Description
Adobe Acrobat and Reader versions 2019.008.20081 and earlier, 2019.008.20080 and earlier, 2019.008.20081 and earlier, 2017.011.30106 and earlier version, 2017.011.30105 and earlier version, 2015.006.30457 and earlier, and 2015.006.30456 and earlier have an out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure.
Affected Software
Related
{"id": "CVE-2018-16001", "vendorId": null, "type": "cve", "bulletinFamily": "NVD", "title": "CVE-2018-16001", "description": "Adobe Acrobat and Reader versions 2019.008.20081 and earlier, 2019.008.20080 and earlier, 2019.008.20081 and earlier, 2017.011.30106 and earlier version, 2017.011.30105 and earlier version, 2015.006.30457 and earlier, and 2015.006.30456 and earlier have an out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure.", "published": "2019-01-18T17:29:00", "modified": "2019-08-21T16:20:00", "cvss": {"score": 4.3, "vector": "AV:N/AC:M/Au:N/C:P/I:N/A:N"}, "cvss2": {"cvssV2": {"version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3}, "severity": "MEDIUM", "exploitabilityScore": 8.6, "impactScore": 2.9, "acInsufInfo": false, "obtainAllPrivilege": false, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": true}, "cvss3": {"cvssV3": {"version": "3.0", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "REQUIRED", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM"}, "exploitabilityScore": 2.8, "impactScore": 3.6}, "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-16001", "reporter": "psirt@adobe.com", "references": ["https://helpx.adobe.com/security/products/acrobat/apsb18-41.html", "http://www.securityfocus.com/bid/106162"], "cvelist": ["CVE-2018-16001"], "immutableFields": [], "lastseen": "2022-03-23T13:52:48", "viewCount": 17, "enchantments": {"dependencies": {"references": [{"type": "adobe", "idList": ["APSB18-41"]}, {"type": "kaspersky", "idList": ["KLA11390"]}, {"type": "nessus", "idList": ["ADOBE_ACROBAT_APSB18-41.NASL", "ADOBE_READER_APSB18-41.NASL", "MACOSX_ADOBE_ACROBAT_APSB18-41.NASL", "MACOSX_ADOBE_READER_APSB18-41.NASL"]}, {"type": "openvas", "idList": ["OPENVAS:1361412562310814380", "OPENVAS:1361412562310814381", "OPENVAS:1361412562310814382", "OPENVAS:1361412562310814383", "OPENVAS:1361412562310814384", "OPENVAS:1361412562310814385", "OPENVAS:1361412562310814386", "OPENVAS:1361412562310814387", "OPENVAS:1361412562310814388", "OPENVAS:1361412562310814389", "OPENVAS:1361412562310814390", "OPENVAS:1361412562310814391"]}, {"type": "zdi", "idList": ["ZDI-18-1382"]}], "rev": 4}, "score": {"value": 6.5, "vector": "NONE"}, "backreferences": {"references": [{"type": "adobe", "idList": ["APSB18-41"]}, {"type": "kaspersky", "idList": ["KLA11390"]}, {"type": "nessus", "idList": ["ADOBE_ACROBAT_APSB18-41.NASL", "ADOBE_READER_APSB18-41.NASL", "MACOSX_ADOBE_ACROBAT_APSB18-41.NASL"]}, {"type": "openvas", "idList": ["OPENVAS:1361412562310814380", "OPENVAS:1361412562310814381", "OPENVAS:1361412562310814382", "OPENVAS:1361412562310814383", "OPENVAS:1361412562310814384", "OPENVAS:1361412562310814385", "OPENVAS:1361412562310814386", "OPENVAS:1361412562310814387", "OPENVAS:1361412562310814388", "OPENVAS:1361412562310814389", "OPENVAS:1361412562310814390", "OPENVAS:1361412562310814391"]}, {"type": "zdi", "idList": ["ZDI-18-1382"]}]}, "exploitation": null, "vulnersScore": 6.5}, "_state": {"dependencies": 