Descripción
Multiple vulnerabilities were found in Adobe Acrobat and Adobe Acrobat Reader. Malicious users can exploit these vulnerabilities to execute arbitrary code, bypass security restrictions, obtain sensitive information, gain privileges.
Below is a complete list of vulnerabilities:
- Input validation vulnerability can be exploited to execute arbitrary code
- Out of bounds read vulnerability can be exploited to execute arbitrary code.
- Use after free vulnerability can be exploited execute arbitrary code.
- Out of bounds write vulnerability can be exploited to execute arbitrary code.
- Input validation vulnerability can be exploited to execute arbitrary code.
- Improper Access Control vulnerability can be exploited to bypass security restrictions.
- Integer Underflow (Wrap or Wraparound) vulnerability can be exploited to execute arbitrary code
- Improper Access Control vulnerability can be exploited to bypass security restrictions
- Out of bounds read vulnerability can be exploited to obtain sensitive information.
- Elevation of privilege vulnerability can be exploited remotely to gain privileges.
Notas informativas originales
Productos relacionados
- Adobe-Acrobat-Reader-DC-Continuous
- Adobe-Acrobat-DC-Continuous
- Adobe-Acrobat-Reader-2020
- Adobe-Acrobat-2020
Lista CVE
- CVE-2023-26405 critical
- CVE-2023-26425 critical
- CVE-2023-26417 critical
- CVE-2023-26419 critical
- CVE-2023-26423 critical
- CVE-2023-26395 critical
- CVE-2023-26407 critical
- CVE-2023-26422 critical
- CVE-2023-26408 critical
- CVE-2023-26424 critical
- CVE-2023-26421 critical
- CVE-2023-26418 critical
- CVE-2023-26406 critical
- CVE-2023-26397 high
- CVE-2023-26420 critical
- CVE-2023-26396 critical
Leer más
Conozca las estadísticas de las vulnerabilidades que se propagan en su región statistics.securelist.com
¿Has encontrado algún error en la descripción de esta vulnerabilidad? ¡Háznoslo saber!