..
Click anywhere to stop
Click anywhere to stop
Detect date
?
|
08/08/2017 |
Severity
?
|
Critical |
Description
|
Multiple serious vulnerabilities have been found in Adobe Acrobat and Adobe Reader. Malicious users can exploit these vulnerabilities to obtain sensitive information or execute arbitrary code. Below is a complete list of vulnerabilities:
Technical details Vulnerabilities (4) are related to text output, rendering a path, bitmap transformations, drawing of Unicode text strings, curve drawing, text strings, polygons, line segments, transformation of blocks of pixels, drawing ASCII text string, transfer of pixel blocks, Bezier curves. |
Affected products
|
Adobe Acrobat Reader DC Continuous earlier than 17.012.20098 |
Solution
|
Update to the latest versions |
Original advisories
|
|
Impacts
?
|
ACE [?] OSI [?] DoS [?] SB [?] |
Related products
|
Adobe Reader Adobe Acrobat Adobe Reader XI Adobe Acrobat XI Adobe Acrobat Reader DC Continuous Adobe Acrobat Reader DC Classic Adobe Acrobat DC Continuous Adobe Acrobat DC Classic Adobe Acrobat Reader 2017 Adobe Acrobat 2017 Adobe Acrobat Reader |
CVE-IDS
?
|
CVE-2017-30389.3Critical
CVE-2017-112219.3Critical CVE-2017-112229.3Critical CVE-2017-112239.3Critical CVE-2017-112249.3Critical CVE-2017-112269.3Critical CVE-2017-112279.3Critical CVE-2017-112289.3Critical CVE-2017-112296.8High CVE-2017-112304.3Warning CVE-2017-112319.3Critical CVE-2017-112324.3Warning CVE-2017-112334.3Warning CVE-2017-112349.3Critical CVE-2017-112359.3Critical CVE-2017-112364.3Warning CVE-2017-112379.3Critical CVE-2017-112384.3Warning CVE-2017-112394.3Warning CVE-2017-112419.3Critical CVE-2017-112424.3Warning CVE-2017-112434.3Warning CVE-2017-112444.3Warning CVE-2017-112454.3Warning CVE-2017-112464.3Warning CVE-2017-112484.3Warning CVE-2017-112494.3Warning CVE-2017-112519.3Critical CVE-2017-112524.3Warning CVE-2017-112546.8High CVE-2017-112554.3Warning CVE-2017-112569.3Critical CVE-2017-112579.3Critical CVE-2017-112584.3Warning CVE-2017-112599.3Critical CVE-2017-112609.3Critical CVE-2017-112619.3Critical CVE-2017-112629.3Critical CVE-2017-112636.8High CVE-2017-112654.3Warning CVE-2017-112679.3Critical CVE-2017-112689.3Critical CVE-2017-112699.3Critical CVE-2017-112709.3Critical CVE-2017-112719.3Critical CVE-2017-30169.3Critical CVE-2017-31139.3Critical CVE-2017-31154.3Warning CVE-2017-31169.3Critical CVE-2017-31179.3Critical CVE-2017-31184.3Warning CVE-2017-31196.8High CVE-2017-31209.3Critical CVE-2017-31219.3Critical CVE-2017-31224.3Warning CVE-2017-31239.3Critical CVE-2017-112094.3Warning CVE-2017-112104.3Warning CVE-2017-112119.3Critical CVE-2017-112129.3Critical CVE-2017-112149.3Critical CVE-2017-112169.3Critical CVE-2017-112174.3Warning CVE-2017-112189.3Critical CVE-2017-112199.3Critical CVE-2017-112209.3Critical |
Exploitation
|
Malware exists for this vulnerability. Usually such malware is classified as Exploit. More details. |
Find out the statistics of the vulnerabilities spreading in your region |