This CPE summary could be partial or incomplete. Please contact us for a detailed listing.

Summary

Detail
Vendor Adobe First view 2017-08-11
Product Acrobat Reader Dc Last view 2024-09-05
Version 17.011.30068 Type Application
Update *  
Edition *  
Language *  
Sofware Edition classic  
Target Software *  
Target Hardware *  
Other *  
 
CPE Product cpe:2.3:a:adobe:acrobat_reader_dc

Activity : Overall

Related : CVE

This CPE have more than 25 Relations. If you want to see a complete summary for this CPE, please contact us.
  Date Alert Description
5.5 2024-09-05 CVE-2024-45107

Acrobat Reader versions 20.005.30636, 24.002.20964, 24.001.30123, 24.002.20991 and earlier are affected by a Use After Free vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file.

5.5 2024-08-14 CVE-2024-41835

Acrobat Reader versions 20.005.30636, 24.002.20965, 24.002.20964, 24.001.30123 and earlier are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file.

5.5 2024-08-14 CVE-2024-41834

Acrobat Reader versions 20.005.30636, 24.002.20965, 24.002.20964, 24.001.30123 and earlier are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file.

5.5 2024-08-14 CVE-2024-41833

Acrobat Reader versions 20.005.30636, 24.002.20965, 24.002.20964, 24.001.30123 and earlier are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file.

5.5 2024-08-14 CVE-2024-41832

Acrobat Reader versions 20.005.30636, 24.002.20965, 24.002.20964, 24.001.30123 and earlier are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file.

7.8 2024-08-14 CVE-2024-41831

Acrobat Reader versions 20.005.30636, 24.002.20965, 24.002.20964, 24.001.30123 and earlier are affected by a Use After Free vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.

7.8 2024-08-14 CVE-2024-41830

Acrobat Reader versions 20.005.30636, 24.002.20965, 24.002.20964, 24.001.30123 and earlier are affected by a Use After Free vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.

7.8 2024-08-14 CVE-2024-39426

Acrobat Reader versions 20.005.30636, 24.002.20965, 24.002.20964, 24.001.30123 and earlier are affected by an out-of-bounds read vulnerability when parsing a crafted file, which could result in a read past the end of an allocated memory structure. An attacker could leverage this vulnerability to execute code in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.

7 2024-08-14 CVE-2024-39425

Acrobat Reader versions 20.005.30636, 24.002.20965, 24.002.20964, 24.001.30123 and earlier are affected by a Time-of-check Time-of-use (TOCTOU) Race Condition vulnerability that could lead to privilege escalation. Exploitation of this issue require local low-privilege access to the affected system and attack complexity is high.

7.8 2024-08-14 CVE-2024-39424

Acrobat Reader versions 20.005.30636, 24.002.20965, 24.002.20964, 24.001.30123 and earlier are affected by a Use After Free vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.

7.8 2024-08-14 CVE-2024-39423

Acrobat Reader versions 20.005.30636, 24.002.20965, 24.002.20964, 24.001.30123 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.

7.8 2024-08-14 CVE-2024-39422

Acrobat Reader versions 20.005.30636, 24.002.20965, 24.002.20964, 24.001.30123 and earlier are affected by a Use After Free vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.

7 2024-08-14 CVE-2024-39420

Acrobat Reader versions 20.005.30636, 24.002.21005, 24.001.30159, 20.005.30655, 24.002.20965, 24.002.20964, 24.001.30123, 24.003.20054 and earlier are affected by a Time-of-check Time-of-use (TOCTOU) Race Condition vulnerability that could lead to arbitrary code execution. This vulnerability arises when the timing of actions changes the state of a resource between the checking of a condition and the use of the resource, allowing an attacker to manipulate the resource in a harmful way. Exploitation of this issue requires user interaction in that a victim must open a malicious file.

7.8 2024-08-14 CVE-2024-39383

Acrobat Reader versions 20.005.30636, 24.002.20965, 24.002.20964, 24.001.30123 and earlier are affected by a Use After Free vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.

5.5 2024-02-15 CVE-2024-20749

Acrobat Reader versions 20.005.30539, 23.008.20470 and earlier are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file.

