Описание
Multiple vulnerabilities were found in Adobe Acrobat and Adobe Acrobat Reader. Malicious users can exploit these vulnerabilities to execute arbitrary code, cause denial of service, gain privileges, obtain sensitive information.
Below is a complete list of vulnerabilities:
- OS command injection vulnerability can be exploited to execute arbitrary code.
- Use after free vulnerability can be exploited to execute arbitrary code.
- Information disclosure vulnerability can be exploited to cause denial of service or execute arbitrary code.
- Code execution vulnerability can be exploited to execute arbitrary code.
- NULL Pointer Dereference vulnerability can be exploited to dcause denial of service.
- Out of bounds read vulnerability can be exploited to to gain privileges.
- Buffer overflow vulnerability can be exploited to execute arbitrary code.
- Type confusion vulnerability can be exploited to execute arbitrary code.
- Out of bounds write vulnerability can be exploited to cause denial of service or execute arbitrary code.
- Out of bounds read vulnerability can be exploited to obtain sensitive information.
- Type confusion vulnerability can be exploited to cause denial of service
Первичный источник обнаружения
Связанные продукты
- Adobe-Acrobat-Reader-DC-Continuous
- Adobe-Acrobat-DC-Continuous
- Adobe-Acrobat-Reader-2017
- Adobe-Acrobat-2017
- Adobe-Acrobat-Reader-2020
- Adobe-Acrobat-2020
Список CVE
- CVE-2021-28634 unknown
- CVE-2021-28639 unknown
- CVE-2021-28644 unknown
- CVE-2021-28636 unknown
- CVE-2021-35980 unknown
- CVE-2021-35983 unknown
- CVE-2021-35985 unknown
- CVE-2021-35988 unknown
- CVE-2021-35981 unknown
- CVE-2021-28638 unknown
- CVE-2021-35987 unknown
- CVE-2021-35984 unknown
- CVE-2021-28641 unknown
- CVE-2021-28635 unknown
- CVE-2021-28640 unknown
- CVE-2021-28643 unknown
- CVE-2021-28642 unknown
- CVE-2021-28637 unknown
- CVE-2021-35986 unknown
Смотрите также
Узнай статистику распространения уязвимостей в своем регионе statistics.securelist.com
Нашли неточность в описании этой уязвимости? Дайте нам знать!