Kaspersky ID:
KLA12418
Date de la détection:
01/11/2022
Mis à jour:
01/28/2026

Description

Multiple vulnerabilities were found in Adobe Acrobat and Adobe Acrobat Reader. Malicious users can exploit these vulnerabilities to bypass security restrictions, execute arbitrary code, cause denial of service, gain privileges, obtain sensitive information.

Below is a complete list of vulnerabilities:

  1. Input validation vulnerability can be exploited to bypass security restrictions.
  2. Use after free vulnerability can be exploited to execute arbitrary code.
  3. Out of bounds write vulnerability can be exploited to execute arbitrary code.
  4. Heap buffer overflow vulnerability can be exploited to execute arbitrary code.
  5. NULL pointer dereference vulnerability can be exploited to cause denial of service.
  6. Security bypass vulnerability can be exploited to bypass security restrictions.
  7. Use after free vulnerability can be exploited to gain privileges.
  8. Use after free vulnerability can be exploited to cause denial of service.
  9. Out of bounds read vulnerability can be exploited to obtain sensitive information.
  10. Memory access vulnerability can be exploited to cause denial of service or execute arbitrary code.
  11. Out of bounds read vulnerability can be exploited to execute arbitrary code.
  12. Access control vulnerability can be exploited to gain privileges.
  13. Integer overflow vulnerability can be exploited to execute arbitrary code.
  14. Access of uninitialized pointer vulnerability can be exploited to execute arbitrary code.
  15. Out of bounds read vulnerability can be exploited to execute arbitrary code or cause denial of service.
  16. Stack buffer overflow vulnerability can be exploited to execute arbitrary code.
  17. Input validation vulnerability can be exploited to cause denial of service.
  18. Out of bounds write vulnerability can be exploited to execute arbitrary code or cause denial of service.

Fiches de renseignement originales

Exploitation

Public exploits exist for this vulnerability.

Malware exists for this vulnerability. Usually such malware is classified as Exploit. More details.

Produits associés

Liste CVE

  • CVE-2021-44739
    warning
  • CVE-2021-44701
    critical
  • CVE-2021-45068
    critical
  • CVE-2021-44708
    critical
  • CVE-2021-44709
    critical
  • CVE-2021-45064
    critical
  • CVE-2021-44741
    high
  • CVE-2021-44714
    warning
  • CVE-2021-45062
    critical
  • CVE-2021-45063
    high
  • CVE-2021-44713
    high
  • CVE-2021-44707
    critical
  • CVE-2021-44742
    high
  • CVE-2021-44710
    critical
  • CVE-2021-45067
    high
  • CVE-2021-45060
    critical
  • CVE-2021-44702
    warning
  • CVE-2021-45061
    critical
  • CVE-2021-44711
    critical
  • CVE-2021-44705
    critical
  • CVE-2021-44715
    high
  • CVE-2021-44703
    critical
  • CVE-2021-44706
    critical
  • CVE-2021-44740
    high
  • CVE-2021-44712
    high
  • CVE-2021-44704
    critical
  • CVE-2022-24091
    critical
  • CVE-2022-24092
    critical

En savoir plus

Découvrez les statistiques de la propagation des vulnérabilités dans votre région statistics.securelist.com

Vous avez trouvé une inexactitude dans la description de cette vulnérabilité ? Faites-le nous savoir !
Kaspersky IT Security Calculator:
Calculez le profil de sécurité de votre entreprise
Apprendre encore plus
Kaspersky!
Votre vie en ligne mérite une protection complète!
Apprendre encore plus
Do you want to save your changes?
Your message has been sent successfully.