Action not permitted
Modal body text goes here.
wid-sec-w-2022-0856
Vulnerability from csaf_certbund
Published
2022-04-12 22:00
Modified
2023-05-25 22:00
Summary
Adobe Acrobat DC: Mehrere Schwachstellen
Notes
Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.
Produktbeschreibung
Adobe Acrobat ist ein Programm für die Erstellung und Betrachtung von Dokumenten im Adobe Portable Document Format (PDF).
Acrobat Reader ist ein Programm für die Anzeige von Dokumenten im Adobe Portable Document Format (PDF).
Adobe Reader ist ein Programm für die Anzeige von Dokumenten im Adobe Portable Document Format (PDF).
Angriff
Ein entfernter, anonymer Angreifer kann mehrere Schwachstellen in Adobe Acrobat DC, Adobe Acrobat Reader DC, Adobe Acrobat und Adobe Acrobat Reader ausnutzen, um seine Privilegien zu erhöhen, beliebigen Programmcode auszuführen oder Informationen offenzulegen.
Betroffene Betriebssysteme
- MacOS X
- Windows
{ "document": { "aggregate_severity": { "text": "hoch" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "Adobe Acrobat ist ein Programm f\u00fcr die Erstellung und Betrachtung von Dokumenten im Adobe Portable Document Format (PDF).\r\nAcrobat Reader ist ein Programm f\u00fcr die Anzeige von Dokumenten im Adobe Portable Document Format (PDF).\r\nAdobe Reader ist ein Programm f\u00fcr die Anzeige von Dokumenten im Adobe Portable Document Format (PDF).", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein entfernter, anonymer Angreifer kann mehrere Schwachstellen in Adobe Acrobat DC, Adobe Acrobat Reader DC, Adobe Acrobat und Adobe Acrobat Reader ausnutzen, um seine Privilegien zu erh\u00f6hen, beliebigen Programmcode auszuf\u00fchren oder Informationen offenzulegen.", "title": "Angriff" }, { "category": "general", "text": "- MacOS X\n- Windows", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2022-0856 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2022/wid-sec-w-2022-0856.json" }, { "category": "self", "summary": "WID-SEC-2022-0856 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2022-0856" }, { "category": "external", "summary": "Adobe Security Bulletin: APSB22-16 vom 2022-04-12", "url": "https://helpx.adobe.com/security/products/acrobat/apsb22-16.html" } ], "source_lang": "en-US", "title": "Adobe Acrobat DC: Mehrere Schwachstellen", "tracking": { "current_release_date": "2023-05-25T22:00:00.000+00:00", "generator": { "date": "2024-02-15T16:54:16.706+00:00", "engine": { "name": "BSI-WID", "version": "1.3.0" } }, "id": "WID-SEC-W-2022-0856", "initial_release_date": "2022-04-12T22:00:00.000+00:00", "revision_history": [ { "date": "2022-04-12T22:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" }, { "date": "2022-05-11T22:00:00.000+00:00", "number": "2", "summary": "CVE\u0027s erg\u00e4nzt" }, { "date": "2022-07-28T22:00:00.000+00:00", "number": "3", "summary": "CVE erg\u00e4nzt" }, { "date": "2023-05-25T22:00:00.000+00:00", "number": "4", "summary": "CVE Nummern erg\u00e4nzt" } ], "status": "final", "version": "4" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Adobe Acrobat \u003c 20.005.30334", "product": { "name": "Adobe Acrobat \u003c 20.005.30334", "product_id": "T022646", "product_identification_helper": { "cpe": "cpe:/a:adobe:acrobat:20.005.30334" } } }, { "category": "product_name", "name": "Adobe Acrobat \u003c 20.005.30331", "product": { "name": "Adobe Acrobat \u003c 20.005.30331", "product_id": "T022647", "product_identification_helper": { "cpe": "cpe:/a:adobe:acrobat:20.005.30331" } } }, { "category": "product_name", "name": "Adobe Acrobat \u003c 17.012.30229", "product": { "name": "Adobe Acrobat \u003c 17.012.30229", "product_id": "T022652", "product_identification_helper": { "cpe": "cpe:/a:adobe:acrobat:17.012.30229" } } }, { "category": "product_name", "name": "Adobe Acrobat \u003c 17.012.30227", "product": { "name": "Adobe Acrobat \u003c 17.012.30227", "product_id": "T022653", "product_identification_helper": { "cpe": "cpe:/a:adobe:acrobat:17.012.30227" } } } ], "category": "product_name", "name": "Acrobat" }, { "branches": [ { "category": "product_name", "name": "Adobe Acrobat DC \u003c 22.001.20117", "product": { "name": "Adobe Acrobat DC \u003c 22.001.20117", "product_id": "T022642", "product_identification_helper": { "cpe": "cpe:/a:adobe:acrobat_dc:22.001.20117" } } }, { "category": "product_name", "name": "Adobe Acrobat DC \u003c 22.001.20112", "product": { "name": "Adobe Acrobat DC \u003c 22.001.20112", "product_id": "T022643", "product_identification_helper": { "cpe": "cpe:/a:adobe:acrobat_dc:22.001.20112" } } } ], "category": "product_name", "name": "Acrobat DC" }, { "branches": [ { "category": "product_name", "name": "Adobe Acrobat Reader \u003c 20.005.30331", "product": { "name": "Adobe Acrobat Reader \u003c 20.005.30331", "product_id": "T022650", "product_identification_helper": { "cpe": "cpe:/a:adobe:acrobat_reader:20.005.30331" } } }, { "category": "product_name", "name": "Adobe Acrobat Reader \u003c 20.005.30334", "product": { "name": "Adobe Acrobat Reader \u003c 20.005.30334", "product_id": "T022651", "product_identification_helper": { "cpe": "cpe:/a:adobe:acrobat_reader:20.005.30334" } } }, { "category": "product_name", "name": "Adobe Acrobat Reader \u003c 17.012.30229", "product": { "name": "Adobe Acrobat Reader \u003c 17.012.30229", "product_id": "T022654", "product_identification_helper": { "cpe": "cpe:/a:adobe:acrobat_reader:17.012.30229" } } }, { "category": "product_name", "name": "Adobe Acrobat Reader \u003c 17.012.30227", "product": { "name": "Adobe Acrobat Reader \u003c 17.012.30227", "product_id": "T022655", "product_identification_helper": { "cpe": "cpe:/a:adobe:acrobat_reader:17.012.30227" } } } ], "category": "product_name", "name": "Acrobat Reader" }, { "branches": [ { "category": "product_name", "name": "Adobe Acrobat Reader DC \u003c 22.001.20117", "product": { "name": "Adobe Acrobat Reader DC \u003c 22.001.20117", "product_id": "T022644", "product_identification_helper": { "cpe": "cpe:/a:adobe:acrobat_reader_dc:22.001.20117" } } }, { "category": "product_name", "name": "Adobe Acrobat Reader DC \u003c 22.001.20112", "product": { "name": "Adobe Acrobat Reader DC \u003c 22.001.20112", "product_id": "T022645", "product_identification_helper": { "cpe": "cpe:/a:adobe:acrobat_reader_dc:22.001.20112" } } } ], "category": "product_name", "name": "Acrobat Reader DC" } ], "category": "vendor", "name": "Adobe" } ] }, "vulnerabilities": [ { "cve": "CVE-2022-44520", "notes": [ { "category": "description", "text": "In Adobe Acrobat DC, Adobe Acrobat Reader DC, Adobe Acrobat und Adobe Acrobat Reader existieren mehrere Schwachstellen. Die Schwachstellen sind auf Use-after-Free-Fehler, Out-of-Bounds-Lese und Schreibfehler, Puffer\u00fcberl\u00e4ufe, Nutzung von nicht-initialisierten Zeigern, fehlenden Integrit\u00e4tskontrollen sowie Verletzungen von sicheren Designprinzipen zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, seine Privilegien zu erweitern oder Informationen offenzulegen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich." } ], "release_date": "2022-04-12T22:00:00Z", "title": "CVE-2022-44520" }, { "cve": "CVE-2022-44519", "notes": [ { "category": "description", "text": "In Adobe Acrobat DC, Adobe Acrobat Reader DC, Adobe Acrobat und Adobe Acrobat Reader existieren mehrere Schwachstellen. Die Schwachstellen sind auf Use-after-Free-Fehler, Out-of-Bounds-Lese und Schreibfehler, Puffer\u00fcberl\u00e4ufe, Nutzung von nicht-initialisierten Zeigern, fehlenden Integrit\u00e4tskontrollen sowie Verletzungen von sicheren Designprinzipen zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, seine Privilegien zu erweitern oder Informationen offenzulegen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich." } ], "release_date": "2022-04-12T22:00:00Z", "title": "CVE-2022-44519" }, { "cve": "CVE-2022-44518", "notes": [ { "category": "description", "text": "In Adobe Acrobat DC, Adobe Acrobat Reader DC, Adobe Acrobat und Adobe Acrobat Reader existieren mehrere Schwachstellen. Die Schwachstellen sind auf Use-after-Free-Fehler, Out-of-Bounds-Lese und Schreibfehler, Puffer\u00fcberl\u00e4ufe, Nutzung von nicht-initialisierten Zeigern, fehlenden Integrit\u00e4tskontrollen sowie Verletzungen von sicheren Designprinzipen zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, seine Privilegien zu erweitern oder Informationen offenzulegen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich." } ], "release_date": "2022-04-12T22:00:00Z", "title": "CVE-2022-44518" }, { "cve": "CVE-2022-44517", "notes": [ { "category": "description", "text": "In Adobe Acrobat DC, Adobe Acrobat Reader DC, Adobe Acrobat und Adobe Acrobat Reader existieren mehrere Schwachstellen. Die Schwachstellen sind auf Use-after-Free-Fehler, Out-of-Bounds-Lese und Schreibfehler, Puffer\u00fcberl\u00e4ufe, Nutzung von nicht-initialisierten Zeigern, fehlenden Integrit\u00e4tskontrollen sowie Verletzungen von sicheren Designprinzipen zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, seine Privilegien zu erweitern oder Informationen offenzulegen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich." } ], "release_date": "2022-04-12T22:00:00Z", "title": "CVE-2022-44517" }, { "cve": "CVE-2022-44516", "notes": [ { "category": "description", "text": "In Adobe Acrobat DC, Adobe Acrobat Reader DC, Adobe Acrobat und Adobe Acrobat Reader existieren mehrere Schwachstellen. Die Schwachstellen sind auf Use-after-Free-Fehler, Out-of-Bounds-Lese und Schreibfehler, Puffer\u00fcberl\u00e4ufe, Nutzung von nicht-initialisierten Zeigern, fehlenden Integrit\u00e4tskontrollen sowie Verletzungen von sicheren Designprinzipen zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, seine Privilegien zu erweitern oder Informationen offenzulegen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich." } ], "release_date": "2022-04-12T22:00:00Z", "title": "CVE-2022-44516" }, { "cve": "CVE-2022-44515", "notes": [ { "category": "description", "text": "In Adobe Acrobat DC, Adobe Acrobat Reader DC, Adobe Acrobat und Adobe Acrobat Reader existieren mehrere Schwachstellen. Die Schwachstellen sind auf Use-after-Free-Fehler, Out-of-Bounds-Lese und Schreibfehler, Puffer\u00fcberl\u00e4ufe, Nutzung von nicht-initialisierten Zeigern, fehlenden Integrit\u00e4tskontrollen sowie Verletzungen von sicheren Designprinzipen zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, seine Privilegien zu erweitern oder Informationen offenzulegen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich." } ], "release_date": "2022-04-12T22:00:00Z", "title": "CVE-2022-44515" }, { "cve": "CVE-2022-44514", "notes": [ { "category": "description", "text": "In Adobe Acrobat DC, Adobe Acrobat Reader DC, Adobe Acrobat und Adobe Acrobat Reader existieren mehrere Schwachstellen. Die Schwachstellen sind auf Use-after-Free-Fehler, Out-of-Bounds-Lese und Schreibfehler, Puffer\u00fcberl\u00e4ufe, Nutzung von nicht-initialisierten Zeigern, fehlenden Integrit\u00e4tskontrollen sowie Verletzungen von sicheren Designprinzipen zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, seine Privilegien zu erweitern oder Informationen offenzulegen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich." } ], "release_date": "2022-04-12T22:00:00Z", "title": "CVE-2022-44514" }, { "cve": "CVE-2022-44513", "notes": [ { "category": "description", "text": "In Adobe Acrobat DC, Adobe Acrobat Reader DC, Adobe Acrobat und Adobe Acrobat Reader existieren mehrere Schwachstellen. Die Schwachstellen sind auf Use-after-Free-Fehler, Out-of-Bounds-Lese und Schreibfehler, Puffer\u00fcberl\u00e4ufe, Nutzung von nicht-initialisierten Zeigern, fehlenden Integrit\u00e4tskontrollen sowie Verletzungen von sicheren Designprinzipen zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, seine Privilegien zu erweitern oder Informationen offenzulegen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich." } ], "release_date": "2022-04-12T22:00:00Z", "title": "CVE-2022-44513" }, { "cve": "CVE-2022-44512", "notes": [ { "category": "description", "text": "In Adobe Acrobat DC, Adobe Acrobat Reader DC, Adobe Acrobat und Adobe Acrobat Reader existieren mehrere Schwachstellen. Die Schwachstellen sind auf Use-after-Free-Fehler, Out-of-Bounds-Lese und Schreibfehler, Puffer\u00fcberl\u00e4ufe, Nutzung von nicht-initialisierten Zeigern, fehlenden Integrit\u00e4tskontrollen sowie Verletzungen von sicheren Designprinzipen zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, seine Privilegien zu erweitern oder Informationen offenzulegen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich." } ], "release_date": "2022-04-12T22:00:00Z", "title": "CVE-2022-44512" }, { "cve": "CVE-2022-35672", "notes": [ { "category": "description", "text": "In Adobe Acrobat DC, Adobe Acrobat Reader DC, Adobe Acrobat und Adobe Acrobat Reader existieren mehrere Schwachstellen. Die Schwachstellen sind auf Use-after-Free-Fehler, Out-of-Bounds-Lese und Schreibfehler, Puffer\u00fcberl\u00e4ufe, Nutzung von nicht-initialisierten Zeigern, fehlenden Integrit\u00e4tskontrollen sowie Verletzungen von sicheren Designprinzipen zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, seine Privilegien zu erweitern oder Informationen offenzulegen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich." } ], "release_date": "2022-04-12T22:00:00Z", "title": "CVE-2022-35672" }, { "cve": "CVE-2022-28838", "notes": [ { "category": "description", "text": "In Adobe Acrobat DC, Adobe Acrobat Reader DC, Adobe Acrobat und Adobe Acrobat Reader existieren mehrere Schwachstellen. Die Schwachstellen sind auf Use-after-Free-Fehler, Out-of-Bounds-Lese und Schreibfehler, Puffer\u00fcberl\u00e4ufe, Nutzung von nicht-initialisierten Zeigern, fehlenden Integrit\u00e4tskontrollen sowie Verletzungen von sicheren Designprinzipen zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, seine Privilegien zu erweitern oder Informationen offenzulegen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich." } ], "release_date": "2022-04-12T22:00:00Z", "title": "CVE-2022-28838" }, { "cve": "CVE-2022-28837", "notes": [ { "category": "description", "text": "In Adobe Acrobat DC, Adobe Acrobat Reader DC, Adobe Acrobat und Adobe Acrobat Reader existieren mehrere Schwachstellen. Die Schwachstellen sind auf Use-after-Free-Fehler, Out-of-Bounds-Lese und Schreibfehler, Puffer\u00fcberl\u00e4ufe, Nutzung von nicht-initialisierten Zeigern, fehlenden Integrit\u00e4tskontrollen sowie Verletzungen von sicheren Designprinzipen zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, seine Privilegien zu erweitern oder Informationen offenzulegen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich." } ], "release_date": "2022-04-12T22:00:00Z", "title": "CVE-2022-28837" }, { "cve": "CVE-2022-28269", "notes": [ { "category": "description", "text": "In Adobe Acrobat DC, Adobe Acrobat Reader DC, Adobe Acrobat und Adobe Acrobat Reader existieren mehrere Schwachstellen. Die Schwachstellen sind auf Use-after-Free-Fehler, Out-of-Bounds-Lese und Schreibfehler, Puffer\u00fcberl\u00e4ufe, Nutzung von nicht-initialisierten Zeigern, fehlenden Integrit\u00e4tskontrollen sowie Verletzungen von sicheren Designprinzipen zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, seine Privilegien zu erweitern oder Informationen offenzulegen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich." } ], "release_date": "2022-04-12T22:00:00Z", "title": "CVE-2022-28269" }, { "cve": "CVE-2022-28268", "notes": [ { "category": "description", "text": "In Adobe Acrobat DC, Adobe Acrobat Reader DC, Adobe Acrobat und Adobe Acrobat Reader existieren mehrere Schwachstellen. Die Schwachstellen sind auf Use-after-Free-Fehler, Out-of-Bounds-Lese und Schreibfehler, Puffer\u00fcberl\u00e4ufe, Nutzung von nicht-initialisierten Zeigern, fehlenden Integrit\u00e4tskontrollen sowie Verletzungen von sicheren Designprinzipen zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, seine Privilegien zu erweitern oder Informationen offenzulegen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich." } ], "release_date": "2022-04-12T22:00:00Z", "title": "CVE-2022-28268" }, { "cve": "CVE-2022-28267", "notes": [ { "category": "description", "text": "In Adobe Acrobat DC, Adobe Acrobat Reader DC, Adobe Acrobat und Adobe Acrobat Reader existieren mehrere Schwachstellen. Die Schwachstellen sind auf Use-after-Free-Fehler, Out-of-Bounds-Lese und Schreibfehler, Puffer\u00fcberl\u00e4ufe, Nutzung von nicht-initialisierten Zeigern, fehlenden Integrit\u00e4tskontrollen sowie Verletzungen von sicheren Designprinzipen zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, seine Privilegien zu erweitern oder Informationen offenzulegen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich." } ], "release_date": "2022-04-12T22:00:00Z", "title": "CVE-2022-28267" }, { "cve": "CVE-2022-28266", "notes": [ { "category": "description", "text": "In Adobe Acrobat DC, Adobe Acrobat Reader DC, Adobe Acrobat und Adobe Acrobat Reader existieren mehrere Schwachstellen. Die Schwachstellen sind auf Use-after-Free-Fehler, Out-of-Bounds-Lese und Schreibfehler, Puffer\u00fcberl\u00e4ufe, Nutzung von nicht-initialisierten Zeigern, fehlenden Integrit\u00e4tskontrollen sowie Verletzungen von sicheren Designprinzipen zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, seine Privilegien zu erweitern oder Informationen offenzulegen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich." } ], "release_date": "2022-04-12T22:00:00Z", "title": "CVE-2022-28266" }, { "cve": "CVE-2022-28265", "notes": [ { "category": "description", "text": "In Adobe Acrobat DC, Adobe Acrobat Reader DC, Adobe Acrobat und Adobe Acrobat Reader existieren mehrere Schwachstellen. Die Schwachstellen sind auf Use-after-Free-Fehler, Out-of-Bounds-Lese und Schreibfehler, Puffer\u00fcberl\u00e4ufe, Nutzung von nicht-initialisierten Zeigern, fehlenden Integrit\u00e4tskontrollen sowie Verletzungen von sicheren Designprinzipen zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, seine Privilegien zu erweitern oder Informationen offenzulegen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich." } ], "release_date": "2022-04-12T22:00:00Z", "title": "CVE-2022-28265" }, { "cve": "CVE-2022-28264", "notes": [ { "category": "description", "text": "In Adobe Acrobat DC, Adobe Acrobat Reader DC, Adobe Acrobat und Adobe Acrobat Reader existieren mehrere Schwachstellen. Die Schwachstellen sind auf Use-after-Free-Fehler, Out-of-Bounds-Lese und Schreibfehler, Puffer\u00fcberl\u00e4ufe, Nutzung von nicht-initialisierten Zeigern, fehlenden Integrit\u00e4tskontrollen sowie Verletzungen von sicheren Designprinzipen zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, seine Privilegien zu erweitern oder Informationen offenzulegen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich." } ], "release_date": "2022-04-12T22:00:00Z", "title": "CVE-2022-28264" }, { "cve": "CVE-2022-28263", "notes": [ { "category": "description", "text": "In Adobe Acrobat DC, Adobe Acrobat Reader DC, Adobe Acrobat und Adobe Acrobat Reader existieren mehrere Schwachstellen. Die Schwachstellen sind auf Use-after-Free-Fehler, Out-of-Bounds-Lese und Schreibfehler, Puffer\u00fcberl\u00e4ufe, Nutzung von nicht-initialisierten Zeigern, fehlenden Integrit\u00e4tskontrollen sowie Verletzungen von sicheren Designprinzipen zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, seine Privilegien zu erweitern oder Informationen offenzulegen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich." } ], "release_date": "2022-04-12T22:00:00Z", "title": "CVE-2022-28263" }, { "cve": "CVE-2022-28262", "notes": [ { "category": "description", "text": "In Adobe Acrobat DC, Adobe Acrobat Reader DC, Adobe Acrobat und Adobe Acrobat Reader existieren mehrere Schwachstellen. Die Schwachstellen sind auf Use-after-Free-Fehler, Out-of-Bounds-Lese und Schreibfehler, Puffer\u00fcberl\u00e4ufe, Nutzung von nicht-initialisierten Zeigern, fehlenden Integrit\u00e4tskontrollen sowie Verletzungen von sicheren Designprinzipen zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, seine Privilegien zu erweitern oder Informationen offenzulegen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich." } ], "release_date": "2022-04-12T22:00:00Z", "title": "CVE-2022-28262" }, { "cve": "CVE-2022-28261", "notes": [ { "category": "description", "text": "In Adobe Acrobat DC, Adobe Acrobat Reader DC, Adobe Acrobat und Adobe Acrobat Reader existieren mehrere Schwachstellen. Die Schwachstellen sind auf Use-after-Free-Fehler, Out-of-Bounds-Lese und Schreibfehler, Puffer\u00fcberl\u00e4ufe, Nutzung von nicht-initialisierten Zeigern, fehlenden Integrit\u00e4tskontrollen sowie Verletzungen von sicheren Designprinzipen zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, seine Privilegien zu erweitern oder Informationen offenzulegen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich." } ], "release_date": "2022-04-12T22:00:00Z", "title": "CVE-2022-28261" }, { "cve": "CVE-2022-28260", "notes": [ { "category": "description", "text": "In Adobe Acrobat DC, Adobe Acrobat Reader DC, Adobe Acrobat und Adobe Acrobat Reader existieren mehrere Schwachstellen. Die Schwachstellen sind auf Use-after-Free-Fehler, Out-of-Bounds-Lese und Schreibfehler, Puffer\u00fcberl\u00e4ufe, Nutzung von nicht-initialisierten Zeigern, fehlenden Integrit\u00e4tskontrollen sowie Verletzungen von sicheren Designprinzipen zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, seine Privilegien zu erweitern oder Informationen offenzulegen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich." } ], "release_date": "2022-04-12T22:00:00Z", "title": "CVE-2022-28260" }, { "cve": "CVE-2022-28259", "notes": [ { "category": "description", "text": "In Adobe Acrobat DC, Adobe Acrobat Reader DC, Adobe Acrobat und Adobe Acrobat Reader existieren mehrere Schwachstellen. Die Schwachstellen sind auf Use-after-Free-Fehler, Out-of-Bounds-Lese und Schreibfehler, Puffer\u00fcberl\u00e4ufe, Nutzung von nicht-initialisierten Zeigern, fehlenden Integrit\u00e4tskontrollen sowie Verletzungen von sicheren Designprinzipen zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, seine Privilegien zu erweitern oder Informationen offenzulegen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich." } ], "release_date": "2022-04-12T22:00:00Z", "title": "CVE-2022-28259" }, { "cve": "CVE-2022-28258", "notes": [ { "category": "description", "text": "In Adobe Acrobat DC, Adobe Acrobat Reader DC, Adobe Acrobat und Adobe Acrobat Reader existieren mehrere Schwachstellen. Die Schwachstellen sind auf Use-after-Free-Fehler, Out-of-Bounds-Lese und Schreibfehler, Puffer\u00fcberl\u00e4ufe, Nutzung von nicht-initialisierten Zeigern, fehlenden Integrit\u00e4tskontrollen sowie Verletzungen von sicheren Designprinzipen zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, seine Privilegien zu erweitern oder Informationen offenzulegen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich." } ], "release_date": "2022-04-12T22:00:00Z", "title": "CVE-2022-28258" }, { "cve": "CVE-2022-28257", "notes": [ { "category": "description", "text": "In Adobe Acrobat DC, Adobe Acrobat Reader DC, Adobe Acrobat und Adobe Acrobat Reader existieren mehrere Schwachstellen. Die Schwachstellen sind auf Use-after-Free-Fehler, Out-of-Bounds-Lese und Schreibfehler, Puffer\u00fcberl\u00e4ufe, Nutzung von nicht-initialisierten Zeigern, fehlenden Integrit\u00e4tskontrollen sowie Verletzungen von sicheren Designprinzipen zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, seine Privilegien zu erweitern oder Informationen offenzulegen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich." } ], "release_date": "2022-04-12T22:00:00Z", "title": "CVE-2022-28257" }, { "cve": "CVE-2022-28256", "notes": [ { "category": "description", "text": "In Adobe Acrobat DC, Adobe Acrobat Reader DC, Adobe Acrobat und Adobe Acrobat Reader existieren mehrere Schwachstellen. Die Schwachstellen sind auf Use-after-Free-Fehler, Out-of-Bounds-Lese und Schreibfehler, Puffer\u00fcberl\u00e4ufe, Nutzung von nicht-initialisierten Zeigern, fehlenden Integrit\u00e4tskontrollen sowie Verletzungen von sicheren Designprinzipen zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, seine Privilegien zu erweitern oder Informationen offenzulegen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich." } ], "release_date": "2022-04-12T22:00:00Z", "title": "CVE-2022-28256" }, { "cve": "CVE-2022-28255", "notes": [ { "category": "description", "text": "In Adobe Acrobat DC, Adobe Acrobat Reader DC, Adobe Acrobat und Adobe Acrobat Reader existieren mehrere Schwachstellen. Die Schwachstellen sind auf Use-after-Free-Fehler, Out-of-Bounds-Lese und Schreibfehler, Puffer\u00fcberl\u00e4ufe, Nutzung von nicht-initialisierten Zeigern, fehlenden Integrit\u00e4tskontrollen sowie Verletzungen von sicheren Designprinzipen zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, seine Privilegien zu erweitern oder Informationen offenzulegen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich." } ], "release_date": "2022-04-12T22:00:00Z", "title": "CVE-2022-28255" }, { "cve": "CVE-2022-28254", "notes": [ { "category": "description", "text": "In Adobe Acrobat DC, Adobe Acrobat Reader DC, Adobe Acrobat und Adobe Acrobat Reader existieren mehrere Schwachstellen. Die Schwachstellen sind auf Use-after-Free-Fehler, Out-of-Bounds-Lese und Schreibfehler, Puffer\u00fcberl\u00e4ufe, Nutzung von nicht-initialisierten Zeigern, fehlenden Integrit\u00e4tskontrollen sowie Verletzungen von sicheren Designprinzipen zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, seine Privilegien zu erweitern oder Informationen offenzulegen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich." } ], "release_date": "2022-04-12T22:00:00Z", "title": "CVE-2022-28254" }, { "cve": "CVE-2022-28253", "notes": [ { "category": "description", "text": "In Adobe Acrobat DC, Adobe Acrobat Reader DC, Adobe Acrobat und Adobe Acrobat Reader existieren mehrere Schwachstellen. Die Schwachstellen sind auf Use-after-Free-Fehler, Out-of-Bounds-Lese und Schreibfehler, Puffer\u00fcberl\u00e4ufe, Nutzung von nicht-initialisierten Zeigern, fehlenden Integrit\u00e4tskontrollen sowie Verletzungen von sicheren Designprinzipen zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, seine Privilegien zu erweitern oder Informationen offenzulegen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich." } ], "release_date": "2022-04-12T22:00:00Z", "title": "CVE-2022-28253" }, { "cve": "CVE-2022-28252", "notes": [ { "category": "description", "text": "In Adobe Acrobat DC, Adobe Acrobat Reader DC, Adobe Acrobat und Adobe Acrobat Reader existieren mehrere Schwachstellen. Die Schwachstellen sind auf Use-after-Free-Fehler, Out-of-Bounds-Lese und Schreibfehler, Puffer\u00fcberl\u00e4ufe, Nutzung von nicht-initialisierten Zeigern, fehlenden Integrit\u00e4tskontrollen sowie Verletzungen von sicheren Designprinzipen zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, seine Privilegien zu erweitern oder Informationen offenzulegen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich." } ], "release_date": "2022-04-12T22:00:00Z", "title": "CVE-2022-28252" }, { "cve": "CVE-2022-28251", "notes": [ { "category": "description", "text": "In Adobe Acrobat DC, Adobe Acrobat Reader DC, Adobe Acrobat und Adobe Acrobat Reader existieren mehrere Schwachstellen. Die Schwachstellen sind auf Use-after-Free-Fehler, Out-of-Bounds-Lese und Schreibfehler, Puffer\u00fcberl\u00e4ufe, Nutzung von nicht-initialisierten Zeigern, fehlenden Integrit\u00e4tskontrollen sowie Verletzungen von sicheren Designprinzipen zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, seine Privilegien zu erweitern oder Informationen offenzulegen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich." } ], "release_date": "2022-04-12T22:00:00Z", "title": "CVE-2022-28251" }, { "cve": "CVE-2022-28250", "notes": [ { "category": "description", "text": "In Adobe Acrobat DC, Adobe Acrobat Reader DC, Adobe Acrobat und Adobe Acrobat Reader existieren mehrere Schwachstellen. Die Schwachstellen sind auf Use-after-Free-Fehler, Out-of-Bounds-Lese und Schreibfehler, Puffer\u00fcberl\u00e4ufe, Nutzung von nicht-initialisierten Zeigern, fehlenden Integrit\u00e4tskontrollen sowie Verletzungen von sicheren Designprinzipen zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, seine Privilegien zu erweitern oder Informationen offenzulegen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich." } ], "release_date": "2022-04-12T22:00:00Z", "title": "CVE-2022-28250" }, { "cve": "CVE-2022-28249", "notes": [ { "category": "description", "text": "In Adobe Acrobat DC, Adobe Acrobat Reader DC, Adobe Acrobat und Adobe Acrobat Reader existieren mehrere Schwachstellen. Die Schwachstellen sind auf Use-after-Free-Fehler, Out-of-Bounds-Lese und Schreibfehler, Puffer\u00fcberl\u00e4ufe, Nutzung von nicht-initialisierten Zeigern, fehlenden Integrit\u00e4tskontrollen sowie Verletzungen von sicheren Designprinzipen zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, seine Privilegien zu erweitern oder Informationen offenzulegen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich." } ], "release_date": "2022-04-12T22:00:00Z", "title": "CVE-2022-28249" }, { "cve": "CVE-2022-28248", "notes": [ { "category": "description", "text": "In Adobe Acrobat DC, Adobe Acrobat Reader DC, Adobe Acrobat und Adobe Acrobat Reader existieren mehrere Schwachstellen. Die Schwachstellen sind auf Use-after-Free-Fehler, Out-of-Bounds-Lese und Schreibfehler, Puffer\u00fcberl\u00e4ufe, Nutzung von nicht-initialisierten Zeigern, fehlenden Integrit\u00e4tskontrollen sowie Verletzungen von sicheren Designprinzipen zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, seine Privilegien zu erweitern oder Informationen offenzulegen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich." } ], "release_date": "2022-04-12T22:00:00Z", "title": "CVE-2022-28248" }, { "cve": "CVE-2022-28247", "notes": [ { "category": "description", "text": "In Adobe Acrobat DC, Adobe Acrobat Reader DC, Adobe Acrobat und Adobe Acrobat Reader existieren mehrere Schwachstellen. Die Schwachstellen sind auf Use-after-Free-Fehler, Out-of-Bounds-Lese und Schreibfehler, Puffer\u00fcberl\u00e4ufe, Nutzung von nicht-initialisierten Zeigern, fehlenden Integrit\u00e4tskontrollen sowie Verletzungen von sicheren Designprinzipen zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, seine Privilegien zu erweitern oder Informationen offenzulegen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich." } ], "release_date": "2022-04-12T22:00:00Z", "title": "CVE-2022-28247" }, { "cve": "CVE-2022-28246", "notes": [ { "category": "description", "text": "In Adobe Acrobat DC, Adobe Acrobat Reader DC, Adobe Acrobat und Adobe Acrobat Reader existieren mehrere Schwachstellen. Die Schwachstellen sind auf Use-after-Free-Fehler, Out-of-Bounds-Lese und Schreibfehler, Puffer\u00fcberl\u00e4ufe, Nutzung von nicht-initialisierten Zeigern, fehlenden Integrit\u00e4tskontrollen sowie Verletzungen von sicheren Designprinzipen zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, seine Privilegien zu erweitern oder Informationen offenzulegen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich." } ], "release_date": "2022-04-12T22:00:00Z", "title": "CVE-2022-28246" }, { "cve": "CVE-2022-28245", "notes": [ { "category": "description", "text": "In Adobe Acrobat DC, Adobe Acrobat Reader DC, Adobe Acrobat und Adobe Acrobat Reader existieren mehrere Schwachstellen. Die Schwachstellen sind auf Use-after-Free-Fehler, Out-of-Bounds-Lese und Schreibfehler, Puffer\u00fcberl\u00e4ufe, Nutzung von nicht-initialisierten Zeigern, fehlenden Integrit\u00e4tskontrollen sowie Verletzungen von sicheren Designprinzipen zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, seine Privilegien zu erweitern oder Informationen offenzulegen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich." } ], "release_date": "2022-04-12T22:00:00Z", "title": "CVE-2022-28245" }, { "cve": "CVE-2022-28244", "notes": [ { "category": "description", "text": "In Adobe Acrobat DC, Adobe Acrobat Reader DC, Adobe Acrobat und Adobe Acrobat Reader existieren mehrere Schwachstellen. Die Schwachstellen sind auf Use-after-Free-Fehler, Out-of-Bounds-Lese und Schreibfehler, Puffer\u00fcberl\u00e4ufe, Nutzung von nicht-initialisierten Zeigern, fehlenden Integrit\u00e4tskontrollen sowie Verletzungen von sicheren Designprinzipen zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, seine Privilegien zu erweitern oder Informationen offenzulegen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich." } ], "release_date": "2022-04-12T22:00:00Z", "title": "CVE-2022-28244" }, { "cve": "CVE-2022-28243", "notes": [ { "category": "description", "text": "In Adobe Acrobat DC, Adobe Acrobat Reader DC, Adobe Acrobat und Adobe Acrobat Reader existieren mehrere Schwachstellen. Die Schwachstellen sind auf Use-after-Free-Fehler, Out-of-Bounds-Lese und Schreibfehler, Puffer\u00fcberl\u00e4ufe, Nutzung von nicht-initialisierten Zeigern, fehlenden Integrit\u00e4tskontrollen sowie Verletzungen von sicheren Designprinzipen zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, seine Privilegien zu erweitern oder Informationen offenzulegen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich." } ], "release_date": "2022-04-12T22:00:00Z", "title": "CVE-2022-28243" }, { "cve": "CVE-2022-28242", "notes": [ { "category": "description", "text": "In Adobe Acrobat DC, Adobe Acrobat Reader DC, Adobe Acrobat und Adobe Acrobat Reader existieren mehrere Schwachstellen. Die Schwachstellen sind auf Use-after-Free-Fehler, Out-of-Bounds-Lese und Schreibfehler, Puffer\u00fcberl\u00e4ufe, Nutzung von nicht-initialisierten Zeigern, fehlenden Integrit\u00e4tskontrollen sowie Verletzungen von sicheren Designprinzipen zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, seine Privilegien zu erweitern oder Informationen offenzulegen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich." } ], "release_date": "2022-04-12T22:00:00Z", "title": "CVE-2022-28242" }, { "cve": "CVE-2022-28241", "notes": [ { "category": "description", "text": "In Adobe Acrobat DC, Adobe Acrobat Reader DC, Adobe Acrobat und Adobe Acrobat Reader existieren mehrere Schwachstellen. Die Schwachstellen sind auf Use-after-Free-Fehler, Out-of-Bounds-Lese und Schreibfehler, Puffer\u00fcberl\u00e4ufe, Nutzung