Page 78 of 1697 results (0.025 seconds)

CVSS: 7.0EPSS: 0%CPEs: 8EXPL: 0

Adobe Acrobat and Reader versions 2020.006.20042 and earlier, 2017.011.30166 and earlier, 2017.011.30166 and earlier, and 2015.006.30518 and earlier have a race condition vulnerability. Successful exploitation could lead to security feature bypass. Adobe Acrobat and Reader versiones 2020.006.20042 y anteriores, versiones 2017.011.30166 y anteriores, versiones 2017.011.30166 y anteriores, y versiones 2015.006.30518 y anteriores, presentan una vulnerabilidad de condición de carrera. Una explotación con éxito podría conllevar a una omisión de la característica de seguridad • https://helpx.adobe.com/security/products/acrobat/apsb20-24.html • CWE-362: Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition') •

CVSS: 5.5EPSS: 0%CPEs: 8EXPL: 0

Adobe Acrobat and Reader versions 2020.006.20042 and earlier, 2017.011.30166 and earlier, 2017.011.30166 and earlier, and 2015.006.30518 and earlier have a null pointer vulnerability. Successful exploitation could lead to application denial-of-service. Adobe Acrobat and Reader versiones 2020.006.20042 y anteriores, versiones 2017.011.30166 y anteriores, versiones 2017.011.30166 y anteriores, y versiones 2015.006.30518 y anteriores, presentan una vulnerabilidad de puntero null. Una explotación con éxito podría conllevar a una denegación de servicio de la aplicación • https://helpx.adobe.com/security/products/acrobat/apsb20-24.html • CWE-476: NULL Pointer Dereference •

CVSS: 7.8EPSS: 0%CPEs: 8EXPL: 0

Adobe Acrobat and Reader versions 2020.006.20042 and earlier, 2017.011.30166 and earlier, 2017.011.30166 and earlier, and 2015.006.30518 and earlier have a security bypass vulnerability. Successful exploitation could lead to security feature bypass. Adobe Acrobat and Reader versiones 2020.006.20042 y anteriores, versiones 2017.011.30166 y anteriores, versiones 2017.011.30166 y anteriores, y versiones 2015.006.30518 y anteriores, presentan una vulnerabilidad de omisión de seguridad. Una explotación con éxito podría conllevar a una omisión de la característica de seguridad • https://helpx.adobe.com/security/products/acrobat/apsb20-24.html •

CVSS: 7.8EPSS: 0%CPEs: 8EXPL: 0

Adobe Acrobat and Reader versions 2020.006.20042 and earlier, 2017.011.30166 and earlier, 2017.011.30166 and earlier, and 2015.006.30518 and earlier have a security bypass vulnerability. Successful exploitation could lead to security feature bypass. Adobe Acrobat and Reader versiones 2020.006.20042 y anteriores, versiones 2017.011.30166 y anteriores, versiones 2017.011.30166 y anteriores, y versiones 2015.006.30518 y anteriores, presentan una vulnerabilidad de omisión de seguridad. Una explotación con éxito podría conllevar a una omisión de la característica de seguridad • https://helpx.adobe.com/security/products/acrobat/apsb20-24.html •

CVSS: 7.8EPSS: 0%CPEs: 8EXPL: 0

Adobe Acrobat and Reader versions 2020.006.20042 and earlier, 2017.011.30166 and earlier, 2017.011.30166 and earlier, and 2015.006.30518 and earlier have an use-after-free vulnerability. Successful exploitation could lead to arbitrary code execution . Adobe Acrobat and Reader versiones 2020.006.20042 y anteriores, versiones 2017.011.30166 y anteriores, versiones 2017.011.30166 y anteriores, y versiones 2015.006.30518 y anteriores, presentan una vulnerabilidad de uso de la memoria previamente liberada. Una explotación con éxito podría conllevar a una ejecución de código arbitraria This vulnerability allows local attackers to escalate privileges on affected installations of Adobe Reader. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The specific flaw exists within the handling of Field objects. • https://helpx.adobe.com/security/products/acrobat/apsb20-24.html • CWE-416: Use After Free •