Description
Multiple vulnerabilities were found in Adobe Acrobat and Adobe Acrobat Reader. Malicious users can exploit these vulnerabilities to execute arbitrary code, bypass security restrictions, obtain sensitive information, gain privileges.
Below is a complete list of vulnerabilities:
- Input validation vulnerability can be exploited to execute arbitrary code
- Out of bounds read vulnerability can be exploited to execute arbitrary code.
- Use after free vulnerability can be exploited execute arbitrary code.
- Out of bounds write vulnerability can be exploited to execute arbitrary code.
- Input validation vulnerability can be exploited to execute arbitrary code.
- Improper Access Control vulnerability can be exploited to bypass security restrictions.
- Integer Underflow (Wrap or Wraparound) vulnerability can be exploited to execute arbitrary code
- Improper Access Control vulnerability can be exploited to bypass security restrictions
- Out of bounds read vulnerability can be exploited to obtain sensitive information.
- Elevation of privilege vulnerability can be exploited remotely to gain privileges.
Original advisories
Related products
- Adobe-Acrobat-Reader-DC-Continuous
- Adobe-Acrobat-DC-Continuous
- Adobe-Acrobat-Reader-2020
- Adobe-Acrobat-2020
CVE list
- CVE-2023-26405 critical
- CVE-2023-26425 critical
- CVE-2023-26417 critical
- CVE-2023-26419 critical
- CVE-2023-26423 critical
- CVE-2023-26395 critical
- CVE-2023-26407 critical
- CVE-2023-26422 critical
- CVE-2023-26408 critical
- CVE-2023-26424 critical
- CVE-2023-26421 critical
- CVE-2023-26418 critical
- CVE-2023-26406 critical
- CVE-2023-26397 high
- CVE-2023-26420 critical
- CVE-2023-26396 critical
Read more
Find out the statistics of the vulnerabilities spreading in your region on statistics.securelist.com
Found an inaccuracy in the description of this vulnerability? Let us know!