5.5 2024-02-15 CVE-2024-20748

Acrobat Reader versions 20.005.30539, 23.008.20470 and earlier are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file.

5.5 2024-02-15 CVE-2024-20747

Acrobat Reader versions 20.005.30539, 23.008.20470 and earlier are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file.

5.5 2024-02-15 CVE-2024-20736

Acrobat Reader versions 20.005.30539, 23.008.20470 and earlier are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file.

5.5 2024-02-15 CVE-2024-20735

Acrobat Reader versions 20.005.30539, 23.008.20470 and earlier are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file.

5.5 2024-02-15 CVE-2024-20734

Acrobat Reader versions 20.005.30539, 23.008.20470 and earlier are affected by a Use After Free vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file.

5.5 2024-02-15 CVE-2024-20733

Acrobat Reader versions 20.005.30539, 23.008.20470 and earlier are affected by an Improper Input Validation vulnerability that could lead to an application denial-of-service. An attacker could leverage this vulnerability to cause the application to crash, resulting in a denial of service. Exploitation of this issue requires user interaction in that a victim must open a malicious file.

7.8 2024-02-15 CVE-2024-20731

Acrobat Reader versions 20.005.30539, 23.008.20470 and earlier are affected by a Use After Free vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.

7.8 2024-02-15 CVE-2024-20730

Acrobat Reader versions 20.005.30539, 23.008.20470 and earlier are affected by an Integer Overflow or Wraparound vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.

7.8 2024-02-15 CVE-2024-20729

Acrobat Reader versions 20.005.30539, 23.008.20470 and earlier are affected by a Use After Free vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.

7.8 2024-02-15 CVE-2024-20728

Acrobat Reader versions 20.005.30539, 23.008.20470 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.

CWE : Common Weakness Enumeration

This CPE have more than 25 Relations. If you want to see a complete summary for this CPE, please contact us.
%idName
39% (462) CWE-125 Out-of-bounds Read
27% (321) CWE-416 Use After Free
17% (205) CWE-787 Out-of-bounds Write
5% (63) CWE-119 Failure to Constrain Operations within the Bounds of a Memory Buffer
1% (23) CWE-476 NULL Pointer Dereference
1% (14) CWE-200 Information Exposure
1% (13) CWE-190 Integer Overflow or Wraparound
0% (10) CWE-704 Incorrect Type Conversion or Cast
0% (9) CWE-20 Improper Input Validation
0% (6) CWE-415 Double Free
0% (6) CWE-122 Heap-based Buffer Overflow
0% (6) CWE-120 Buffer Copy without Checking Size of Input ('Classic Buffer Overflo...
0% (4) CWE-427 Uncontrolled Search Path Element
0% (4) CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path ...
0% (3) CWE-401 Failure to Release Memory Before Removing Last Reference ('Memory L...
0% (3) CWE-400 Uncontrolled Resource Consumption ('Resource Exhaustion')
0% (3) CWE-367 Time-of-check Time-of-use (TOCTOU) Race Condition
0% (3) CWE-347 Improper Verification of Cryptographic Signature
0% (3) CWE-121 Stack-based Buffer Overflow
0% (2) CWE-379 Creation of Temporary File in Directory with Incorrect Permissions
0% (2) CWE-362 Race Condition
0% (2) CWE-353 Failure to Add Integrity Check Value
0% (2) CWE-129 Improper Validation of Array Index
0% (1) CWE-674 Uncontrolled Recursion
0% (1) CWE-668 Exposure of Resource to Wrong Sphere

