![adobe acrobat reader update history adobe acrobat reader update history](https://helpdesksurvival.files.wordpress.com/2016/06/adobe421.png)
Īdobe Reader Mobile versions 20.0.1 and earlier have a directory traversal vulnerability.
Adobe acrobat reader update history code#
Successful exploitation could lead to arbitrary code execution. Successful exploitation could lead to memory leak.Īdobe Acrobat and Reader versions 2020.009.20074 and earlier, 2020.001.30002, 2017.011.30171 and earlier, and 2015.006.30523 and earlier have an out-of-bounds write vulnerability. Successful exploitation could lead to application denial-of-service.Īdobe Acrobat and Reader versions 2020.009.20074 and earlier, 2020.001.30002, 2017.011.30171 and earlier, and 2015.006.30523 and earlier have a disclosure of sensitive data vulnerability. Successful exploitation could lead to security feature bypass.Īdobe Acrobat and Reader versions 2020.009.20074 and earlier, 2020.001.30002, 2017.011.30171 and earlier, and 2015.006.30523 and earlier have a buffer error vulnerability. Successful exploitation could lead to privilege escalation. Successful exploitation could lead to information disclosure.Īdobe Acrobat and Reader versions 2020.009.20074 and earlier, 2020.001.30002, 2017.011.30171 and earlier, and 2015.006.30523 and earlier have an use-after-free vulnerability. Exploitation of this issue requires user interaction in that a victim must visit an attacker controlled web page.Īdobe Acrobat and Reader versions 2020.009.20074 and earlier, 2020.001.30002, 2017.011.30171 and earlier, and 2015.006.30523 and earlier have an out-of-bounds read vulnerability. An unauthenticated attacker could leverage this vulnerability to check for existence of local files.
![adobe acrobat reader update history adobe acrobat reader update history](https://i0.wp.com/www.404techsupport.com/wp-content/uploads/2015/04/readerdc_versioning.png)
Exploitation of this issue requires user interaction in that a victim must open a malicious file.Īdobe Acrobat Reader DC add-on for Internet Explorer versions 2021.005.20060 (and earlier), 2020.004.30006 (and earlier) and 2017.011.30199 (and earlier) are affected by an Information Disclosure vulnerability.
Adobe acrobat reader update history pdf#
Exploitation of this issue requires user interaction in that a victim must open a malicious PDF file.Īdobe Acrobat Reader DC version 21.007.20095 (and earlier), 21.007.20096 (and earlier), 20.004.30015 (and earlier), and 17.011.30202 (and earlier) is affected by a use-after-free vulnerability in the processing of the GetURL function on a global object window that could result in arbitrary code execution in the context of the current user. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. The specific flaw exists within the parsing of JPG2000 images.Īdobe Acrobat Reader DC version 21.007.20095 (and earlier), 21.007.20096 (and earlier), 20.004.30015 (and earlier), and 17.011.30202 (and earlier) is affected by a out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. Exploitation of this issue requires user interaction in that a victim must open a malicious file.Īdobe Acrobat Reader DC version 21.007.20095 (and earlier), 21.007.20096 (and earlier), 20.004.30015 (and earlier), and 17.011.30202 (and earlier) is affected by a use-after-free that allow a remote attacker to disclose sensitive information on affected installations of of Adobe Acrobat Reader DC. Adobe Acrobat Reader DC version 21.007.20095 (and earlier), 21.007.20096 (and earlier), 20.004.30015 (and earlier), and 17.011.30202 (and earlier) is affected by an out-of-bounds write vulnerability when parsing a crafted JPEG2000 file, which could result in arbitrary code execution in the context of the current user.