Kaspersky ID:
KLA11421
Дата обнаружения:
12/02/2019
Обновлено:
28/10/2025

Описание

Multiple vulnerabilities were found in Adobe Acrobat and Reader. Malicious users can exploit these vulnerabilities to execute arbitrary code, obtain sensitive information, gain privileges.

Below is a complete list of vulnerabilities:

  1. Multiple buffer errors vulnerabilities can be exploited remotely to execute arbitrary code;
  2. Multiple data leakage vulnerabilities can be exploited remotely to obtain sensitive information;
  3. Multiple double free vulnerabilities can be exploited remotely to execute arbitrary code;
  4. Multiple integer overflow vulnerabilities can be exploited remotely to obtain sensitive information;
  5. Multiple out-of-bounds read vulnerabilities can be exploited remotely to obtain sensitive information;
  6. Multiple security bypass vulnerabilities can be exploited remotely to gain privileges;
  7. Multiple out-of-bounds write vulnerabilities can be exploited remotely to execute arbitrary code;
  8. Multiple type confusion vulnerabilities can be exploited remotely to execute arbitrary code;
  9. Multiple untrusted pointer dereference vulnerabilities can be exploited remotely to execute arbitrary code;
  10. Multiple use after free vulnerabilities can be exploited remotely to execute arbitrary code.

Первичный источник обнаружения

Эксплуатация

Public exploits exist for this vulnerability.

Malware exists for this vulnerability. Usually such malware is classified as Exploit. More details.

Связанные продукты

Список CVE

  • CVE-2019-7020
    critical
  • CVE-2019-7085
    critical
  • CVE-2019-7089
    critical
  • CVE-2019-7080
    critical
  • CVE-2019-7030
    critical
  • CVE-2019-7021
    critical
  • CVE-2019-7022
    critical
  • CVE-2019-7023
    critical
  • CVE-2019-7024
    critical
  • CVE-2019-7028
    critical
  • CVE-2019-7032
    critical
  • CVE-2019-7033
    critical
  • CVE-2019-7034
    critical
  • CVE-2019-7035
    critical
  • CVE-2019-7036
    critical
  • CVE-2019-7038
    critical
  • CVE-2019-7045
    high
  • CVE-2019-7047
    critical
  • CVE-2019-7049
    high
  • CVE-2019-7053
    critical
  • CVE-2019-7055
    critical
  • CVE-2019-7056
    critical
  • CVE-2019-7057
    critical
  • CVE-2019-7058
    critical
  • CVE-2019-7059
    critical
  • CVE-2019-7063
    critical
  • CVE-2019-7064
    critical
  • CVE-2019-7065
    critical
  • CVE-2019-7067
    critical
  • CVE-2019-7071
    high
  • CVE-2019-7073
    high
  • CVE-2019-7074
    high
  • CVE-2019-7081
    critical
  • CVE-2018-19725
    critical
  • CVE-2019-7041
    critical
  • CVE-2019-7019
    critical
  • CVE-2019-7027
    critical
  • CVE-2019-7037
    critical
  • CVE-2019-7039
    critical
  • CVE-2019-7052
    critical
  • CVE-2019-7060
    critical
  • CVE-2019-7079
    critical
  • CVE-2019-7069
    critical
  • CVE-2019-7086
    critical
  • CVE-2019-7087
    critical
  • CVE-2019-7042
    critical
  • CVE-2019-7046
    critical
  • CVE-2019-7051
    critical
  • CVE-2019-7054
    critical
  • CVE-2019-7066
    critical
  • CVE-2019-7076
    critical
  • CVE-2019-7018
    critical
  • CVE-2019-7025
    critical
  • CVE-2019-7026
    critical
  • CVE-2019-7029
    critical
  • CVE-2019-7031
    critical
  • CVE-2019-7040
    critical
  • CVE-2019-7043
    critical
  • CVE-2019-7044
    critical
  • CVE-2019-7048
    critical
  • CVE-2019-7050
    critical
  • CVE-2019-7062
    critical
  • CVE-2019-7068
    critical
  • CVE-2019-7070
    critical
  • CVE-2019-7072
    critical
  • CVE-2019-7075
    high
  • CVE-2019-7077
    critical
  • CVE-2019-7078
    critical
  • CVE-2019-7082
    critical
  • CVE-2019-7083
    critical
  • CVE-2019-7084
    critical

Смотрите также

Узнай статистику распространения уязвимостей в своем регионе statistics.securelist.com

Нашли неточность в описании этой уязвимости? Дайте нам знать!
Kaspersky IT Security Calculator:
Оцените ваш профиль кибербезопасности
Узнать больше
Встречай новый Kaspersky!
Каждая минута твоей онлайн-жизни заслуживает топовой защиты.
Узнать больше
Confirm changes?
Your message has been sent successfully.