Snort® IPS/IDS

This CPE have more than 25 Relations. If you want to see a complete summary for this CPE, please contact us.
Date Description
2020-07-07 Adobe Reader custom JavaScript field use-after-free attempt
RuleID : 54190 - Type : FILE-PDF - Revision : 1
2020-07-07 Adobe Reader custom JavaScript field use-after-free attempt
RuleID : 54189 - Type : FILE-PDF - Revision : 1
2020-12-05 TRUFFLEHUNTER TALOS-2020-1031 attack attempt
RuleID : 53564 - Type : FILE-PDF - Revision : 2
2020-12-05 TRUFFLEHUNTER TALOS-2020-1031 attack attempt
RuleID : 53563 - Type : FILE-PDF - Revision : 3
2020-12-05 TRUFFLEHUNTER TALOS-2020-1028 attack attempt
RuleID : 53486 - Type : FILE-PDF - Revision : 2
2020-12-05 TRUFFLEHUNTER TALOS-2020-1028 attack attempt
RuleID : 53485 - Type : FILE-PDF - Revision : 2
2020-03-24 Adobe Acrobat CTextWidget memory corruption attempt
RuleID : 53149 - Type : FILE-PDF - Revision : 1
2020-03-24 Adobe Acrobat CTextWidget memory corruption attempt
RuleID : 53148 - Type : FILE-PDF - Revision : 1
2020-01-07 Adobe Acrobat and Reader crafted .joboptions file download attempt
RuleID : 52383 - Type : FILE-OTHER - Revision : 1
2019-12-03 Adobe Acrobat Reader JP2 image stream parsing double free attempt
RuleID : 52041 - Type : FILE-PDF - Revision : 1
2019-12-03 Adobe Acrobat Reader JP2 image stream parsing double free attempt
RuleID : 52040 - Type : FILE-PDF - Revision : 1
2019-10-01 Adobe Acrobat XPS TTF cmap out-of-bounds read attempt
RuleID : 51380 - Type : FILE-OTHER - Revision : 1
2019-10-01 Adobe Acrobat XPS TTF cmap out-of-bounds read attempt
RuleID : 51379 - Type : FILE-OTHER - Revision : 1
2019-08-27 Schneider Electric Quantum modicon ethernet module unauthenticated password r...
RuleID : 50779 - Type : SERVER-WEBAPP - Revision : 1
2019-07-16 Adobe Acrobat double free attempt
RuleID : 50449 - Type : FILE-PDF - Revision : 1
2019-07-16 Adobe Acrobat double free attempt
RuleID : 50448 - Type : FILE-PDF - Revision : 1
2019-07-04 Adobe Acrobat execCalculate use after free attempt
RuleID : 50298 - Type : FILE-PDF - Revision : 2
2019-07-04 Adobe Acrobat execCalculate use after free attempt
RuleID : 50297 - Type : FILE-PDF - Revision : 2
2019-07-02 Adobe Acrobat out-of-bounds read attempt
RuleID : 50272 - Type : FILE-PDF - Revision : 1
2019-07-02 Adobe Acrobat out-of-bounds read attempt
RuleID : 50271 - Type : FILE-PDF - Revision : 1
2019-07-02 Adobe Acrobat out-of-bounds read attempt
RuleID : 50257 - Type : FILE-OTHER - Revision : 1
2019-07-02 Adobe Acrobat out-of-bounds read attempt
RuleID : 50256 - Type : FILE-OTHER - Revision : 1
2019-07-02 Adobe Acrobat out-of-bounds write attempt
RuleID : 50255 - Type : FILE-PDF - Revision : 1
2019-07-02 Adobe Acrobat out-of-bounds write attempt
RuleID : 50254 - Type : FILE-PDF - Revision : 1
2019-07-02 Adobe Acrobat out-of-bounds write attempt
RuleID : 50253 - Type : FILE-IMAGE - Revision : 1