von nicht-initialisierten Zeigern, fehlenden Integrit\u00e4tskontrollen sowie Verletzungen von sicheren Designprinzipen zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, seine Privilegien zu erweitern oder Informationen offenzulegen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich." } ], "release_date": "2022-04-12T22:00:00Z", "title": "CVE-2022-28241" }, { "cve": "CVE-2022-28240", "notes": [ { "category": "description", "text": "In Adobe Acrobat DC, Adobe Acrobat Reader DC, Adobe Acrobat und Adobe Acrobat Reader existieren mehrere Schwachstellen. Die Schwachstellen sind auf Use-after-Free-Fehler, Out-of-Bounds-Lese und Schreibfehler, Puffer\u00fcberl\u00e4ufe, Nutzung von nicht-initialisierten Zeigern, fehlenden Integrit\u00e4tskontrollen sowie Verletzungen von sicheren Designprinzipen zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, seine Privilegien zu erweitern oder Informationen offenzulegen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich." } ], "release_date": "2022-04-12T22:00:00Z", "title": "CVE-2022-28240" }, { "cve": "CVE-2022-28239", "notes": [ { "category": "description", "text": "In Adobe Acrobat DC, Adobe Acrobat Reader DC, Adobe Acrobat und Adobe Acrobat Reader existieren mehrere Schwachstellen. Die Schwachstellen sind auf Use-after-Free-Fehler, Out-of-Bounds-Lese und Schreibfehler, Puffer\u00fcberl\u00e4ufe, Nutzung von nicht-initialisierten Zeigern, fehlenden Integrit\u00e4tskontrollen sowie Verletzungen von sicheren Designprinzipen zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, seine Privilegien zu erweitern oder Informationen offenzulegen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich." } ], "release_date": "2022-04-12T22:00:00Z", "title": "CVE-2022-28239" }, { "cve": "CVE-2022-28238", "notes": [ { "category": "description", "text": "In Adobe Acrobat DC, Adobe Acrobat Reader DC, Adobe Acrobat und Adobe Acrobat Reader existieren mehrere Schwachstellen. Die Schwachstellen sind auf Use-after-Free-Fehler, Out-of-Bounds-Lese und Schreibfehler, Puffer\u00fcberl\u00e4ufe, Nutzung von nicht-initialisierten Zeigern, fehlenden Integrit\u00e4tskontrollen sowie Verletzungen von sicheren Designprinzipen zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, seine Privilegien zu erweitern oder Informationen offenzulegen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich." } ], "release_date": "2022-04-12T22:00:00Z", "title": "CVE-2022-28238" }, { "cve": "CVE-2022-28237", "notes": [ { "category": "description", "text": "In Adobe Acrobat DC, Adobe Acrobat Reader DC, Adobe Acrobat und Adobe Acrobat Reader existieren mehrere Schwachstellen. Die Schwachstellen sind auf Use-after-Free-Fehler, Out-of-Bounds-Lese und Schreibfehler, Puffer\u00fcberl\u00e4ufe, Nutzung von nicht-initialisierten Zeigern, fehlenden Integrit\u00e4tskontrollen sowie Verletzungen von sicheren Designprinzipen zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, seine Privilegien zu erweitern oder Informationen offenzulegen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich." } ], "release_date": "2022-04-12T22:00:00Z", "title": "CVE-2022-28237" }, { "cve": "CVE-2022-28236", "notes": [ { "category": "description", "text": "In Adobe Acrobat DC, Adobe Acrobat Reader DC, Adobe Acrobat und Adobe Acrobat Reader existieren mehrere Schwachstellen. Die Schwachstellen sind auf Use-after-Free-Fehler, Out-of-Bounds-Lese und Schreibfehler, Puffer\u00fcberl\u00e4ufe, Nutzung von nicht-initialisierten Zeigern, fehlenden Integrit\u00e4tskontrollen sowie Verletzungen von sicheren Designprinzipen zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, seine Privilegien zu erweitern oder Informationen offenzulegen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich." } ], "release_date": "2022-04-12T22:00:00Z", "title": "CVE-2022-28236" }, { "cve": "CVE-2022-28235", "notes": [ { "category": "description", "text": "In Adobe Acrobat DC, Adobe Acrobat Reader DC, Adobe Acrobat und Adobe Acrobat Reader existieren mehrere Schwachstellen. Die Schwachstellen sind auf Use-after-Free-Fehler, Out-of-Bounds-Lese und Schreibfehler, Puffer\u00fcberl\u00e4ufe, Nutzung von nicht-initialisierten Zeigern, fehlenden Integrit\u00e4tskontrollen sowie Verletzungen von sicheren Designprinzipen zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, seine Privilegien zu erweitern oder Informationen offenzulegen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich." } ], "release_date": "2022-04-12T22:00:00Z", "title": "CVE-2022-28235" }, { "cve": "CVE-2022-28234", "notes": [ { "category": "description", "text": "In Adobe Acrobat DC, Adobe Acrobat Reader DC, Adobe Acrobat und Adobe Acrobat Reader existieren mehrere Schwachstellen. Die Schwachstellen sind auf Use-after-Free-Fehler, Out-of-Bounds-Lese und Schreibfehler, Puffer\u00fcberl\u00e4ufe, Nutzung von nicht-initialisierten Zeigern, fehlenden Integrit\u00e4tskontrollen sowie Verletzungen von sicheren Designprinzipen zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, seine Privilegien zu erweitern oder Informationen offenzulegen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich." } ], "release_date": "2022-04-12T22:00:00Z", "title": "CVE-2022-28234" }, { "cve": "CVE-2022-28233", "notes": [ { "category": "description", "text": "In Adobe Acrobat DC, Adobe Acrobat Reader DC, Adobe Acrobat und Adobe Acrobat Reader existieren mehrere Schwachstellen. Die Schwachstellen sind auf Use-after-Free-Fehler, Out-of-Bounds-Lese und Schreibfehler, Puffer\u00fcberl\u00e4ufe, Nutzung von nicht-initialisierten Zeigern, fehlenden Integrit\u00e4tskontrollen sowie Verletzungen von sicheren Designprinzipen zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, seine Privilegien zu erweitern oder Informationen offenzulegen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich." } ], "release_date": "2022-04-12T22:00:00Z", "title": "CVE-2022-28233" }, { "cve": "CVE-2022-28232", "notes": [ { "category": "description", "text": "In Adobe Acrobat DC, Adobe Acrobat Reader DC, Adobe Acrobat und Adobe Acrobat Reader existieren mehrere Schwachstellen. Die Schwachstellen sind auf Use-after-Free-Fehler, Out-of-Bounds-Lese und Schreibfehler, Puffer\u00fcberl\u00e4ufe, Nutzung von nicht-initialisierten Zeigern, fehlenden Integrit\u00e4tskontrollen sowie Verletzungen von sicheren Designprinzipen zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, seine Privilegien zu erweitern oder Informationen offenzulegen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich." } ], "release_date": "2022-04-12T22:00:00Z", "title": "CVE-2022-28232" }, { "cve": "CVE-2022-28231", "notes": [ { "category": "description", "text": "In Adobe Acrobat DC, Adobe Acrobat Reader DC, Adobe Acrobat und Adobe Acrobat Reader existieren mehrere Schwachstellen. Die Schwachstellen sind auf Use-after-Free-Fehler, Out-of-Bounds-Lese und Schreibfehler, Puffer\u00fcberl\u00e4ufe, Nutzung von nicht-initialisierten Zeigern, fehlenden Integrit\u00e4tskontrollen sowie Verletzungen von sicheren Designprinzipen zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, seine Privilegien zu erweitern oder Informationen offenzulegen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich." } ], "release_date": "2022-04-12T22:00:00Z", "title": "CVE-2022-28231" }, { "cve": "CVE-2022-28230", "notes": [ { "category": "description", "text": "In Adobe Acrobat DC, Adobe Acrobat Reader DC, Adobe Acrobat und Adobe Acrobat Reader existieren mehrere Schwachstellen. Die Schwachstellen sind auf Use-after-Free-Fehler, Out-of-Bounds-Lese und Schreibfehler, Puffer\u00fcberl\u00e4ufe, Nutzung von nicht-initialisierten Zeigern, fehlenden Integrit\u00e4tskontrollen sowie Verletzungen von sicheren Designprinzipen zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, seine Privilegien zu erweitern oder Informationen offenzulegen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich." } ], "release_date": "2022-04-12T22:00:00Z", "title": "CVE-2022-28230" }, { "cve": "CVE-2022-27802", "notes": [ { "category": "description", "text": "In Adobe Acrobat DC, Adobe Acrobat Reader DC, Adobe Acrobat und Adobe Acrobat Reader existieren mehrere Schwachstellen. Die Schwachstellen sind auf Use-after-Free-Fehler, Out-of-Bounds-Lese und Schreibfehler, Puffer\u00fcberl\u00e4ufe, Nutzung von nicht-initialisierten Zeigern, fehlenden Integrit\u00e4tskontrollen sowie Verletzungen von sicheren Designprinzipen zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, seine Privilegien zu erweitern oder Informationen offenzulegen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich." } ], "release_date": "2022-04-12T22:00:00Z", "title": "CVE-2022-27802" }, { "cve": "CVE-2022-27801", "notes": [ { "category": "description", "text": "In Adobe Acrobat DC, Adobe Acrobat Reader DC, Adobe Acrobat und Adobe Acrobat Reader existieren mehrere Schwachstellen. Die Schwachstellen sind auf Use-after-Free-Fehler, Out-of-Bounds-Lese und Schreibfehler, Puffer\u00fcberl\u00e4ufe, Nutzung von nicht-initialisierten Zeigern, fehlenden Integrit\u00e4tskontrollen sowie Verletzungen von sicheren Designprinzipen zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, seine Privilegien zu erweitern oder Informationen offenzulegen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich." } ], "release_date": "2022-04-12T22:00:00Z", "title": "CVE-2022-27801" }, { "cve": "CVE-2022-27800", "notes": [ { "category": "description", "text": "In Adobe Acrobat DC, Adobe Acrobat Reader DC, Adobe Acrobat und Adobe Acrobat Reader existieren mehrere Schwachstellen. Die Schwachstellen sind auf Use-after-Free-Fehler, Out-of-Bounds-Lese und Schreibfehler, Puffer\u00fcberl\u00e4ufe, Nutzung von nicht-initialisierten Zeigern, fehlenden Integrit\u00e4tskontrollen sowie Verletzungen von sicheren Designprinzipen zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, seine Privilegien zu erweitern oder Informationen offenzulegen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich." } ], "release_date": "2022-04-12T22:00:00Z", "title": "CVE-2022-27800" }, { "cve": "CVE-2022-27799", "notes": [ { "category": "description", "text": "In Adobe Acrobat DC, Adobe Acrobat Reader DC, Adobe Acrobat und Adobe Acrobat Reader existieren mehrere Schwachstellen. Die Schwachstellen sind auf Use-after-Free-Fehler, Out-of-Bounds-Lese und Schreibfehler, Puffer\u00fcberl\u00e4ufe, Nutzung von nicht-initialisierten Zeigern, fehlenden Integrit\u00e4tskontrollen sowie Verletzungen von sicheren Designprinzipen zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, seine Privilegien zu erweitern oder Informationen offenzulegen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich." } ], "release_date": "2022-04-12T22:00:00Z", "title": "CVE-2022-27799" }, { "cve": "CVE-2022-27798", "notes": [ { "category": "description", "text": "In Adobe Acrobat DC, Adobe Acrobat Reader DC, Adobe Acrobat und Adobe Acrobat Reader existieren mehrere Schwachstellen. Die Schwachstellen sind auf Use-after-Free-Fehler, Out-of-Bounds-Lese und Schreibfehler, Puffer\u00fcberl\u00e4ufe, Nutzung von nicht-initialisierten Zeigern, fehlenden Integrit\u00e4tskontrollen sowie Verletzungen von sicheren Designprinzipen zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, seine Privilegien zu erweitern oder Informationen offenzulegen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich." } ], "release_date": "2022-04-12T22:00:00Z", "title": "CVE-2022-27798" }, { "cve": "CVE-2022-27797", "notes": [ { "category": "description", "text": "In Adobe Acrobat DC, Adobe Acrobat Reader DC, Adobe Acrobat und Adobe Acrobat Reader existieren mehrere Schwachstellen. Die Schwachstellen sind auf Use-after-Free-Fehler, Out-of-Bounds-Lese und Schreibfehler, Puffer\u00fcberl\u00e4ufe, Nutzung von nicht-initialisierten Zeigern, fehlenden Integrit\u00e4tskontrollen sowie Verletzungen von sicheren Designprinzipen zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, seine Privilegien zu erweitern oder Informationen offenzulegen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich." } ], "release_date": "2022-04-12T22:00:00Z", "title": "CVE-2022-27797" }, { "cve": "CVE-2022-27796", "notes": [ { "category": "description", "text": "In Adobe Acrobat DC, Adobe Acrobat Reader DC, Adobe Acrobat und Adobe Acrobat Reader existieren mehrere Schwachstellen. Die Schwachstellen sind auf Use-after-Free-Fehler, Out-of-Bounds-Lese und Schreibfehler, Puffer\u00fcberl\u00e4ufe, Nutzung von nicht-initialisierten Zeigern, fehlenden Integrit\u00e4tskontrollen sowie Verletzungen von sicheren Designprinzipen zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, seine Privilegien zu erweitern oder Informationen offenzulegen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich." } ], "release_date": "2022-04-12T22:00:00Z", "title": "CVE-2022-27796" }, { "cve": "CVE-2022-27795", "notes": [ { "category": "description", "text": "In Adobe Acrobat DC, Adobe Acrobat Reader DC, Adobe Acrobat und Adobe Acrobat Reader existieren mehrere Schwachstellen. Die Schwachstellen sind auf Use-after-Free-Fehler, Out-of-Bounds-Lese und Schreibfehler, Puffer\u00fcberl\u00e4ufe, Nutzung von nicht-initialisierten Zeigern, fehlenden Integrit\u00e4tskontrollen sowie Verletzungen von sicheren Designprinzipen zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, seine Privilegien zu erweitern oder Informationen offenzulegen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich." } ], "release_date": "2022-04-12T22:00:00Z", "title": "CVE-2022-27795" }, { "cve": "CVE-2022-27794", "notes": [ { "category": "description", "text": "In Adobe Acrobat DC, Adobe Acrobat Reader DC, Adobe Acrobat und Adobe Acrobat Reader existieren mehrere Schwachstellen. Die Schwachstellen sind auf Use-after-Free-Fehler, Out-of-Bounds-Lese und Schreibfehler, Puffer\u00fcberl\u00e4ufe, Nutzung von nicht-initialisierten Zeigern, fehlenden Integrit\u00e4tskontrollen sowie Verletzungen von sicheren Designprinzipen zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, seine Privilegien zu erweitern oder Informationen offenzulegen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich." } ], "release_date": "2022-04-12T22:00:00Z", "title": "CVE-2022-27794" }, { "cve": "CVE-2022-27793", "notes": [ { "category": "description", "text": "In Adobe Acrobat DC, Adobe Acrobat Reader DC, Adobe Acrobat und Adobe Acrobat Reader existieren mehrere Schwachstellen. Die Schwachstellen sind auf Use-after-Free-Fehler, Out-of-Bounds-Lese und Schreibfehler, Puffer\u00fcberl\u00e4ufe, Nutzung von nicht-initialisierten Zeigern, fehlenden Integrit\u00e4tskontrollen sowie Verletzungen von sicheren Designprinzipen zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, seine Privilegien zu erweitern oder Informationen offenzulegen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich." } ], "release_date": "2022-04-12T22:00:00Z", "title": "CVE-2022-27793" }, { "cve": "CVE-2022-27792", "notes": [ { "category": "description", "text": "In Adobe Acrobat DC, Adobe Acrobat Reader DC, Adobe Acrobat und Adobe Acrobat Reader existieren mehrere Schwachstellen. Die Schwachstellen sind auf Use-after-Free-Fehler, Out-of-Bounds-Lese und Schreibfehler, Puffer\u00fcberl\u00e4ufe, Nutzung von nicht-initialisierten Zeigern, fehlenden Integrit\u00e4tskontrollen sowie Verletzungen von sicheren Designprinzipen zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, seine Privilegien zu erweitern oder Informationen offenzulegen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich." } ], "release_date": "2022-04-12T22:00:00Z", "title": "CVE-2022-27792" }, { "cve": "CVE-2022-27791", "notes": [ { "category": "description", "text": "In Adobe Acrobat DC, Adobe Acrobat Reader DC, Adobe Acrobat und Adobe Acrobat Reader existieren mehrere Schwachstellen. Die Schwachstellen sind auf Use-after-Free-Fehler, Out-of-Bounds-Lese und Schreibfehler, Puffer\u00fcberl\u00e4ufe, Nutzung von nicht-initialisierten Zeigern, fehlenden Integrit\u00e4tskontrollen sowie Verletzungen von sicheren Designprinzipen zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, seine Privilegien zu erweitern oder Informationen offenzulegen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich." } ], "release_date": "2022-04-12T22:00:00Z", "title": "CVE-2022-27791" }, { "cve": "CVE-2022-27790", "notes": [ { "category": "description", "text": "In Adobe Acrobat DC, Adobe Acrobat Reader DC, Adobe Acrobat und Adobe Acrobat Reader existieren mehrere Schwachstellen. Die Schwachstellen sind auf Use-after-Free-Fehler, Out-of-Bounds-Lese und Schreibfehler, Puffer\u00fcberl\u00e4ufe, Nutzung von nicht-initialisierten Zeigern, fehlenden Integrit\u00e4tskontrollen sowie Verletzungen von sicheren Designprinzipen zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, seine Privilegien zu erweitern oder Informationen offenzulegen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich." } ], "release_date": "2022-04-12T22:00:00Z", "title": "CVE-2022-27790" }, { "cve": "CVE-2022-27789", "notes": [ { "category": "description", "text": "In Adobe Acrobat DC, Adobe Acrobat Reader DC, Adobe Acrobat und Adobe Acrobat Reader existieren mehrere Schwachstellen. Die Schwachstellen sind auf Use-after-Free-Fehler, Out-of-Bounds-Lese und Schreibfehler, Puffer\u00fcberl\u00e4ufe, Nutzung von nicht-initialisierten Zeigern, fehlenden Integrit\u00e4tskontrollen sowie Verletzungen von sicheren Designprinzipen zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, seine Privilegien zu erweitern oder Informationen offenzulegen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich." } ], "release_date": "2022-04-12T22:00:00Z", "title": "CVE-2022-27789" }, { "cve": "CVE-2022-27788", "notes": [ { "category": "description", "text": "In Adobe Acrobat DC, Adobe Acrobat Reader DC, Adobe Acrobat und Adobe Acrobat Reader existieren mehrere Schwachstellen. Die Schwachstellen sind auf Use-after-Free-Fehler, Out-of-Bounds-Lese und Schreibfehler, Puffer\u00fcberl\u00e4ufe, Nutzung von nicht-initialisierten Zeigern, fehlenden Integrit\u00e4tskontrollen sowie Verletzungen von sicheren Designprinzipen zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, seine Privilegien zu erweitern oder Informationen offenzulegen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich." } ], "release_date": "2022-04-12T22:00:00Z", "title": "CVE-2022-27788" }, { "cve": "CVE-2022-27787", "notes": [ { "category": "description", "text": "In Adobe Acrobat DC, Adobe Acrobat Reader DC, Adobe Acrobat und Adobe Acrobat Reader existieren mehrere Schwachstellen. Die Schwachstellen sind auf Use-after-Free-Fehler, Out-of-Bounds-Lese und Schreibfehler, Puffer\u00fcberl\u00e4ufe, Nutzung von nicht-initialisierten Zeigern, fehlenden Integrit\u00e4tskontrollen sowie Verletzungen von sicheren Designprinzipen zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, seine Privilegien zu erweitern oder Informationen offenzulegen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich." } ], "release_date": "2022-04-12T22:00:00Z", "title": "CVE-2022-27787" }, { "cve": "CVE-2022-27786", "notes": [ { "category": "description", "text": "In Adobe Acrobat DC, Adobe Acrobat Reader DC, Adobe Acrobat und Adobe Acrobat Reader existieren mehrere Schwachstellen. Die Schwachstellen sind auf Use-after-Free-Fehler, Out-of-Bounds-Lese und Schreibfehler, Puffer\u00fcberl\u00e4ufe, Nutzung von nicht-initialisierten Zeigern, fehlenden Integrit\u00e4tskontrollen sowie Verletzungen von sicheren Designprinzipen zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, seine Privilegien zu erweitern oder Informationen offenzulegen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich." } ], "release_date": "2022-04-12T22:00:00Z", "title": "CVE-2022-27786" }, { "cve": "CVE-2022-27785", "notes": [ { "category": "description", "text": "In Adobe Acrobat DC, Adobe Acrobat Reader DC, Adobe Acrobat und Adobe Acrobat Reader existieren mehrere Schwachstellen. Die Schwachstellen sind auf Use-after-Free-Fehler, Out-of-Bounds-Lese und Schreibfehler, Puffer\u00fcberl\u00e4ufe, Nutzung von nicht-initialisierten Zeigern, fehlenden Integrit\u00e4tskontrollen sowie Verletzungen von sicheren Designprinzipen zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, seine Privilegien zu erweitern oder Informationen offenzulegen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich." } ], "release_date": "2022-04-12T22:00:00Z", "title": "CVE-2022-27785" }, { "cve": "CVE-2022-24104", "notes": [ { "category": "description", "text": "In Adobe Acrobat DC, Adobe Acrobat Reader DC, Adobe Acrobat und Adobe Acrobat Reader existieren mehrere Schwachstellen. Die Schwachstellen sind auf Use-after-Free-Fehler, Out-of-Bounds-Lese und Schreibfehler, Puffer\u00fcberl\u00e4ufe, Nutzung von nicht-initialisierten Zeigern, fehlenden Integrit\u00e4tskontrollen sowie Verletzungen von sicheren Designprinzipen zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, seine Privilegien zu erweitern oder Informationen offenzulegen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich." } ], "release_date": "2022-04-12T22:00:00Z", "title": "CVE-2022-24104" }, { "cve": "CVE-2022-24103", "notes": [ { "category": "description", "text": "In Adobe Acrobat DC, Adobe Acrobat Reader DC, Adobe Acrobat und Adobe Acrobat Reader existieren mehrere Schwachstellen. Die Schwachstellen sind auf Use-after-Free-Fehler, Out-of-Bounds-Lese und Schreibfehler, Puffer\u00fcberl\u00e4ufe, Nutzung von nicht-initialisierten Zeigern, fehlenden Integrit\u00e4tskontrollen sowie Verletzungen von sicheren Designprinzipen zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, seine Privilegien zu erweitern oder Informationen offenzulegen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich." } ], "release_date": "2022-04-12T22:00:00Z", "title": "CVE-2022-24103" }, { "cve": "CVE-2022-24102", "notes": [ { "category": "description", "text": "In Adobe Acrobat DC, Adobe Acrobat Reader DC, Adobe Acrobat und Adobe Acrobat Reader existieren mehrere Schwachstellen. Die Schwachstellen sind auf Use-after-Free-Fehler, Out-of-Bounds-Lese und Schreibfehler, Puffer\u00fcberl\u00e4ufe, Nutzung von nicht-initialisierten Zeigern, fehlenden Integrit\u00e4tskontrollen sowie Verletzungen von sicheren Designprinzipen zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, seine Privilegien zu erweitern oder Informationen offenzulegen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich." } ], "release_date": "2022-04-12T22:00:00Z", "title": "CVE-2022-24102" }, { "cve": "CVE-2022-24101", "notes": [ { "category": "description", "text": "In Adobe Acrobat DC, Adobe Acrobat Reader DC, Adobe Acrobat und Adobe Acrobat Reader existieren mehrere Schwachstellen. Die Schwachstellen sind auf Use-after-Free-Fehler, Out-of-Bounds-Lese und Schreibfehler, Puffer\u00fcberl\u00e4ufe, Nutzung von nicht-initialisierten Zeigern, fehlenden Integrit\u00e4tskontrollen sowie Verletzungen von sicheren Designprinzipen zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, seine Privilegien zu erweitern oder Informationen offenzulegen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich." } ], "release_date": "2022-04-12T22:00:00Z", "title": "CVE-2022-24101" } ] }
cve-2022-28246
Vulnerability from cvelistv5
Published
2022-05-11 17:41
Modified
2024-09-16 17:08
Severity ?
EPSS score ?
Summary
Adobe Acrobat Reader DC Doc Object Out-Of-Bounds Read Information Disclosure Vulnerability
References
▼ | URL | Tags |
---|---|---|
https://helpx.adobe.com/security/products/acrobat/apsb22-16.html | x_refsource_MISC |
Impacted products
▼ | Vendor | Product |
---|---|---|
Adobe | Acrobat Reader |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T05:48:37.892Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://helpx.adobe.com/security/products/acrobat/apsb22-16.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Acrobat Reader", "vendor": "Adobe", "versions": [ { "lessThanOrEqual": "22.001.20085", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThanOrEqual": "20.005.3031x", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThanOrEqual": "17.012.30205", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThanOrEqual": "None", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "datePublic": "2022-04-12T00:00:00", "descriptions": [ { "lang": "en", "value": "Acrobat Reader DC version 22.001.2011x (and earlier), 20.005.3033x (and earlier) and 17.012.3022x (and earlier) are affected by an out-of-bounds read vulnerability when parsing a crafted file, which could result in a read past the end of an allocated memory structure. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-125", "description": "Out-of-bounds Read (CWE-125)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-05-11T17:41:17", "orgId": "078d4453-3bcd-4900-85e6-15281da43538", "shortName": "adobe" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://helpx.adobe.com/security/products/acrobat/apsb22-16.html" } ], "source": { "discovery": "EXTERNAL" }, "title": "Adobe Acrobat Reader DC Doc Object Out-Of-Bounds Read Information Disclosure Vulnerability", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@adobe.com", "DATE_PUBLIC": "2022-04-12T23:00:00.000Z", "ID": "CVE-2022-28246", "STATE": "PUBLIC", "TITLE": "Adobe Acrobat Reader DC Doc Object Out-Of-Bounds Read Information Disclosure Vulnerability" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Acrobat Reader", "version": { "version_data": [ { "version_affected": "\u003c=", "version_value": "22.001.20085" }, { "version_affected": "\u003c=", "version_value": "20.005.3031x" }, { "version_affected": "\u003c=", "version_value": "17.012.30205" }, { "version_affected": "\u003c=", "version_value": "None" } ] } } ] }, "vendor_name": "Adobe" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Acrobat Reader DC version 22.001.2011x (and earlier), 20.005.3033x (and earlier) and 17.012.3022x (and earlier) are affected by an out-of-bounds read vulnerability when parsing a crafted file, which could result in a read past the end of an allocated memory structure. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file." } ] }, "impact": { "cvss": { "attackComplexity": "Low", "attackVector": "Local", "availabilityImpact": "None", "baseScore": 5.5, "baseSeverity": "Medium", "confidentialityImpact": "High", "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "userInteraction": "Required", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Out-of-bounds Read (CWE-125)" } ] } ] }, "references": { "reference_data": [ { "name": "https://helpx.adobe.com/security/products/acrobat/apsb22-16.html", "refsource": "MISC", "url": "https://helpx.adobe.com/security/products/acrobat/apsb22-16.html" } ] }, "source": { "discovery": "EXTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "078d4453-3bcd-4900-85e6-15281da43538", "assignerShortName": "adobe", "cveId": "CVE-2022-28246", "datePublished": "2022-05-11T17:41:17.257577Z", "dateReserved": "2022-03-30T00:00:00", "dateUpdated": "2024-09-16T17:08:47.339Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-27785
Vulnerability from cvelistv5
Published
2022-05-11 17:10
Modified
2024-09-16 17:14
Severity ?
EPSS score ?
Summary
Adobe Acrobat Reader DC Font Parsing Use-After-Free Remote Code Execution Vulnerability
References
▼ | URL | Tags |
---|---|---|
https://helpx.adobe.com/security/products/acrobat/apsb22-16.html | x_refsource_MISC |
Impacted products
▼ | Vendor | Product |
---|---|---|
Adobe | Acrobat Reader |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T05:32:59.805Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://helpx.adobe.com/security/products/acrobat/apsb22-16.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Acrobat Reader", "vendor": "Adobe", "versions": [ { "lessThanOrEqual": "22.001.20085", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThanOrEqual": "20.005.3031x", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThanOrEqual": "17.012.30205", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThanOrEqual": "None", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "datePublic": "2022-04-12T00:00:00", "descriptions": [ { "lang": "en", "value": "Acrobat Reader DC versions 22.001.20085 (and earlier), 20.005.3031x (and earlier) and 17.012.30205 (and earlier) are affected by a use-after-free vulnerability in the processing of fonts that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file." } ], "metrics": [ { "cvssV3_0": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-416", "description": "Use After Free (CWE-416)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-05-11T17:10:19", "orgId": "078d4453-3bcd-4900-85e6-15281da43538", "shortName": "adobe" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://helpx.adobe.com/security/products/acrobat/apsb22-16.html" } ], "source": { "discovery": "EXTERNAL" }, "title": "Adobe Acrobat Reader DC Font Parsing Use-After-Free Remote Code Execution Vulnerability", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@adobe.com", "DATE_PUBLIC": "2022-04-12T23:00:00.000Z", "ID": "CVE-2022-27785", "STATE": "PUBLIC", "TITLE": "Adobe Acrobat Reader DC Font Parsing Use-After-Free Remote Code Execution Vulnerability" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Acrobat Reader", "version": { "version_data": [ { "version_affected": "\u003c=", "version_value": "22.001.20085" }, { "version_affected": "\u003c=", "version_value": "20.005.3031x" }, { "version_affected": "\u003c=", "version_value": "17.012.30205" }, { "version_affected": "\u003c=", "version_value": "None" } ] } } ] }, "vendor_name": "Adobe" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Acrobat Reader DC versions 22.001.20085 (and earlier), 20.005.3031x (and earlier) and 17.012.30205 (and earlier) are affected by a use-after-free vulnerability in the processing of fonts that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file." } ] }, "impact": { "cvss": { "attackComplexity": "Low", "attackVector": "Local", "availabilityImpact": "High", "baseScore": 7.8, "baseSeverity": "High", "confidentialityImpact": "High", "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "userInteraction": "Required", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Use After Free (CWE-416)" } ] } ] }, "references": { "reference_data": [ { "name": "https://helpx.adobe.com/security/products/acrobat/apsb22-16.html", "refsource": "MISC", "url": "https://helpx.adobe.com/security/products/acrobat/apsb22-16.html" } ] }, "source": { "discovery": "EXTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "078d4453-3bcd-4900-85e6-15281da43538", "assignerShortName": "adobe", "cveId": "CVE-2022-27785", "datePublished": "2022-05-11T17:10:19.826062Z", "dateReserved": "2022-03-23T00:00:00", "dateUpdated": "2024-09-16T17:14:10.031Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-27788
Vulnerability from cvelistv5
Published
2022-05-11 17:12
Modified
2024-09-17 02:58
Severity ?
EPSS score ?
Summary
Adobe Acrobat Reader DC Font Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability
References
▼ | URL | Tags |
---|---|---|
https://helpx.adobe.com/security/products/acrobat/apsb22-16.html | x_refsource_MISC |
Impacted products
▼ | Vendor | Product |
---|---|---|
Adobe | Acrobat Reader |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T05:33:00.157Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://helpx.adobe.com/security/products/acrobat/apsb22-16.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Acrobat Reader", "vendor": "Adobe", "versions": [ { "lessThanOrEqual": "22.001.20085", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThanOrEqual": "20.005.3031x", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThanOrEqual": "17.012.30205", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThanOrEqual": "None", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "datePublic": "2022-04-12T00:00:00", "descriptions": [ { "lang": "en", "value": "Acrobat Reader DC versions 22.001.20085 (and earlier), 20.005.3031x (and earlier) and 17.012.30205 (and earlier) are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file." } ], "metrics": [ { "cvssV3_0": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-787", "description": "Out-of-bounds Write (CWE-787)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-05-11T17:12:56", "orgId": "078d4453-3bcd-4900-85e6-15281da43538", "shortName": "adobe" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://helpx.adobe.com/security/products/acrobat/apsb22-16.html" } ], "source": { "discovery": "EXTERNAL" }, "title": "Adobe Acrobat Reader DC Font Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@adobe.com", "DATE_PUBLIC": "2022-04-12T23:00:00.000Z", "ID": "CVE-2022-27788", "STATE": "PUBLIC", "TITLE": "Adobe Acrobat Reader DC Font Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Acrobat Reader", "version": { "version_data": [ { "version_affected": "\u003c=", "version_value": "22.001.20085" }, { "version_affected": "\u003c=", "version_value": "20.005.3031x" }, { "version_affected": "\u003c=", "version_value": "17.012.30205" }, { "version_affected": "\u003c=", "version_value": "None" } ] } } ] }, "vendor_name": "Adobe" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Acrobat Reader DC versions 22.001.20085 (and earlier), 20.005.3031x (and earlier) and 17.012.30205 (and earlier) are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file." } ] }, "impact": { "cvss": { "attackComplexity": "Low", "attackVector": "Local", "availabilityImpact": "High", "baseScore": 7.8, "baseSeverity": "High", "confidentialityImpact": "High", "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "userInteraction": "Required", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Out-of-bounds Write (CWE-787)" } ] } ] }, "references": { "reference_data": [ { "name": "https://helpx.adobe.com/security/products/acrobat/apsb22-16.html", "refsource": "MISC", "url": "https://helpx.adobe.com/security/products/acrobat/apsb22-16.html" } ] }, "source": { "discovery": "EXTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "078d4453-3bcd-4900-85e6-15281da43538", "assignerShortName": "adobe", "cveId": "CVE-2022-27788", "datePublished": "2022-05-11T17:12:56.095599Z", "dateReserved": "2022-03-23T00:00:00", "dateUpdated": "2024-09-17T02:58:01.673Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-28245
Vulnerability from cvelistv5
Published
2022-05-11 17:40
Modified
2024-09-17 04:08
Severity ?
