat_reader, Acrobat_reader_dc | 7.8 | ||
2020-11-05 | CVE-2020-24430 | Acrobat Reader DC versions 2020.012.20048 (and earlier), 2020.001.30005 (and earlier) and 2017.011.30175 (and earlier) are affected by a use-after-free vulnerability when handling malicious JavaScript. This vulnerability could result in arbitrary code execution in the context of the current user. Exploitation requires user interaction in that a victim must open a malicious file. | Acrobat, Acrobat_dc, Acrobat_reader, Acrobat_reader_dc | 7.8 | ||
2020-11-05 | CVE-2020-24431 | Acrobat Reader DC versions 2020.012.20048 (and earlier), 2020.001.30005 (and earlier) and 2017.011.30175 (and earlier) for macOS are affected by a security feature bypass that could result in dynamic library code injection by the Adobe Reader process. Exploitation of this issue requires user interaction in that a victim must open a malicious file. | Acrobat, Acrobat_dc, Acrobat_reader, Acrobat_reader_dc | 4.4 | ||
2020-11-05 | CVE-2020-24432 | Acrobat Reader DC versions 2020.012.20048 (and earlier), 2020.001.30005 (and earlier) and 2017.011.30175 (and earlier) and Adobe Acrobat Pro DC 2017.011.30175 (and earlier) are affected by an improper input validation vulnerability that could result in arbitrary JavaScript execution in the context of the current user. To exploit this issue, an attacker must acquire and then modify a certified PDF document that is trusted by the victim. The attacker then needs to convince the victim to open... | Acrobat, Acrobat_dc, Acrobat_reader, Acrobat_reader_dc | 7.8 | ||
2020-11-05 | CVE-2020-24435 | Acrobat Reader DC versions 2020.012.20048 (and earlier), 2020.001.30005 (and earlier) and 2017.011.30175 (and earlier) are affected by a heap-based buffer overflow vulnerability in the submitForm function, potentially resulting in arbitrary code execution in the context of the current user. Exploitation requires user interaction in that a victim must open a crafted .pdf file in Acrobat Reader. | Acrobat, Acrobat_dc, Acrobat_reader, Acrobat_reader_dc | 7.8 | ||
2020-11-05 | CVE-2020-24437 | Acrobat Reader DC versions 2020.012.20048 (and earlier), 2020.001.30005 (and earlier) and 2017.011.30175 (and earlier) are affected by a use-after-free vulnerability in the processing of Format event actions that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. | Acrobat, Acrobat_dc, Acrobat_reader, Acrobat_reader_dc | 7.8 |