Nessus® Vulnerability Scanner

This CPE have more than 25 Relations. If you want to see a complete summary for this CPE, please contact us.
id Description
2019-01-04 Name: The version of Adobe Reader installed on the remote macOS host is affected by...
File: macosx_adobe_reader_apsb19-02.nasl - Type: ACT_GATHER_INFO
2019-01-04 Name: The version of Adobe Acrobat installed on the remote macOS host is affected b...
File: macosx_adobe_acrobat_apsb19-02.nasl - Type: ACT_GATHER_INFO
2019-01-04 Name: The version of Adobe Reader installed on the remote Windows host is affected ...
File: adobe_reader_apsb19-02.nasl - Type: ACT_GATHER_INFO
2019-01-04 Name: The version of Adobe Acrobat installed on the remote Windows host is affected...
File: adobe_acrobat_apsb19-02.nasl - Type: ACT_GATHER_INFO
2018-12-14 Name: The version of Adobe Reader installed on the remote host is affected by multi...
File: macosx_adobe_reader_apsb18-41.nasl - Type: ACT_GATHER_INFO
2018-12-14 Name: The version of Adobe Acrobat installed on the remote host is affected by mult...
File: macosx_adobe_acrobat_apsb18-41.nasl - Type: ACT_GATHER_INFO
2018-12-14 Name: The version of Adobe Reader installed on the remote Windows host is affected ...
File: adobe_reader_apsb18-41.nasl - Type: ACT_GATHER_INFO
2018-12-14 Name: The version of Adobe Acrobat installed on the remote Windows host is affected...
File: adobe_acrobat_apsb18-41.nasl - Type: ACT_GATHER_INFO
2018-11-14 Name: The version of Adobe Acrobat installed on the remote Windows host is affected...
File: adobe_acrobat_apsb18-40.nasl - Type: ACT_GATHER_INFO
2018-11-14 Name: The version of Adobe Reader installed on the remote Windows host is affected ...
File: adobe_reader_apsb18-40.nasl - Type: ACT_GATHER_INFO
2018-10-02 Name: The version of Adobe Reader installed on the remote host is affected by multi...
File: macosx_adobe_reader_apsb18-30.nasl - Type: ACT_GATHER_INFO
2018-10-02 Name: The version of Adobe Acrobat installed on the remote host is affected by mult...
File: macosx_adobe_acrobat_apsb18-30.nasl - Type: ACT_GATHER_INFO
2018-10-02 Name: The version of Adobe Reader installed on the remote Windows host is affected ...
File: adobe_reader_apsb18-30.nasl - Type: ACT_GATHER_INFO
2018-10-02 Name: The version of Adobe Acrobat installed on the remote Windows host is affected...
File: adobe_acrobat_apsb18-30.nasl - Type: ACT_GATHER_INFO
2018-09-19 Name: The version of Adobe Reader installed on the remote host is affected by multi...
File: macosx_adobe_reader_apsb18-34.nasl - Type: ACT_GATHER_INFO
2018-09-19 Name: The version of Adobe Acrobat installed on the remote host is affected by mult...
File: macosx_adobe_acrobat_apsb18-34.nasl - Type: ACT_GATHER_INFO
2018-09-19 Name: The version of Adobe Reader installed on the remote Windows host is affected ...
File: adobe_reader_apsb18-34.nasl - Type: ACT_GATHER_INFO
2018-09-19 Name: The version of Adobe Acrobat installed on the remote Windows host is affected...
File: adobe_acrobat_apsb18-34.nasl - Type: ACT_GATHER_INFO
2018-08-16 Name: The version of Adobe Reader installed on the remote Windows host is affected ...
File: adobe_reader_apsb18-29.nasl - Type: ACT_GATHER_INFO
2018-08-16 Name: The version of Adobe Reader installed on the remote host is affected by multi...
File: macosx_adobe_reader_apsb18-29.nasl - Type: ACT_GATHER_INFO
2018-08-16 Name: The version of Adobe Acrobat installed on the remote host is affected by mult...
File: macosx_adobe_acrobat_apsb18-29.nasl - Type: ACT_GATHER_INFO
2018-08-16 Name: The version of Adobe Acrobat installed on the remote Windows host is affected...
File: adobe_acrobat_apsb18-29.nasl - Type: ACT_GATHER_INFO
2018-07-12 Name: The version of Adobe Reader installed on the remote host is affected by multi...
File: macosx_adobe_reader_apsb18-21.nasl - Type: ACT_GATHER_INFO
2018-07-12 Name: The version of Adobe Acrobat installed on the remote host is affected by mult...
File: macosx_adobe_acrobat_apsb18-21.nasl - Type: ACT_GATHER_INFO
2018-07-12 Name: The version of Adobe Reader installed on the remote Windows host is affected ...
File: adobe_reader_apsb18-21.nasl - Type: ACT_GATHER_INFO