EPSS score ?
Summary
Adobe Acrobat Reader DC Doc Object Out-Of-Bounds Read Information Disclosure Vulnerability
References
▼ | URL | Tags |
---|---|---|
https://helpx.adobe.com/security/products/acrobat/apsb22-16.html | x_refsource_MISC |
Impacted products
▼ | Vendor | Product |
---|---|---|
Adobe | Acrobat Reader |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T05:48:37.663Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://helpx.adobe.com/security/products/acrobat/apsb22-16.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Acrobat Reader", "vendor": "Adobe", "versions": [ { "lessThanOrEqual": "22.001.20085", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThanOrEqual": "20.005.3031x", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThanOrEqual": "17.012.30205", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThanOrEqual": "None", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "datePublic": "2022-04-12T00:00:00", "descriptions": [ { "lang": "en", "value": "Acrobat Reader DC version 22.001.2011x (and earlier), 20.005.3033x (and earlier) and 17.012.3022x (and earlier) are affected by an out-of-bounds read vulnerability when parsing a crafted file, which could result in a read past the end of an allocated memory structure. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-125", "description": "Out-of-bounds Read (CWE-125)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-05-11T17:40:00", "orgId": "078d4453-3bcd-4900-85e6-15281da43538", "shortName": "adobe" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://helpx.adobe.com/security/products/acrobat/apsb22-16.html" } ], "source": { "discovery": "EXTERNAL" }, "title": "Adobe Acrobat Reader DC Doc Object Out-Of-Bounds Read Information Disclosure Vulnerability", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@adobe.com", "DATE_PUBLIC": "2022-04-12T23:00:00.000Z", "ID": "CVE-2022-28245", "STATE": "PUBLIC", "TITLE": "Adobe Acrobat Reader DC Doc Object Out-Of-Bounds Read Information Disclosure Vulnerability" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Acrobat Reader", "version": { "version_data": [ { "version_affected": "\u003c=", "version_value": "22.001.20085" }, { "version_affected": "\u003c=", "version_value": "20.005.3031x" }, { "version_affected": "\u003c=", "version_value": "17.012.30205" }, { "version_affected": "\u003c=", "version_value": "None" } ] } } ] }, "vendor_name": "Adobe" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Acrobat Reader DC version 22.001.2011x (and earlier), 20.005.3033x (and earlier) and 17.012.3022x (and earlier) are affected by an out-of-bounds read vulnerability when parsing a crafted file, which could result in a read past the end of an allocated memory structure. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file." } ] }, "impact": { "cvss": { "attackComplexity": "Low", "attackVector": "Local", "availabilityImpact": "None", "baseScore": 5.5, "baseSeverity": "Medium", "confidentialityImpact": "High", "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "userInteraction": "Required", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Out-of-bounds Read (CWE-125)" } ] } ] }, "references": { "reference_data": [ { "name": "https://helpx.adobe.com/security/products/acrobat/apsb22-16.html", "refsource": "MISC", "url": "https://helpx.adobe.com/security/products/acrobat/apsb22-16.html" } ] }, "source": { "discovery": "EXTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "078d4453-3bcd-4900-85e6-15281da43538", "assignerShortName": "adobe", "cveId": "CVE-2022-28245", "datePublished": "2022-05-11T17:40:00.764209Z", "dateReserved": "2022-03-30T00:00:00", "dateUpdated": "2024-09-17T04:08:59.119Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-35672
Vulnerability from cvelistv5
Published
2022-07-27 16:20
Modified
2024-09-16 16:22
Severity ?
EPSS score ?
Summary
Adobe Acrobat Reader DC Font Parsing Out-Of-Bounds Read Remote Code Execution Vulnerability
References
▼ | URL | Tags |
---|---|---|
https://helpx.adobe.com/security/products/acrobat/apsb22-16.html | x_refsource_MISC |
Impacted products
▼ | Vendor | Product |
---|---|---|
Adobe | Acrobat Reader |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T09:36:44.418Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://helpx.adobe.com/security/products/acrobat/apsb22-16.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Acrobat Reader", "vendor": "Adobe", "versions": [ { "lessThanOrEqual": "22.001.20085", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThanOrEqual": "17.012.30205", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThanOrEqual": "20.005.30314", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThanOrEqual": "None", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "datePublic": "2022-04-12T00:00:00", "descriptions": [ { "lang": "en", "value": "Adobe Acrobat Reader version 22.001.20085 (and earlier), 20.005.30314 (and earlier) and 17.012.30205 (and earlier) are affected by an out-of-bounds read vulnerability when parsing a crafted file, which could result in a read past the end of an allocated memory structure. An attacker could leverage this vulnerability to execute code in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file." } ], "metrics": [ { "cvssV3_0": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-125", "description": "Out-of-bounds Read (CWE-125)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-07-27T16:20:50", "orgId": "078d4453-3bcd-4900-85e6-15281da43538", "shortName": "adobe" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://helpx.adobe.com/security/products/acrobat/apsb22-16.html" } ], "source": { "discovery": "EXTERNAL" }, "title": "Adobe Acrobat Reader DC Font Parsing Out-Of-Bounds Read Remote Code Execution Vulnerability", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@adobe.com", "DATE_PUBLIC": "2022-04-12T23:00:00.000Z", "ID": "CVE-2022-35672", "STATE": "PUBLIC", "TITLE": "Adobe Acrobat Reader DC Font Parsing Out-Of-Bounds Read Remote Code Execution Vulnerability" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Acrobat Reader", "version": { "version_data": [ { "version_affected": "\u003c=", "version_value": "22.001.20085" }, { "version_affected": "\u003c=", "version_value": "17.012.30205" }, { "version_affected": "\u003c=", "version_value": "20.005.30314" }, { "version_affected": "\u003c=", "version_value": "None" } ] } } ] }, "vendor_name": "Adobe" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Adobe Acrobat Reader version 22.001.20085 (and earlier), 20.005.30314 (and earlier) and 17.012.30205 (and earlier) are affected by an out-of-bounds read vulnerability when parsing a crafted file, which could result in a read past the end of an allocated memory structure. An attacker could leverage this vulnerability to execute code in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file." } ] }, "impact": { "cvss": { "attackComplexity": "Low", "attackVector": "Local", "availabilityImpact": "High", "baseScore": 7.8, "baseSeverity": "High", "confidentialityImpact": "High", "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "userInteraction": "Required", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Out-of-bounds Read (CWE-125)" } ] } ] }, "references": { "reference_data": [ { "name": "https://helpx.adobe.com/security/products/acrobat/apsb22-16.html", "refsource": "MISC", "url": "https://helpx.adobe.com/security/products/acrobat/apsb22-16.html" } ] }, "source": { "discovery": "EXTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "078d4453-3bcd-4900-85e6-15281da43538", "assignerShortName": "adobe", "cveId": "CVE-2022-35672", "datePublished": "2022-07-27T16:20:50.452019Z", "dateReserved": "2022-07-12T00:00:00", "dateUpdated": "2024-09-16T16:22:55.894Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-28266
Vulnerability from cvelistv5
Published
2022-05-11 17:57
Modified
2024-09-17 02:12
Severity ?
EPSS score ?
Summary
Adobe Acrobat Reader DC Annotation Out-Of-Bounds Read Information Disclosure Vulnerability
References
▼ | URL | Tags |
---|---|---|
https://helpx.adobe.com/security/products/acrobat/apsb22-16.html | x_refsource_MISC |
Impacted products
▼ | Vendor | Product |
---|---|---|
Adobe | Acrobat Reader |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T05:48:37.900Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://helpx.adobe.com/security/products/acrobat/apsb22-16.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Acrobat Reader", "vendor": "Adobe", "versions": [ { "lessThanOrEqual": "22.001.20085", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThanOrEqual": "20.005.3031x", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThanOrEqual": "17.012.30205", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThanOrEqual": "None", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "datePublic": "2022-04-12T00:00:00", "descriptions": [ { "lang": "en", "value": "Acrobat Reader DC version 22.001.2011x (and earlier), 20.005.3033x (and earlier) and 17.012.3022x (and earlier) are affected by an out-of-bounds read vulnerability when parsing a crafted file, which could result in a read past the end of an allocated memory structure. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-125", "description": "Out-of-bounds Read (CWE-125)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-05-11T17:57:07", "orgId": "078d4453-3bcd-4900-85e6-15281da43538", "shortName": "adobe" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://helpx.adobe.com/security/products/acrobat/apsb22-16.html" } ], "source": { "discovery": "EXTERNAL" }, "title": "Adobe Acrobat Reader DC Annotation Out-Of-Bounds Read Information Disclosure Vulnerability", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@adobe.com", "DATE_PUBLIC": "2022-04-12T23:00:00.000Z", "ID": "CVE-2022-28266", "STATE": "PUBLIC", "TITLE": "Adobe Acrobat Reader DC Annotation Out-Of-Bounds Read Information Disclosure Vulnerability" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Acrobat Reader", "version": { "version_data": [ { "version_affected": "\u003c=", "version_value": "22.001.20085" }, { "version_affected": "\u003c=", "version_value": "20.005.3031x" }, { "version_affected": "\u003c=", "version_value": "17.012.30205" }, { "version_affected": "\u003c=", "version_value": "None" } ] } } ] }, "vendor_name": "Adobe" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Acrobat Reader DC version 22.001.2011x (and earlier), 20.005.3033x (and earlier) and 17.012.3022x (and earlier) are affected by an out-of-bounds read vulnerability when parsing a crafted file, which could result in a read past the end of an allocated memory structure. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file." } ] }, "impact": { "cvss": { "attackComplexity": "Low", "attackVector": "Local", "availabilityImpact": "None", "baseScore": 5.5, "baseSeverity": "Medium", "confidentialityImpact": "High", "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "userInteraction": "Required", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Out-of-bounds Read (CWE-125)" } ] } ] }, "references": { "reference_data": [ { "name": "https://helpx.adobe.com/security/products/acrobat/apsb22-16.html", "refsource": "MISC", "url": "https://helpx.adobe.com/security/products/acrobat/apsb22-16.html" } ] }, "source": { "discovery": "EXTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "078d4453-3bcd-4900-85e6-15281da43538", "assignerShortName": "adobe", "cveId": "CVE-2022-28266", "datePublished": "2022-05-11T17:57:07.416981Z", "dateReserved": "2022-03-30T00:00:00", "dateUpdated": "2024-09-17T02:12:11.095Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-28258
Vulnerability from cvelistv5
Published
2022-05-11 17:51
Modified
2024-09-16 21:02
Severity ?
EPSS score ?
Summary
Adobe Acrobat Reader DC Annotation Out-Of-Bounds Read Information Disclosure Vulnerability
References
▼ | URL | Tags |
---|---|---|
https://helpx.adobe.com/security/products/acrobat/apsb22-16.html | x_refsource_MISC |
Impacted products
▼ | Vendor | Product |
---|---|---|
Adobe | Acrobat Reader |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T05:48:37.885Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://helpx.adobe.com/security/products/acrobat/apsb22-16.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Acrobat Reader", "vendor": "Adobe", "versions": [ { "lessThanOrEqual": "22.001.20085", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThanOrEqual": "20.005.3031x", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThanOrEqual": "17.012.30205", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThanOrEqual": "None", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "datePublic": "2022-04-12T00:00:00", "descriptions": [ { "lang": "en", "value": "Acrobat Reader DC version 22.001.2011x (and earlier), 20.005.3033x (and earlier) and 17.012.3022x (and earlier) are affected by an out-of-bounds read vulnerability when parsing a crafted file, which could result in a read past the end of an allocated memory structure. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-125", "description": "Out-of-bounds Read (CWE-125)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-05-11T17:51:03", "orgId": "078d4453-3bcd-4900-85e6-15281da43538", "shortName": "adobe" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://helpx.adobe.com/security/products/acrobat/apsb22-16.html" } ], "source": { "discovery": "EXTERNAL" }, "title": "Adobe Acrobat Reader DC Annotation Out-Of-Bounds Read Information Disclosure Vulnerability", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@adobe.com", "DATE_PUBLIC": "2022-04-12T23:00:00.000Z", "ID": "CVE-2022-28258", "STATE": "PUBLIC", "TITLE": "Adobe Acrobat Reader DC Annotation Out-Of-Bounds Read Information Disclosure Vulnerability" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Acrobat Reader", "version": { "version_data": [ { "version_affected": "\u003c=", "version_value": "22.001.20085" }, { "version_affected": "\u003c=", "version_value": "20.005.3031x" }, { "version_affected": "\u003c=", "version_value": "17.012.30205" }, { "version_affected": "\u003c=", "version_value": "None" } ] } } ] }, "vendor_name": "Adobe" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Acrobat Reader DC version 22.001.2011x (and earlier), 20.005.3033x (and earlier) and 17.012.3022x (and earlier) are affected by an out-of-bounds read vulnerability when parsing a crafted file, which could result in a read past the end of an allocated memory structure. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file." } ] }, "impact": { "cvss": { "attackComplexity": "Low", "attackVector": "Local", "availabilityImpact": "None", "baseScore": 5.5, "baseSeverity": "Medium", "confidentialityImpact": "High", "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "userInteraction": "Required", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Out-of-bounds Read (CWE-125)" } ] } ] }, "references": { "reference_data": [ { "name": "https://helpx.adobe.com/security/products/acrobat/apsb22-16.html", "refsource": "MISC", "url": "https://helpx.adobe.com/security/products/acrobat/apsb22-16.html" } ] }, "source": { "discovery": "EXTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "078d4453-3bcd-4900-85e6-15281da43538", "assignerShortName": "adobe", "cveId": "CVE-2022-28258", "datePublished": "2022-05-11T17:51:03.301841Z", "dateReserved": "2022-03-30T00:00:00", "dateUpdated": "2024-09-16T21:02:33.566Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-24102
Vulnerability from cvelistv5
Published
2022-05-11 17:06
Modified
2024-09-17 04:05
Severity ?
EPSS score ?
Summary
Adobe Acrobat Reader DC Annotation Use-After-Free Remote Code Execution Vulnerability
References
▼ | URL | Tags |
---|---|---|
https://helpx.adobe.com/security/products/acrobat/apsb22-16.html | x_refsource_MISC |
Impacted products
▼ | Vendor | Product |
---|---|---|
Adobe | Acrobat Reader |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T03:59:23.519Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://helpx.adobe.com/security/products/acrobat/apsb22-16.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Acrobat Reader", "vendor": "Adobe", "versions": [ { "lessThanOrEqual": "22.001.20085", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThanOrEqual": "20.005.3031x", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThanOrEqual": "17.012.30205", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThanOrEqual": "None", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "datePublic": "2022-04-12T00:00:00", "descriptions": [ { "lang": "en", "value": "Acrobat Reader DC versions 20.001.20085 (and earlier), 20.005.3031x (and earlier) and 17.012.30205 (and earlier) are affected by a use-after-free vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file." } ], "metrics": [ { "cvssV3_0": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-416", "description": "Use After Free (CWE-416)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-05-11T17:06:12", "orgId": "078d4453-3bcd-4900-85e6-15281da43538", "shortName": "adobe" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://helpx.adobe.com/security/products/acrobat/apsb22-16.html" } ], "source": { "discovery": "EXTERNAL" }, "title": "Adobe Acrobat Reader DC Annotation Use-After-Free Remote Code Execution Vulnerability", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@adobe.com", "DATE_PUBLIC": "2022-04-12T23:00:00.000Z", "ID": "CVE-2022-24102", "STATE": "PUBLIC", "TITLE": "Adobe Acrobat Reader DC Annotation Use-After-Free Remote Code Execution Vulnerability" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Acrobat Reader", "version": { "version_data": [ { "version_affected": "\u003c=", "version_value": "22.001.20085" }, { "version_affected": "\u003c=", "version_value": "20.005.3031x" }, { "version_affected": "\u003c=", "version_value": "17.012.30205" }, { "version_affected": "\u003c=", "version_value": "None" } ] } } ] }, "vendor_name": "Adobe" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Acrobat Reader DC versions 20.001.20085 (and earlier), 20.005.3031x (and earlier) and 17.012.30205 (and earlier) are affected by a use-after-free vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file." } ] }, "impact": { "cvss": { "attackComplexity": "Low", "attackVector": "Local", "availabilityImpact": "High", "baseScore": 7.8, "baseSeverity": "High", "confidentialityImpact": "High", "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "userInteraction": "Required", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Use After Free (CWE-416)" } ] } ] }, "references": { "reference_data": [ { "name": "https://helpx.adobe.com/security/products/acrobat/apsb22-16.html", "refsource": "MISC", "url": "https://helpx.adobe.com/security/products/acrobat/apsb22-16.html" } ] }, "source": { "discovery": "EXTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "078d4453-3bcd-4900-85e6-15281da43538", "assignerShortName": "adobe", "cveId": "CVE-2022-24102", "datePublished": "2022-05-11T17:06:12.292206Z", "dateReserved": "2022-01-27T00:00:00", "dateUpdated": "2024-09-17T04:05:10.682Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-27801
Vulnerability from cvelistv5
Published
2022-05-11 17:23
Modified
2024-09-17 03:07
Severity ?
EPSS score ?
Summary
Adobe Acrobat Reader DC Annotation Use-After-Free Remote Code Execution Vulnerability
References
▼ | URL | Tags |
---|---|---|
https://helpx.adobe.com/security/products/acrobat/apsb22-16.html | x_refsource_MISC |
Impacted products
▼ | Vendor | Product |
---|---|---|
Adobe | Acrobat Reader |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T05:32:59.969Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://helpx.adobe.com/security/products/acrobat/apsb22-16.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Acrobat Reader", "vendor": "Adobe", "versions": [ { "lessThanOrEqual": "22.001.20085", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThanOrEqual": "20.005.3031x", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThanOrEqual": "17.012.30205", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThanOrEqual": "None", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "datePublic": "2022-04-12T00:00:00", "descriptions": [ { "lang": "en", "value": "Acrobat Reader DC versions 22.001.20085 (and earlier), 20.005.3031x (and earlier) and 17.012.30205 (and earlier) are affected by a use-after-free vulnerability in the processing of annotations that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file." } ], "metrics": [ { "cvssV3_0": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-416", "description": "Use After Free (CWE-416)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-05-11T17:23:46", "orgId": "078d4453-3bcd-4900-85e6-15281da43538", "shortName": "adobe" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://helpx.adobe.com/security/products/acrobat/apsb22-16.html" } ], "source": { "discovery": "EXTERNAL" }, "title": "Adobe Acrobat Reader DC Annotation Use-After-Free Remote Code Execution Vulnerability", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@adobe.com", "DATE_PUBLIC": "2022-04-12T23:00:00.000Z", "ID": "CVE-2022-27801", "STATE": "PUBLIC", "TITLE": "Adobe Acrobat Reader DC Annotation Use-After-Free Remote Code Execution Vulnerability" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Acrobat Reader", "version": { "version_data": [ { "version_affected": "\u003c=", "version_value": "22.001.20085" }, { "version_affected": "\u003c=", "version_value": "20.005.3031x" }, { "version_affected": "\u003c=", "version_value": "17.012.30205" }, { "version_affected": "\u003c=", "version_value": "None" } ] } } ] }, "vendor_name": "Adobe" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Acrobat Reader DC versions 22.001.20085 (and earlier), 20.005.3031x (and earlier) and 17.012.30205 (and earlier) are affected by a use-after-free vulnerability in the processing of annotations that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file." } ] }, "impact": { "cvss": { "attackComplexity": "Low", "attackVector": "Local", "availabilityImpact": "High", "baseScore": 7.8, "baseSeverity": "High", "confidentialityImpact": "High", "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "userInteraction": "Required", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Use After Free (CWE-416)" } ] } ] }, "references": { "reference_data": [ { "name": "https://helpx.adobe.com/security/products/acrobat/apsb22-16.html", "refsource": "MISC", "url": "https://helpx.adobe.com/security/products/acrobat/apsb22-16.html" } ] }, "source": { "discovery": "EXTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "078d4453-3bcd-4900-85e6-15281da43538", "assignerShortName": "adobe", "cveId": "CVE-2022-27801", "datePublished": "2022-05-11T17:23:46.982154Z", "dateReserved": "2022-03-23T00:00:00", "dateUpdated": "2024-09-17T03:07:48.360Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-28236
Vulnerability from cvelistv5
Published
2022-05-11 17:32
Modified
2024-09-17 01:51
Severity ?
EPSS score ?
Summary
Adobe Acrobat Reader DC Annotation Out-Of-Bounds Write Remote Code Execution Vulnerability
References
▼ | URL | Tags |
---|---|---|
https://helpx.adobe.com/security/products/acrobat/apsb22-16.html | x_refsource_MISC |
Impacted products
▼ | Vendor | Product |
---|---|---|
Adobe | Acrobat Reader |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T05:48:37.899Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://helpx.adobe.com/security/products/acrobat/apsb22-16.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Acrobat Reader", "vendor": "Adobe", "versions": [ { "lessThanOrEqual": "22.001.20085", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThanOrEqual": "20.005.3031x", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThanOrEqual": "17.012.30205", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThanOrEqual": "None", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "datePublic": "2022-04-12T00:00:00", "descriptions": [ { "lang": "en", "value": "Acrobat Reader DC versions 22.001.20085 (and earlier), 20.005.3031x (and earlier) and 17.012.30205 (and earlier) are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file." } ], "metrics": [ { "cvssV3_0": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-787", "description": "Out-of-bounds Write (CWE-787)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-05-11T17:32:16", "orgId": "078d4453-3bcd-4900-85e6-15281da43538", "shortName": "adobe" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://helpx.adobe.com/security/products/acrobat/apsb22-16.html" } ], "source": { "discovery": "EXTERNAL" }, "title": "Adobe Acrobat Reader DC Annotation Out-Of-Bounds Write Remote Code Execution Vulnerability", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@adobe.com", "DATE_PUBLIC": "2022-04-12T23:00:00.000Z", "ID": "CVE-2022-28236", "STATE": "PUBLIC", "TITLE": "Adobe Acrobat Reader DC Annotation Out-Of-Bounds Write Remote Code Execution Vulnerability" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Acrobat Reader", "version": { "version_data": [ { "version_affected": "\u003c=", "version_value": "22.001.20085" }, { "version_affected": "\u003c=", "version_value": "20.005.3031x" }, { "version_affected": "\u003c=", "version_value": "17.012.30205" }, { "version_affected": "\u003c=", "version_value": "None" } ] } } ] }, "vendor_name": "Adobe" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Acrobat Reader DC versions 22.001.20085 (and earlier), 20.005.3031x (and earlier) and 17.012.30205 (and earlier) are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file." } ] }, "impact": { "cvss": { "attackComplexity": "Low", "attackVector": "Local", "availabilityImpact": "High", "baseScore": 7.8, "baseSeverity": "High", "confidentialityImpact": "High", "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "userInteraction": "Required", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Out-of-bounds Write (CWE-787)" } ] } ] }, "references": { "reference_data": [ { "name": "https://helpx.adobe.com/security/products/acrobat/apsb22-16.html", "refsource": "MISC", "url": "https://helpx.adobe.com/security/products/acrobat/apsb22-16.html" } ] }, "source": { "discovery": "EXTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "078d4453-3bcd-4900-85e6-15281da43538", "assignerShortName": "adobe", "cveId": "CVE-2022-28236", "datePublished": "2022-05-11T17:32:16.805652Z", "dateReserved": "2022-03-30T00:00:00", "dateUpdated": "2024-09-17T01:51:28.785Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-28234
Vulnerability from cvelistv5
Published
2022-05-11 17:29
Modified
2024-09-17 02:56
Severity ?
EPSS score ?
Summary
Adobe Acrobat Reader DC Heap Overflow Could Lead to RCE
References
▼ | URL | Tags |
---|---|---|
https://helpx.adobe.com/security/products/acrobat/apsb22-16.html | x_refsource_MISC |
Impacted products
▼ | Vendor | Product |
---|---|---|
Adobe | Acrobat Reader |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T05:48:37.947Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://helpx.adobe.com/security/products/acrobat/apsb22-16.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Acrobat Reader", "vendor": "Adobe", "versions": [ { "lessThanOrEqual": "22.001.20085", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThanOrEqual": "20.005.3031x", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThanOrEqual": "17.012.30205", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThanOrEqual": "None", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "datePublic": "2022-04-12T00:00:00", "descriptions": [ { "lang": "en", "value": "Acrobat Reader DC versions 22.001.20085 (and earlier), 20.005.3031x (and earlier) and 17.012.30205 (and earlier) is affected by a heap-based buffer overflow vulnerability due to insecure handling of a crafted .pdf file, potentially resulting in arbitrary code execution in the context of the current user. Exploitation requires user interaction in that a victim must open a crafted .pdf file" } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-122", "description": "Heap-based Buffer Overflow (CWE-122)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-05-11T17:29:44", "orgId": "078d4453-3bcd-4900-85e6-15281da43538", "shortName": "adobe" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://helpx.adobe.com/security/products/acrobat/apsb22-16.html" } ], "source": { "discovery": "EXTERNAL" }, "title": "Adobe Acrobat Reader DC Heap Overflow Could Lead to RCE", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@adobe.com", "DATE_PUBLIC": "2022-04-12T23:00:00.000Z", "ID": "CVE-2022-28234", "STATE": "PUBLIC", "TITLE": "Adobe Acrobat Reader DC Heap Overflow Could Lead to RCE" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Acrobat Reader", "version": { "version_data": [ { "version_affected": "\u003c=", "version_value": "22.001.20085" }, { "version_affected": "\u003c=", "version_value": "20.005.3031x" }, { "version_affected": "\u003c=", "version_value": "17.012.30205" }, { "version_affected": "\u003c=", "version_value": "None" } ] } } ] }, "vendor_name": "Adobe" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Acrobat Reader DC versions 22.001.20085 (and earlier), 20.005.3031x (and earlier) and 17.012.30205 (and earlier) is affected by a heap-based buffer overflow vulnerability due to insecure handling of a crafted .pdf file, potentially resulting in arbitrary code execution in the context of the current user. Exploitation requires user interaction in that a victim must open a crafted .pdf file" } ] }, "impact": { "cvss": { "attackComplexity": "Low", "attackVector": "Local", "availabilityImpact": "High", "baseScore": 7.8, "baseSeverity": "High", "confidentialityImpact": "High", "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "userInteraction": "Required", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Heap-based Buffer Overflow (CWE-122)" } ] } ] }, "references": { "reference_data": [ { "name": "https://helpx.adobe.com/security/products/acrobat/apsb22-16.html", "refsource": "MISC", "url": "https://helpx.adobe.com/security/products/acrobat/apsb22-16.html" } ] }, "source": { "discovery": "EXTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "078d4453-3bcd-4900-85e6-15281da43538", "assignerShortName": "adobe", "cveId": "CVE-2022-28234", "datePublished": "2022-05-11T17:29:44.104266Z", "dateReserved": "2022-03-30T00:00:00", "dateUpdated": "2024-09-17T02:56:40.239Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-28237
Vulnerability from cvelistv5
Published
2022-05-11 17:33
Modified
2024-09-17 01:21
Severity ?
EPSS score ?
Summary
Adobe Acrobat Reader DC Annotation Use-After-Free Remote Code Execution Vulnerability
References
▼ | URL | Tags |
---|---|---|
https://helpx.adobe.com/security/products/acrobat/apsb22-16.html | x_refsource_MISC |
Impacted products
▼ | Vendor | Product |
---|---|---|
Adobe | Acrobat Reader |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T05:48:37.883Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://helpx.adobe.com/security/products/acrobat/apsb22-16.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Acrobat Reader", "vendor": "Adobe", "versions": [ { "lessThanOrEqual": "22.001.20085", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThanOrEqual": "20.005.3031x", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThanOrEqual": "17.012.30205", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThanOrEqual": "None", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "datePublic": "2022-04-12T00:00:00", "descriptions": [ { "lang": "en", "value": "Acrobat Reader DC versions 22.001.20085 (and earlier), 20.005.3031x (and earlier) and 17.012.30205 (and earlier) are affected by a use-after-free vulnerability in the processing of annotations that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file." } ], "metrics": [ { "cvssV3_0": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-416", "description": "Use After Free (CWE-416)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-05-11T17:33:09", "orgId": "078d4453-3bcd-4900-85e6-15281da43538", "shortName": "adobe" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://helpx.adobe.com/security/products/acrobat/apsb22-16.html" } ], "source": { "discovery": "EXTERNAL" }, "title": "Adobe Acrobat Reader DC Annotation Use-After-Free Remote Code Execution Vulnerability", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@adobe.com", "DATE_PUBLIC": "2022-04-12T23:00:00.000Z", "ID": "CVE-2022-28237", "STATE": "PUBLIC", "TITLE": "Adobe Acrobat Reader DC Annotation Use-After-Free Remote Code Execution Vulnerability" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Acrobat Reader", "version": { "version_data": [ { "version_affected": "\u003c=", "version_value": "22.001.20085" }, { "version_affected": "\u003c=", "version_value": "20.005.3031x" }, { "version_affected": "\u003c=", "version_value": "17.012.30205" }, { "version_affected": "\u003c=", "version_value": "None" } ] } } ] }, "vendor_name": "Adobe" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Acrobat Reader DC versions 22.001.20085 (and earlier), 20.005.3031x (and earlier) and 17.012.30205 (and earlier) are affected by a use-after-free vulnerability in the processing of annotations that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file." } ] }, "impact": { "cvss": { "attackComplexity": "Low", "attackVector": "Local", "availabilityImpact": "High", "baseScore": 7.8, "baseSeverity": "High", "confidentialityImpact": "High", "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "userInteraction": "Required", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Use After Free (CWE-416)" } ] } ] }, "references": { "reference_data": [ { "name": "https://helpx.adobe.com/security/products/acrobat/apsb22-16.html", "refsource": "MISC", "url": "https://helpx.adobe.com/security/products/acrobat/apsb22-16.html" } ] }, "source": { "discovery": "EXTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "078d4453-3bcd-4900-85e6-15281da43538", "assignerShortName": "adobe", "cveId": "CVE-2022-28237", "datePublished": "2022-05-11T17:33:09.328007Z", "dateReserved": "2022-03-30T00:00:00", "dateUpdated": "2024-09-17T01:21:09.097Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-28260
Vulnerability from cvelistv5
Published
2022-05-11 17:52
Modified
2024-09-16 20:47
Severity ?
EPSS score ?
Summary
Adobe Acrobat Reader DC Annotation Out-Of-Bounds Read Information Disclosure Vulnerability
References
▼ | URL | Tags |
---|---|---|
https://helpx.adobe.com/security/products/acrobat/apsb22-16.html | x_refsource_MISC |
Impacted products
▼ | Vendor | Product |
---|---|---|
Adobe | Acrobat Reader |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T05:48:37.901Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://helpx.adobe.com/security/products/acrobat/apsb22-16.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Acrobat Reader", "vendor": "Adobe", "versions": [ { "lessThanOrEqual": "22.001.20085", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThanOrEqual": "20.005.3031x", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThanOrEqual": "17.012.30205", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThanOrEqual": "None", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "datePublic": "2022-04-12T00:00:00", "descriptions": [ { "lang": "en", "value": "Acrobat Reader DC version 22.001.2011x (and earlier), 20.005.3033x (and earlier) and 17.012.3022x (and earlier) are affected by an out-of-bounds read vulnerability when parsing a crafted file, which could result in a read past the end of an allocated memory structure. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-125", "description": "Out-of-bounds Read (CWE-125)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-05-11T17:52:47", "orgId": "078d4453-3bcd-4900-85e6-15281da43538", "shortName": "adobe" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://helpx.adobe.com/security/products/acrobat/apsb22-16.html" } ], "source": { "discovery": "EXTERNAL" }, "title": "Adobe Acrobat Reader DC Annotation Out-Of-Bounds Read Information Disclosure Vulnerability", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@adobe.com", "DATE_PUBLIC": "2022-04-12T23:00:00.000Z", "ID": "CVE-2022-28260", "STATE": "PUBLIC", "TITLE": "Adobe Acrobat Reader DC Annotation Out-Of-Bounds Read Information Disclosure Vulnerability" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Acrobat Reader", "version": { "version_data": [ { "version_affected": "\u003c=", "version_value": "22.001.20085" }, { "version_affected": "\u003c=", "version_value": "20.005.3031x" }, { "version_affected": "\u003c=", "version_value": "17.012.30205" }, { "version_affected": "\u003c=", "version_value": "None" } ] } } ] }, "vendor_name": "Adobe" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Acrobat Reader DC version 22.001.2011x (and earlier), 20.005.3033x (and earlier) and 17.012.3022x (and earlier) are affected by an out-of-bounds read vulnerability when parsing a crafted file, which could result in a read past the end of an allocated memory structure. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file." } ] }, "impact": { "cvss": { "attackComplexity": "Low", "attackVector": "Local", "availabilityImpact": "None", "baseScore": 5.5, "baseSeverity": "Medium", "confidentialityImpact": "High", "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "userInteraction": "Required", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Out-of-bounds Read (CWE-125)" } ] } ] }, "references": { "reference_data": [ { "name": "https://helpx.adobe.com/security/products/acrobat/apsb22-16.html", "refsource": "MISC", "url": "https://helpx.adobe.com/security/products/acrobat/apsb22-16.html" } ] }, "source": { "discovery": "EXTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "078d4453-3bcd-4900-85e6-15281da43538", "assignerShortName": "adobe", "cveId": "CVE-2022-28260", "datePublished": "2022-05-11T17:52:47.714868Z", "dateReserved": "2022-03-30T00:00:00", "dateUpdated": "2024-09-16T20:47:57.101Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-28256
Vulnerability from cvelistv5
Published
2022-05-11 17:49
Modified
2024-09-16 20:13
Severity ?
