Adobe Acrobat and Adobe Reader are both products of Adobe, a PDF file editing and conversion tool, and Adobe Reader, a PDF document reading software. The vulnerability arises from the processing of PDF files after the release of the use of the error and the existence of the attacker can use the vulnerability can be executed on the system arbitrary code.