Description
Multiple vulnerabilities were found in Adobe Acrobat and Adobe Acrobat Reader. Malicious users can exploit these vulnerabilities to obtain sensitive information and execute arbitrary code, bypass security restrictions.
Below is a complete list of vulnerabilities:
- Multiple out-of-bound read vulnerabilities can be exploited to obtain sensitive information;
- Multiple out-of-bounds write vulnerabilities can be exploited to execute arbitrary code;
- A command injection vulnerability can be exploited to execute arbitrary code;
- Multiple use-after-free vulnerabilities can be exploited to execute arbitrary code;
- Multiple heap overflow vulnerabilities can be exploited to execute arbitrary code;
- A buffer error vulnerability can be exploited to execute arbitrary code;
- A double free vulnerability can be exploited to execute arbitrary code;
- Multiple integer overflow vulnerabilities can be exploited to obtain sensitive information;
- An internal IP disclosure vulnerability can be exploited to obtain sensitive information;
- A type confusion vulnerability can be exploited to execute arbitrary code;
- Multiple untrusted pointer dereference vulnerabilities can be exploited to execute arbitrary code;
- Insufficiently Robust Encryption can be exploited to bypass security restrictions;
Original advisories
Exploitation
Public exploits exist for this vulnerability.
Malware exists for this vulnerability. Usually such malware is classified as Exploit. More details.
Related products
- Adobe-Acrobat-Reader-DC-Continuous
- Adobe-Acrobat-Reader-DC-Classic
- Adobe-Acrobat-DC-Continuous
- Adobe-Acrobat-DC-Classic
- Adobe-Acrobat-Reader-2017
- Adobe-Acrobat-2017
CVE list
- CVE-2019-8077 critical
- CVE-2019-8094 critical
- CVE-2019-8095 critical
- CVE-2019-8096 critical
- CVE-2019-8102 critical
- CVE-2019-8103 critical
- CVE-2019-8104 critical
- CVE-2019-8105 critical
- CVE-2019-8106 critical
- CVE-2019-8002 critical
- CVE-2019-8004 critical
- CVE-2019-8005 critical
- CVE-2019-8007 critical
- CVE-2019-8010 critical
- CVE-2019-8011 critical
- CVE-2019-8012 critical
- CVE-2019-8018 critical
- CVE-2019-8020 critical
- CVE-2019-8021 critical
- CVE-2019-8032 critical
- CVE-2019-8035 warning
- CVE-2019-8037 warning
- CVE-2019-8040 high
- CVE-2019-8043 critical
- CVE-2019-8052 warning
- CVE-2019-8098 critical
- CVE-2019-8100 critical
- CVE-2019-7965 critical
- CVE-2019-8008 critical
- CVE-2019-8009 critical
- CVE-2019-8016 critical
- CVE-2019-8022 critical
- CVE-2019-8023 critical
- CVE-2019-8027 high
- CVE-2019-8060 critical
- CVE-2019-8003 critical
- CVE-2019-8013 critical
- CVE-2019-8024 critical
- CVE-2019-8025 critical
- CVE-2019-8026 critical
- CVE-2019-8028 critical
- CVE-2019-8029 critical
- CVE-2019-8030 critical
- CVE-2019-8031 critical
- CVE-2019-8033 critical
- CVE-2019-8034 critical
- CVE-2019-8036 critical
- CVE-2019-8038 critical
- CVE-2019-8039 critical
- CVE-2019-8047 critical
- CVE-2019-8051 warning
- CVE-2019-8053 warning
- CVE-2019-8054 warning
- CVE-2019-8055 critical
- CVE-2019-8056 warning
- CVE-2019-8057 critical
- CVE-2019-8058 warning
- CVE-2019-8059 warning
- CVE-2019-8061 critical
- CVE-2019-8014 critical
- CVE-2019-8015 critical
- CVE-2019-8041 critical
- CVE-2019-8042 critical
- CVE-2019-8046 critical
- CVE-2019-8049 critical
- CVE-2019-8050 critical
- CVE-2019-8048 critical
- CVE-2019-8044 critical
- CVE-2019-8099 critical
- CVE-2019-8101 critical
- CVE-2019-8097 high
- CVE-2019-8019 critical
- CVE-2019-8006 critical
- CVE-2019-8017 critical
- CVE-2019-8045 critical
- CVE-2019-8066 critical
- CVE-2019-8237 critical
- CVE-2019-8249 critical
- CVE-2019-8250 critical
- CVE-2019-8251 high
- CVE-2019-8252 high
- CVE-2019-8257 critical
Read more
Find out the statistics of the vulnerabilities spreading in your region on statistics.securelist.com
Found an inaccuracy in the description of this vulnerability? Let us know!