EPSS score ?
Summary
Adobe Acrobat Reader DC Annotation Use-After-Free Information Disclosure Vulnerability
References
▼ | URL | Tags |
---|---|---|
https://helpx.adobe.com/security/products/acrobat/apsb22-16.html | x_refsource_MISC |
Impacted products
▼ | Vendor | Product |
---|---|---|
Adobe | Acrobat Reader |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T05:48:37.902Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://helpx.adobe.com/security/products/acrobat/apsb22-16.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Acrobat Reader", "vendor": "Adobe", "versions": [ { "lessThanOrEqual": "22.001.20085", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThanOrEqual": "20.005.3031x", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThanOrEqual": "17.012.30205", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThanOrEqual": "None", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "datePublic": "2022-04-12T00:00:00", "descriptions": [ { "lang": "en", "value": "Acrobat Reader DC version 22.001.2011x (and earlier), 20.005.3033x (and earlier) and 17.012.3022x (and earlier) are affected by a use-after-free vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-416", "description": "Use After Free (CWE-416)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-05-11T17:49:17", "orgId": "078d4453-3bcd-4900-85e6-15281da43538", "shortName": "adobe" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://helpx.adobe.com/security/products/acrobat/apsb22-16.html" } ], "source": { "discovery": "EXTERNAL" }, "title": "Adobe Acrobat Reader DC Annotation Use-After-Free Information Disclosure Vulnerability", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@adobe.com", "DATE_PUBLIC": "2022-04-12T23:00:00.000Z", "ID": "CVE-2022-28256", "STATE": "PUBLIC", "TITLE": "Adobe Acrobat Reader DC Annotation Use-After-Free Information Disclosure Vulnerability" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Acrobat Reader", "version": { "version_data": [ { "version_affected": "\u003c=", "version_value": "22.001.20085" }, { "version_affected": "\u003c=", "version_value": "20.005.3031x" }, { "version_affected": "\u003c=", "version_value": "17.012.30205" }, { "version_affected": "\u003c=", "version_value": "None" } ] } } ] }, "vendor_name": "Adobe" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Acrobat Reader DC version 22.001.2011x (and earlier), 20.005.3033x (and earlier) and 17.012.3022x (and earlier) are affected by a use-after-free vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file." } ] }, "impact": { "cvss": { "attackComplexity": "Low", "attackVector": "Local", "availabilityImpact": "None", "baseScore": 5.5, "baseSeverity": "Medium", "confidentialityImpact": "High", "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "userInteraction": "Required", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Use After Free (CWE-416)" } ] } ] }, "references": { "reference_data": [ { "name": "https://helpx.adobe.com/security/products/acrobat/apsb22-16.html", "refsource": "MISC", "url": "https://helpx.adobe.com/security/products/acrobat/apsb22-16.html" } ] }, "source": { "discovery": "EXTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "078d4453-3bcd-4900-85e6-15281da43538", "assignerShortName": "adobe", "cveId": "CVE-2022-28256", "datePublished": "2022-05-11T17:49:17.907317Z", "dateReserved": "2022-03-30T00:00:00", "dateUpdated": "2024-09-16T20:13:12.236Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-28250
Vulnerability from cvelistv5
Published
2022-05-11 17:44
Modified
2024-09-17 02:11
Severity ?
EPSS score ?
Summary
Adobe Acrobat Reader DC Annotation Use-After-Free Information Disclosure Vulnerability
References
▼ | URL | Tags |
---|---|---|
https://helpx.adobe.com/security/products/acrobat/apsb22-16.html | x_refsource_MISC |
Impacted products
▼ | Vendor | Product |
---|---|---|
Adobe | Acrobat Reader |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T05:48:37.904Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://helpx.adobe.com/security/products/acrobat/apsb22-16.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Acrobat Reader", "vendor": "Adobe", "versions": [ { "lessThanOrEqual": "22.001.20085", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThanOrEqual": "20.005.3031x", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThanOrEqual": "17.012.30205", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThanOrEqual": "None", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "datePublic": "2022-04-12T00:00:00", "descriptions": [ { "lang": "en", "value": "Acrobat Reader DC version 22.001.2011x (and earlier), 20.005.3033x (and earlier) and 17.012.3022x (and earlier) are affected by a use-after-free vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-416", "description": "Use After Free (CWE-416)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-05-11T17:44:23", "orgId": "078d4453-3bcd-4900-85e6-15281da43538", "shortName": "adobe" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://helpx.adobe.com/security/products/acrobat/apsb22-16.html" } ], "source": { "discovery": "EXTERNAL" }, "title": "Adobe Acrobat Reader DC Annotation Use-After-Free Information Disclosure Vulnerability", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@adobe.com", "DATE_PUBLIC": "2022-04-12T23:00:00.000Z", "ID": "CVE-2022-28250", "STATE": "PUBLIC", "TITLE": "Adobe Acrobat Reader DC Annotation Use-After-Free Information Disclosure Vulnerability" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Acrobat Reader", "version": { "version_data": [ { "version_affected": "\u003c=", "version_value": "22.001.20085" }, { "version_affected": "\u003c=", "version_value": "20.005.3031x" }, { "version_affected": "\u003c=", "version_value": "17.012.30205" }, { "version_affected": "\u003c=", "version_value": "None" } ] } } ] }, "vendor_name": "Adobe" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Acrobat Reader DC version 22.001.2011x (and earlier), 20.005.3033x (and earlier) and 17.012.3022x (and earlier) are affected by a use-after-free vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file." } ] }, "impact": { "cvss": { "attackComplexity": "Low", "attackVector": "Local", "availabilityImpact": "None", "baseScore": 5.5, "baseSeverity": "Medium", "confidentialityImpact": "High", "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "userInteraction": "Required", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Use After Free (CWE-416)" } ] } ] }, "references": { "reference_data": [ { "name": "https://helpx.adobe.com/security/products/acrobat/apsb22-16.html", "refsource": "MISC", "url": "https://helpx.adobe.com/security/products/acrobat/apsb22-16.html" } ] }, "source": { "discovery": "EXTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "078d4453-3bcd-4900-85e6-15281da43538", "assignerShortName": "adobe", "cveId": "CVE-2022-28250", "datePublished": "2022-05-11T17:44:24.010164Z", "dateReserved": "2022-03-30T00:00:00", "dateUpdated": "2024-09-17T02:11:08.925Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-28244
Vulnerability from cvelistv5
Published
2022-05-11 17:39
Modified
2024-09-17 01:41
Severity ?
EPSS score ?
Summary
Adobe Acrobat Reader DC CSP Bypass Leads To Privilege Escalation
References
▼ | URL | Tags |
---|---|---|
https://helpx.adobe.com/security/products/acrobat/apsb22-16.html | x_refsource_MISC |
Impacted products
▼ | Vendor | Product |
---|---|---|
Adobe | Acrobat Reader |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T05:48:37.651Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://helpx.adobe.com/security/products/acrobat/apsb22-16.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Acrobat Reader", "vendor": "Adobe", "versions": [ { "lessThanOrEqual": "22.001.20085", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThanOrEqual": "20.005.3031x", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThanOrEqual": "17.012.30205", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThanOrEqual": "None", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "datePublic": "2022-04-12T00:00:00", "descriptions": [ { "lang": "en", "value": "Acrobat Reader DC versions 22.001.20085 (and earlier), 20.005.3031x (and earlier) and 17.012.30205 (and earlier) is affected by a violation of secure design principles through bypassing the content security policy, which could result in an attacker sending arbitrarily configured requests to the cross-origin attack target domain. Exploitation requires user interaction in which the victim needs to access a crafted PDF file on an attacker\u0027s server." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 6.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-657", "description": "Violation of Secure Design Principles (CWE-657)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-05-11T17:39:13", "orgId": "078d4453-3bcd-4900-85e6-15281da43538", "shortName": "adobe" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://helpx.adobe.com/security/products/acrobat/apsb22-16.html" } ], "source": { "discovery": "EXTERNAL" }, "title": "Adobe Acrobat Reader DC CSP Bypass Leads To Privilege Escalation", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@adobe.com", "DATE_PUBLIC": "2022-04-12T23:00:00.000Z", "ID": "CVE-2022-28244", "STATE": "PUBLIC", "TITLE": "Adobe Acrobat Reader DC CSP Bypass Leads To Privilege Escalation" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Acrobat Reader", "version": { "version_data": [ { "version_affected": "\u003c=", "version_value": "22.001.20085" }, { "version_affected": "\u003c=", "version_value": "20.005.3031x" }, { "version_affected": "\u003c=", "version_value": "17.012.30205" }, { "version_affected": "\u003c=", "version_value": "None" } ] } } ] }, "vendor_name": "Adobe" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Acrobat Reader DC versions 22.001.20085 (and earlier), 20.005.3031x (and earlier) and 17.012.30205 (and earlier) is affected by a violation of secure design principles through bypassing the content security policy, which could result in an attacker sending arbitrarily configured requests to the cross-origin attack target domain. Exploitation requires user interaction in which the victim needs to access a crafted PDF file on an attacker\u0027s server." } ] }, "impact": { "cvss": { "attackComplexity": "Low", "attackVector": "Local", "availabilityImpact": "None", "baseScore": 6.3, "baseSeverity": "Medium", "confidentialityImpact": "High", "integrityImpact": "None", "privilegesRequired": "None", "scope": "Changed", "userInteraction": "Required", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Violation of Secure Design Principles (CWE-657)" } ] } ] }, "references": { "reference_data": [ { "name": "https://helpx.adobe.com/security/products/acrobat/apsb22-16.html", "refsource": "MISC", "url": "https://helpx.adobe.com/security/products/acrobat/apsb22-16.html" } ] }, "source": { "discovery": "EXTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "078d4453-3bcd-4900-85e6-15281da43538", "assignerShortName": "adobe", "cveId": "CVE-2022-28244", "datePublished": "2022-05-11T17:39:13.587890Z", "dateReserved": "2022-03-30T00:00:00", "dateUpdated": "2024-09-17T01:41:08.519Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-27792
Vulnerability from cvelistv5
Published
2022-05-11 17:16
Modified
2024-09-16 23:16
Severity ?
EPSS score ?
Summary
Adobe Acrobat Reader DC Font Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability
References
▼ | URL | Tags |
---|---|---|
https://helpx.adobe.com/security/products/acrobat/apsb22-16.html | x_refsource_MISC |
Impacted products
▼ | Vendor | Product |
---|---|---|
Adobe | Acrobat Reader |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T05:32:59.801Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://helpx.adobe.com/security/products/acrobat/apsb22-16.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Acrobat Reader", "vendor": "Adobe", "versions": [ { "lessThanOrEqual": "22.001.20085", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThanOrEqual": "20.005.3031x", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThanOrEqual": "17.012.30205", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThanOrEqual": "None", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "datePublic": "2022-04-12T00:00:00", "descriptions": [ { "lang": "en", "value": "Acrobat Reader DC versions 22.001.20085 (and earlier), 20.005.3031x (and earlier) and 17.012.30205 (and earlier) are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file." } ], "metrics": [ { "cvssV3_0": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-787", "description": "Out-of-bounds Write (CWE-787)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-05-11T17:16:11", "orgId": "078d4453-3bcd-4900-85e6-15281da43538", "shortName": "adobe" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://helpx.adobe.com/security/products/acrobat/apsb22-16.html" } ], "source": { "discovery": "EXTERNAL" }, "title": "Adobe Acrobat Reader DC Font Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@adobe.com", "DATE_PUBLIC": "2022-04-12T23:00:00.000Z", "ID": "CVE-2022-27792", "STATE": "PUBLIC", "TITLE": "Adobe Acrobat Reader DC Font Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Acrobat Reader", "version": { "version_data": [ { "version_affected": "\u003c=", "version_value": "22.001.20085" }, { "version_affected": "\u003c=", "version_value": "20.005.3031x" }, { "version_affected": "\u003c=", "version_value": "17.012.30205" }, { "version_affected": "\u003c=", "version_value": "None" } ] } } ] }, "vendor_name": "Adobe" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Acrobat Reader DC versions 22.001.20085 (and earlier), 20.005.3031x (and earlier) and 17.012.30205 (and earlier) are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file." } ] }, "impact": { "cvss": { "attackComplexity": "Low", "attackVector": "Local", "availabilityImpact": "High", "baseScore": 7.8, "baseSeverity": "High", "confidentialityImpact": "High", "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "userInteraction": "Required", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Out-of-bounds Write (CWE-787)" } ] } ] }, "references": { "reference_data": [ { "name": "https://helpx.adobe.com/security/products/acrobat/apsb22-16.html", "refsource": "MISC", "url": "https://helpx.adobe.com/security/products/acrobat/apsb22-16.html" } ] }, "source": { "discovery": "EXTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "078d4453-3bcd-4900-85e6-15281da43538", "assignerShortName": "adobe", "cveId": "CVE-2022-27792", "datePublished": "2022-05-11T17:16:11.029286Z", "dateReserved": "2022-03-23T00:00:00", "dateUpdated": "2024-09-16T23:16:54.428Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-28265
Vulnerability from cvelistv5
Published
2022-05-11 17:56
Modified
2024-09-16 16:38
Severity ?
EPSS score ?
Summary
Adobe Acrobat Reader DC Annotation Out-Of-Bounds Read Information Disclosure Vulnerability
References
▼ | URL | Tags |
---|---|---|
https://helpx.adobe.com/security/products/acrobat/apsb22-16.html | x_refsource_MISC |
Impacted products
▼ | Vendor | Product |
---|---|---|
Adobe | Acrobat Reader |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T05:48:37.884Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://helpx.adobe.com/security/products/acrobat/apsb22-16.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Acrobat Reader", "vendor": "Adobe", "versions": [ { "lessThanOrEqual": "22.001.20085", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThanOrEqual": "20.005.3031x", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThanOrEqual": "17.012.30205", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThanOrEqual": "None", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "datePublic": "2022-04-12T00:00:00", "descriptions": [ { "lang": "en", "value": "Acrobat Reader DC version 22.001.2011x (and earlier), 20.005.3033x (and earlier) and 17.012.3022x (and earlier) are affected by an out-of-bounds read vulnerability when parsing a crafted file, which could result in a read past the end of an allocated memory structure. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-125", "description": "Out-of-bounds Read (CWE-125)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-05-11T17:56:23", "orgId": "078d4453-3bcd-4900-85e6-15281da43538", "shortName": "adobe" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://helpx.adobe.com/security/products/acrobat/apsb22-16.html" } ], "source": { "discovery": "EXTERNAL" }, "title": "Adobe Acrobat Reader DC Annotation Out-Of-Bounds Read Information Disclosure Vulnerability", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@adobe.com", "DATE_PUBLIC": "2022-04-12T23:00:00.000Z", "ID": "CVE-2022-28265", "STATE": "PUBLIC", "TITLE": "Adobe Acrobat Reader DC Annotation Out-Of-Bounds Read Information Disclosure Vulnerability" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Acrobat Reader", "version": { "version_data": [ { "version_affected": "\u003c=", "version_value": "22.001.20085" }, { "version_affected": "\u003c=", "version_value": "20.005.3031x" }, { "version_affected": "\u003c=", "version_value": "17.012.30205" }, { "version_affected": "\u003c=", "version_value": "None" } ] } } ] }, "vendor_name": "Adobe" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Acrobat Reader DC version 22.001.2011x (and earlier), 20.005.3033x (and earlier) and 17.012.3022x (and earlier) are affected by an out-of-bounds read vulnerability when parsing a crafted file, which could result in a read past the end of an allocated memory structure. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file." } ] }, "impact": { "cvss": { "attackComplexity": "Low", "attackVector": "Local", "availabilityImpact": "None", "baseScore": 5.5, "baseSeverity": "Medium", "confidentialityImpact": "High", "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "userInteraction": "Required", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Out-of-bounds Read (CWE-125)" } ] } ] }, "references": { "reference_data": [ { "name": "https://helpx.adobe.com/security/products/acrobat/apsb22-16.html", "refsource": "MISC", "url": "https://helpx.adobe.com/security/products/acrobat/apsb22-16.html" } ] }, "source": { "discovery": "EXTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "078d4453-3bcd-4900-85e6-15281da43538", "assignerShortName": "adobe", "cveId": "CVE-2022-28265", "datePublished": "2022-05-11T17:56:23.876551Z", "dateReserved": "2022-03-30T00:00:00", "dateUpdated": "2024-09-16T16:38:29.086Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-27802
Vulnerability from cvelistv5
Published
2022-05-11 17:24
Modified
2024-09-16 20:58
Severity ?
EPSS score ?
Summary
Adobe Acrobat Reader DC Annotation Use-After-Free Remote Code Execution Vulnerability
References
▼ | URL | Tags |
---|---|---|
https://helpx.adobe.com/security/products/acrobat/apsb22-16.html | x_refsource_MISC |
Impacted products
▼ | Vendor | Product |
---|---|---|
Adobe | Acrobat Reader |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T05:32:59.800Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://helpx.adobe.com/security/products/acrobat/apsb22-16.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Acrobat Reader", "vendor": "Adobe", "versions": [ { "lessThanOrEqual": "22.001.20085", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThanOrEqual": "20.005.3031x", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThanOrEqual": "17.012.30205", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThanOrEqual": "None", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "datePublic": "2022-04-12T00:00:00", "descriptions": [ { "lang": "en", "value": "Acrobat Reader DC versions 22.001.20085 (and earlier), 20.005.3031x (and earlier) and 17.012.30205 (and earlier) are affected by a use-after-free vulnerability in the processing of annotations that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file." } ], "metrics": [ { "cvssV3_0": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-416", "description": "Use After Free (CWE-416)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-05-11T17:24:41", "orgId": "078d4453-3bcd-4900-85e6-15281da43538", "shortName": "adobe" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://helpx.adobe.com/security/products/acrobat/apsb22-16.html" } ], "source": { "discovery": "EXTERNAL" }, "title": "Adobe Acrobat Reader DC Annotation Use-After-Free Remote Code Execution Vulnerability", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@adobe.com", "DATE_PUBLIC": "2022-04-12T23:00:00.000Z", "ID": "CVE-2022-27802", "STATE": "PUBLIC", "TITLE": "Adobe Acrobat Reader DC Annotation Use-After-Free Remote Code Execution Vulnerability" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Acrobat Reader", "version": { "version_data": [ { "version_affected": "\u003c=", "version_value": "22.001.20085" }, { "version_affected": "\u003c=", "version_value": "20.005.3031x" }, { "version_affected": "\u003c=", "version_value": "17.012.30205" }, { "version_affected": "\u003c=", "version_value": "None" } ] } } ] }, "vendor_name": "Adobe" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Acrobat Reader DC versions 22.001.20085 (and earlier), 20.005.3031x (and earlier) and 17.012.30205 (and earlier) are affected by a use-after-free vulnerability in the processing of annotations that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file." } ] }, "impact": { "cvss": { "attackComplexity": "Low", "attackVector": "Local", "availabilityImpact": "High", "baseScore": 7.8, "baseSeverity": "High", "confidentialityImpact": "High", "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "userInteraction": "Required", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Use After Free (CWE-416)" } ] } ] }, "references": { "reference_data": [ { "name": "https://helpx.adobe.com/security/products/acrobat/apsb22-16.html", "refsource": "MISC", "url": "https://helpx.adobe.com/security/products/acrobat/apsb22-16.html" } ] }, "source": { "discovery": "EXTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "078d4453-3bcd-4900-85e6-15281da43538", "assignerShortName": "adobe", "cveId": "CVE-2022-27802", "datePublished": "2022-05-11T17:24:41.039398Z", "dateReserved": "2022-03-23T00:00:00", "dateUpdated": "2024-09-16T20:58:02.479Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-27797
Vulnerability from cvelistv5
Published
2022-05-11 17:20
Modified
2024-09-16 22:02
Severity ?
EPSS score ?
Summary
Adobe Acrobat Reader DC Annotation Use-After-Free Remote Code Execution Vulnerability
References
▼ | URL | Tags |
---|---|---|
https://helpx.adobe.com/security/products/acrobat/apsb22-16.html | x_refsource_MISC |
Impacted products
▼ | Vendor | Product |
---|---|---|
Adobe | Acrobat Reader |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T05:32:59.982Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://helpx.adobe.com/security/products/acrobat/apsb22-16.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Acrobat Reader", "vendor": "Adobe", "versions": [ { "lessThanOrEqual": "22.001.20085", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThanOrEqual": "20.005.3031x", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThanOrEqual": "17.012.30205", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThanOrEqual": "None", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "datePublic": "2022-04-12T00:00:00", "descriptions": [ { "lang": "en", "value": "Acrobat Reader DC versions 22.001.20085 (and earlier), 20.005.3031x (and earlier) and 17.012.30205 (and earlier) are affected by a use-after-free vulnerability in the processing of annotations that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file." } ], "metrics": [ { "cvssV3_0": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-416", "description": "Use After Free (CWE-416)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-05-11T17:20:13", "orgId": "078d4453-3bcd-4900-85e6-15281da43538", "shortName": "adobe" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://helpx.adobe.com/security/products/acrobat/apsb22-16.html" } ], "source": { "discovery": "EXTERNAL" }, "title": "Adobe Acrobat Reader DC Annotation Use-After-Free Remote Code Execution Vulnerability", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@adobe.com", "DATE_PUBLIC": "2022-04-12T23:00:00.000Z", "ID": "CVE-2022-27797", "STATE": "PUBLIC", "TITLE": "Adobe Acrobat Reader DC Annotation Use-After-Free Remote Code Execution Vulnerability" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Acrobat Reader", "version": { "version_data": [ { "version_affected": "\u003c=", "version_value": "22.001.20085" }, { "version_affected": "\u003c=", "version_value": "20.005.3031x" }, { "version_affected": "\u003c=", "version_value": "17.012.30205" }, { "version_affected": "\u003c=", "version_value": "None" } ] } } ] }, "vendor_name": "Adobe" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Acrobat Reader DC versions 22.001.20085 (and earlier), 20.005.3031x (and earlier) and 17.012.30205 (and earlier) are affected by a use-after-free vulnerability in the processing of annotations that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file." } ] }, "impact": { "cvss": { "attackComplexity": "Low", "attackVector": "Local", "availabilityImpact": "High", "baseScore": 7.8, "baseSeverity": "High", "confidentialityImpact": "High", "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "userInteraction": "Required", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Use After Free (CWE-416)" } ] } ] }, "references": { "reference_data": [ { "name": "https://helpx.adobe.com/security/products/acrobat/apsb22-16.html", "refsource": "MISC", "url": "https://helpx.adobe.com/security/products/acrobat/apsb22-16.html" } ] }, "source": { "discovery": "EXTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "078d4453-3bcd-4900-85e6-15281da43538", "assignerShortName": "adobe", "cveId": "CVE-2022-27797", "datePublished": "2022-05-11T17:20:13.978278Z", "dateReserved": "2022-03-23T00:00:00", "dateUpdated": "2024-09-16T22:02:10.705Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-28838
Vulnerability from cvelistv5
Published
2022-05-11 18:00
Modified
2024-09-16 21:07
Severity ?
EPSS score ?
Summary
Adobe Acrobat Pro DC Doc flattenPages Use-After-Free Remote Code Execution Vulnerability
References
▼ | URL | Tags |
---|---|---|
https://helpx.adobe.com/security/products/acrobat/apsb22-16.html | x_refsource_MISC |
Impacted products
▼ | Vendor | Product |
---|---|---|
Adobe | Acrobat Reader |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T06:03:53.152Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://helpx.adobe.com/security/products/acrobat/apsb22-16.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Acrobat Reader", "vendor": "Adobe", "versions": [ { "lessThanOrEqual": "22.001.20085", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThanOrEqual": "20.005.3031x", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThanOrEqual": "17.012.30205", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThanOrEqual": "None", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "value": "Acrobat Acrobat Pro DC version 22.001.2011x (and earlier), 20.005.3033x (and earlier) and 17.012.3022x (and earlier) are affected by a use-after-free vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-416", "description": "Use After Free (CWE-416)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-05-11T18:00:37", "orgId": "078d4453-3bcd-4900-85e6-15281da43538", "shortName": "adobe" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://helpx.adobe.com/security/products/acrobat/apsb22-16.html" } ], "source": { "discovery": "EXTERNAL" }, "title": "Adobe Acrobat Pro DC Doc flattenPages Use-After-Free Remote Code Execution Vulnerability", "x_ConverterErrors": { "DATE_PUBLIC": { "error": "v4 DATE_PUBLIC is invalid", "message": "(\u0027Unknown string format:\u0027, \u0027NoneT23:00:00.000Z\u0027)" } }, "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@adobe.com", "DATE_PUBLIC": "NoneT23:00:00.000Z", "ID": "CVE-2022-28838", "STATE": "PUBLIC", "TITLE": "Adobe Acrobat Pro DC Doc flattenPages Use-After-Free Remote Code Execution Vulnerability" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Acrobat Reader", "version": { "version_data": [ { "version_affected": "\u003c=", "version_value": "22.001.20085" }, { "version_affected": "\u003c=", "version_value": "20.005.3031x" }, { "version_affected": "\u003c=", "version_value": "17.012.30205" }, { "version_affected": "\u003c=", "version_value": "None" } ] } } ] }, "vendor_name": "Adobe" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Acrobat Acrobat Pro DC version 22.001.2011x (and earlier), 20.005.3033x (and earlier) and 17.012.3022x (and earlier) are affected by a use-after-free vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file." } ] }, "impact": { "cvss": { "attackComplexity": "Low", "attackVector": "Local", "availabilityImpact": "High", "baseScore": 7.8, "baseSeverity": "High", "confidentialityImpact": "High", "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "userInteraction": "Required", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Use After Free (CWE-416)" } ] } ] }, "references": { "reference_data": [ { "name": "https://helpx.adobe.com/security/products/acrobat/apsb22-16.html", "refsource": "MISC", "url": "https://helpx.adobe.com/security/products/acrobat/apsb22-16.html" } ] }, "source": { "discovery": "EXTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "078d4453-3bcd-4900-85e6-15281da43538", "assignerShortName": "adobe", "cveId": "CVE-2022-28838", "datePublished": "2022-05-11T18:00:37.961597Z", "dateReserved": "2022-04-08T00:00:00", "dateUpdated": "2024-09-16T21:07:56.576Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-28233
Vulnerability from cvelistv5
Published
2022-05-11 17:28
Modified
2024-09-17 01:21
Severity ?
EPSS score ?
Summary
Adobe Acrobat Reader DC Annotation Use-After-Free Remote Code Execution Vulnerability
References
▼ | URL | Tags |
---|---|---|
https://helpx.adobe.com/security/products/acrobat/apsb22-16.html | x_refsource_MISC |
Impacted products
▼ | Vendor | Product |
---|---|---|
Adobe | Acrobat Reader |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T05:48:37.656Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://helpx.adobe.com/security/products/acrobat/apsb22-16.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Acrobat Reader", "vendor": "Adobe", "versions": [ { "lessThanOrEqual": "22.001.20085", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThanOrEqual": "20.005.3031x", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThanOrEqual": "17.012.30205", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThanOrEqual": "None", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "datePublic": "2022-04-12T00:00:00", "descriptions": [ { "lang": "en", "value": "Acrobat Reader DC versions 22.001.20085 (and earlier), 20.005.3031x (and earlier) and 17.012.30205 (and earlier) are affected by a use-after-free vulnerability in the processing of annotations that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file." } ], "metrics": [ { "cvssV3_0": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-416", "description": "Use After Free (CWE-416)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-05-11T17:28:57", "orgId": "078d4453-3bcd-4900-85e6-15281da43538", "shortName": "adobe" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://helpx.adobe.com/security/products/acrobat/apsb22-16.html" } ], "source": { "discovery": "EXTERNAL" }, "title": "Adobe Acrobat Reader DC Annotation Use-After-Free Remote Code Execution Vulnerability", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@adobe.com", "DATE_PUBLIC": "2022-04-12T23:00:00.000Z", "ID": "CVE-2022-28233", "STATE": "PUBLIC", "TITLE": "Adobe Acrobat Reader DC Annotation Use-After-Free Remote Code Execution Vulnerability" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Acrobat Reader", "version": { "version_data": [ { "version_affected": "\u003c=", "version_value": "22.001.20085" }, { "version_affected": "\u003c=", "version_value": "20.005.3031x" }, { "version_affected": "\u003c=", "version_value": "17.012.30205" }, { "version_affected": "\u003c=", "version_value": "None" } ] } } ] }, "vendor_name": "Adobe" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Acrobat Reader DC versions 22.001.20085 (and earlier), 20.005.3031x (and earlier) and 17.012.30205 (and earlier) are affected by a use-after-free vulnerability in the processing of annotations that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file." } ] }, "impact": { "cvss": { "attackComplexity": "Low", "attackVector": "Local", "availabilityImpact": "High", "baseScore": 7.8, "baseSeverity": "High", "confidentialityImpact": "High", "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "userInteraction": "Required", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Use After Free (CWE-416)" } ] } ] }, "references": { "reference_data": [ { "name": "https://helpx.adobe.com/security/products/acrobat/apsb22-16.html", "refsource": "MISC", "url": "https://helpx.adobe.com/security/products/acrobat/apsb22-16.html" } ] }, "source": { "discovery": "EXTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "078d4453-3bcd-4900-85e6-15281da43538", "assignerShortName": "adobe", "cveId": "CVE-2022-28233", "datePublished": "2022-05-11T17:28:57.938788Z", "dateReserved": "2022-03-30T00:00:00", "dateUpdated": "2024-09-17T01:21:16.592Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-24101
Vulnerability from cvelistv5
Published
2022-05-11 17:04
Modified
2024-09-16 22:30
Severity ?
EPSS score ?
Summary
Adobe Acrobat Reader DC Annotation Use-After-Free Information Disclosure Vulnerability
References
▼ | URL | Tags |
---|---|---|
https://helpx.adobe.com/security/products/acrobat/apsb22-16.html | x_refsource_MISC |
Impacted products
▼ | Vendor | Product |
---|---|---|
Adobe | Acrobat Reader |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T03:59:24.099Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://helpx.adobe.com/security/products/acrobat/apsb22-16.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Acrobat Reader", "vendor": "Adobe", "versions": [ { "lessThanOrEqual": "22.001.20085", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThanOrEqual": "20.005.3031x", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThanOrEqual": "17.012.30205", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThanOrEqual": "None", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "datePublic": "2022-04-12T00:00:00", "descriptions": [ { "lang": "en", "value": "Acrobat Reader DC versions 20.001.20085 (and earlier), 20.005.3031x (and earlier) and 17.012.30205 (and earlier) are affected by a use-after-free vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file." } ], "metrics": [ { "cvssV3_0": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 3.3, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-416", "description": "Use After Free (CWE-416)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-05-11T17:04:27", "orgId": "078d4453-3bcd-4900-85e6-15281da43538", "shortName": "adobe" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://helpx.adobe.com/security/products/acrobat/apsb22-16.html" } ], "source": { "discovery": "EXTERNAL" }, "title": "Adobe Acrobat Reader DC Annotation Use-After-Free Information Disclosure Vulnerability", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@adobe.com", "DATE_PUBLIC": "2022-04-12T23:00:00.000Z", "ID": "CVE-2022-24101", "STATE": "PUBLIC", "TITLE": "Adobe Acrobat Reader DC Annotation Use-After-Free Information Disclosure Vulnerability" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Acrobat Reader", "version": { "version_data": [ { "version_affected": "\u003c=", "version_value": "22.001.20085" }, { "version_affected": "\u003c=", "version_value": "20.005.3031x" }, { "version_affected": "\u003c=", "version_value": "17.012.30205" }, { "version_affected": "\u003c=", "version_value": "None" } ] } } ] }, "vendor_name": "Adobe" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Acrobat Reader DC versions 20.001.20085 (and earlier), 20.005.3031x (and earlier) and 17.012.30205 (and earlier) are affected by a use-after-free vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file." } ] }, "impact": { "cvss": { "attackComplexity": "Low", "attackVector": "Local", "availabilityImpact": "None", "baseScore": 3.3, "baseSeverity": "Low", "confidentialityImpact": "Low", "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "userInteraction": "Required", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Use After Free (CWE-416)" } ] } ] }, "references": { "reference_data": [ { "name": "https://helpx.adobe.com/security/products/acrobat/apsb22-16.html", "refsource": "MISC", "url": "https://helpx.adobe.com/security/products/acrobat/apsb22-16.html" } ] }, "source": { "discovery": "EXTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "078d4453-3bcd-4900-85e6-15281da43538", "assignerShortName": "adobe", "cveId": "CVE-2022-24101", "datePublished": "2022-05-11T17:04:27.495408Z", "dateReserved": "2022-01-27T00:00:00", "dateUpdated": "2024-09-16T22:30:51.000Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-28232
Vulnerability from cvelistv5
Published
2022-05-11 17:28
Modified
2024-09-16 19:42
Severity ?
EPSS score ?
