Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-qx2f-c94g-wj6x

Опубликовано: 15 янв. 2022
Источник: github
Github: Не прошло ревью

Описание

Acrobat Reader DC version 21.007.20099 (and earlier), 20.004.30017 (and earlier) and 17.011.30204 (and earlier) are affected by a use-after-free vulnerability in the processing of Format event actions that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.

Acrobat Reader DC version 21.007.20099 (and earlier), 20.004.30017 (and earlier) and 17.011.30204 (and earlier) are affected by a use-after-free vulnerability in the processing of Format event actions that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.

EPSS

Процентиль: 95%
0.16254
Средний

Дефекты

CWE-416

Связанные уязвимости

CVSS3: 7.8
nvd
около 4 лет назад

Acrobat Reader DC version 21.007.20099 (and earlier), 20.004.30017 (and earlier) and 17.011.30204 (and earlier) are affected by a use-after-free vulnerability in the processing of Format event actions that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.

CVSS3: 7.8
fstec
около 4 лет назад

Уязвимость программ просмотра и редактирования PDF-файлов Adobe Acrobat Document Cloud, Adobe Acrobat Reader Document Cloud, Adobe Acrobat 2017, Adobe Acrobat Reader 2017, Adobe Acrobat 2020, Adobe Acrobat Reader 2020, связанная с использованием памяти после ее освобождения, позволяющая нарушителю выполнить произвольный код

EPSS

Процентиль: 95%
0.16254
Средний

Дефекты

CWE-416