Kaspersky ID:
KLA67474
Bulunma tarihi:
05/14/2024
Yüklendi:
03/26/2025

Açıklama

Multiple vulnerabilities were found in Adobe Acrobat. Malicious users can exploit these vulnerabilities to execute arbitrary code, cause denial of service, obtain sensitive information.

Below is a complete list of vulnerabilities:

  1. Use after free vulnerability in Adobe Acrobat can be exploited to cause denial of service or execute arbitrary code.
  2. Input validation vulnerability can be exploited to execute arbitrary code.
  3. Out of bounds read vulnerability in Adobe Acrobat can be exploited to cause denial of service.
  4. Out of bounds write vulnerability in Adobe Acrobat can be exploited to cause denial of service or execute arbitrary code.
  5. Access control vulnerability in Adobe Acrobat can be exploited to cause denial of service or execute arbitrary code.
  6. Use after free vulnerability in v can be exploited to cause denial of service or execute arbitrary code.
  7. Out of bounds memory write vulnerability can be exploited to cause denial of service.
  8. Out of bounds memory read vulnerability can be exploited to cause denial of service.

Orijinal öneriler

İlgili ürünler

CVE Listesi

  • CVE-2024-34094
    critical
  • CVE-2024-34098
    critical
  • CVE-2024-34096
    critical
  • CVE-2024-30284
    critical
  • CVE-2024-34100
    critical
  • CVE-2024-30312
    high
  • CVE-2024-30311
    high
  • CVE-2024-30310
    critical
  • CVE-2024-34095
    critical
  • CVE-2024-34101
    high
  • CVE-2024-34099
    critical
  • CVE-2024-34097
    critical
  • CVE-2024-30279
    critical
  • CVE-2024-30280
    critical

Daha fazlasını okuyun

Bölgenizde yayılan güvenlik açıklarının istatistiklerini öğrenin statistics.securelist.com

Bu güvenlik açığının açıklamasında bir tutarsızlık mı tespit ettiniz? Bize bildirin!
Kaspersky IT Security Calculator
Daha fazla bilgi edin
Yeni Kaspersky!
Dijital hayatınız güçlü korumayı hak ediyor!
Daha fazla bilgi edin
Do you want to save your changes?
Your message has been sent successfully.