Summary
Adobe Acrobat Reader DC Collab Object Use-After-Free Information Disclosure Vulnerability
References
▼ | URL | Tags |
---|---|---|
https://helpx.adobe.com/security/products/acrobat/apsb22-16.html | x_refsource_MISC |
Impacted products
▼ | Vendor | Product |
---|---|---|
Adobe | Acrobat Reader |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T05:48:37.883Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://helpx.adobe.com/security/products/acrobat/apsb22-16.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Acrobat Reader", "vendor": "Adobe", "versions": [ { "lessThanOrEqual": "22.001.20085", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThanOrEqual": "20.005.3031x", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThanOrEqual": "17.012.30205", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThanOrEqual": "None", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "datePublic": "2022-04-12T00:00:00", "descriptions": [ { "lang": "en", "value": "Acrobat Reader DC versions 22.001.20085 (and earlier), 20.005.3031x (and earlier) and 17.012.30205 (and earlier) are affected by a use-after-free vulnerability in the processing of the collab object that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file." } ], "metrics": [ { "cvssV3_0": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-416", "description": "Use After Free (CWE-416)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-05-11T17:28:10", "orgId": "078d4453-3bcd-4900-85e6-15281da43538", "shortName": "adobe" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://helpx.adobe.com/security/products/acrobat/apsb22-16.html" } ], "source": { "discovery": "EXTERNAL" }, "title": "Adobe Acrobat Reader DC Collab Object Use-After-Free Information Disclosure Vulnerability", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@adobe.com", "DATE_PUBLIC": "2022-04-12T23:00:00.000Z", "ID": "CVE-2022-28232", "STATE": "PUBLIC", "TITLE": "Adobe Acrobat Reader DC Collab Object Use-After-Free Information Disclosure Vulnerability" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Acrobat Reader", "version": { "version_data": [ { "version_affected": "\u003c=", "version_value": "22.001.20085" }, { "version_affected": "\u003c=", "version_value": "20.005.3031x" }, { "version_affected": "\u003c=", "version_value": "17.012.30205" }, { "version_affected": "\u003c=", "version_value": "None" } ] } } ] }, "vendor_name": "Adobe" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Acrobat Reader DC versions 22.001.20085 (and earlier), 20.005.3031x (and earlier) and 17.012.30205 (and earlier) are affected by a use-after-free vulnerability in the processing of the collab object that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file." } ] }, "impact": { "cvss": { "attackComplexity": "Low", "attackVector": "Local", "availabilityImpact": "High", "baseScore": 7.8, "baseSeverity": "High", "confidentialityImpact": "High", "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "userInteraction": "Required", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Use After Free (CWE-416)" } ] } ] }, "references": { "reference_data": [ { "name": "https://helpx.adobe.com/security/products/acrobat/apsb22-16.html", "refsource": "MISC", "url": "https://helpx.adobe.com/security/products/acrobat/apsb22-16.html" } ] }, "source": { "discovery": "EXTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "078d4453-3bcd-4900-85e6-15281da43538", "assignerShortName": "adobe", "cveId": "CVE-2022-28232", "datePublished": "2022-05-11T17:28:10.912425Z", "dateReserved": "2022-03-30T00:00:00", "dateUpdated": "2024-09-16T19:42:00.282Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-28235
Vulnerability from cvelistv5
Published
2022-05-11 17:31
Modified
2024-09-16 17:22
Severity ?
EPSS score ?
Summary
Adobe Acrobat Reader DC AcroForm Use-After-Free Remote Code Execution Vulnerability
References
▼ | URL | Tags |
---|---|---|
https://helpx.adobe.com/security/products/acrobat/apsb22-16.html | x_refsource_MISC |
Impacted products
▼ | Vendor | Product |
---|---|---|
Adobe | Acrobat Reader |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T05:48:37.705Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://helpx.adobe.com/security/products/acrobat/apsb22-16.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Acrobat Reader", "vendor": "Adobe", "versions": [ { "lessThanOrEqual": "22.001.20085", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThanOrEqual": "20.005.3031x", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThanOrEqual": "17.012.30205", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThanOrEqual": "None", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "datePublic": "2022-04-12T00:00:00", "descriptions": [ { "lang": "en", "value": "Acrobat Reader DC versions 22.001.20085 (and earlier), 20.005.3031x (and earlier) and 17.012.30205 (and earlier) are affected by a use-after-free vulnerability in the processing of the acroform event that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file." } ], "metrics": [ { "cvssV3_0": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-416", "description": "Use After Free (CWE-416)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-05-11T17:31:21", "orgId": "078d4453-3bcd-4900-85e6-15281da43538", "shortName": "adobe" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://helpx.adobe.com/security/products/acrobat/apsb22-16.html" } ], "source": { "discovery": "EXTERNAL" }, "title": "Adobe Acrobat Reader DC AcroForm Use-After-Free Remote Code Execution Vulnerability", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@adobe.com", "DATE_PUBLIC": "2022-04-12T23:00:00.000Z", "ID": "CVE-2022-28235", "STATE": "PUBLIC", "TITLE": "Adobe Acrobat Reader DC AcroForm Use-After-Free Remote Code Execution Vulnerability" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Acrobat Reader", "version": { "version_data": [ { "version_affected": "\u003c=", "version_value": "22.001.20085" }, { "version_affected": "\u003c=", "version_value": "20.005.3031x" }, { "version_affected": "\u003c=", "version_value": "17.012.30205" }, { "version_affected": "\u003c=", "version_value": "None" } ] } } ] }, "vendor_name": "Adobe" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Acrobat Reader DC versions 22.001.20085 (and earlier), 20.005.3031x (and earlier) and 17.012.30205 (and earlier) are affected by a use-after-free vulnerability in the processing of the acroform event that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file." } ] }, "impact": { "cvss": { "attackComplexity": "Low", "attackVector": "Local", "availabilityImpact": "High", "baseScore": 7.8, "baseSeverity": "High", "confidentialityImpact": "High", "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "userInteraction": "Required", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Use After Free (CWE-416)" } ] } ] }, "references": { "reference_data": [ { "name": "https://helpx.adobe.com/security/products/acrobat/apsb22-16.html", "refsource": "MISC", "url": "https://helpx.adobe.com/security/products/acrobat/apsb22-16.html" } ] }, "source": { "discovery": "EXTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "078d4453-3bcd-4900-85e6-15281da43538", "assignerShortName": "adobe", "cveId": "CVE-2022-28235", "datePublished": "2022-05-11T17:31:21.670736Z", "dateReserved": "2022-03-30T00:00:00", "dateUpdated": "2024-09-16T17:22:36.607Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-28262
Vulnerability from cvelistv5
Published
2022-05-11 17:54
Modified
2024-09-17 01:40
Severity ?
EPSS score ?
Summary
Adobe Acrobat Reader DC Annotation Out-Of-Bounds Read Information Disclosure Vulnerability
References
▼ | URL | Tags |
---|---|---|
https://helpx.adobe.com/security/products/acrobat/apsb22-16.html | x_refsource_MISC |
Impacted products
▼ | Vendor | Product |
---|---|---|
Adobe | Acrobat Reader |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T05:48:37.893Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://helpx.adobe.com/security/products/acrobat/apsb22-16.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Acrobat Reader", "vendor": "Adobe", "versions": [ { "lessThanOrEqual": "22.001.20085", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThanOrEqual": "20.005.3031x", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThanOrEqual": "17.012.30205", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThanOrEqual": "None", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "datePublic": "2022-04-12T00:00:00", "descriptions": [ { "lang": "en", "value": "Acrobat Reader DC version 22.001.2011x (and earlier), 20.005.3033x (and earlier) and 17.012.3022x (and earlier) are affected by an out-of-bounds read vulnerability when parsing a crafted file, which could result in a read past the end of an allocated memory structure. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-125", "description": "Out-of-bounds Read (CWE-125)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-05-11T17:54:07", "orgId": "078d4453-3bcd-4900-85e6-15281da43538", "shortName": "adobe" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://helpx.adobe.com/security/products/acrobat/apsb22-16.html" } ], "source": { "discovery": "EXTERNAL" }, "title": "Adobe Acrobat Reader DC Annotation Out-Of-Bounds Read Information Disclosure Vulnerability", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@adobe.com", "DATE_PUBLIC": "2022-04-12T23:00:00.000Z", "ID": "CVE-2022-28262", "STATE": "PUBLIC", "TITLE": "Adobe Acrobat Reader DC Annotation Out-Of-Bounds Read Information Disclosure Vulnerability" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Acrobat Reader", "version": { "version_data": [ { "version_affected": "\u003c=", "version_value": "22.001.20085" }, { "version_affected": "\u003c=", "version_value": "20.005.3031x" }, { "version_affected": "\u003c=", "version_value": "17.012.30205" }, { "version_affected": "\u003c=", "version_value": "None" } ] } } ] }, "vendor_name": "Adobe" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Acrobat Reader DC version 22.001.2011x (and earlier), 20.005.3033x (and earlier) and 17.012.3022x (and earlier) are affected by an out-of-bounds read vulnerability when parsing a crafted file, which could result in a read past the end of an allocated memory structure. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file." } ] }, "impact": { "cvss": { "attackComplexity": "Low", "attackVector": "Local", "availabilityImpact": "None", "baseScore": 5.5, "baseSeverity": "Medium", "confidentialityImpact": "High", "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "userInteraction": "Required", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Out-of-bounds Read (CWE-125)" } ] } ] }, "references": { "reference_data": [ { "name": "https://helpx.adobe.com/security/products/acrobat/apsb22-16.html", "refsource": "MISC", "url": "https://helpx.adobe.com/security/products/acrobat/apsb22-16.html" } ] }, "source": { "discovery": "EXTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "078d4453-3bcd-4900-85e6-15281da43538", "assignerShortName": "adobe", "cveId": "CVE-2022-28262", "datePublished": "2022-05-11T17:54:07.815850Z", "dateReserved": "2022-03-30T00:00:00", "dateUpdated": "2024-09-17T01:40:54.639Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-28263
Vulnerability from cvelistv5
Published
2022-05-11 17:54
Modified
2024-09-16 17:48
Severity ?
EPSS score ?
Summary
Adobe Acrobat Reader DC Annotation Out-Of-Bounds Read Information Disclosure Vulnerability
References
▼ | URL | Tags |
---|---|---|
https://helpx.adobe.com/security/products/acrobat/apsb22-16.html | x_refsource_MISC |
Impacted products
▼ | Vendor | Product |
---|---|---|
Adobe | Acrobat Reader |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T05:48:37.905Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://helpx.adobe.com/security/products/acrobat/apsb22-16.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Acrobat Reader", "vendor": "Adobe", "versions": [ { "lessThanOrEqual": "22.001.20085", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThanOrEqual": "20.005.3031x", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThanOrEqual": "17.012.30205", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThanOrEqual": "None", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "datePublic": "2022-04-12T00:00:00", "descriptions": [ { "lang": "en", "value": "Acrobat Reader DC version 22.001.2011x (and earlier), 20.005.3033x (and earlier) and 17.012.3022x (and earlier) are affected by an out-of-bounds read vulnerability when parsing a crafted file, which could result in a read past the end of an allocated memory structure. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-125", "description": "Out-of-bounds Read (CWE-125)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-05-11T17:54:54", "orgId": "078d4453-3bcd-4900-85e6-15281da43538", "shortName": "adobe" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://helpx.adobe.com/security/products/acrobat/apsb22-16.html" } ], "source": { "discovery": "EXTERNAL" }, "title": "Adobe Acrobat Reader DC Annotation Out-Of-Bounds Read Information Disclosure Vulnerability", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@adobe.com", "DATE_PUBLIC": "2022-04-12T23:00:00.000Z", "ID": "CVE-2022-28263", "STATE": "PUBLIC", "TITLE": "Adobe Acrobat Reader DC Annotation Out-Of-Bounds Read Information Disclosure Vulnerability" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Acrobat Reader", "version": { "version_data": [ { "version_affected": "\u003c=", "version_value": "22.001.20085" }, { "version_affected": "\u003c=", "version_value": "20.005.3031x" }, { "version_affected": "\u003c=", "version_value": "17.012.30205" }, { "version_affected": "\u003c=", "version_value": "None" } ] } } ] }, "vendor_name": "Adobe" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Acrobat Reader DC version 22.001.2011x (and earlier), 20.005.3033x (and earlier) and 17.012.3022x (and earlier) are affected by an out-of-bounds read vulnerability when parsing a crafted file, which could result in a read past the end of an allocated memory structure. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file." } ] }, "impact": { "cvss": { "attackComplexity": "Low", "attackVector": "Local", "availabilityImpact": "None", "baseScore": 5.5, "baseSeverity": "Medium", "confidentialityImpact": "High", "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "userInteraction": "Required", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Out-of-bounds Read (CWE-125)" } ] } ] }, "references": { "reference_data": [ { "name": "https://helpx.adobe.com/security/products/acrobat/apsb22-16.html", "refsource": "MISC", "url": "https://helpx.adobe.com/security/products/acrobat/apsb22-16.html" } ] }, "source": { "discovery": "EXTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "078d4453-3bcd-4900-85e6-15281da43538", "assignerShortName": "adobe", "cveId": "CVE-2022-28263", "datePublished": "2022-05-11T17:54:54.942059Z", "dateReserved": "2022-03-30T00:00:00", "dateUpdated": "2024-09-16T17:48:17.544Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-27798
Vulnerability from cvelistv5
Published
2022-05-11 17:20
Modified
2024-09-16 23:20
Severity ?
EPSS score ?
Summary
Adobe Acrobat Reader DC zoomType Out-Of-Bounds Write Remote Code Execution Vulnerability
References
▼ | URL | Tags |
---|---|---|
https://helpx.adobe.com/security/products/acrobat/apsb22-16.html | x_refsource_MISC |
Impacted products
▼ | Vendor | Product |
---|---|---|
Adobe | Acrobat Reader |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T05:32:59.824Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://helpx.adobe.com/security/products/acrobat/apsb22-16.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Acrobat Reader", "vendor": "Adobe", "versions": [ { "lessThanOrEqual": "22.001.20085", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThanOrEqual": "20.005.3031x", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThanOrEqual": "17.012.30205", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThanOrEqual": "None", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "datePublic": "2022-04-12T00:00:00", "descriptions": [ { "lang": "en", "value": "Acrobat Reader DC versions 22.001.20085 (and earlier), 20.005.3031x (and earlier) and 17.012.30205 (and earlier) are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file." } ], "metrics": [ { "cvssV3_0": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-787", "description": "Out-of-bounds Write (CWE-787)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-05-11T17:20:59", "orgId": "078d4453-3bcd-4900-85e6-15281da43538", "shortName": "adobe" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://helpx.adobe.com/security/products/acrobat/apsb22-16.html" } ], "source": { "discovery": "EXTERNAL" }, "title": "Adobe Acrobat Reader DC zoomType Out-Of-Bounds Write Remote Code Execution Vulnerability", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@adobe.com", "DATE_PUBLIC": "2022-04-12T23:00:00.000Z", "ID": "CVE-2022-27798", "STATE": "PUBLIC", "TITLE": "Adobe Acrobat Reader DC zoomType Out-Of-Bounds Write Remote Code Execution Vulnerability" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Acrobat Reader", "version": { "version_data": [ { "version_affected": "\u003c=", "version_value": "22.001.20085" }, { "version_affected": "\u003c=", "version_value": "20.005.3031x" }, { "version_affected": "\u003c=", "version_value": "17.012.30205" }, { "version_affected": "\u003c=", "version_value": "None" } ] } } ] }, "vendor_name": "Adobe" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Acrobat Reader DC versions 22.001.20085 (and earlier), 20.005.3031x (and earlier) and 17.012.30205 (and earlier) are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file." } ] }, "impact": { "cvss": { "attackComplexity": "Low", "attackVector": "Local", "availabilityImpact": "High", "baseScore": 7.8, "baseSeverity": "High", "confidentialityImpact": "High", "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "userInteraction": "Required", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Out-of-bounds Write (CWE-787)" } ] } ] }, "references": { "reference_data": [ { "name": "https://helpx.adobe.com/security/products/acrobat/apsb22-16.html", "refsource": "MISC", "url": "https://helpx.adobe.com/security/products/acrobat/apsb22-16.html" } ] }, "source": { "discovery": "EXTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "078d4453-3bcd-4900-85e6-15281da43538", "assignerShortName": "adobe", "cveId": "CVE-2022-27798", "datePublished": "2022-05-11T17:20:59.435459Z", "dateReserved": "2022-03-23T00:00:00", "dateUpdated": "2024-09-16T23:20:30.600Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-27790
Vulnerability from cvelistv5
Published
2022-05-11 17:14
Modified
2024-09-17 00:46
Severity ?
EPSS score ?
Summary
Adobe Acrobat Reader DC Font Parsing Use-After-Free Remote Code Execution Vulnerability
References
▼ | URL | Tags |
---|---|---|
https://helpx.adobe.com/security/products/acrobat/apsb22-16.html | x_refsource_MISC |
Impacted products
▼ | Vendor | Product |
---|---|---|
Adobe | Acrobat Reader |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T05:33:00.331Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://helpx.adobe.com/security/products/acrobat/apsb22-16.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Acrobat Reader", "vendor": "Adobe", "versions": [ { "lessThanOrEqual": "22.001.20085", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThanOrEqual": "20.005.3031x", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThanOrEqual": "17.012.30205", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThanOrEqual": "None", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "datePublic": "2022-04-12T00:00:00", "descriptions": [ { "lang": "en", "value": "Acrobat Reader DC versions 22.001.20085 (and earlier), 20.005.3031x (and earlier) and 17.012.30205 (and earlier) are affected by a use-after-free vulnerability in the processing of fonts that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file." } ], "metrics": [ { "cvssV3_0": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-416", "description": "Use After Free (CWE-416)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-05-11T17:14:44", "orgId": "078d4453-3bcd-4900-85e6-15281da43538", "shortName": "adobe" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://helpx.adobe.com/security/products/acrobat/apsb22-16.html" } ], "source": { "discovery": "EXTERNAL" }, "title": "Adobe Acrobat Reader DC Font Parsing Use-After-Free Remote Code Execution Vulnerability", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@adobe.com", "DATE_PUBLIC": "2022-04-12T23:00:00.000Z", "ID": "CVE-2022-27790", "STATE": "PUBLIC", "TITLE": "Adobe Acrobat Reader DC Font Parsing Use-After-Free Remote Code Execution Vulnerability" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Acrobat Reader", "version": { "version_data": [ { "version_affected": "\u003c=", "version_value": "22.001.20085" }, { "version_affected": "\u003c=", "version_value": "20.005.3031x" }, { "version_affected": "\u003c=", "version_value": "17.012.30205" }, { "version_affected": "\u003c=", "version_value": "None" } ] } } ] }, "vendor_name": "Adobe" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Acrobat Reader DC versions 22.001.20085 (and earlier), 20.005.3031x (and earlier) and 17.012.30205 (and earlier) are affected by a use-after-free vulnerability in the processing of fonts that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file." } ] }, "impact": { "cvss": { "attackComplexity": "Low", "attackVector": "Local", "availabilityImpact": "High", "baseScore": 7.8, "baseSeverity": "High", "confidentialityImpact": "High", "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "userInteraction": "Required", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Use After Free (CWE-416)" } ] } ] }, "references": { "reference_data": [ { "name": "https://helpx.adobe.com/security/products/acrobat/apsb22-16.html", "refsource": "MISC", "url": "https://helpx.adobe.com/security/products/acrobat/apsb22-16.html" } ] }, "source": { "discovery": "EXTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "078d4453-3bcd-4900-85e6-15281da43538", "assignerShortName": "adobe", "cveId": "CVE-2022-27790", "datePublished": "2022-05-11T17:14:44.242299Z", "dateReserved": "2022-03-23T00:00:00", "dateUpdated": "2024-09-17T00:46:10.123Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-27791
Vulnerability from cvelistv5
Published
2022-05-11 17:15
Modified
2024-09-16 20:31
Severity ?
EPSS score ?
Summary
Adobe Acrobat Reader DC Font Parsing Stack-based Buffer Overflow Remote Code Execution Vulnerability
References
▼ | URL | Tags |
---|---|---|
https://helpx.adobe.com/security/products/acrobat/apsb22-16.html | x_refsource_MISC |
Impacted products
▼ | Vendor | Product |
---|---|---|
Adobe | Acrobat Reader |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T05:32:59.885Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://helpx.adobe.com/security/products/acrobat/apsb22-16.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Acrobat Reader", "vendor": "Adobe", "versions": [ { "lessThanOrEqual": "22.001.20085", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThanOrEqual": "20.005.3031x", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThanOrEqual": "17.012.30205", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThanOrEqual": "None", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "datePublic": "2022-04-12T00:00:00", "descriptions": [ { "lang": "en", "value": "Acrobat Reader DC versions 22.001.20085 (and earlier), 20.005.3031x (and earlier) and 17.012.30205 (and earlier) is affected by a stack-based buffer overflow vulnerability due to insecure processing of a font, potentially resulting in arbitrary code execution in the context of the current user. Exploitation requires user interaction in that a victim must open a crafted .pdf file" } ], "metrics": [ { "cvssV3_0": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-121", "description": "Stack-based Buffer Overflow (CWE-121)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-05-11T17:15:29", "orgId": "078d4453-3bcd-4900-85e6-15281da43538", "shortName": "adobe" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://helpx.adobe.com/security/products/acrobat/apsb22-16.html" } ], "source": { "discovery": "EXTERNAL" }, "title": "Adobe Acrobat Reader DC Font Parsing Stack-based Buffer Overflow Remote Code Execution Vulnerability", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@adobe.com", "DATE_PUBLIC": "2022-04-12T23:00:00.000Z", "ID": "CVE-2022-27791", "STATE": "PUBLIC", "TITLE": "Adobe Acrobat Reader DC Font Parsing Stack-based Buffer Overflow Remote Code Execution Vulnerability" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Acrobat Reader", "version": { "version_data": [ { "version_affected": "\u003c=", "version_value": "22.001.20085" }, { "version_affected": "\u003c=", "version_value": "20.005.3031x" }, { "version_affected": "\u003c=", "version_value": "17.012.30205" }, { "version_affected": "\u003c=", "version_value": "None" } ] } } ] }, "vendor_name": "Adobe" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Acrobat Reader DC versions 22.001.20085 (and earlier), 20.005.3031x (and earlier) and 17.012.30205 (and earlier) is affected by a stack-based buffer overflow vulnerability due to insecure processing of a font, potentially resulting in arbitrary code execution in the context of the current user. Exploitation requires user interaction in that a victim must open a crafted .pdf file" } ] }, "impact": { "cvss": { "attackComplexity": "Low", "attackVector": "Local", "availabilityImpact": "High", "baseScore": 7.8, "baseSeverity": "High", "confidentialityImpact": "High", "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "userInteraction": "Required", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Stack-based Buffer Overflow (CWE-121)" } ] } ] }, "references": { "reference_data": [ { "name": "https://helpx.adobe.com/security/products/acrobat/apsb22-16.html", "refsource": "MISC", "url": "https://helpx.adobe.com/security/products/acrobat/apsb22-16.html" } ] }, "source": { "discovery": "EXTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "078d4453-3bcd-4900-85e6-15281da43538", "assignerShortName": "adobe", "cveId": "CVE-2022-27791", "datePublished": "2022-05-11T17:15:29.873263Z", "dateReserved": "2022-03-23T00:00:00", "dateUpdated": "2024-09-16T20:31:31.266Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-28269
Vulnerability from cvelistv5
Published
2022-05-11 17:59
Modified
2024-09-17 02:21
Severity ?
EPSS score ?
Summary
Adobe Acrobat Reader DC Annotation Use-After-Free Information Disclosure Vulnerability
References
▼ | URL | Tags |
---|---|---|
https://helpx.adobe.com/security/products/acrobat/apsb22-16.html | x_refsource_MISC |
Impacted products
▼ | Vendor | Product |
---|---|---|
Adobe | Acrobat Reader |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T05:48:37.653Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://helpx.adobe.com/security/products/acrobat/apsb22-16.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Acrobat Reader", "vendor": "Adobe", "versions": [ { "lessThanOrEqual": "22.001.20085", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThanOrEqual": "20.005.3031x", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThanOrEqual": "17.012.30205", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThanOrEqual": "None", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "datePublic": "2022-04-12T00:00:00", "descriptions": [ { "lang": "en", "value": "Acrobat Reader DC versions 22.001.20085 (and earlier), 20.005.3031x (and earlier) and 17.012.30205 (and earlier) are affected by a use-after-free vulnerability in the processing of Annotation objects that could result in a memory leak in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file." } ], "metrics": [ { "cvssV3_0": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 3.3, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-416", "description": "Use After Free (CWE-416)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-05-11T17:59:15", "orgId": "078d4453-3bcd-4900-85e6-15281da43538", "shortName": "adobe" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://helpx.adobe.com/security/products/acrobat/apsb22-16.html" } ], "source": { "discovery": "EXTERNAL" }, "title": "Adobe Acrobat Reader DC Annotation Use-After-Free Information Disclosure Vulnerability", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@adobe.com", "DATE_PUBLIC": "2022-04-12T23:00:00.000Z", "ID": "CVE-2022-28269", "STATE": "PUBLIC", "TITLE": "Adobe Acrobat Reader DC Annotation Use-After-Free Information Disclosure Vulnerability" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Acrobat Reader", "version": { "version_data": [ { "version_affected": "\u003c=", "version_value": "22.001.20085" }, { "version_affected": "\u003c=", "version_value": "20.005.3031x" }, { "version_affected": "\u003c=", "version_value": "17.012.30205" }, { "version_affected": "\u003c=", "version_value": "None" } ] } } ] }, "vendor_name": "Adobe" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Acrobat Reader DC versions 22.001.20085 (and earlier), 20.005.3031x (and earlier) and 17.012.30205 (and earlier) are affected by a use-after-free vulnerability in the processing of Annotation objects that could result in a memory leak in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file." } ] }, "impact": { "cvss": { "attackComplexity": "Low", "attackVector": "Local", "availabilityImpact": "None", "baseScore": 3.3, "baseSeverity": "Low", "confidentialityImpact": "Low", "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "userInteraction": "Required", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Use After Free (CWE-416)" } ] } ] }, "references": { "reference_data": [ { "name": "https://helpx.adobe.com/security/products/acrobat/apsb22-16.html", "refsource": "MISC", "url": "https://helpx.adobe.com/security/products/acrobat/apsb22-16.html" } ] }, "source": { "discovery": "EXTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "078d4453-3bcd-4900-85e6-15281da43538", "assignerShortName": "adobe", "cveId": "CVE-2022-28269", "datePublished": "2022-05-11T17:59:15.360913Z", "dateReserved": "2022-03-30T00:00:00", "dateUpdated": "2024-09-17T02:21:37.596Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-24103
Vulnerability from cvelistv5
Published
2022-05-11 17:07
Modified
2024-09-17 01:15
Severity ?
EPSS score ?
Summary
Adobe Acrobat Reader DC Annotation Use-After-Free Remote Code Execution Vulnerability
References
▼ | URL | Tags |
---|---|---|
https://helpx.adobe.com/security/products/acrobat/apsb22-16.html | x_refsource_MISC |
Impacted products
▼ | Vendor | Product |
---|---|---|
Adobe | Acrobat Reader |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T03:59:23.930Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://helpx.adobe.com/security/products/acrobat/apsb22-16.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Acrobat Reader", "vendor": "Adobe", "versions": [ { "lessThanOrEqual": "22.001.20085", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThanOrEqual": "20.005.3031x", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThanOrEqual": "17.012.30205", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThanOrEqual": "None", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "datePublic": "2022-04-12T00:00:00", "descriptions": [ { "lang": "en", "value": "Acrobat Reader DC versions 20.001.20085 (and earlier), 20.005.3031x (and earlier) and 17.012.30205 (and earlier) are affected by a use-after-free vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file." } ], "metrics": [ { "cvssV3_0": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-416", "description": "Use After Free (CWE-416)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-05-11T17:07:33", "orgId": "078d4453-3bcd-4900-85e6-15281da43538", "shortName": "adobe" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://helpx.adobe.com/security/products/acrobat/apsb22-16.html" } ], "source": { "discovery": "EXTERNAL" }, "title": "Adobe Acrobat Reader DC Annotation Use-After-Free Remote Code Execution Vulnerability", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@adobe.com", "DATE_PUBLIC": "2022-04-12T23:00:00.000Z", "ID": "CVE-2022-24103", "STATE": "PUBLIC", "TITLE": "Adobe Acrobat Reader DC Annotation Use-After-Free Remote Code Execution Vulnerability" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Acrobat Reader", "version": { "version_data": [ { "version_affected": "\u003c=", "version_value": "22.001.20085" }, { "version_affected": "\u003c=", "version_value": "20.005.3031x" }, { "version_affected": "\u003c=", "version_value": "17.012.30205" }, { "version_affected": "\u003c=", "version_value": "None" } ] } } ] }, "vendor_name": "Adobe" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Acrobat Reader DC versions 20.001.20085 (and earlier), 20.005.3031x (and earlier) and 17.012.30205 (and earlier) are affected by a use-after-free vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file." } ] }, "impact": { "cvss": { "attackComplexity": "Low", "attackVector": "Local", "availabilityImpact": "High", "baseScore": 7.8, "baseSeverity": "High", "confidentialityImpact": "High", "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "userInteraction": "Required", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Use After Free (CWE-416)" } ] } ] }, "references": { "reference_data": [ { "name": "https://helpx.adobe.com/security/products/acrobat/apsb22-16.html", "refsource": "MISC", "url": "https://helpx.adobe.com/security/products/acrobat/apsb22-16.html" } ] }, "source": { "discovery": "EXTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "078d4453-3bcd-4900-85e6-15281da43538", "assignerShortName": "adobe", "cveId": "CVE-2022-24103", "datePublished": "2022-05-11T17:07:33.458821Z", "dateReserved": "2022-01-27T00:00:00", "dateUpdated": "2024-09-17T01:15:42.436Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-28267
Vulnerability from cvelistv5
Published
2022-05-11 17:57
Modified
2024-09-16 18:48
Severity ?
EPSS score ?
Summary
Adobe Acrobat Reader DC Annotation Out-Of-Bounds Read Information Disclosure Vulnerability
References
▼ | URL | Tags |
---|---|---|
https://helpx.adobe.com/security/products/acrobat/apsb22-16.html | x_refsource_MISC |
Impacted products
▼ | Vendor | Product |
---|---|---|
Adobe | Acrobat Reader |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T05:48:37.667Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://helpx.adobe.com/security/products/acrobat/apsb22-16.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Acrobat Reader", "vendor": "Adobe", "versions": [ { "lessThanOrEqual": "22.001.20085", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThanOrEqual": "20.005.3031x", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThanOrEqual": "17.012.30205", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThanOrEqual": "None", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "datePublic": "2022-04-12T00:00:00", "descriptions": [ { "lang": "en", "value": "Acrobat Reader DC version 22.001.2011x (and earlier), 20.005.3033x (and earlier) and 17.012.3022x (and earlier) are affected by an out-of-bounds read vulnerability when parsing a crafted file, which could result in a read past the end of an allocated memory structure. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-125", "description": "Out-of-bounds Read (CWE-125)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-05-11T17:57:49", "orgId": "078d4453-3bcd-4900-85e6-15281da43538", "shortName": "adobe" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://helpx.adobe.com/security/products/acrobat/apsb22-16.html" } ], "source": { "discovery": "EXTERNAL" }, "title": "Adobe Acrobat Reader DC Annotation Out-Of-Bounds Read Information Disclosure Vulnerability", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@adobe.com", "DATE_PUBLIC": "2022-04-12T23:00:00.000Z", "ID": "CVE-2022-28267", "STATE": "PUBLIC", "TITLE": "Adobe Acrobat Reader DC Annotation Out-Of-Bounds Read Information Disclosure Vulnerability" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Acrobat Reader", "version": { "version_data": [ { "version_affected": "\u003c=", "version_value": "22.001.20085" }, { "version_affected": "\u003c=", "version_value": "20.005.3031x" }, { "version_affected": "\u003c=", "version_value": "17.012.30205" }, { "version_affected": "\u003c=", "version_value": "None" } ] } } ] }, "vendor_name": "Adobe" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Acrobat Reader DC version 22.001.2011x (and earlier), 20.005.3033x (and earlier) and 17.012.3022x (and earlier) are affected by an out-of-bounds read vulnerability when parsing a crafted file, which could result in a read past the end of an allocated memory structure. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file." } ] }, "impact": { "cvss": { "attackComplexity": "Low", "attackVector": "Local", "availabilityImpact": "None", "baseScore": 5.5, "baseSeverity": "Medium", "confidentialityImpact": "High", "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "userInteraction": "Required", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Out-of-bounds Read (CWE-125)" } ] } ] }, "references": { "reference_data": [ { "name": "https://helpx.adobe.com/security/products/acrobat/apsb22-16.html", "refsource": "MISC", "url": "https://helpx.adobe.com/security/products/acrobat/apsb22-16.html" } ] }, "source": { "discovery": "EXTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "078d4453-3bcd-4900-85e6-15281da43538", "assignerShortName": "adobe", "cveId": "CVE-2022-28267", "datePublished": "2022-05-11T17:57:49.256949Z", "dateReserved": "2022-03-30T00:00:00", "dateUpdated": "2024-09-16T18:48:54.072Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-27793
Vulnerability from cvelistv5
Published
2022-05-11 17:17
Modified
2024-09-16 23:41
Severity ?
EPSS score ?
Summary
Adobe Acrobat Reader DC Font Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability
References
▼ | URL | Tags |
---|---|---|
https://helpx.adobe.com/security/products/acrobat/apsb22-16.html | x_refsource_MISC |
Impacted products
▼ | Vendor | Product |
---|---|---|
Adobe | Acrobat Reader |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T05:33:00.489Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://helpx.adobe.com/security/products/acrobat/apsb22-16.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Acrobat Reader", "vendor": "Adobe", "versions": [ { "lessThanOrEqual": "22.001.20085", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThanOrEqual": "20.005.3031x", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThanOrEqual": "17.012.30205", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThanOrEqual": "None", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "datePublic": "2022-04-12T00:00:00", "descriptions": [ { "lang": "en", "value": "Acrobat Reader DC versions 22.001.20085 (and earlier), 20.005.3031x (and earlier) and 17.012.30205 (and earlier) are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file." } ], "metrics": [ { "cvssV3_0": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-787", "description": "Out-of-bounds Write (CWE-787)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-05-11T17:17:03", "orgId": "078d4453-3bcd-4900-85e6-15281da43538", "shortName": "adobe" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://helpx.adobe.com/security/products/acrobat/apsb22-16.html" } ], "source": { "discovery": "EXTERNAL" }, "title": "Adobe Acrobat Reader DC Font Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@adobe.com", "DATE_PUBLIC": "2022-04-12T23:00:00.000Z", "ID": "CVE-2022-27793", "STATE": "PUBLIC", "TITLE": "Adobe Acrobat Reader DC Font Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Acrobat Reader", "version": { "version_data": [ { "version_affected": "\u003c=", "version_value": "22.001.20085" }, { "version_affected": "\u003c=", "version_value": "20.005.3031x" }, { "version_affected": "\u003c=", "version_value": "17.012.30205" }, { "version_affected": "\u003c=", "version_value": "None" } ] } } ] }, "vendor_name": "Adobe" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Acrobat Reader DC versions 22.001.20085 (and earlier), 20.005.3031x (and earlier) and 17.012.30205 (and earlier) are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file." } ] }, "impact": { "cvss": { "attackComplexity": "Low", "attackVector": "Local", "availabilityImpact": "High", "baseScore": 7.8, "baseSeverity": "High", "confidentialityImpact": "High", "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "userInteraction": "Required", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Out-of-bounds Write (CWE-787)" } ] } ] }, "references": { "reference_data": [ { "name": "https://helpx.adobe.com/security/products/acrobat/apsb22-16.html", "refsource": "MISC", "url": "https://helpx.adobe.com/security/products/acrobat/apsb22-16.html" } ] }, "source": { "discovery": "EXTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "078d4453-3bcd-4900-85e6-15281da43538", "assignerShortName": "adobe", "cveId": "CVE-2022-27793", "datePublished": "2022-05-11T17:17:03.882917Z", "dateReserved": "2022-03-23T00:00:00", "dateUpdated": "2024-09-16T23:41:51.590Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-27786
Vulnerability from cvelistv5
Published
2022-05-11 17:11
Modified
2024-09-16 16:38
Severity ?
