Description
Multiple vulnerabilities were found in in Adobe Acrobat and Adobe Acrobat Reader. Malicious users can exploit these vulnerabilities to obtain sensitive information, bypass security restrictions, execute arbitrary code, cause denial of service.
Below is a complete list of vulnerabilities:
- Memory access vulnerability can be exploited to obtain sensitive information.
- Race condition vulnerability can be exploited to bypass security restrictions.
- Security vulnerability can be exploited to bypass security restrictions.
- Use after free vulnerability can be exploited to execute arbitrary code.
- Buffer vulnerability can be exploited to execute arbitrary code.
- Out of bound read vulnerability can be exploited to obtain sensitive information.
- Stack exhaustion vulnerability can be exploited to cause denial of service.
- Out of bounds write vulnerability can be exploited to execute arbitrary code.
- Null pointer vulnerability can be exploited to cause denial of service.
- Heap overflow vulnerability can be exploited to execute arbitrary code.
Fiches de renseignement originales
Exploitation
Malware exists for this vulnerability. Usually such malware is classified as Exploit. More details.
Produits associés
- Adobe-Acrobat-Reader-DC-Continuous
- Adobe-Acrobat-Reader-DC-Classic
- Adobe-Acrobat-DC-Continuous
- Adobe-Acrobat-DC-Classic
- Adobe-Acrobat-Reader-2017
- Adobe-Acrobat-2017
Liste CVE
- CVE-2020-9598 warning
- CVE-2020-9593 warning
- CVE-2020-9615 high
- CVE-2020-9613 high
- CVE-2020-9607 high
- CVE-2020-9595 warning
- CVE-2020-9604 high
- CVE-2020-9602 warning
- CVE-2020-9606 warning
- CVE-2020-9603 warning
- CVE-2020-9599 warning
- CVE-2020-9611 warning
- CVE-2020-9594 high
- CVE-2020-9614 high
- CVE-2020-9608 warning
- CVE-2020-9610 warning
- CVE-2020-9596 high
- CVE-2020-9601 warning
- CVE-2020-9600 warning
- CVE-2020-9605 high
- CVE-2020-9592 high
- CVE-2020-9609 warning
- CVE-2020-9597 high
- CVE-2020-9612 high
En savoir plus
Découvrez les statistiques de la propagation des vulnérabilités dans votre région statistics.securelist.com
Vous avez trouvé une inexactitude dans la description de cette vulnérabilité ? Faites-le nous savoir !