0}, "_internal": {}, "cna_cvss": {"cna": null, "cvss": {}}, "cpe": ["cpe:/a:adobe:acrobat_dc:15.006.30457", "cpe:/a:adobe:acrobat_dc:19.008.20080", "cpe:/a:adobe:acrobat_dc:15.006.30456", "cpe:/a:adobe:acrobat_reader_dc:15.006.30457", "cpe:/a:adobe:acrobat_reader_dc:15.006.30456", "cpe:/a:adobe:acrobat_reader_dc:19.008.20080", "cpe:/a:adobe:acrobat_reader_dc:17.011.30105", "cpe:/a:adobe:acrobat_dc:17.011.30106", "cpe:/a:adobe:acrobat_dc:17.011.30105", "cpe:/a:adobe:acrobat_reader_dc:17.011.30106", "cpe:/a:adobe:acrobat_reader_dc:19.008.20081", "cpe:/a:adobe:acrobat_dc:19.008.20081"], "cpe23": ["cpe:2.3:a:adobe:acrobat_dc:19.008.20080:*:*:*:continuous:*:*:*", "cpe:2.3:a:adobe:acrobat_reader_dc:17.011.30106:*:*:*:classic:*:*:*", "cpe:2.3:a:adobe:acrobat_dc:15.006.30457:*:*:*:classic:*:*:*", "cpe:2.3:a:adobe:acrobat_reader_dc:19.008.20081:*:*:*:continuous:*:*:*", "cpe:2.3:a:adobe:acrobat_reader_dc:15.006.30456:*:*:*:classic:*:*:*", "cpe:2.3:a:adobe:acrobat_dc:17.011.30105:*:*:*:classic:*:*:*", "cpe:2.3:a:adobe:acrobat_dc:19.008.20081:*:*:*:continuous:*:*:*", "cpe:2.3:a:adobe:acrobat_reader_dc:15.006.30457:*:*:*:classic:*:*:*", "cpe:2.3:a:adobe:acrobat_reader_dc:17.011.30105:*:*:*:classic:*:*:*", "cpe:2.3:a:adobe:acrobat_dc:17.011.30106:*:*:*:classic:*:*:*", "cpe:2.3:a:adobe:acrobat_reader_dc:19.008.20080:*:*:*:continuous:*:*:*", "cpe:2.3:a:adobe:acrobat_dc:15.006.30456:*:*:*:classic:*:*:*"], "cwe": ["CWE-125"], "affectedSoftware": [{"cpeName": "adobe:acrobat_dc", "version": "19.008.20081", "operator": "le", "name": "adobe acrobat dc"}, {"cpeName": "adobe:acrobat_reader_dc", "version": "19.008.20081", "operator": "le", "name": "adobe acrobat reader dc"}, {"cpeName": "adobe:acrobat_dc", "version": "17.011.30106", "operator": "le", "name": "adobe acrobat dc"}, {"cpeName": "adobe:acrobat_reader_dc", "version": "17.011.30106", "operator": "le", "name": "adobe acrobat reader dc"}, {"cpeName": "adobe:acrobat_dc", "version": "15.006.30457", "operator": "le", "name": "adobe acrobat dc"}, {"cpeName": "adobe:acrobat_reader_dc", "version": "15.006.30457", "operator": "le", "name": "adobe acrobat reader dc"}, {"cpeName": "adobe:acrobat_reader_dc", "version": "17.011.30105", "operator": "le", "name": "adobe acrobat reader dc"}, {"cpeName": "adobe:acrobat_reader_dc", "version": "15.006.30456", "operator": "le", "name": "adobe acrobat reader dc"}, {"cpeName": "adobe:acrobat_dc", "version": "19.008.20080", "operator": "le", "name": "adobe acrobat dc"}, {"cpeName": "adobe:acrobat_reader_dc", "version": "19.008.20080", "operator": "le", "name": "adobe acrobat reader dc"}, {"cpeName": "adobe:acrobat_dc", "version": "17.011.30105", "operator": "le", "name": "adobe acrobat dc"}, {"cpeName": "adobe:acrobat_dc", "version": "15.006.30456", "operator": "le", "name": "adobe acrobat dc"}], "affectedConfiguration": [{"name": "microsoft windows", "cpeName": "microsoft:windows", "version": "-", "operator": "eq"}, {"name": "apple mac os x", "cpeName": "apple:mac_os_x", "version": "-", "operator": "eq"}], "cpeConfiguration": {"CVE_data_version": "4.0", "nodes": [{"operator": "AND", "children": [{"operator": "OR", "children": [], "cpe_match": [{"vulnerable": true, "cpe23Uri": "cpe:2.3:a:adobe:acrobat_dc:19.008.20081:*:*:*:continuous:*:*:*", "versionStartIncluding": "15.008.20082", "versionEndIncluding": "19.008.20081", "cpe_name": []}, {"vulnerable": true, "cpe23Uri": "cpe:2.3:a:adobe:acrobat_reader_dc:19.008.20081:*:*:*:continuous:*:*:*", "versionStartIncluding": "15.008.20082", "versionEndIncluding": "19.008.20081", "cpe_name": []}, {"vulnerable": true, "cpe23Uri": "cpe:2.3:a:adobe:acrobat_dc:17.011.30106:*:*:*:classic:*:*:*", "versionStartIncluding": "17.011.30056", "versionEndIncluding": "17.011.30106", "cpe_name": []}, {"vulnerable": true, "cpe23Uri": "cpe:2.3:a:adobe:acrobat_reader_dc:17.011.30106:*:*:*:classic:*:*:*", "versionStartIncluding": "17.011.30059", "versionEndIncluding": "17.011.30106", "cpe_name": []}, {"vulnerable": true, "cpe23Uri": "cpe:2.3:a:adobe:acrobat_dc:15.006.30457:*:*:*:classic:*:*:*", "versionStartIncluding": "15.006.30060", "versionEndIncluding": "15.006.30457", "cpe_name": []}, {"vulnerable": true, "cpe23Uri": "cpe:2.3:a:adobe:acrobat_reader_dc:15.006.30457:*:*:*:classic:*:*:*", "versionStartIncluding": "15.006.30060", "versionEndIncluding": "15.006.30457", "cpe_name": []}]}, {"operator": "OR", "children": [], "cpe_match": [{"vulnerable": false, "cpe23Uri": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", "cpe_name": []}]}], "cpe_match": []}, {"operator": "AND", "children": [{"operator": "OR", "children": [], "cpe_match": [{"vulnerable": true, "cpe23Uri": "cpe:2.3:a:adobe:acrobat_reader_dc:17.011.30105:*:*:*:classic:*:*:*", "versionStartIncluding": "17.011.30059", "versionEndIncluding": "17.011.30105", "cpe_name": []}, {"vulnerable": true, "cpe23Uri": "cpe:2.3:a:adobe:acrobat_reader_dc:15.006.30456:*:*:*:classic:*:*:*", "versionStartIncluding": "15.006.30060", "versionEndIncluding": "15.006.30456", "cpe_name": []}, {"vulnerable": true, "cpe23Uri": "cpe:2.3:a:adobe:acrobat_dc:19.008.20080:*:*:*:continuous:*:*:*", "versionStartIncluding": "15.008.20082", "versionEndIncluding": "19.008.20080", "cpe_name": []}, {"vulnerable": true, "cpe23Uri": "cpe:2.3:a:adobe:acrobat_reader_dc:19.008.20080:*:*:*:continuous:*:*:*", "versionStartIncluding": "15.008.20082", "versionEndIncluding": "19.008.20080", "cpe_name": []}, {"vulnerable": true, "cpe23Uri": "cpe:2.3:a:adobe:acrobat_dc:17.011.30105:*:*:*:classic:*:*:*", "versionStartIncluding": "17.011.30056", "versionEndIncluding": "17.011.30105", "cpe_name": []}, {"vulnerable": true, "cpe23Uri": "cpe:2.3:a:adobe:acrobat_dc:15.006.30456:*:*:*:classic:*:*:*", "versionStartIncluding": "15.006.30060", "versionEndIncluding": "15.006.30456", "cpe_name": []}]}, {"operator": "OR", "children": [], "cpe_match": [{"vulnerable": false, "cpe23Uri": "cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*", "cpe_name": []}]}], "cpe_match": []}]}, "extraReferences": [{"url": "https://helpx.adobe.com/security/products/acrobat/apsb18-41.html", "name": "https://helpx.adobe.com/security/products/acrobat/apsb18-41.html", "refsource": "CONFIRM", "tags": ["Patch", "Vendor Advisory"]}, {"url": "http://www.securityfocus.com/bid/106162", "name": "106162", "refsource": "BID", "tags": ["Third Party Advisory", "VDB Entry"]}]}
{"zdi": [{"lastseen": "2022-01-31T21:41:17", "description": "This vulnerability allows remote attackers to disclose sensitive information on vulnerable installations of Adobe Acrobat Pro DC. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of font files. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated data structure. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of the current process.", "cvss3": {"exploitabilityScore": 2.8, "cvssV3": {"baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "NONE", "integrityImpact": "NONE", "baseScore": 6.5, "privilegesRequired": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "userInteraction": "REQUIRED", "version": "3.0"}, "impactScore": 3.6}, "published": "2018-12-12T00:00:00", "type": "zdi", "title": "Adobe Acrobat Pro DC Font Parsing Out-Of-Bounds Read Information Disclosure Vulnerability", "bulletinFamily": "info", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "PARTIAL", "availabilityImpact": "NONE", "integrityImpact": "NONE", "baseScore": 4.3, "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "acInsufInfo": false, "impactScore": 2.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2018-16001"], "modified": "2018-12-12T00:00:00", "id": "ZDI-18-1382", "href": "https://www.zerodayinitiative.com/advisories/ZDI-18-1382/", "cvss": {"score": 4.3, "vector": "AV:N/AC:M/Au:N/C:P/I:N/A:N"}}], "kaspersky": [{"lastseen": "2021-12-22T23:50:15", "description": "### *Detect date*:\n12/11/2018\n\n### *Severity*:\nCritical\n\n### *Description*:\nMultiple serious vulnerabilities were found in Adobe Acrobat and Reader. Malicious users can exploit these vulnerabilities to execute arbitrary code, gain privileges and obtain sensitive information.