EPSS score ?
Summary
Adobe Acrobat Reader DC Font Parsing Use-After-Free Remote Code Execution Vulnerability
References
▼ | URL | Tags |
---|---|---|
https://helpx.adobe.com/security/products/acrobat/apsb22-16.html | x_refsource_MISC |
Impacted products
▼ | Vendor | Product |
---|---|---|
Adobe | Acrobat Reader |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T05:32:59.904Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://helpx.adobe.com/security/products/acrobat/apsb22-16.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Acrobat Reader", "vendor": "Adobe", "versions": [ { "lessThanOrEqual": "22.001.20085", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThanOrEqual": "20.005.3031x", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThanOrEqual": "17.012.30205", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThanOrEqual": "None", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "datePublic": "2022-04-12T00:00:00", "descriptions": [ { "lang": "en", "value": "Acrobat Reader DC versions 22.001.20085 (and earlier), 20.005.3031x (and earlier) and 17.012.30205 (and earlier) are affected by a use-after-free vulnerability in the processing of fonts that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file." } ], "metrics": [ { "cvssV3_0": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-416", "description": "Use After Free (CWE-416)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-05-11T17:11:17", "orgId": "078d4453-3bcd-4900-85e6-15281da43538", "shortName": "adobe" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://helpx.adobe.com/security/products/acrobat/apsb22-16.html" } ], "source": { "discovery": "EXTERNAL" }, "title": "Adobe Acrobat Reader DC Font Parsing Use-After-Free Remote Code Execution Vulnerability", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@adobe.com", "DATE_PUBLIC": "2022-04-12T23:00:00.000Z", "ID": "CVE-2022-27786", "STATE": "PUBLIC", "TITLE": "Adobe Acrobat Reader DC Font Parsing Use-After-Free Remote Code Execution Vulnerability" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Acrobat Reader", "version": { "version_data": [ { "version_affected": "\u003c=", "version_value": "22.001.20085" }, { "version_affected": "\u003c=", "version_value": "20.005.3031x" }, { "version_affected": "\u003c=", "version_value": "17.012.30205" }, { "version_affected": "\u003c=", "version_value": "None" } ] } } ] }, "vendor_name": "Adobe" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Acrobat Reader DC versions 22.001.20085 (and earlier), 20.005.3031x (and earlier) and 17.012.30205 (and earlier) are affected by a use-after-free vulnerability in the processing of fonts that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file." } ] }, "impact": { "cvss": { "attackComplexity": "Low", "attackVector": "Local", "availabilityImpact": "High", "baseScore": 7.8, "baseSeverity": "High", "confidentialityImpact": "High", "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "userInteraction": "Required", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Use After Free (CWE-416)" } ] } ] }, "references": { "reference_data": [ { "name": "https://helpx.adobe.com/security/products/acrobat/apsb22-16.html", "refsource": "MISC", "url": "https://helpx.adobe.com/security/products/acrobat/apsb22-16.html" } ] }, "source": { "discovery": "EXTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "078d4453-3bcd-4900-85e6-15281da43538", "assignerShortName": "adobe", "cveId": "CVE-2022-27786", "datePublished": "2022-05-11T17:11:17.335273Z", "dateReserved": "2022-03-23T00:00:00", "dateUpdated": "2024-09-16T16:38:40.402Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-24104
Vulnerability from cvelistv5
Published
2022-05-11 17:08
Modified
2024-09-17 03:59
Severity ?
EPSS score ?
Summary
Adobe Acrobat Reader DC Annotation Use-After-Free Remote Code Execution Vulnerability
References
▼ | URL | Tags |
---|---|---|
https://helpx.adobe.com/security/products/acrobat/apsb22-16.html | x_refsource_MISC |
Impacted products
▼ | Vendor | Product |
---|---|---|
Adobe | Acrobat Reader |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T03:59:23.724Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://helpx.adobe.com/security/products/acrobat/apsb22-16.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Acrobat Reader", "vendor": "Adobe", "versions": [ { "lessThanOrEqual": "22.001.20085", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThanOrEqual": "20.005.3031x", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThanOrEqual": "17.012.30205", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThanOrEqual": "None", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "datePublic": "2022-04-12T00:00:00", "descriptions": [ { "lang": "en", "value": "Acrobat Reader DC versions 20.001.20085 (and earlier), 20.005.3031x (and earlier) and 17.012.30205 (and earlier) are affected by a use-after-free vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file." } ], "metrics": [ { "cvssV3_0": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-416", "description": "Use After Free (CWE-416)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-05-11T17:08:48", "orgId": "078d4453-3bcd-4900-85e6-15281da43538", "shortName": "adobe" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://helpx.adobe.com/security/products/acrobat/apsb22-16.html" } ], "source": { "discovery": "EXTERNAL" }, "title": "Adobe Acrobat Reader DC Annotation Use-After-Free Remote Code Execution Vulnerability", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@adobe.com", "DATE_PUBLIC": "2022-04-12T23:00:00.000Z", "ID": "CVE-2022-24104", "STATE": "PUBLIC", "TITLE": "Adobe Acrobat Reader DC Annotation Use-After-Free Remote Code Execution Vulnerability" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Acrobat Reader", "version": { "version_data": [ { "version_affected": "\u003c=", "version_value": "22.001.20085" }, { "version_affected": "\u003c=", "version_value": "20.005.3031x" }, { "version_affected": "\u003c=", "version_value": "17.012.30205" }, { "version_affected": "\u003c=", "version_value": "None" } ] } } ] }, "vendor_name": "Adobe" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Acrobat Reader DC versions 20.001.20085 (and earlier), 20.005.3031x (and earlier) and 17.012.30205 (and earlier) are affected by a use-after-free vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file." } ] }, "impact": { "cvss": { "attackComplexity": "Low", "attackVector": "Local", "availabilityImpact": "High", "baseScore": 7.8, "baseSeverity": "High", "confidentialityImpact": "High", "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "userInteraction": "Required", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Use After Free (CWE-416)" } ] } ] }, "references": { "reference_data": [ { "name": "https://helpx.adobe.com/security/products/acrobat/apsb22-16.html", "refsource": "MISC", "url": "https://helpx.adobe.com/security/products/acrobat/apsb22-16.html" } ] }, "source": { "discovery": "EXTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "078d4453-3bcd-4900-85e6-15281da43538", "assignerShortName": "adobe", "cveId": "CVE-2022-24104", "datePublished": "2022-05-11T17:08:48.324244Z", "dateReserved": "2022-01-27T00:00:00", "dateUpdated": "2024-09-17T03:59:02.036Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-28243
Vulnerability from cvelistv5
Published
2022-05-11 17:38
Modified
2024-09-16 20:37
Severity ?
EPSS score ?
Summary
Adobe Acrobat Reader DC Doc Object Out-Of-Bounds Read Remote Code Execution Vulnerability
References
▼ | URL | Tags |
---|---|---|
https://helpx.adobe.com/security/products/acrobat/apsb22-16.html | x_refsource_MISC |
Impacted products
▼ | Vendor | Product |
---|---|---|
Adobe | Acrobat Reader |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T05:48:37.864Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://helpx.adobe.com/security/products/acrobat/apsb22-16.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Acrobat Reader", "vendor": "Adobe", "versions": [ { "lessThanOrEqual": "22.001.20085", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThanOrEqual": "20.005.3031x", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThanOrEqual": "17.012.30205", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThanOrEqual": "None", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "datePublic": "2022-04-12T00:00:00", "descriptions": [ { "lang": "en", "value": "Acrobat Reader DC version 22.001.2011x (and earlier), 20.005.3033x (and earlier) and 17.012.3022x (and earlier) are affected by an out-of-bounds read vulnerability when parsing a crafted file, which could result in a read past the end of an allocated memory structure. An attacker could leverage this vulnerability to execute code in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-125", "description": "Out-of-bounds Read (CWE-125)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-05-11T17:38:23", "orgId": "078d4453-3bcd-4900-85e6-15281da43538", "shortName": "adobe" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://helpx.adobe.com/security/products/acrobat/apsb22-16.html" } ], "source": { "discovery": "EXTERNAL" }, "title": "Adobe Acrobat Reader DC Doc Object Out-Of-Bounds Read Remote Code Execution Vulnerability", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@adobe.com", "DATE_PUBLIC": "2022-04-12T23:00:00.000Z", "ID": "CVE-2022-28243", "STATE": "PUBLIC", "TITLE": "Adobe Acrobat Reader DC Doc Object Out-Of-Bounds Read Remote Code Execution Vulnerability" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Acrobat Reader", "version": { "version_data": [ { "version_affected": "\u003c=", "version_value": "22.001.20085" }, { "version_affected": "\u003c=", "version_value": "20.005.3031x" }, { "version_affected": "\u003c=", "version_value": "17.012.30205" }, { "version_affected": "\u003c=", "version_value": "None" } ] } } ] }, "vendor_name": "Adobe" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Acrobat Reader DC version 22.001.2011x (and earlier), 20.005.3033x (and earlier) and 17.012.3022x (and earlier) are affected by an out-of-bounds read vulnerability when parsing a crafted file, which could result in a read past the end of an allocated memory structure. An attacker could leverage this vulnerability to execute code in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file." } ] }, "impact": { "cvss": { "attackComplexity": "Low", "attackVector": "Local", "availabilityImpact": "High", "baseScore": 7.8, "baseSeverity": "High", "confidentialityImpact": "High", "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "userInteraction": "Required", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Out-of-bounds Read (CWE-125)" } ] } ] }, "references": { "reference_data": [ { "name": "https://helpx.adobe.com/security/products/acrobat/apsb22-16.html", "refsource": "MISC", "url": "https://helpx.adobe.com/security/products/acrobat/apsb22-16.html" } ] }, "source": { "discovery": "EXTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "078d4453-3bcd-4900-85e6-15281da43538", "assignerShortName": "adobe", "cveId": "CVE-2022-28243", "datePublished": "2022-05-11T17:38:23.258614Z", "dateReserved": "2022-03-30T00:00:00", "dateUpdated": "2024-09-16T20:37:34.206Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-28255
Vulnerability from cvelistv5
Published
2022-05-11 17:48
Modified
2024-09-16 17:03
Severity ?
EPSS score ?
Summary
Adobe Acrobat Reader DC Annotation Out-Of-Bounds Read Information Disclosure Vulnerability
References
▼ | URL | Tags |
---|---|---|
https://helpx.adobe.com/security/products/acrobat/apsb22-16.html | x_refsource_MISC |
Impacted products
▼ | Vendor | Product |
---|---|---|
Adobe | Acrobat Reader |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T05:48:37.887Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://helpx.adobe.com/security/products/acrobat/apsb22-16.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Acrobat Reader", "vendor": "Adobe", "versions": [ { "lessThanOrEqual": "22.001.20085", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThanOrEqual": "20.005.3031x", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThanOrEqual": "17.012.30205", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThanOrEqual": "None", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "datePublic": "2022-04-12T00:00:00", "descriptions": [ { "lang": "en", "value": "Acrobat Reader DC version 22.001.2011x (and earlier), 20.005.3033x (and earlier) and 17.012.3022x (and earlier) are affected by an out-of-bounds read vulnerability when parsing a crafted file, which could result in a read past the end of an allocated memory structure. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-125", "description": "Out-of-bounds Read (CWE-125)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-05-11T17:48:36", "orgId": "078d4453-3bcd-4900-85e6-15281da43538", "shortName": "adobe" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://helpx.adobe.com/security/products/acrobat/apsb22-16.html" } ], "source": { "discovery": "EXTERNAL" }, "title": "Adobe Acrobat Reader DC Annotation Out-Of-Bounds Read Information Disclosure Vulnerability", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@adobe.com", "DATE_PUBLIC": "2022-04-12T23:00:00.000Z", "ID": "CVE-2022-28255", "STATE": "PUBLIC", "TITLE": "Adobe Acrobat Reader DC Annotation Out-Of-Bounds Read Information Disclosure Vulnerability" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Acrobat Reader", "version": { "version_data": [ { "version_affected": "\u003c=", "version_value": "22.001.20085" }, { "version_affected": "\u003c=", "version_value": "20.005.3031x" }, { "version_affected": "\u003c=", "version_value": "17.012.30205" }, { "version_affected": "\u003c=", "version_value": "None" } ] } } ] }, "vendor_name": "Adobe" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Acrobat Reader DC version 22.001.2011x (and earlier), 20.005.3033x (and earlier) and 17.012.3022x (and earlier) are affected by an out-of-bounds read vulnerability when parsing a crafted file, which could result in a read past the end of an allocated memory structure. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file." } ] }, "impact": { "cvss": { "attackComplexity": "Low", "attackVector": "Local", "availabilityImpact": "None", "baseScore": 5.5, "baseSeverity": "Medium", "confidentialityImpact": "High", "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "userInteraction": "Required", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Out-of-bounds Read (CWE-125)" } ] } ] }, "references": { "reference_data": [ { "name": "https://helpx.adobe.com/security/products/acrobat/apsb22-16.html", "refsource": "MISC", "url": "https://helpx.adobe.com/security/products/acrobat/apsb22-16.html" } ] }, "source": { "discovery": "EXTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "078d4453-3bcd-4900-85e6-15281da43538", "assignerShortName": "adobe", "cveId": "CVE-2022-28255", "datePublished": "2022-05-11T17:48:36.261104Z", "dateReserved": "2022-03-30T00:00:00", "dateUpdated": "2024-09-16T17:03:44.288Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-28257
Vulnerability from cvelistv5
Published
2022-05-11 17:50
Modified
2024-09-16 17:44
Severity ?
EPSS score ?
Summary
Adobe Acrobat Reader DC Annotation Out-Of-Bounds Read Information Disclosure Vulnerability
References
▼ | URL | Tags |
---|---|---|
https://helpx.adobe.com/security/products/acrobat/apsb22-16.html | x_refsource_MISC |
Impacted products
▼ | Vendor | Product |
---|---|---|
Adobe | Acrobat Reader |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T05:48:37.654Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://helpx.adobe.com/security/products/acrobat/apsb22-16.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Acrobat Reader", "vendor": "Adobe", "versions": [ { "lessThanOrEqual": "22.001.20085", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThanOrEqual": "20.005.3031x", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThanOrEqual": "17.012.30205", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThanOrEqual": "None", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "datePublic": "2022-04-12T00:00:00", "descriptions": [ { "lang": "en", "value": "Acrobat Reader DC version 22.001.2011x (and earlier), 20.005.3033x (and earlier) and 17.012.3022x (and earlier) are affected by an out-of-bounds read vulnerability when parsing a crafted file, which could result in a read past the end of an allocated memory structure. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-125", "description": "Out-of-bounds Read (CWE-125)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-05-11T17:50:17", "orgId": "078d4453-3bcd-4900-85e6-15281da43538", "shortName": "adobe" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://helpx.adobe.com/security/products/acrobat/apsb22-16.html" } ], "source": { "discovery": "EXTERNAL" }, "title": "Adobe Acrobat Reader DC Annotation Out-Of-Bounds Read Information Disclosure Vulnerability", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@adobe.com", "DATE_PUBLIC": "2022-04-12T23:00:00.000Z", "ID": "CVE-2022-28257", "STATE": "PUBLIC", "TITLE": "Adobe Acrobat Reader DC Annotation Out-Of-Bounds Read Information Disclosure Vulnerability" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Acrobat Reader", "version": { "version_data": [ { "version_affected": "\u003c=", "version_value": "22.001.20085" }, { "version_affected": "\u003c=", "version_value": "20.005.3031x" }, { "version_affected": "\u003c=", "version_value": "17.012.30205" }, { "version_affected": "\u003c=", "version_value": "None" } ] } } ] }, "vendor_name": "Adobe" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Acrobat Reader DC version 22.001.2011x (and earlier), 20.005.3033x (and earlier) and 17.012.3022x (and earlier) are affected by an out-of-bounds read vulnerability when parsing a crafted file, which could result in a read past the end of an allocated memory structure. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file." } ] }, "impact": { "cvss": { "attackComplexity": "Low", "attackVector": "Local", "availabilityImpact": "None", "baseScore": 5.5, "baseSeverity": "Medium", "confidentialityImpact": "High", "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "userInteraction": "Required", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Out-of-bounds Read (CWE-125)" } ] } ] }, "references": { "reference_data": [ { "name": "https://helpx.adobe.com/security/products/acrobat/apsb22-16.html", "refsource": "MISC", "url": "https://helpx.adobe.com/security/products/acrobat/apsb22-16.html" } ] }, "source": { "discovery": "EXTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "078d4453-3bcd-4900-85e6-15281da43538", "assignerShortName": "adobe", "cveId": "CVE-2022-28257", "datePublished": "2022-05-11T17:50:17.893985Z", "dateReserved": "2022-03-30T00:00:00", "dateUpdated": "2024-09-16T17:44:08.683Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-28261
Vulnerability from cvelistv5
Published
2022-05-11 17:53
Modified
2024-09-17 01:51
Severity ?
EPSS score ?
Summary
Adobe Acrobat Reader DC Annotation Out-Of-Bounds Read Information Disclosure Vulnerability
References
▼ | URL | Tags |
---|---|---|
https://helpx.adobe.com/security/products/acrobat/apsb22-16.html | x_refsource_MISC |
Impacted products
▼ | Vendor | Product |
---|---|---|
Adobe | Acrobat Reader |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T05:48:37.904Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://helpx.adobe.com/security/products/acrobat/apsb22-16.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Acrobat Reader", "vendor": "Adobe", "versions": [ { "lessThanOrEqual": "22.001.20085", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThanOrEqual": "20.005.3031x", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThanOrEqual": "17.012.30205", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThanOrEqual": "None", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "datePublic": "2022-04-12T00:00:00", "descriptions": [ { "lang": "en", "value": "Acrobat Reader DC version 22.001.2011x (and earlier), 20.005.3033x (and earlier) and 17.012.3022x (and earlier) are affected by an out-of-bounds read vulnerability when parsing a crafted file, which could result in a read past the end of an allocated memory structure. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-125", "description": "Out-of-bounds Read (CWE-125)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-05-11T17:53:28", "orgId": "078d4453-3bcd-4900-85e6-15281da43538", "shortName": "adobe" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://helpx.adobe.com/security/products/acrobat/apsb22-16.html" } ], "source": { "discovery": "EXTERNAL" }, "title": "Adobe Acrobat Reader DC Annotation Out-Of-Bounds Read Information Disclosure Vulnerability", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@adobe.com", "DATE_PUBLIC": "2022-04-12T23:00:00.000Z", "ID": "CVE-2022-28261", "STATE": "PUBLIC", "TITLE": "Adobe Acrobat Reader DC Annotation Out-Of-Bounds Read Information Disclosure Vulnerability" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Acrobat Reader", "version": { "version_data": [ { "version_affected": "\u003c=", "version_value": "22.001.20085" }, { "version_affected": "\u003c=", "version_value": "20.005.3031x" }, { "version_affected": "\u003c=", "version_value": "17.012.30205" }, { "version_affected": "\u003c=", "version_value": "None" } ] } } ] }, "vendor_name": "Adobe" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Acrobat Reader DC version 22.001.2011x (and earlier), 20.005.3033x (and earlier) and 17.012.3022x (and earlier) are affected by an out-of-bounds read vulnerability when parsing a crafted file, which could result in a read past the end of an allocated memory structure. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file." } ] }, "impact": { "cvss": { "attackComplexity": "Low", "attackVector": "Local", "availabilityImpact": "None", "baseScore": 5.5, "baseSeverity": "Medium", "confidentialityImpact": "High", "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "userInteraction": "Required", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Out-of-bounds Read (CWE-125)" } ] } ] }, "references": { "reference_data": [ { "name": "https://helpx.adobe.com/security/products/acrobat/apsb22-16.html", "refsource": "MISC", "url": "https://helpx.adobe.com/security/products/acrobat/apsb22-16.html" } ] }, "source": { "discovery": "EXTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "078d4453-3bcd-4900-85e6-15281da43538", "assignerShortName": "adobe", "cveId": "CVE-2022-28261", "datePublished": "2022-05-11T17:53:28.084635Z", "dateReserved": "2022-03-30T00:00:00", "dateUpdated": "2024-09-17T01:51:01.647Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-28252
Vulnerability from cvelistv5
Published
2022-05-11 17:45
Modified
2024-09-17 00:31
Severity ?
EPSS score ?
Summary
Adobe Acrobat Reader DC Annotation Out-Of-Bounds Read Information Disclosure Vulnerability
References
▼ | URL | Tags |
---|---|---|
https://helpx.adobe.com/security/products/acrobat/apsb22-16.html | x_refsource_MISC |
Impacted products
▼ | Vendor | Product |
---|---|---|
Adobe | Acrobat Reader |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T05:48:37.890Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://helpx.adobe.com/security/products/acrobat/apsb22-16.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Acrobat Reader", "vendor": "Adobe", "versions": [ { "lessThanOrEqual": "22.001.20085", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThanOrEqual": "20.005.3031x", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThanOrEqual": "17.012.30205", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThanOrEqual": "None", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "datePublic": "2022-04-12T00:00:00", "descriptions": [ { "lang": "en", "value": "Acrobat Reader DC version 22.001.2011x (and earlier), 20.005.3033x (and earlier) and 17.012.3022x (and earlier) are affected by an out-of-bounds read vulnerability when parsing a crafted file, which could result in a read past the end of an allocated memory structure. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 3.3, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-125", "description": "Out-of-bounds Read (CWE-125)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-05-11T17:45:46", "orgId": "078d4453-3bcd-4900-85e6-15281da43538", "shortName": "adobe" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://helpx.adobe.com/security/products/acrobat/apsb22-16.html" } ], "source": { "discovery": "EXTERNAL" }, "title": "Adobe Acrobat Reader DC Annotation Out-Of-Bounds Read Information Disclosure Vulnerability", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@adobe.com", "DATE_PUBLIC": "2022-04-12T23:00:00.000Z", "ID": "CVE-2022-28252", "STATE": "PUBLIC", "TITLE": "Adobe Acrobat Reader DC Annotation Out-Of-Bounds Read Information Disclosure Vulnerability" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Acrobat Reader", "version": { "version_data": [ { "version_affected": "\u003c=", "version_value": "22.001.20085" }, { "version_affected": "\u003c=", "version_value": "20.005.3031x" }, { "version_affected": "\u003c=", "version_value": "17.012.30205" }, { "version_affected": "\u003c=", "version_value": "None" } ] } } ] }, "vendor_name": "Adobe" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Acrobat Reader DC version 22.001.2011x (and earlier), 20.005.3033x (and earlier) and 17.012.3022x (and earlier) are affected by an out-of-bounds read vulnerability when parsing a crafted file, which could result in a read past the end of an allocated memory structure. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file." } ] }, "impact": { "cvss": { "attackComplexity": "Low", "attackVector": "Local", "availabilityImpact": "None", "baseScore": 3.3, "baseSeverity": "Low", "confidentialityImpact": "Low", "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "userInteraction": "Required", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Out-of-bounds Read (CWE-125)" } ] } ] }, "references": { "reference_data": [ { "name": "https://helpx.adobe.com/security/products/acrobat/apsb22-16.html", "refsource": "MISC", "url": "https://helpx.adobe.com/security/products/acrobat/apsb22-16.html" } ] }, "source": { "discovery": "EXTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "078d4453-3bcd-4900-85e6-15281da43538", "assignerShortName": "adobe", "cveId": "CVE-2022-28252", "datePublished": "2022-05-11T17:45:46.818881Z", "dateReserved": "2022-03-30T00:00:00", "dateUpdated": "2024-09-17T00:31:21.515Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-28238
Vulnerability from cvelistv5
Published
2022-05-11 17:33
Modified
2024-09-17 00:31
Severity ?
EPSS score ?
Summary
Adobe Acrobat Reader DC Annotation Use-After-Free Remote Code Execution Vulnerability
References
▼ | URL | Tags |
---|---|---|
https://helpx.adobe.com/security/products/acrobat/apsb22-16.html | x_refsource_MISC |
Impacted products
▼ | Vendor | Product |
---|---|---|
Adobe | Acrobat Reader |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T05:48:37.863Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://helpx.adobe.com/security/products/acrobat/apsb22-16.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Acrobat Reader", "vendor": "Adobe", "versions": [ { "lessThanOrEqual": "22.001.20085", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThanOrEqual": "20.005.3031x", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThanOrEqual": "17.012.30205", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThanOrEqual": "None", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "datePublic": "2022-04-12T00:00:00", "descriptions": [ { "lang": "en", "value": "Acrobat Reader DC versions 22.001.20085 (and earlier), 20.005.3031x (and earlier) and 17.012.30205 (and earlier) are affected by a use-after-free vulnerability in the processing of annotations that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file." } ], "metrics": [ { "cvssV3_0": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-416", "description": "Use After Free (CWE-416)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-05-11T17:33:48", "orgId": "078d4453-3bcd-4900-85e6-15281da43538", "shortName": "adobe" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://helpx.adobe.com/security/products/acrobat/apsb22-16.html" } ], "source": { "discovery": "EXTERNAL" }, "title": "Adobe Acrobat Reader DC Annotation Use-After-Free Remote Code Execution Vulnerability", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@adobe.com", "DATE_PUBLIC": "2022-04-12T23:00:00.000Z", "ID": "CVE-2022-28238", "STATE": "PUBLIC", "TITLE": "Adobe Acrobat Reader DC Annotation Use-After-Free Remote Code Execution Vulnerability" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Acrobat Reader", "version": { "version_data": [ { "version_affected": "\u003c=", "version_value": "22.001.20085" }, { "version_affected": "\u003c=", "version_value": "20.005.3031x" }, { "version_affected": "\u003c=", "version_value": "17.012.30205" }, { "version_affected": "\u003c=", "version_value": "None" } ] } } ] }, "vendor_name": "Adobe" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Acrobat Reader DC versions 22.001.20085 (and earlier), 20.005.3031x (and earlier) and 17.012.30205 (and earlier) are affected by a use-after-free vulnerability in the processing of annotations that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file." } ] }, "impact": { "cvss": { "attackComplexity": "Low", "attackVector": "Local", "availabilityImpact": "High", "baseScore": 7.8, "baseSeverity": "High", "confidentialityImpact": "High", "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "userInteraction": "Required", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Use After Free (CWE-416)" } ] } ] }, "references": { "reference_data": [ { "name": "https://helpx.adobe.com/security/products/acrobat/apsb22-16.html", "refsource": "MISC", "url": "https://helpx.adobe.com/security/products/acrobat/apsb22-16.html" } ] }, "source": { "discovery": "EXTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "078d4453-3bcd-4900-85e6-15281da43538", "assignerShortName": "adobe", "cveId": "CVE-2022-28238", "datePublished": "2022-05-11T17:33:48.396330Z", "dateReserved": "2022-03-30T00:00:00", "dateUpdated": "2024-09-17T00:31:47.108Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-28242
Vulnerability from cvelistv5
Published
2022-05-11 17:37
Modified
2024-09-16 18:13
Severity ?
EPSS score ?
Summary
Adobe Acrobat Reader DC Annotation Use-After-Free Remote Code Execution Vulnerability
References
▼ | URL | Tags |
---|---|---|
https://helpx.adobe.com/security/products/acrobat/apsb22-16.html | x_refsource_MISC |
Impacted products
▼ | Vendor | Product |
---|---|---|
Adobe | Acrobat Reader |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T05:48:37.685Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://helpx.adobe.com/security/products/acrobat/apsb22-16.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Acrobat Reader", "vendor": "Adobe", "versions": [ { "lessThanOrEqual": "22.001.20085", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThanOrEqual": "20.005.3031x", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThanOrEqual": "17.012.30205", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThanOrEqual": "None", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "datePublic": "2022-04-12T00:00:00", "descriptions": [ { "lang": "en", "value": "Acrobat Reader DC version 22.001.2011x (and earlier), 20.005.3033x (and earlier) and 17.012.3022x (and earlier) are affected by a use-after-free vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-416", "description": "Use After Free (CWE-416)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-05-11T17:37:36", "orgId": "078d4453-3bcd-4900-85e6-15281da43538", "shortName": "adobe" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://helpx.adobe.com/security/products/acrobat/apsb22-16.html" } ], "source": { "discovery": "EXTERNAL" }, "title": "Adobe Acrobat Reader DC Annotation Use-After-Free Remote Code Execution Vulnerability", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@adobe.com", "DATE_PUBLIC": "2022-04-12T23:00:00.000Z", "ID": "CVE-2022-28242", "STATE": "PUBLIC", "TITLE": "Adobe Acrobat Reader DC Annotation Use-After-Free Remote Code Execution Vulnerability" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Acrobat Reader", "version": { "version_data": [ { "version_affected": "\u003c=", "version_value": "22.001.20085" }, { "version_affected": "\u003c=", "version_value": "20.005.3031x" }, { "version_affected": "\u003c=", "version_value": "17.012.30205" }, { "version_affected": "\u003c=", "version_value": "None" } ] } } ] }, "vendor_name": "Adobe" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Acrobat Reader DC version 22.001.2011x (and earlier), 20.005.3033x (and earlier) and 17.012.3022x (and earlier) are affected by a use-after-free vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file." } ] }, "impact": { "cvss": { "attackComplexity": "Low", "attackVector": "Local", "availabilityImpact": "High", "baseScore": 7.8, "baseSeverity": "High", "confidentialityImpact": "High", "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "userInteraction": "Required", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Use After Free (CWE-416)" } ] } ] }, "references": { "reference_data": [ { "name": "https://helpx.adobe.com/security/products/acrobat/apsb22-16.html", "refsource": "MISC", "url": "https://helpx.adobe.com/security/products/acrobat/apsb22-16.html" } ] }, "source": { "discovery": "EXTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "078d4453-3bcd-4900-85e6-15281da43538", "assignerShortName": "adobe", "cveId": "CVE-2022-28242", "datePublished": "2022-05-11T17:37:36.811211Z", "dateReserved": "2022-03-30T00:00:00", "dateUpdated": "2024-09-16T18:13:47.069Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-28254
Vulnerability from cvelistv5
Published
2022-05-11 17:47
Modified
2024-09-16 19:10
Severity ?
EPSS score ?
Summary
Adobe Acrobat Reader DC Annotation Out-Of-Bounds Read Information Disclosure Vulnerability
References
▼ | URL | Tags |
---|---|---|
https://helpx.adobe.com/security/products/acrobat/apsb22-16.html | x_refsource_MISC |
Impacted products
▼ | Vendor | Product |
---|---|---|
Adobe | Acrobat Reader |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T05:48:37.901Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://helpx.adobe.com/security/products/acrobat/apsb22-16.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Acrobat Reader", "vendor": "Adobe", "versions": [ { "lessThanOrEqual": "22.001.20085", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThanOrEqual": "20.005.3031x", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThanOrEqual": "17.012.30205", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThanOrEqual": "None", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "datePublic": "2022-04-12T00:00:00", "descriptions": [ { "lang": "en", "value": "Acrobat Reader DC version 22.001.2011x (and earlier), 20.005.3033x (and earlier) and 17.012.3022x (and earlier) are affected by an out-of-bounds read vulnerability when parsing a crafted file, which could result in a read past the end of an allocated memory structure. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-125", "description": "Out-of-bounds Read (CWE-125)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-05-11T17:47:20", "orgId": "078d4453-3bcd-4900-85e6-15281da43538", "shortName": "adobe" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://helpx.adobe.com/security/products/acrobat/apsb22-16.html" } ], "source": { "discovery": "EXTERNAL" }, "title": "Adobe Acrobat Reader DC Annotation Out-Of-Bounds Read Information Disclosure Vulnerability", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@adobe.com", "DATE_PUBLIC": "2022-04-12T23:00:00.000Z", "ID": "CVE-2022-28254", "STATE": "PUBLIC", "TITLE": "Adobe Acrobat Reader DC Annotation Out-Of-Bounds Read Information Disclosure Vulnerability" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Acrobat Reader", "version": { "version_data": [ { "version_affected": "\u003c=", "version_value": "22.001.20085" }, { "version_affected": "\u003c=", "version_value": "20.005.3031x" }, { "version_affected": "\u003c=", "version_value": "17.012.30205" }, { "version_affected": "\u003c=", "version_value": "None" } ] } } ] }, "vendor_name": "Adobe" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Acrobat Reader DC version 22.001.2011x (and earlier), 20.005.3033x (and earlier) and 17.012.3022x (and earlier) are affected by an out-of-bounds read vulnerability when parsing a crafted file, which could result in a read past the end of an allocated memory structure. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file." } ] }, "impact": { "cvss": { "attackComplexity": "Low", "attackVector": "Local", "availabilityImpact": "None", "baseScore": 5.5, "baseSeverity": "Medium", "confidentialityImpact": "High", "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "userInteraction": "Required", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Out-of-bounds Read (CWE-125)" } ] } ] }, "references": { "reference_data": [ { "name": "https://helpx.adobe.com/security/products/acrobat/apsb22-16.html", "refsource": "MISC", "url": "https://helpx.adobe.com/security/products/acrobat/apsb22-16.html" } ] }, "source": { "discovery": "EXTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "078d4453-3bcd-4900-85e6-15281da43538", "assignerShortName": "adobe", "cveId": "CVE-2022-28254", "datePublished": "2022-05-11T17:47:20.020925Z", "dateReserved": "2022-03-30T00:00:00", "dateUpdated": "2024-09-16T19:10:01.242Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-27799
Vulnerability from cvelistv5
Published
2022-05-11 17:21
Modified
2024-09-16 19:21
Severity ?
EPSS score ?
Summary
Adobe Acrobat Reader DC AcroForm Use-After-Free Remote Code Execution Vulnerability
References
▼ | URL | Tags |
---|---|---|
https://helpx.adobe.com/security/products/acrobat/apsb22-16.html | x_refsource_MISC |
Impacted products
▼ | Vendor | Product |
---|---|---|
Adobe | Acrobat Reader |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T05:32:59.941Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://helpx.adobe.com/security/products/acrobat/apsb22-16.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Acrobat Reader", "vendor": "Adobe", "versions": [ { "lessThanOrEqual": "22.001.20085", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThanOrEqual": "20.005.3031x", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThanOrEqual": "17.012.30205", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThanOrEqual": "None", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "datePublic": "2022-04-12T00:00:00", "descriptions": [ { "lang": "en", "value": "Acrobat Reader DC versions 22.001.20085 (and earlier), 20.005.3031x (and earlier) and 17.012.30205 (and earlier) are affected by a use-after-free vulnerability in the processing of the acroform event that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file." } ], "metrics": [ { "cvssV3_0": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-416", "description": "Use After Free (CWE-416)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-05-11T17:21:43", "orgId": "078d4453-3bcd-4900-85e6-15281da43538", "shortName": "adobe" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://helpx.adobe.com/security/products/acrobat/apsb22-16.html" } ], "source": { "discovery": "EXTERNAL" }, "title": "Adobe Acrobat Reader DC AcroForm Use-After-Free Remote Code Execution Vulnerability", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@adobe.com", "DATE_PUBLIC": "2022-04-12T23:00:00.000Z", "ID": "CVE-2022-27799", "STATE": "PUBLIC", "TITLE": "Adobe Acrobat Reader DC AcroForm Use-After-Free Remote Code Execution Vulnerability" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Acrobat Reader", "version": { "version_data": [ { "version_affected": "\u003c=", "version_value": "22.001.20085" }, { "version_affected": "\u003c=", "version_value": "20.005.3031x" }, { "version_affected": "\u003c=", "version_value": "17.012.30205" }, { "version_affected": "\u003c=", "version_value": "None" } ] } } ] }, "vendor_name": "Adobe" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Acrobat Reader DC versions 22.001.20085 (and earlier), 20.005.3031x (and earlier) and 17.012.30205 (and earlier) are affected by a use-after-free vulnerability in the processing of the acroform event that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file." } ] }, "impact": { "cvss": { "attackComplexity": "Low", "attackVector": "Local", "availabilityImpact": "High", "baseScore": 7.8, "baseSeverity": "High", "confidentialityImpact": "High", "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "userInteraction": "Required", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Use After Free (CWE-416)" } ] } ] }, "references": { "reference_data": [ { "name": "https://helpx.adobe.com/security/products/acrobat/apsb22-16.html", "refsource": "MISC", "url": "https://helpx.adobe.com/security/products/acrobat/apsb22-16.html" } ] }, "source": { "discovery": "EXTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "078d4453-3bcd-4900-85e6-15281da43538", "assignerShortName": "adobe", "cveId": "CVE-2022-27799", "datePublished": "2022-05-11T17:21:43.991982Z", "dateReserved": "2022-03-23T00:00:00", "dateUpdated": "2024-09-16T19:21:12.693Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-28239
Vulnerability from cvelistv5
Published
2022-05-11 17:34
Modified
2024-09-17 02:02
Severity ?
EPSS score ?
Summary
Adobe Acrobat Reader DC Annotation Out-Of-Bounds Read Remote Code Execution Vulnerability
References
▼ | URL | Tags |
---|---|---|
https://helpx.adobe.com/security/products/acrobat/apsb22-16.html | x_refsource_MISC |
Impacted products
▼ | Vendor | Product |
---|---|---|
Adobe | Acrobat Reader |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T05:48:37.894Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://helpx.adobe.com/security/products/acrobat/apsb22-16.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Acrobat Reader", "vendor": "Adobe", "versions": [ { "lessThanOrEqual": "22.001.20085", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThanOrEqual": "20.005.3031x", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThanOrEqual": "17.012.30205", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThanOrEqual": "None", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "datePublic": "2022-04-12T00:00:00", "descriptions": [ { "lang": "en", "value": "Acrobat Reader DC version 22.001.2011x (and earlier), 20.005.3033x (and earlier) and 17.012.3022x (and earlier) are affected by an out-of-bounds read vulnerability when parsing a crafted file, which could result in a read past the end of an allocated memory structure. An attacker could leverage this vulnerability to execute code in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-125", "description": "Out-of-bounds Read (CWE-125)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-05-11T17:34:27", "orgId": "078d4453-3bcd-4900-85e6-15281da43538", "shortName": "adobe" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://helpx.adobe.com/security/products/acrobat/apsb22-16.html" } ], "source": { "discovery": "EXTERNAL" }, "title": "Adobe Acrobat Reader DC Annotation Out-Of-Bounds Read Remote Code Execution Vulnerability", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@adobe.com", "DATE_PUBLIC": "2022-04-12T23:00:00.000Z", "ID": "CVE-2022-28239", "STATE": "PUBLIC", "TITLE": "Adobe Acrobat Reader DC Annotation Out-Of-Bounds Read Remote Code Execution Vulnerability" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Acrobat Reader", "version": { "version_data": [ { "version_affected": "\u003c=", "version_value": "22.001.20085" }, { "version_affected": "\u003c=", "version_value": "20.005.3031x" }, { "version_affected": "\u003c=", "version_value": "17.012.30205" }, { "version_affected": "\u003c=", "version_value": "None" } ] } } ] }, "vendor_name": "Adobe" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Acrobat Reader DC version 22.001.2011x (and earlier), 20.005.3033x (and earlier) and 17.012.3022x (and earlier) are affected by an out-of-bounds read vulnerability when parsing a crafted file, which could result in a read past the end of an allocated memory structure. An attacker could leverage this vulnerability to execute code in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file." } ] }, "impact": { "cvss": { "attackComplexity": "Low", "attackVector": "Local", "availabilityImpact": "High", "baseScore": 7.8, "baseSeverity": "High", "confidentialityImpact": "High", "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "userInteraction": "Required", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Out-of-bounds Read (CWE-125)" } ] } ] }, "references": { "reference_data": [ { "name": "https://helpx.adobe.com/security/products/acrobat/apsb22-16.html", "refsource": "MISC", "url": "https://helpx.adobe.com/security/products/acrobat/apsb22-16.html" } ] }, "source": { "discovery": "EXTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "078d4453-3bcd-4900-85e6-15281da43538", "assignerShortName": "adobe", "cveId": "CVE-2022-28239", "datePublished": "2022-05-11T17:34:27.817648Z", "dateReserved": "2022-03-30T00:00:00", "dateUpdated": "2024-09-17T02:02:44.017Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-28259
Vulnerability from cvelistv5
Published
2022-05-11 17:51
Modified
2024-09-16 23:51
Severity ?
EPSS score ?
Summary
Adobe Acrobat Reader DC Annotation Out-Of-Bounds Read Information Disclosure Vulnerability
References
▼ | URL | Tags |
---|---|---|
https://helpx.adobe.com/security/products/acrobat/apsb22-16.html | x_refsource_MISC |
Impacted products
▼ | Vendor | Product |
---|---|---|
Adobe | Acrobat Reader |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T05:48:37.893Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://helpx.adobe.com/security/products/acrobat/apsb22-16.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Acrobat Reader", "vendor": "Adobe", "versions": [ { "lessThanOrEqual": "22.001.20085", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThanOrEqual": "20.005.3031x", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThanOrEqual": "17.012.30205", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThanOrEqual": "None", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "datePublic": "2022-04-12T00:00:00", "descriptions": [ { "lang": "en", "value": "Acrobat Reader DC version 22.001.2011x (and earlier), 20.005.3033x (and earlier) and 17.012.3022x (and earlier) are affected by an out-of-bounds read vulnerability when parsing a crafted file, which could result in a read past the end of an allocated memory structure. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-125", "description": "Out-of-bounds Read (CWE-125)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-05-11T17:51:55", "orgId": "078d4453-3bcd-4900-85e6-15281da43538", "shortName": "adobe" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://helpx.adobe.com/security/products/acrobat/apsb22-16.html" } ], "source": { "discovery": "EXTERNAL" }, "title": "Adobe Acrobat Reader DC Annotation Out-Of-Bounds Read Information Disclosure Vulnerability", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@adobe.com", "DATE_PUBLIC": "2022-04-12T23:00:00.000Z", "ID": "CVE-2022-28259", "STATE": "PUBLIC", "TITLE": "Adobe Acrobat Reader DC Annotation Out-Of-Bounds Read Information Disclosure Vulnerability" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Acrobat Reader", "version": { "version_data": [ { "version_affected": "\u003c=", "version_value": "22.001.20085" }, { "version_affected": "\u003c=", "version_value": "20.005.3031x" }, { "version_affected": "\u003c=", "version_value": "17.012.30205" }, { "version_affected": "\u003c=", "version_value": "None" } ] } } ] }, "vendor_name": "Adobe" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Acrobat Reader DC version 22.001.2011x (and earlier), 20.005.3033x (and earlier) and 17.012.3022x (and earlier) are affected by an out-of-bounds read vulnerability when parsing a crafted file, which could result in a read past the end of an allocated memory structure. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file." } ] }, "impact": { "cvss": { "attackComplexity": "Low", "attackVector": "Local", "availabilityImpact": "None", "baseScore": 5.5, "baseSeverity": "Medium", "confidentialityImpact": "High", "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "userInteraction": "Required", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Out-of-bounds Read (CWE-125)" } ] } ] }, "references": { "reference_data": [ { "name": "https://helpx.adobe.com/security/products/acrobat/apsb22-16.html", "refsource": "MISC", "url": "https://helpx.adobe.com/security/products/acrobat/apsb22-16.html" } ] }, "source": { "discovery": "EXTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "078d4453-3bcd-4900-85e6-15281da43538", "assignerShortName": "adobe", "cveId": "CVE-2022-28259", "datePublished": "2022-05-11T17:51:55.393116Z", "dateReserved": "2022-03-30T00:00:00", "dateUpdated": "2024-09-16T23:51:51.241Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-27787
Vulnerability from cvelistv5
Published
2022-05-11 17:12
Modified
2024-09-16 17:58
Severity ?
EPSS score ?
Summary
Adobe Acrobat Reader DC Font Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability
References
▼ | URL | Tags |
---|---|---|
https://helpx.adobe.com/security/products/acrobat/apsb22-16.html | x_refsource_MISC |
Impacted products
▼ | Vendor | Product |
---|---|---|
Adobe | Acrobat Reader |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T05:32:59.938Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://helpx.adobe.com/security/products/acrobat/apsb22-16.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Acrobat Reader", "vendor": "Adobe", "versions": [ { "lessThanOrEqual": "22.001.20085", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThanOrEqual": "20.005.3031x", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThanOrEqual": "17.012.30205", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThanOrEqual": "None", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "datePublic": "2022-04-12T00:00:00", "descriptions": [ { "lang": "en", "value": "Acrobat Reader DC versions 22.001.20085 (and earlier), 20.005.3031x (and earlier) and 17.012.30205 (and earlier) are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file." } ], "metrics": [ { "cvssV3_0": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-787", "description": "Out-of-bounds Write (CWE-787)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-05-11T17:12:04", "orgId": "078d4453-3bcd-4900-85e6-15281da43538", "shortName": "adobe" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://helpx.adobe.com/security/products/acrobat/apsb22-16.html" } ], "source": { "discovery": "EXTERNAL" }, "title": "Adobe Acrobat Reader DC Font Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@adobe.com", "DATE_PUBLIC": "2022-04-12T23:00:00.000Z", "ID": "CVE-2022-27787", "STATE": "PUBLIC", "TITLE": "Adobe Acrobat Reader DC Font Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Acrobat Reader", "version": { "version_data": [ { "version_affected": "\u003c=", "version_value": "22.001.20085" }, { "version_affected": "\u003c=", "version_value": "20.005.3031x" }, { "version_affected": "\u003c=", "version_value": "17.012.30205" }, { "version_affected": "\u003c=", "version_value": "None" } ] } } ] }, "vendor_name": "Adobe" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Acrobat Reader DC versions 22.001.20085 (and earlier), 20.005.3031x (and earlier) and 17.012.30205 (and earlier) are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file." } ] }, "impact": { "cvss": { "attackComplexity": "Low", "attackVector": "Local", "availabilityImpact": "High", "baseScore": 7.8, "baseSeverity": "High", "confidentialityImpact": "High", "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "userInteraction": "Required", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Out-of-bounds Write (CWE-787)" } ] } ] }, "references": { "reference_data": [ { "name": "https://helpx.adobe.com/security/products/acrobat/apsb22-16.html", "refsource": "MISC", "url": "https://helpx.adobe.com/security/products/acrobat/apsb22-16.html" } ] }, "source": { "discovery": "EXTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "078d4453-3bcd-4900-85e6-15281da43538", "assignerShortName": "adobe", "cveId": "CVE-2022-27787", "datePublished": "2022-05-11T17:12:04.905853Z", "dateReserved": "2022-03-23T00:00:00", "dateUpdated": "2024-09-16T17:58:41.287Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-28231
Vulnerability from cvelistv5
Published
2022-05-11 17:27
Modified
2024-09-17 01:15
Severity ?
EPSS score ?
Summary
Adobe Acrobat Reader DC Doc Object Out-Of-Bounds Read Information Disclosure Vulnerability
References
▼ | URL | Tags |
---|---|---|
https://helpx.adobe.com/security/products/acrobat/apsb22-16.html | x_refsource_MISC |
Impacted products
▼ | Vendor | Product |
---|---|---|
Adobe | Acrobat Reader |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T05:48:37.884Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://helpx.adobe.com/security/products/acrobat/apsb22-16.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Acrobat Reader", "vendor": "Adobe", "versions": [ { "lessThanOrEqual": "22.001.20085", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThanOrEqual": "20.005.3031x", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThanOrEqual": "17.012.30205", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThanOrEqual": "None", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "datePublic": "2022-04-12T00:00:00", "descriptions": [ { "lang": "en", "value": "Acrobat Reader DC versions 22.001.20085 (and earlier), 20.005.3031x (and earlier) and 17.012.30205 (and earlier) is affected by an out-of-bounds read vulnerability when processing a doc object, which could result in a read past the end of an allocated memory structure. An attacker could leverage this vulnerability to execute code in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file." } ], "metrics": [ { "cvssV3_0": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-125", "description": "Out-of-bounds Read (CWE-125)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-05-11T17:27:27", "orgId": "078d4453-3bcd-4900-85e6-15281da43538", "shortName": "adobe" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://helpx.adobe.com/security/products/acrobat/apsb22-16.html" } ], "source": { "discovery": "EXTERNAL" }, "title": "Adobe Acrobat Reader DC Doc Object Out-Of-Bounds Read Information Disclosure Vulnerability", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@adobe.com", "DATE_PUBLIC": "2022-04-12T23:00:00.000Z", "ID": "CVE-2022-28231", "STATE": "PUBLIC", "TITLE": "Adobe Acrobat Reader DC Doc Object Out-Of-Bounds Read Information Disclosure Vulnerability" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Acrobat Reader", "version": { "version_data": [ { "version_affected": "\u003c=", "version_value": "22.001.20085" }, { "version_affected": "\u003c=", "version_value": "20.005.3031x" }, { "version_affected": "\u003c=", "version_value": "17.012.30205" }, { "version_affected": "\u003c=", "version_value": "None" } ] } } ] }, "vendor_name": "Adobe" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Acrobat Reader DC versions 22.001.20085 (and earlier), 20.005.3031x (and earlier) and 17.012.30205 (and earlier) is affected by an out-of-bounds read vulnerability when processing a doc object, which could result in a read past the end of an allocated memory structure. An attacker could leverage this vulnerability to execute code in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file." } ] }, "impact": { "cvss": { "attackComplexity": "Low", "attackVector": "Local", "availabilityImpact": "High", "baseScore": 7.8, "baseSeverity": "High", "confidentialityImpact": "High", "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "userInteraction": "Required", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Out-of-bounds Read (CWE-125)" } ] } ] }, "references": { "reference_data": [ { "name": "https://helpx.adobe.com/security/products/acrobat/apsb22-16.html", "refsource": "MISC", "url": "https://helpx.adobe.com/security/products/acrobat/apsb22-16.html" } ] }, "source": { "discovery": "EXTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "078d4453-3bcd-4900-85e6-15281da43538", "assignerShortName": "adobe", "cveId": "CVE-2022-28231", "datePublished": "2022-05-11T17:27:27.209419Z", "dateReserved": "2022-03-30T00:00:00", "dateUpdated": "2024-09-17T01:15:29.106Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-28268
Vulnerability from cvelistv5
Published
2022-05-11 17:58
Modified
2024-09-16 23:06
Severity ?
EPSS score ?
Summary
Adobe Acrobat Reader DC Annotation Out-Of-Bounds Read Information Disclosure Vulnerability
References
▼ | URL | Tags |
---|---|---|
https://helpx.adobe.com/security/products/acrobat/apsb22-16.html | x_refsource_MISC |
Impacted products
▼ | Vendor | Product |
---|---|---|
Adobe | Acrobat Reader |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T05:48:37.899Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://helpx.adobe.com/security/products/acrobat/apsb22-16.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Acrobat Reader", "vendor": "Adobe", "versions": [ { "lessThanOrEqual": "22.001.20085", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThanOrEqual": "20.005.3031x", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThanOrEqual": "17.012.30205", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThanOrEqual": "None", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "datePublic": "2022-04-12T00:00:00", "descriptions": [ { "lang": "en", "value": "Acrobat Reader DC versions 22.001.20085 (and earlier), 20.005.3031x (and earlier) and 17.012.30205 (and earlier) are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file." } ], "metrics": [ { "cvssV3_0": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 3.3, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-125", "description": "Out-of-bounds Read (CWE-125)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-05-11T17:58:37", "orgId": "078d4453-3bcd-4900-85e6-15281da43538", "shortName": "adobe" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://helpx.adobe.com/security/products/acrobat/apsb22-16.html" } ], "source": { "discovery": "EXTERNAL" }, "title": "Adobe Acrobat Reader DC Annotation Out-Of-Bounds Read Information Disclosure Vulnerability", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@adobe.com", "DATE_PUBLIC": "2022-04-12T23:00:00.000Z", "ID": "CVE-2022-28268", "STATE": "PUBLIC", "TITLE": "Adobe Acrobat Reader DC Annotation Out-Of-Bounds Read Information Disclosure Vulnerability" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Acrobat Reader", "version": { "version_data": [ { "version_affected": "\u003c=", "version_value": "22.001.20085" }, { "version_affected": "\u003c=", "version_value": "20.005.3031x" }, { "version_affected": "\u003c=", "version_value": "17.012.30205" }, { "version_affected": "\u003c=", "version_value": "None" } ] } } ] }, "vendor_name": "Adobe" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Acrobat Reader DC versions 22.001.20085 (and earlier), 20.005.3031x (and earlier) and 17.012.30205 (and earlier) are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file." } ] }, "impact": { "cvss": { "attackComplexity": "Low", "attackVector": "Local", "availabilityImpact": "None", "baseScore": 3.3, "baseSeverity": "Low", "confidentialityImpact": "Low", "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "userInteraction": "Required", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Out-of-bounds Read (CWE-125)" } ] } ] }, "references": { "reference_data": [ { "name": "https://helpx.adobe.com/security/products/acrobat/apsb22-16.html", "refsource": "MISC", "url": "https://helpx.adobe.com/security/products/acrobat/apsb22-16.html" } ] }, "source": { "discovery": "EXTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "078d4453-3bcd-4900-85e6-15281da43538", "assignerShortName": "adobe", "cveId": "CVE-2022-28268", "datePublished": "2022-05-11T17:58:37.505865Z", "dateReserved": "2022-03-30T00:00:00", "dateUpdated": "2024-09-16T23:06:44.946Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-28241
Vulnerability from cvelistv5
Published
2022-05-11 17:36
Modified
2024-09-17 00:21
Severity ?
EPSS score ?
Summary
Adobe Acrobat Reader DC Doc Object Out-Of-Bounds Read Remote Code Execution Vulnerability
References
▼ | URL | Tags |
---|---|---|
https://helpx.adobe.com/security/products/acrobat/apsb22-16.html | x_refsource_MISC |
Impacted products
▼ | Vendor | Product |
---|---|---|
Adobe | Acrobat Reader |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T05:48:37.650Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://helpx.adobe.com/security/products/acrobat/apsb22-16.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Acrobat Reader", "vendor": "Adobe", "versions": [ { "lessThanOrEqual": "22.001.20085", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThanOrEqual": "20.005.3031x", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThanOrEqual": "17.012.30205", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThanOrEqual": "None", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "datePublic": "2022-04-12T00:00:00", "descriptions": [ { "lang": "en", "value": "Acrobat Reader DC version 22.001.2011x (and earlier), 20.005.3033x (and earlier) and 17.012.3022x (and earlier) are affected by an out-of-bounds read vulnerability when parsing a crafted file, which could result in a read past the end of an allocated memory structure. An attacker could leverage this vulnerability to execute code in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-125", "description": "Out-of-bounds Read (CWE-125)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-05-11T17:36:35", "orgId": "078d4453-3bcd-4900-85e6-15281da43538", "shortName": "adobe" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://helpx.adobe.com/security/products/acrobat/apsb22-16.html" } ], "source": { "discovery": "EXTERNAL" }, "title": "Adobe Acrobat Reader DC Doc Object Out-Of-Bounds Read Remote Code Execution Vulnerability", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@adobe.com", "DATE_PUBLIC": "2022-04-12T23:00:00.000Z", "ID": "CVE-2022-28241", "STATE": "PUBLIC", "TITLE": "Adobe Acrobat Reader DC Doc Object Out-Of-Bounds Read Remote Code Execution Vulnerability" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Acrobat Reader", "version": { "version_data": [ { "version_affected": "\u003c=", "version_value": "22.001.20085" }, { "version_affected": "\u003c=", "version_value": "20.005.3031x" }, { "version_affected": "\u003c=", "version_value": "17.012.30205" }, { "version_affected": "\u003c=", "version_value": "None" } ] } } ] }, "vendor_name": "Adobe" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Acrobat Reader DC version 22.001.2011x (and earlier), 20.005.3033x (and earlier) and 17.012.3022x (and earlier) are affected by an out-of-bounds read vulnerability when parsing a crafted file, which could result in a read past the end of an allocated memory structure. An attacker could leverage this vulnerability to execute code in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file." } ] }, "impact": { "cvss": { "attackComplexity": "Low", "attackVector": "Local", "availabilityImpact": "High", "baseScore": 7.8, "baseSeverity": "High", "confidentialityImpact": "High", "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "userInteraction": "Required", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Out-of-bounds Read (CWE-125)" } ] } ] }, "references": { "reference_data": [ { "name": "https://helpx.adobe.com/security/products/acrobat/apsb22-16.html", "refsource": "MISC", "url": "https://helpx.adobe.com/security/products/acrobat/apsb22-16.html" } ] }, "source": { "discovery": "EXTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "078d4453-3bcd-4900-85e6-15281da43538", "assignerShortName": "adobe", "cveId": "CVE-2022-28241", "datePublished": "2022-05-11T17:36:36.007258Z", "dateReserved": "2022-03-30T00:00:00", "dateUpdated": "2024-09-17T00:21:51.769Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-28247
Vulnerability from cvelistv5
Published
2022-05-11 17:42
Modified
2024-09-16 18:17
Severity ?
EPSS score ?
Summary
Adobe Acrobat Uninstaller Hard Link Leads To Remote Code Execution
References
▼ | URL | Tags |
---|---|---|
https://helpx.adobe.com/security/products/acrobat/apsb22-16.html | x_refsource_MISC |
Impacted products
▼ | Vendor | Product |
---|---|---|
Adobe | Acrobat Reader |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T05:48:37.637Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://helpx.adobe.com/security/products/acrobat/apsb22-16.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Acrobat Reader", "vendor": "Adobe", "versions": [ { "lessThanOrEqual": "22.001.20085", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThanOrEqual": "20.005.3031x", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThanOrEqual": "17.012.30205", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThanOrEqual": "None", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "datePublic": "2022-04-12T00:00:00", "descriptions": [ { "lang": "en", "value": "Acrobat Reader DC version 22.001.2011x (and earlier), 20.005.3033x (and earlier) and 17.012.3022x (and earlier) are affected by an uncontrolled search path vulnerability that could lead to local privilege escalation. Exploitation of this issue requires user interaction in that a victim must run the uninstaller with Admin privileges." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-427", "description": "Uncontrolled Search Path Element (CWE-427)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-05-11T17:42:04", "orgId": "078d4453-3bcd-4900-85e6-15281da43538", "shortName": "adobe" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://helpx.adobe.com/security/products/acrobat/apsb22-16.html" } ], "source": { "discovery": "EXTERNAL" }, "title": "Adobe Acrobat Uninstaller Hard Link Leads To Remote Code Execution", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@adobe.com", "DATE_PUBLIC": "2022-04-12T23:00:00.000Z", "ID": "CVE-2022-28247", "STATE": "PUBLIC", "TITLE": "Adobe Acrobat Uninstaller Hard Link Leads To Remote Code Execution" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Acrobat Reader", "version": { "version_data": [ { "version_affected": "\u003c=", "version_value": "22.001.20085" }, { "version_affected": "\u003c=", "version_value": "20.005.3031x" }, { "version_affected": "\u003c=", "version_value": "17.012.30205" }, { "version_affected": "\u003c=", "version_value": "None" } ] } } ] }, "vendor_name": "Adobe" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Acrobat Reader DC version 22.001.2011x (and earlier), 20.005.3033x (and earlier) and 17.012.3022x (and earlier) are affected by an uncontrolled search path vulnerability that could lead to local privilege escalation. Exploitation of this issue requires user interaction in that a victim must run the uninstaller with Admin privileges." } ] }, "impact": { "cvss": { "attackComplexity": "High", "attackVector": "Local", "availabilityImpact": "High", "baseScore": 6.7, "baseSeverity": "Medium", "confidentialityImpact": "High", "integrityImpact": "High", "privilegesRequired": "Low", "scope": "Unchanged", "userInteraction": "Required", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Uncontrolled Search Path Element (CWE-427)" } ] } ] }, "references": { "reference_data": [ { "name": "https://helpx.adobe.com/security/products/acrobat/apsb22-16.html", "refsource": "MISC", "url": "https://helpx.adobe.com/security/products/acrobat/apsb22-16.html" } ] }, "source": { "discovery": "EXTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "078d4453-3bcd-4900-85e6-15281da43538", "assignerShortName": "adobe", "cveId": "CVE-2022-28247", "datePublished": "2022-05-11T17:42:04.643883Z", "dateReserved": "2022-03-30T00:00:00", "dateUpdated": "2024-09-16T18:17:53.217Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-28253
Vulnerability from cvelistv5
Published
2022-05-11 17:46
Modified
2024-09-17 03:44
Severity ?
EPSS score ?
Summary
Adobe Acrobat Reader DC Annotation Out-Of-Bounds Read Information Disclosure Vulnerability
References
▼ | URL | Tags |
---|---|---|
https://helpx.adobe.com/security/products/acrobat/apsb22-16.html | x_refsource_MISC |
Impacted products
▼ | Vendor | Product |
---|---|---|
Adobe | Acrobat Reader |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T05:48:37.895Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://helpx.adobe.com/security/products/acrobat/apsb22-16.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Acrobat Reader", "vendor": "Adobe", "versions": [ { "lessThanOrEqual": "22.001.20085", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThanOrEqual": "20.005.3031x", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThanOrEqual": "17.012.30205", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThanOrEqual": "None", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "datePublic": "2022-04-12T00:00:00", "descriptions": [ { "lang": "en", "value": "Acrobat Reader DC version 22.001.2011x (and earlier), 20.005.3033x (and earlier) and 17.012.3022x (and earlier) are affected by an out-of-bounds read vulnerability when parsing a crafted file, which could result in a read past the end of an allocated memory structure. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-125", "description": "Out-of-bounds Read (CWE-125)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-05-11T17:46:32", "orgId": "078d4453-3bcd-4900-85e6-15281da43538", "shortName": "adobe" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://helpx.adobe.com/security/products/acrobat/apsb22-16.html" } ], "source": { "discovery": "EXTERNAL" }, "title": "Adobe Acrobat Reader DC Annotation Out-Of-Bounds Read Information Disclosure Vulnerability", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@adobe.com", "DATE_PUBLIC": "2022-04-12T23:00:00.000Z", "ID": "CVE-2022-28253", "STATE": "PUBLIC", "TITLE": "Adobe Acrobat Reader DC Annotation Out-Of-Bounds Read Information Disclosure Vulnerability" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Acrobat Reader", "version": { "version_data": [ { "version_affected": "\u003c=", "version_value": "22.001.20085" }, { "version_affected": "\u003c=", "version_value": "20.005.3031x" }, { "version_affected": "\u003c=", "version_value": "17.012.30205" }, { "version_affected": "\u003c=", "version_value": "None" } ] } } ] }, "vendor_name": "Adobe" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Acrobat Reader DC version 22.001.2011x (and earlier), 20.005.3033x (and earlier) and 17.012.3022x (and earlier) are affected by an out-of-bounds read vulnerability when parsing a crafted file, which could result in a read past the end of an allocated memory structure. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file." } ] }, "impact": { "cvss": { "attackComplexity": "Low", "attackVector": "Local", "availabilityImpact": "None", "baseScore": 5.5, "baseSeverity": "Medium", "confidentialityImpact": "High", "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "userInteraction": "Required", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Out-of-bounds Read (CWE-125)" } ] } ] }, "references": { "reference_data": [ { "name": "https://helpx.adobe.com/security/products/acrobat/apsb22-16.html", "refsource": "MISC", "url": "https://helpx.adobe.com/security/products/acrobat/apsb22-16.html" } ] }, "source": { "discovery": "EXTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "078d4453-3bcd-4900-85e6-15281da43538", "assignerShortName": "adobe", "cveId": "CVE-2022-28253", "datePublished": "2022-05-11T17:46:32.496975Z", "dateReserved": "2022-03-30T00:00:00", "dateUpdated": "2024-09-17T03:44:25.091Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-28837
Vulnerability from cvelistv5
Published
2022-05-11 17:59
Modified
2024-09-16 18:08
Severity ?
EPSS score ?
Summary
Adobe Acrobat Pro DC Doc buttonSetIcon Use-After-Free Information Disclosure Vulnerability
References
▼ | URL | Tags |
---|---|---|
https://helpx.adobe.com/security/products/acrobat/apsb22-16.html | x_refsource_MISC |
Impacted products
▼ | Vendor | Product |
---|---|---|
Adobe | Acrobat Reader |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T06:03:53.093Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://helpx.adobe.com/security/products/acrobat/apsb22-16.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Acrobat Reader", "vendor": "Adobe", "versions": [ { "lessThanOrEqual": "22.001.20085", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThanOrEqual": "20.005.3031x", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThanOrEqual": "17.012.30205", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThanOrEqual": "None", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "value": "Acrobat Pro DC version 22.001.2011x (and earlier), 20.005.3033x (and earlier) and 17.012.3022x (and earlier) are affected by a use-after-free vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-416", "description": "Use After Free (CWE-416)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-05-11T17:59:57", "orgId": "078d4453-3bcd-4900-85e6-15281da43538", "shortName": "adobe" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://helpx.adobe.com/security/products/acrobat/apsb22-16.html" } ], "source": { "discovery": "EXTERNAL" }, "title": "Adobe Acrobat Pro DC Doc buttonSetIcon Use-After-Free Information Disclosure Vulnerability", "x_ConverterErrors": { "DATE_PUBLIC": { "error": "v4 DATE_PUBLIC is invalid", "message": "(\u0027Unknown string format:\u0027, \u0027NoneT23:00:00.000Z\u0027)" } }, "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@adobe.com", "DATE_PUBLIC": "NoneT23:00:00.000Z", "ID": "CVE-2022-28837", "STATE": "PUBLIC", "TITLE": "Adobe Acrobat Pro DC Doc buttonSetIcon Use-After-Free Information Disclosure Vulnerability" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Acrobat Reader", "version": { "version_data": [ { "version_affected": "\u003c=", "version_value": "22.001.20085" }, { "version_affected": "\u003c=", "version_value": "20.005.3031x" }, { "version_affected": "\u003c=", "version_value": "17.012.30205" }, { "version_affected": "\u003c=", "version_value": "None" } ] } } ] }, "vendor_name": "Adobe" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Acrobat Pro DC version 22.001.2011x (and earlier), 20.005.3033x (and earlier) and 17.012.3022x (and earlier) are affected by a use-after-free vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file." } ] }, "impact": { "cvss": { "attackComplexity": "Low", "attackVector": "Local", "availabilityImpact": "None", "baseScore": 5.5, "baseSeverity": "Medium", "confidentialityImpact": "High", "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "userInteraction": "Required", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Use After Free (CWE-416)" } ] } ] }, "references": { "reference_data": [ { "name": "https://helpx.adobe.com/security/products/acrobat/apsb22-16.html", "refsource": "MISC", "url": "https://helpx.adobe.com/security/products/acrobat/apsb22-16.html" } ] }, "source": { "discovery": "EXTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "078d4453-3bcd-4900-85e6-15281da43538", "assignerShortName": "adobe", "cveId": "CVE-2022-28837", "datePublished": "2022-05-11T17:59:57.468192Z", "dateReserved": "2022-04-08T00:00:00", "dateUpdated": "2024-09-16T18:08:20.458Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-27789
Vulnerability from cvelistv5
Published
2022-05-11 17:13
Modified
2024-09-16 22:20
Severity ?
EPSS score ?
Summary
Adobe Acrobat Reader DC AcroForm Use-After-Free Remote Code Execution Vulnerability
References
▼ | URL | Tags |
---|---|---|
https://helpx.adobe.com/security/products/acrobat/apsb22-16.html | x_refsource_MISC |
Impacted products
▼ | Vendor | Product |
---|---|---|
Adobe | Acrobat Reader |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T05:32:59.997Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://helpx.adobe.com/security/products/acrobat/apsb22-16.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Acrobat Reader", "vendor": "Adobe", "versions": [ { "lessThanOrEqual": "22.001.20085", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThanOrEqual": "20.005.3031x", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThanOrEqual": "17.012.30205", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThanOrEqual": "None", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "datePublic": "2022-04-12T00:00:00", "descriptions": [ { "lang": "en", "value": "Acrobat Reader DC versions 22.001.20085 (and earlier), 20.005.3031x (and earlier) and 17.012.30205 (and earlier) are affected by a use-after-free vulnerability in the processing of the acroform event that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file." } ], "metrics": [ { "cvssV3_0": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-416", "description": "Use After Free (CWE-416)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-05-11T17:13:59", "orgId": "078d4453-3bcd-4900-85e6-15281da43538", "shortName": "adobe" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://helpx.adobe.com/security/products/acrobat/apsb22-16.html" } ], "source": { "discovery": "EXTERNAL" }, "title": "Adobe Acrobat Reader DC AcroForm Use-After-Free Remote Code Execution Vulnerability", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@adobe.com", "DATE_PUBLIC": "2022-04-12T23:00:00.000Z", "ID": "CVE-2022-27789", "STATE": "PUBLIC", "TITLE": "Adobe Acrobat Reader DC AcroForm Use-After-Free Remote Code Execution Vulnerability" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Acrobat Reader", "version": { "version_data": [ { "version_affected": "\u003c=", "version_value": "22.001.20085" }, { "version_affected": "\u003c=", "version_value": "20.005.3031x" }, { "version_affected": "\u003c=", "version_value": "17.012.30205" }, { "version_affected": "\u003c=", "version_value": "None" } ] } } ] }, "vendor_name": "Adobe" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Acrobat Reader DC versions 22.001.20085 (and earlier), 20.005.3031x (and earlier) and 17.012.30205 (and earlier) are affected by a use-after-free vulnerability in the processing of the acroform event that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file." } ] }, "impact": { "cvss": { "attackComplexity": "Low", "attackVector": "Local", "availabilityImpact": "High", "baseScore": 7.8, "baseSeverity": "High", "confidentialityImpact": "High", "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "userInteraction": "Required", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Use After Free (CWE-416)" } ] } ] }, "references": { "reference_data": [ { "name": "https://helpx.adobe.com/security/products/acrobat/apsb22-16.html", "refsource": "MISC", "url": "https://helpx.adobe.com/security/products/acrobat/apsb22-16.html" } ] }, "source": { "discovery": "EXTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "078d4453-3bcd-4900-85e6-15281da43538", "assignerShortName": "adobe", "cveId": "CVE-2022-27789", "datePublished": "2022-05-11T17:13:59.728311Z", "dateReserved": "2022-03-23T00:00:00", "dateUpdated": "2024-09-16T22:20:23.182Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-27794
Vulnerability from cvelistv5
Published
2022-05-11 17:17
Modified
2024-09-17 03:49
Severity ?
EPSS score ?
Summary
Adobe Acrobat Reader DC Font Parsing Uninitialized Variable Remote Code Execution Vulnerability
References
▼ | URL | Tags |
---|---|---|
https://helpx.adobe.com/security/products/acrobat/apsb22-16.html | x_refsource_MISC |
Impacted products
▼ | Vendor | Product |
---|---|---|
Adobe | Acrobat Reader |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T05:32:59.819Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://helpx.adobe.com/security/products/acrobat/apsb22-16.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Acrobat Reader", "vendor": "Adobe", "versions": [ { "lessThanOrEqual": "22.001.20085", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThanOrEqual": "20.005.3031x", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThanOrEqual": "17.012.30205", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThanOrEqual": "None", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "datePublic": "2022-04-12T00:00:00", "descriptions": [ { "lang": "en", "value": "Acrobat Reader DC versions 22.001.20085 (and earlier), 20.005.3031x (and earlier) and 17.012.30205 (and earlier) is affected by the use of a variable that has not been initialized when processing of embedded fonts, potentially resulting in arbitrary code execution in the context of the current user. Exploitation requires user interaction in that a victim must open a crafted .pdf file" } ], "metrics": [ { "cvssV3_0": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-824", "description": "Access of Uninitialized Pointer (CWE-824)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-05-11T17:17:56", "orgId": "078d4453-3bcd-4900-85e6-15281da43538", "shortName": "adobe" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://helpx.adobe.com/security/products/acrobat/apsb22-16.html" } ], "source": { "discovery": "EXTERNAL" }, "title": "Adobe Acrobat Reader DC Font Parsing Uninitialized Variable Remote Code Execution Vulnerability", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@adobe.com", "DATE_PUBLIC": "2022-04-12T23:00:00.000Z", "ID": "CVE-2022-27794", "STATE": "PUBLIC", "TITLE": "Adobe Acrobat Reader DC Font Parsing Uninitialized Variable Remote Code Execution Vulnerability" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Acrobat Reader", "version": { "version_data": [ { "version_affected": "\u003c=", "version_value": "22.001.20085" }, { "version_affected": "\u003c=", "version_value": "20.005.3031x" }, { "version_affected": "\u003c=", "version_value": "17.012.30205" }, { "version_affected": "\u003c=", "version_value": "None" } ] } } ] }, "vendor_name": "Adobe" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Acrobat Reader DC versions 22.001.20085 (and earlier), 20.005.3031x (and earlier) and 17.012.30205 (and earlier) is affected by the use of a variable that has not been initialized when processing of embedded fonts, potentially resulting in arbitrary code execution in the context of the current user. Exploitation requires user interaction in that a victim must open a crafted .pdf file" } ] }, "impact": { "cvss": { "attackComplexity": "Low", "attackVector": "Local", "availabilityImpact": "High", "baseScore": 7.8, "baseSeverity": "High", "confidentialityImpact": "High", "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "userInteraction": "Required", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Access of Uninitialized Pointer (CWE-824)" } ] } ] }, "references": { "reference_data": [ { "name": "https://helpx.adobe.com/security/products/acrobat/apsb22-16.html", "refsource": "MISC", "url": "https://helpx.adobe.com/security/products/acrobat/apsb22-16.html" } ] }, "source": { "discovery": "EXTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "078d4453-3bcd-4900-85e6-15281da43538", "assignerShortName": "adobe", "cveId": "CVE-2022-27794", "datePublished": "2022-05-11T17:17:56.608205Z", "dateReserved": "2022-03-23T00:00:00", "dateUpdated": "2024-09-17T03:49:06.272Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-27796
Vulnerability from cvelistv5
Published
2022-05-11 17:19
Modified
2024-09-17 03:27
Severity ?
EPSS score ?
Summary
Adobe Acrobat Reader DC AcroForm isBoxChecked Use-After-Free Remote Code Execution Vulnerability
References
▼ | URL | Tags |
---|---|---|
https://helpx.adobe.com/security/products/acrobat/apsb22-16.html | x_refsource_MISC |
Impacted products
▼ | Vendor | Product |
---|---|---|
Adobe | Acrobat Reader |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T05:32:59.939Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://helpx.adobe.com/security/products/acrobat/apsb22-16.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Acrobat Reader", "vendor": "Adobe", "versions": [ { "lessThanOrEqual": "22.001.20085", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThanOrEqual": "20.005.3031x", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThanOrEqual": "17.012.30205", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThanOrEqual": "None", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "datePublic": "2022-04-12T00:00:00", "descriptions": [ { "lang": "en", "value": "Acrobat Reader DC versions 22.001.20085 (and earlier), 20.005.3031x (and earlier) and 17.012.30205 (and earlier) are affected by a use-after-free vulnerability in the processing of the acroform event that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file." } ], "metrics": [ { "cvssV3_0": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-416", "description": "Use After Free (CWE-416)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-05-11T17:19:31", "orgId": "078d4453-3bcd-4900-85e6-15281da43538", "shortName": "adobe" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://helpx.adobe.com/security/products/acrobat/apsb22-16.html" } ], "source": { "discovery": "EXTERNAL" }, "title": "Adobe Acrobat Reader DC AcroForm isBoxChecked Use-After-Free Remote Code Execution Vulnerability", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@adobe.com", "DATE_PUBLIC": "2022-04-12T23:00:00.000Z", "ID": "CVE-2022-27796", "STATE": "PUBLIC", "TITLE": "Adobe Acrobat Reader DC AcroForm isBoxChecked Use-After-Free Remote Code Execution Vulnerability" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Acrobat Reader", "version": { "version_data": [ { "version_affected": "\u003c=", "version_value": "22.001.20085" }, { "version_affected": "\u003c=", "version_value": "20.005.3031x" }, { "version_affected": "\u003c=", "version_value": "17.012.30205" }, { "version_affected": "\u003c=", "version_value": "None" } ] } } ] }, "vendor_name": "Adobe" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Acrobat Reader DC versions 22.001.20085 (and earlier), 20.005.3031x (and earlier) and 17.012.30205 (and earlier) are affected by a use-after-free vulnerability in the processing of the acroform event that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file." } ] }, "impact": { "cvss": { "attackComplexity": "Low", "attackVector": "Local", "availabilityImpact": "High", "baseScore": 7.8, "baseSeverity": "High", "confidentialityImpact": "High", "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "userInteraction": "Required", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Use After Free (CWE-416)" } ] } ] }, "references": { "reference_data": [ { "name": "https://helpx.adobe.com/security/products/acrobat/apsb22-16.html", "refsource": "MISC", "url": "https://helpx.adobe.com/security/products/acrobat/apsb22-16.html" } ] }, "source": { "discovery": "EXTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "078d4453-3bcd-4900-85e6-15281da43538", "assignerShortName": "adobe", "cveId": "CVE-2022-27796", "datePublished": "2022-05-11T17:19:31.046623Z", "dateReserved": "2022-03-23T00:00:00", "dateUpdated": "2024-09-17T03:27:55.026Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-27800
Vulnerability from cvelistv5
Published
2022-05-11 17:22
Modified
2024-09-16 18:56
Severity ?
EPSS score ?
Summary
Adobe Acrobat Reader DC Annotation Use-After-Free Remote Code Execution Vulnerability
References
▼ | URL | Tags |
---|---|---|
https://helpx.adobe.com/security/products/acrobat/apsb22-16.html | x_refsource_MISC |
Impacted products
▼ | Vendor | Product |
---|---|---|
Adobe | Acrobat Reader |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T05:32:59.807Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://helpx.adobe.com/security/products/acrobat/apsb22-16.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Acrobat Reader", "vendor": "Adobe", "versions": [ { "lessThanOrEqual": "22.001.20085", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThanOrEqual": "20.005.3031x", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThanOrEqual": "17.012.30205", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThanOrEqual": "None", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "datePublic": "2022-04-12T00:00:00", "descriptions": [ { "lang": "en", "value": "Acrobat Reader DC versions 22.001.20085 (and earlier), 20.005.3031x (and earlier) and 17.012.30205 (and earlier) are affected by a use-after-free vulnerability in the processing of annotations that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file." } ], "metrics": [ { "cvssV3_0": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-416", "description": "Use After Free (CWE-416)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-05-11T17:22:46", "orgId": "078d4453-3bcd-4900-85e6-15281da43538", "shortName": "adobe" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://helpx.adobe.com/security/products/acrobat/apsb22-16.html" } ], "source": { "discovery": "EXTERNAL" }, "title": "Adobe Acrobat Reader DC Annotation Use-After-Free Remote Code Execution Vulnerability", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@adobe.com", "DATE_PUBLIC": "2022-04-12T23:00:00.000Z", "ID": "CVE-2022-27800", "STATE": "PUBLIC", "TITLE": "Adobe Acrobat Reader DC Annotation Use-After-Free Remote Code Execution Vulnerability" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Acrobat Reader", "version": { "version_data": [ { "version_affected": "\u003c=", "version_value": "22.001.20085" }, { "version_affected": "\u003c=", "version_value": "20.005.3031x" }, { "version_affected": "\u003c=", "version_value": "17.012.30205" }, { "version_affected": "\u003c=", "version_value": "None" } ] } } ] }, "vendor_name": "Adobe" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Acrobat Reader DC versions 22.001.20085 (and earlier), 20.005.3031x (and earlier) and 17.012.30205 (and earlier) are affected by a use-after-free vulnerability in the processing of annotations that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file." } ] }, "impact": { "cvss": { "attackComplexity": "Low", "attackVector": "Local", "availabilityImpact": "High", "baseScore": 7.8, "baseSeverity": "High", "confidentialityImpact": "High", "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "userInteraction": "Required", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Use After Free (CWE-416)" } ] } ] }, "references": { "reference_data": [ { "name": "https://helpx.adobe.com/security/products/acrobat/apsb22-16.html", "refsource": "MISC", "url": "https://helpx.adobe.com/security/products/acrobat/apsb22-16.html" } ] }, "source": { "discovery": "EXTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "078d4453-3bcd-4900-85e6-15281da43538", "assignerShortName": "adobe", "cveId": "CVE-2022-27800", "datePublished": "2022-05-11T17:22:46.319076Z", "dateReserved": "2022-03-23T00:00:00", "dateUpdated": "2024-09-16T18:56:19.861Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-28248
Vulnerability from cvelistv5
Published
2022-05-11 17:42
Modified
2024-09-17 01:25
Severity ?
EPSS score ?
Summary
Adobe Acrobat Reader DC Annotation Out-Of-Bounds Read Information Disclosure Vulnerability
References
▼ | URL | Tags |
---|---|---|
https://helpx.adobe.com/security/products/acrobat/apsb22-16.html | x_refsource_MISC |
Impacted products
▼ | Vendor | Product |
---|---|---|
Adobe | Acrobat Reader |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T05:48:37.881Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://helpx.adobe.com/security/products/acrobat/apsb22-16.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Acrobat Reader", "vendor": "Adobe", "versions": [ { "lessThanOrEqual": "22.001.20085", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThanOrEqual": "20.005.3031x", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThanOrEqual": "17.012.30205", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThanOrEqual": "None", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "datePublic": "2022-04-12T00:00:00", "descriptions": [ { "lang": "en", "value": "Acrobat Reader DC version 22.001.2011x (and earlier), 20.005.3033x (and earlier) and 17.012.3022x (and earlier) are affected by an out-of-bounds read vulnerability when parsing a crafted file, which could result in a read past the end of an allocated memory structure. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-125", "description": "Out-of-bounds Read (CWE-125)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-05-11T17:42:45", "orgId": "078d4453-3bcd-4900-85e6-15281da43538", "shortName": "adobe" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://helpx.adobe.com/security/products/acrobat/apsb22-16.html" } ], "source": { "discovery": "EXTERNAL" }, "title": "Adobe Acrobat Reader DC Annotation Out-Of-Bounds Read Information Disclosure Vulnerability", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@adobe.com", "DATE_PUBLIC": "2022-04-12T23:00:00.000Z", "ID": "CVE-2022-28248", "STATE": "PUBLIC", "TITLE": "Adobe Acrobat Reader DC Annotation Out-Of-Bounds Read Information Disclosure Vulnerability" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Acrobat Reader", "version": { "version_data": [ { "version_affected": "\u003c=", "version_value": "22.001.20085" }, { "version_affected": "\u003c=", "version_value": "20.005.3031x" }, { "version_affected": "\u003c=", "version_value": "17.012.30205" }, { "version_affected": "\u003c=", "version_value": "None" } ] } } ] }, "vendor_name": "Adobe" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Acrobat Reader DC version 22.001.2011x (and earlier), 20.005.3033x (and earlier) and 17.012.3022x (and earlier) are affected by an out-of-bounds read vulnerability when parsing a crafted file, which could result in a read past the end of an allocated memory structure. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file." } ] }, "impact": { "cvss": { "attackComplexity": "Low", "attackVector": "Local", "availabilityImpact": "None", "baseScore": 5.5, "baseSeverity": "Medium", "confidentialityImpact": "High", "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "userInteraction": "Required", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Out-of-bounds Read (CWE-125)" } ] } ] }, "references": { "reference_data": [ { "name": "https://helpx.adobe.com/security/products/acrobat/apsb22-16.html", "refsource": "MISC", "url": "https://helpx.adobe.com/security/products/acrobat/apsb22-16.html" } ] }, "source": { "discovery": "EXTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "078d4453-3bcd-4900-85e6-15281da43538", "assignerShortName": "adobe", "cveId": "CVE-2022-28248", "datePublished": "2022-05-11T17:42:45.690090Z", "dateReserved": "2022-03-30T00:00:00", "dateUpdated": "2024-09-17T01:25:33.523Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-28249
Vulnerability from cvelistv5
Published
2022-05-11 17:43
Modified
2024-09-16 22:45
Severity ?
EPSS score ?
Summary
Adobe Acrobat Reader DC Annotation Out-Of-Bounds Read Information Disclosure Vulnerability
References
▼ | URL | Tags |
---|---|---|
https://helpx.adobe.com/security/products/acrobat/apsb22-16.html | x_refsource_MISC |
Impacted products
▼ | Vendor | Product |
---|---|---|
Adobe | Acrobat Reader |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T05:48:37.896Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://helpx.adobe.com/security/products/acrobat/apsb22-16.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Acrobat Reader", "vendor": "Adobe", "versions": [ { "lessThanOrEqual": "22.001.20085", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThanOrEqual": "20.005.3031x", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThanOrEqual": "17.012.30205", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThanOrEqual": "None", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "datePublic": "2022-04-12T00:00:00", "descriptions": [ { "lang": "en", "value": "Acrobat Reader DC version 22.001.2011x (and earlier), 20.005.3033x (and earlier) and 17.012.3022x (and earlier) are affected by an out-of-bounds read vulnerability when parsing a crafted file, which could result in a read past the end of an allocated memory structure. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-125", "description": "Out-of-bounds Read (CWE-125)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-05-11T17:43:36", "orgId": "078d4453-3bcd-4900-85e6-15281da43538", "shortName": "adobe" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://helpx.adobe.com/security/products/acrobat/apsb22-16.html" } ], "source": { "discovery": "EXTERNAL" }, "title": "Adobe Acrobat Reader DC Annotation Out-Of-Bounds Read Information Disclosure Vulnerability", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@adobe.com", "DATE_PUBLIC": "2022-04-12T23:00:00.000Z", "ID": "CVE-2022-28249", "STATE": "PUBLIC", "TITLE": "Adobe Acrobat Reader DC Annotation Out-Of-Bounds Read Information Disclosure Vulnerability" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Acrobat Reader", "version": { "version_data": [ { "version_affected": "\u003c=", "version_value": "22.001.20085" }, { "version_affected": "\u003c=", "version_value": "20.005.3031x" }, { "version_affected": "\u003c=", "version_value": "17.012.30205" }, { "version_affected": "\u003c=", "version_value": "None" } ] } } ] }, "vendor_name": "Adobe" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Acrobat Reader DC version 22.001.2011x (and earlier), 20.005.3033x (and earlier) and 17.012.3022x (and earlier) are affected by an out-of-bounds read vulnerability when parsing a crafted file, which could result in a read past the end of an allocated memory structure. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file." } ] }, "impact": { "cvss": { "attackComplexity": "Low", "attackVector": "Local", "availabilityImpact": "None", "baseScore": 5.5, "baseSeverity": "Medium", "confidentialityImpact": "High", "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "userInteraction": "Required", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Out-of-bounds Read (CWE-125)" } ] } ] }, "references": { "reference_data": [ { "name": "https://helpx.adobe.com/security/products/acrobat/apsb22-16.html", "refsource": "MISC", "url": "https://helpx.adobe.com/security/products/acrobat/apsb22-16.html" } ] }, "source": { "discovery": "EXTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "078d4453-3bcd-4900-85e6-15281da43538", "assignerShortName": "adobe", "cveId": "CVE-2022-28249", "datePublished": "2022-05-11T17:43:36.819694Z", "dateReserved": "2022-03-30T00:00:00", "dateUpdated": "2024-09-16T22:45:29.226Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-28264
Vulnerability from cvelistv5
Published
2022-05-11 17:55
Modified
2024-09-16 18:29
Severity ?
EPSS score ?
Summary
Adobe Acrobat Reader DC Annotation Out-Of-Bounds Read Information Disclosure Vulnerability
References
▼ | URL | Tags |
---|---|---|
https://helpx.adobe.com/security/products/acrobat/apsb22-16.html | x_refsource_MISC |
Impacted products
▼ | Vendor | Product |
---|---|---|
Adobe | Acrobat Reader |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T05:48:37.892Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://helpx.adobe.com/security/products/acrobat/apsb22-16.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Acrobat Reader", "vendor": "Adobe", "versions": [ { "lessThanOrEqual": "22.001.20085", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThanOrEqual": "20.005.3031x", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThanOrEqual": "17.012.30205", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThanOrEqual": "None", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "datePublic": "2022-04-12T00:00:00", "descriptions": [ { "lang": "en", "value": "Acrobat Reader DC version 22.001.2011x (and earlier), 20.005.3033x (and earlier) and 17.012.3022x (and earlier) are affected by an out-of-bounds read vulnerability when parsing a crafted file, which could result in a read past the end of an allocated memory structure. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-125", "description": "Out-of-bounds Read (CWE-125)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-05-11T17:55:40", "orgId": "078d4453-3bcd-4900-85e6-15281da43538", "shortName": "adobe" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://helpx.adobe.com/security/products/acrobat/apsb22-16.html" } ], "source": { "discovery": "EXTERNAL" }, "title": "Adobe Acrobat Reader DC Annotation Out-Of-Bounds Read Information Disclosure Vulnerability", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@adobe.com", "DATE_PUBLIC": "2022-04-12T23:00:00.000Z", "ID": "CVE-2022-28264", "STATE": "PUBLIC", "TITLE": "Adobe Acrobat Reader DC Annotation Out-Of-Bounds Read Information Disclosure Vulnerability" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Acrobat Reader", "version": { "version_data": [ { "version_affected": "\u003c=", "version_value": "22.001.20085" }, { "version_affected": "\u003c=", "version_value": "20.005.3031x" }, { "version_affected": "\u003c=", "version_value": "17.012.30205" }, { "version_affected": "\u003c=", "version_value": "None" } ] } } ] }, "vendor_name": "Adobe" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Acrobat Reader DC version 22.001.2011x (and earlier), 20.005.3033x (and earlier) and 17.012.3022x (and earlier) are affected by an out-of-bounds read vulnerability when parsing a crafted file, which could result in a read past the end of an allocated memory structure. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file." } ] }, "impact": { "cvss": { "attackComplexity": "Low", "attackVector": "Local", "availabilityImpact": "None", "baseScore": 5.5, "baseSeverity": "Medium", "confidentialityImpact": "High", "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "userInteraction": "Required", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Out-of-bounds Read (CWE-125)" } ] } ] }, "references": { "reference_data": [ { "name": "https://helpx.adobe.com/security/products/acrobat/apsb22-16.html", "refsource": "MISC", "url": "https://helpx.adobe.com/security/products/acrobat/apsb22-16.html" } ] }, "source": { "discovery": "EXTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "078d4453-3bcd-4900-85e6-15281da43538", "assignerShortName": "adobe", "cveId": "CVE-2022-28264", "datePublished": "2022-05-11T17:55:40.126402Z", "dateReserved": "2022-03-30T00:00:00", "dateUpdated": "2024-09-16T18:29:11.361Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-28251
Vulnerability from cvelistv5
Published
2022-05-11 17:45
Modified
2024-09-16 19:05
Severity ?
EPSS score ?
Summary
Adobe Acrobat Reader DC Annotation Out-Of-Bounds Read Information Disclosure Vulnerability
References
▼ | URL | Tags |
---|---|---|
https://helpx.adobe.com/security/products/acrobat/apsb22-16.html | x_refsource_MISC |
Impacted products
▼ | Vendor | Product |
---|---|---|
Adobe | Acrobat Reader |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T05:48:37.657Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://helpx.adobe.com/security/products/acrobat/apsb22-16.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Acrobat Reader", "vendor": "Adobe", "versions": [ { "lessThanOrEqual": "22.001.20085", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThanOrEqual": "20.005.3031x", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThanOrEqual": "17.012.30205", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThanOrEqual": "None", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "datePublic": "2022-04-12T00:00:00", "descriptions": [ { "lang": "en", "value": "Acrobat Reader DC version 22.001.2011x (and earlier), 20.005.3033x (and earlier) and 17.012.3022x (and earlier) are affected by an out-of-bounds read vulnerability when parsing a crafted file, which could result in a read past the end of an allocated memory structure. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-125", "description": "Out-of-bounds Read (CWE-125)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-05-11T17:45:04", "orgId": "078d4453-3bcd-4900-85e6-15281da43538", "shortName": "adobe" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://helpx.adobe.com/security/products/acrobat/apsb22-16.html" } ], "source": { "discovery": "EXTERNAL" }, "title": "Adobe Acrobat Reader DC Annotation Out-Of-Bounds Read Information Disclosure Vulnerability", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@adobe.com", "DATE_PUBLIC": "2022-04-12T23:00:00.000Z", "ID": "CVE-2022-28251", "STATE": "PUBLIC", "TITLE": "Adobe Acrobat Reader DC Annotation Out-Of-Bounds Read Information Disclosure Vulnerability" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Acrobat Reader", "version": { "version_data": [ { "version_affected": "\u003c=", "version_value": "22.001.20085" }, { "version_affected": "\u003c=", "version_value": "20.005.3031x" }, { "version_affected": "\u003c=", "version_value": "17.012.30205" }, { "version_affected": "\u003c=", "version_value": "None" } ] } } ] }, "vendor_name": "Adobe" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Acrobat Reader DC version 22.001.2011x (and earlier), 20.005.3033x (and earlier) and 17.012.3022x (and earlier) are affected by an out-of-bounds read vulnerability when parsing a crafted file, which could result in a read past the end of an allocated memory structure. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file." } ] }, "impact": { "cvss": { "attackComplexity": "Low", "attackVector": "Local", "availabilityImpact": "None", "baseScore": 5.5, "baseSeverity": "Medium", "confidentialityImpact": "High", "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "userInteraction": "Required", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Out-of-bounds Read (CWE-125)" } ] } ] }, "references": { "reference_data": [ { "name": "https://helpx.adobe.com/security/products/acrobat/apsb22-16.html", "refsource": "MISC", "url": "https://helpx.adobe.com/security/products/acrobat/apsb22-16.html" } ] }, "source": { "discovery": "EXTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "078d4453-3bcd-4900-85e6-15281da43538", "assignerShortName": "adobe", "cveId": "CVE-2022-28251", "datePublished": "2022-05-11T17:45:04.137738Z", "dateReserved": "2022-03-30T00:00:00", "dateUpdated": "2024-09-16T19:05:06.136Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-28230
Vulnerability from cvelistv5
Published
2022-05-11 17:26
Modified
2024-09-16 18:39
Severity ?
EPSS score ?
Summary
Adobe Acrobat Reader DC AcroForm calculateNow Use-After-Free Remote Code Execution Vulnerability
References
▼ | URL | Tags |
---|---|---|
https://helpx.adobe.com/security/products/acrobat/apsb22-16.html | x_refsource_MISC |
Impacted products
▼ | Vendor | Product |
---|---|---|
Adobe | Acrobat Reader |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T05:48:37.419Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://helpx.adobe.com/security/products/acrobat/apsb22-16.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Acrobat Reader", "vendor": "Adobe", "versions": [ { "lessThanOrEqual": "22.001.20085", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThanOrEqual": "20.005.3031x", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThanOrEqual": "17.012.30205", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThanOrEqual": "None", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "datePublic": "2022-04-12T00:00:00", "descriptions": [ { "lang": "en", "value": "Acrobat Reader DC versions 22.001.20085 (and earlier), 20.005.3031x (and earlier) and 17.012.30205 (and earlier) are affected by a use-after-free vulnerability in the processing of the acroform event that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file." } ], "metrics": [ { "cvssV3_0": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-416", "description": "Use After Free (CWE-416)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-05-11T17:26:33", "orgId": "078d4453-3bcd-4900-85e6-15281da43538", "shortName": "adobe" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://helpx.adobe.com/security/products/acrobat/apsb22-16.html" } ], "source": { "discovery": "EXTERNAL" }, "title": "Adobe Acrobat Reader DC AcroForm calculateNow Use-After-Free Remote Code Execution Vulnerability", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@adobe.com", "DATE_PUBLIC": "2022-04-12T23:00:00.000Z", "ID": "CVE-2022-28230", "STATE": "PUBLIC", "TITLE": "Adobe Acrobat Reader DC AcroForm calculateNow Use-After-Free Remote Code Execution Vulnerability" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Acrobat Reader", "version": { "version_data": [ { "version_affected": "\u003c=", "version_value": "22.001.20085" }, { "version_affected": "\u003c=", "version_value": "20.005.3031x" }, { "version_affected": "\u003c=", "version_value": "17.012.30205" }, { "version_affected": "\u003c=", "version_value": "None" } ] } } ] }, "vendor_name": "Adobe" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Acrobat Reader DC versions 22.001.20085 (and earlier), 20.005.3031x (and earlier) and 17.012.30205 (and earlier) are affected by a use-after-free vulnerability in the processing of the acroform event that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file." } ] }, "impact": { "cvss": { "attackComplexity": "Low", "attackVector": "Local", "availabilityImpact": "High", "baseScore": 7.8, "baseSeverity": "High", "confidentialityImpact": "High", "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "userInteraction": "Required", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Use After Free (CWE-416)" } ] } ] }, "references": { "reference_data": [ { "name": "https://helpx.adobe.com/security/products/acrobat/apsb22-16.html", "refsource": "MISC", "url": "https://helpx.adobe.com/security/products/acrobat/apsb22-16.html" } ] }, "source": { "discovery": "EXTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "078d4453-3bcd-4900-85e6-15281da43538", "assignerShortName": "adobe", "cveId": "CVE-2022-28230", "datePublished": "2022-05-11T17:26:33.975140Z", "dateReserved": "2022-03-30T00:00:00", "dateUpdated": "2024-09-16T18:39:47.929Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-27795
Vulnerability from cvelistv5
Published
2022-05-11 17:18
Modified
2024-09-17 00:26
Severity ?
EPSS score ?
Summary
Adobe Acrobat Reader DC AcroForm isDefaultChecked Use-After-Free Remote Code Execution Vulnerability
References
▼ | URL | Tags |
---|---|---|
https://helpx.adobe.com/security/products/acrobat/apsb22-16.html | x_refsource_MISC |
Impacted products
▼ | Vendor | Product |
---|---|---|
Adobe | Acrobat Reader |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T05:32:59.976Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://helpx.adobe.com/security/products/acrobat/apsb22-16.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Acrobat Reader", "vendor": "Adobe", "versions": [ { "lessThanOrEqual": "22.001.20085", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThanOrEqual": "20.005.3031x", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThanOrEqual": "17.012.30205", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThanOrEqual": "None", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "datePublic": "2022-04-12T00:00:00", "descriptions": [ { "lang": "en", "value": "Acrobat Reader DC versions 22.001.20085 (and earlier), 20.005.3031x (and earlier) and 17.012.30205 (and earlier) are affected by a use-after-free vulnerability in the processing of the acroform event that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file." } ], "metrics": [ { "cvssV3_0": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-416", "description": "Use After Free (CWE-416)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-05-11T17:18:48", "orgId": "078d4453-3bcd-4900-85e6-15281da43538", "shortName": "adobe" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://helpx.adobe.com/security/products/acrobat/apsb22-16.html" } ], "source": { "discovery": "EXTERNAL" }, "title": "Adobe Acrobat Reader DC AcroForm isDefaultChecked Use-After-Free Remote Code Execution Vulnerability", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@adobe.com", "DATE_PUBLIC": "2022-04-12T23:00:00.000Z", "ID": "CVE-2022-27795", "STATE": "PUBLIC", "TITLE": "Adobe Acrobat Reader DC AcroForm isDefaultChecked Use-After-Free Remote Code Execution Vulnerability" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Acrobat Reader", "version": { "version_data": [ { "version_affected": "\u003c=", "version_value": "22.001.20085" }, { "version_affected": "\u003c=", "version_value": "20.005.3031x" }, { "version_affected": "\u003c=", "version_value": "17.012.30205" }, { "version_affected": "\u003c=", "version_value": "None" } ] } } ] }, "vendor_name": "Adobe" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Acrobat Reader DC versions 22.001.20085 (and earlier), 20.005.3031x (and earlier) and 17.012.30205 (and earlier) are affected by a use-after-free vulnerability in the processing of the acroform event that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file." } ] }, "impact": { "cvss": { "attackComplexity": "Low", "attackVector": "Local", "availabilityImpact": "High", "baseScore": 7.8, "baseSeverity": "High", "confidentialityImpact": "High", "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "userInteraction": "Required", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Use After Free (CWE-416)" } ] } ] }, "references": { "reference_data": [ { "name": "https://helpx.adobe.com/security/products/acrobat/apsb22-16.html", "refsource": "MISC", "url": "https://helpx.adobe.com/security/products/acrobat/apsb22-16.html" } ] }, "source": { "discovery": "EXTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "078d4453-3bcd-4900-85e6-15281da43538", "assignerShortName": "adobe", "cveId": "CVE-2022-27795", "datePublished": "2022-05-11T17:18:48.317132Z", "dateReserved": "2022-03-23T00:00:00", "dateUpdated": "2024-09-17T00:26:59.660Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-28240
Vulnerability from cvelistv5
Published
2022-05-11 17:35
Modified
2024-09-16 21:03
Severity ?
EPSS score ?
Summary
Adobe Acrobat Reader DC Annotation Use-After-Free Remote Code Execution Vulnerability
References
▼ | URL | Tags |
---|---|---|
https://helpx.adobe.com/security/products/acrobat/apsb22-16.html | x_refsource_MISC |
Impacted products
▼ | Vendor | Product |
---|---|---|
Adobe | Acrobat Reader |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T05:48:37.882Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://helpx.adobe.com/security/products/acrobat/apsb22-16.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Acrobat Reader", "vendor": "Adobe", "versions": [ { "lessThanOrEqual": "22.001.20085", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThanOrEqual": "20.005.3031x", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThanOrEqual": "17.012.30205", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThanOrEqual": "None", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "datePublic": "2022-04-12T00:00:00", "descriptions": [ { "lang": "en", "value": "Acrobat Reader DC version 22.001.2011x (and earlier), 20.005.3033x (and earlier) and 17.012.3022x (and earlier) are affected by a use-after-free vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-416", "description": "Use After Free (CWE-416)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-05-11T17:35:36", "orgId": "078d4453-3bcd-4900-85e6-15281da43538", "shortName": "adobe" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://helpx.adobe.com/security/products/acrobat/apsb22-16.html" } ], "source": { "discovery": "EXTERNAL" }, "title": "Adobe Acrobat Reader DC Annotation Use-After-Free Remote Code Execution Vulnerability", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@adobe.com", "DATE_PUBLIC": "2022-04-12T23:00:00.000Z", "ID": "CVE-2022-28240", "STATE": "PUBLIC", "TITLE": "Adobe Acrobat Reader DC Annotation Use-After-Free Remote Code Execution Vulnerability" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Acrobat Reader", "version": { "version_data": [ { "version_affected": "\u003c=", "version_value": "22.001.20085" }, { "version_affected": "\u003c=", "version_value": "20.005.3031x" }, { "version_affected": "\u003c=", "version_value": "17.012.30205" }, { "version_affected": "\u003c=", "version_value": "None" } ] } } ] }, "vendor_name": "Adobe" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Acrobat Reader DC version 22.001.2011x (and earlier), 20.005.3033x (and earlier) and 17.012.3022x (and earlier) are affected by a use-after-free vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file." } ] }, "impact": { "cvss": { "attackComplexity": "Low", "attackVector": "Local", "availabilityImpact": "High", "baseScore": 7.8, "baseSeverity": "High", "confidentialityImpact": "High", "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "userInteraction": "Required", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Use After Free (CWE-416)" } ] } ] }, "references": { "reference_data": [ { "name": "https://helpx.adobe.com/security/products/acrobat/apsb22-16.html", "refsource": "MISC", "url": "https://helpx.adobe.com/security/products/acrobat/apsb22-16.html" } ] }, "source": { "discovery": "EXTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "078d4453-3bcd-4900-85e6-15281da43538", "assignerShortName": "adobe", "cveId": "CVE-2022-28240", "datePublished": "2022-05-11T17:35:36.954632Z", "dateReserved": "2022-03-30T00:00:00", "dateUpdated": "2024-09-16T21:03:37.303Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
Loading...
Loading...
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.