\n\n### *Affected products*:\nAdobe Acrobat DC Continuous earlier than 2019.010.20064 \nAdobe Acrobat Reader DC Continuous earlier than 2019.010.20064 \nAdobe Acrobat 2017 (Classic Track) earlier than 2017.011.30110 \nAdobe Acrobat Reader 2017 (Classic Track) earlier than 2017.011.30110 \nAdobe Acrobat DC 2015(Classic Track) earlier than 2015.006.30461 \nAdobe Acrobat Reader DC 2015 (Classic Track) earlier than 2015.006.30461\n\n### *Solution*:\nUpdate to the latest version \n[Download Adobe Acrobat Reader DC](<https://get.adobe.com/ru/reader/>)\n\n### *Original advisories*:\n[Security Bulletin for Adobe Acrobat and Reader | APSB18-41](<https://helpx.adobe.com/security/products/acrobat/apsb18-41.html>) \n\n\n### *Impacts*:\nACE \n\n### *Related products*:\n[Adobe Acrobat Reader DC Continuous](<https://threats.kaspersky.com/en/product/Adobe-Acrobat-Reader-DC-Continuous/>)\n\n### *CVE-IDS*:\n[CVE-2018-15998](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15998>)9.3Critical \n[CVE-2018-15987](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15987>)9.3Critical \n[CVE-2018-16004](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16004>)9.3Critical \n[CVE-2018-19720](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19720>)9.3Critical \n[CVE-2018-16045](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16045>)9.3Critical \n[CVE-2018-16044](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16044>)9.3Critical \n[CVE-2018-16018](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16018>)9.3Critical \n[CVE-2018-19713](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19713>)9.3Critical \n[CVE-2018-16046](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16046>)9.3Critical \n[CVE-2018-16029](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16029>)6.8High \n[CVE-2018-16027](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16027>)6.8High \n[CVE-2018-16026](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16026>)9.3Critical \n[CVE-2018-16025](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16025>)9.3Critical \n[CVE-2018-16014](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16014>)9.3Critical \n[CVE-2018-16008](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16008>)9.3Critical \n[CVE-2018-16003](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16003>)9.3Critical \n[CVE-2018-15994](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15994>)9.3Critical \n[CVE-2018-15993](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15993>)9.3Critical \n[CVE-2018-15992](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15992>)9.3Critical \n[CVE-2018-15991](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15991>)9.3Critical \n[CVE-2018-15990](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15990>)9.3Critical \n[CVE-2018-16016](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16016>)9.3Critical \n[CVE-2018-16000](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16000>)9.3Critical \n[CVE-2018-15999](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15999>)9.3Critical \n[CVE-2018-15988](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15988>)9.3Critical \n[CVE-2018-19716](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19716>)7.5Critical \n[CVE-2018-16021](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16021>)9.3Critical \n[CVE-2018-12830](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12830>)9.3Critical \n[CVE-2018-19717](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19717>)4.3Warning \n[CVE-2018-19714](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19714>)4.3Warning \n[CVE-2018-19712](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19712>)4.3Warning \n[CVE-2018-19711](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19711>)4.3Warning \n[CVE-2018-19710](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19710>)4.3Warning \n[CVE-2018-19709](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19709>)4.3Warning \n[CVE-2018-19706](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19706>)5.0Critical \n[CVE-2018-19705](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19705>)4.3Warning \n[CVE-2018-19704](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19704>)4.3Warning \n[CVE-2018-19703](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19703>)4.3Warning \n[CVE-2018-19701](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19701>)5.0Critical \n[CVE-2018-19699](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19699>)5.0Critical \n[CVE-2018-16047](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16047>)5.0Critical \n[CVE-2018-16043](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16043>)4.3Warning \n[CVE-2018-16041](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16041>)5.0Critical \n[CVE-2018-16038](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16038>)5.0Critical \n[CVE-2018-16035](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16035>)5.0Critical \n[CVE-2018-16034](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16034>)4.3Warning \n[CVE-2018-16033](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16033>)4.3Warning \n[CVE-2018-16032](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16032>)4.3Warning \n[CVE-2018-16031](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16031>)5.0Critical \n[CVE-2018-16030](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16030>)4.3Warning \n[CVE-2018-16028](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16028>)4.3Warning \n[CVE-2018-16024](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16024>)4.3Warning \n[CVE-2018-16023](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16023>)4.3Warning \n[CVE-2018-16022](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16022>)4.3Warning \n[CVE-2018-16020](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16020>)4.3Warning \n[CVE-2018-16019](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16019>)4.3Warning \n[CVE-2018-16017](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16017>)4.3Warning \n[CVE-2018-16015](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16015>)4.3Warning \n[CVE-2018-16013](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16013>)4.3Warning \n[CVE-2018-16012](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16012>)4.3Warning \n[CVE-2018-16010](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16010>)4.3Warning \n[CVE-2018-16006](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16006>)4.3Warning \n[CVE-2018-16005](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16005>)4.3Warning \n[CVE-2018-16002](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16002>)4.3Warning \n[CVE-2018-16001](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16001>)4.3Warning \n[CVE-2018-15997](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15997>)4.3Warning \n[CVE-2018-15996](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15996>)4.3Warning \n[CVE-2018-15989](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15989>)4.3Warning \n[CVE-2018-15985](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15985>)4.3Warning \n[CVE-2018-15984](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15984>)4.3Warning \n[CVE-2018-19719](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19719>)4.3Warning \n[CVE-2018-16009](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16009>)4.3Warning \n[CVE-2018-16007](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16007>)4.3Warning \n[CVE-2018-15995](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15995>)4.3Warning \n[CVE-2018-15986](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15986>)4.3Warning \n[CVE-2018-16042](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16042>)6.4High \n[CVE-2018-19728](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19728>)4.3Warning", "cvss3": {"exploitabilityScore": 3.9, "cvssV3": {"baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "baseScore": 9.8, "privilegesRequired": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "userInteraction": "NONE", "version": "3.0"}, "impactScore": 5.9}, "published": "2018-12-11T00:00:00", "type": "kaspersky", "title": "KLA11390 Multiple vulnerabilities in Adobe Acrobat and Reader", "bulletinFamily": "info", "cvss2": {"severity": "HIGH", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "COMPLETE", "availabilityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "baseScore": 9.3, "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "acInsufInfo": false, "impactScore": 10.0, "obtainUserPrivilege": false}, "cvelist": ["CVE-2018-12830", "CVE-2018-15984", "CVE-2018-15985", "CVE-2018-15986", "CVE-2018-15987", "CVE-2018-15988", "CVE-2018-15989", "CVE-2018-15990", "CVE-2018-15991", "CVE-2018-15992", "CVE-2018-15993", "CVE-2018-15994", "CVE-2018-15995", "CVE-2018-15996", "CVE-2018-15997", "CVE-2018-15998", "CVE-2018-15999", "CVE-2018-16000", "CVE-2018-16001", "CVE-2018-16002", "CVE-2018-16003", "CVE-2018-16004", "CVE-2018-16005", "CVE-2018-16006", "CVE-2018-16007", "CVE-2018-16008", "CVE-2018-16009", "CVE-2018-16010", "CVE-2018-16012", "CVE-2018-16013", "CVE-2018-16014", "CVE-2018-16015", "CVE-2018-16016", "CVE-2018-16017", "CVE-2018-16018", "CVE-2018-16019", "CVE-2018-16020", "CVE-2018-16021", "CVE-2018-16022", "CVE-2018-16023", "CVE-2018-16024", "CVE-2018-16025", "CVE-2018-16026", "CVE-2018-16027", "CVE-2018-16028", "CVE-2018-16029", "CVE-2018-16030", "CVE-2018-16031", "CVE-2018-16032", "CVE-2018-16033", "CVE-2018-16034", "CVE-2018-16035", "CVE-2018-16038", "CVE-2018-16041", "CVE-2018-16042", "CVE-2018-16043", "CVE-2018-16044", "CVE-2018-16045", "CVE-2018-16046", "CVE-2018-16047", "CVE-2018-19699", "CVE-2018-19701", "CVE-2018-19703", "CVE-2018-19704", "CVE-2018-19705", "CVE-2018-19706", "CVE-2018-19709", "CVE-2018-19710", "CVE-2018-19711", "CVE-2018-19712", "CVE-2018-19713", "CVE-2018-19714", "CVE-2018-19716", "CVE-2018-19717", "CVE-2018-19719", "CVE-2018-19720", "CVE-2018-19728"], "modified": "2020-06-03T00:00:00", "id": "KLA11390", "href": "https://threats.kaspersky.com/en/vulnerability/KLA11390/", "cvss": {"score": 9.3, "vector": "AV:N/AC:M/Au:N/C:C/I:C/A:C"}}], "openvas": [{"lastseen": "2019-07-17T14:18:12", "description": "This host is installed with Adobe Acrobat Reader 2017\n and is prone to multiple vulnerabilities.", "cvss3": {}, "published": "2018-12-13T00:00:00", "type": "openvas", "title": "Adobe Reader 2017 Security Updates(apsb18-41)-MAC OS X", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2018-19714", "CVE-2018-19713", "CVE-2018-19698", "CVE-2018-15988", "CVE-2018-16001", "CVE-2018-16033", "CVE-2018-19704", "CVE-2018-16038", "CVE-2018-16014", "CVE-2018-16044", "CVE-2018-16019", "CVE-2018-16008", "CVE-2018-15991", "CVE-2018-19700", "CVE-2018-15985", "CVE-2018-15989", "CVE-2018-16039", "CVE-2018-19709", "CVE-2018-16015", "CVE-2018-19719", "CVE-2018-19703", "CVE-2018-16025", "CVE-2018-16041", "CVE-2018-16042", "CVE-2018-19717", "CVE-2018-15992", "CVE-2018-19716", "CVE-2018-16027", "CVE-2018-16017", "CVE-2018-19712", "CVE-2018-16016", "CVE-2018-16037", "CVE-2018-16002", "CVE-2018-19720", "CVE-2018-19701", "CVE-2018-15986", "CVE-2018-16028", "CVE-2018-16006", "CVE-2018-16022", "CVE-2018-16004", "CVE-2018-16005", "CVE-2018-16013", "CVE-2018-19699", "CVE-2018-15997", "CVE-2018-16035", "CVE-2018-15998", "CVE-2018-16031", "CVE-2018-16009", "CVE-2018-15999", "CVE-2018-16036", "CVE-2018-16030", "CVE-2018-16029", "CVE-2018-16007", "CVE-2018-19715", "CVE-2018-19710", "CVE-2018-15993", "CVE-2018-19728", "CVE-2018-16026", "CVE-2018-16010", "CVE-2018-16021", "CVE-2018-16032", "CVE-2018-15994", "CVE-2018-15987", "CVE-2018-16018", "CVE-2018-12830", "CVE-2018-15996", "CVE-2018-16043", "CVE-2018-15984", "CVE-2018-16046", "CVE-2018-19706", "CVE-2018-15995", "CVE-2018-16024", "CVE-2018-15990", "CVE-2018-16045", "CVE-2018-19711", "CVE-2018-19708", "CVE-2018-16000", "CVE-2018-16003", "CVE-2018-16034", "CVE-2018-16023", "CVE-2018-19702", "CVE-2018-16047", "CVE-2018-16012", "CVE-2018-19705", "CVE-2018-19707", "CVE-2018-16040", "CVE-2018-16020"], "modified": "2019-07-16T00:00:00", "id": "OPENVAS:1361412562310814388", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310814388", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Adobe Acrobat Reader 2017 Security Updates(apsb18-41)-MAC OS X\n#\n# Authors:\n# Vidita V Koushik <vidita@secpod.com>\n#\n# Copyright:\n# Copyright (C) 2018 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nCPE = \"cpe:/a:adobe:acrobat_reader\";\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.814388\");\n script_version(\"2019-07-16T10:27:00+0000\");\n script_cve_id(\"CVE-2018-15998\", \"CVE-2018-15987\", \"CVE-2018-16004\", \"CVE-2018-19720\",\n \"CVE-2018-16045\", \"CVE-2018-16044\", \"CVE-2018-16018\", \"CVE-2018-19715\",\n \"CVE-2018-19713\", \"CVE-2018-19708\", \"CVE-2018-19707\", \"CVE-2018-19700\",\n \"CVE-2018-19698\", \"CVE-2018-16046\", \"CVE-2018-16040\", \"CVE-2018-16039\",\n \"CVE-2018-16037\", \"CVE-2018-16036\", \"CVE-2018-16029\", \"CVE-2018-16027\",\n \"CVE-2018-16026\", \"CVE-2018-16025\", \"CVE-2018-16014\", \"CVE-2018-16008\",\n \"CVE-2018-16003\", \"CVE-2018-15994\", \"CVE-2018-15993\", \"CVE-2018-15992\",\n \"CVE-2018-15991\", \"CVE-2018-15990\", \"CVE-2018-19702\", \"CVE-2018-16016\",\n \"CVE-2018-16000\", \"CVE-2018-15999\", \"CVE-2018-15988\", \"CVE-2018-19716\",\n \"CVE-2018-16021\", \"CVE-2018-12830\", \"CVE-2018-19717\", \"CVE-2018-19714\",\n \"CVE-2018-19712\", \"CVE-2018-19711\", \"CVE-2018-19710\", \"CVE-2018-19709\",\n \"CVE-2018-19706\", \"CVE-2018-19705\", \"CVE-2018-19704\", \"CVE-2018-19703\",\n \"CVE-2018-19701\", \"CVE-2018-19699\", \"CVE-2018-16047\", \"CVE-2018-16043\",\n \"CVE-2018-16041\", \"CVE-2018-16038\", \"CVE-2018-16035\", \"CVE-2018-16034\",\n \"CVE-2018-16033\", \"CVE-2018-16032\", \"CVE-2018-16031\", \"CVE-2018-16030\",\n \"CVE-2018-16028\", \"CVE-2018-16024\", \"CVE-2018-16023\", \"CVE-2018-16022\",\n \"CVE-2018-16020\", \"CVE-2018-16019\", \"CVE-2018-16017\", \"CVE-2018-16015\",\n \"CVE-2018-16013\", \"CVE-2018-16012\", \"CVE-2018-16010\", \"CVE-2018-16006\",\n \"CVE-2018-16005\", \"CVE-2018-16002\", \"CVE-2018-16001\", \"CVE-2018-15997\",\n \"CVE-2018-15996\", \"CVE-2018-15989\", \"CVE-2018-15985\", \"CVE-2018-15984\",\n \"CVE-2018-19719\", \"CVE-2018-16009\", \"CVE-2018-16007\", \"CVE-2018-15995\",\n \"CVE-2018-15986\", \"CVE-2018-16042\", \"CVE-2018-19728\");\n script_tag(name:\"cvss_base\", value:\"10.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_tag(name:\"last_modification\", value:\"2019-07-16 10:27:00 +0000 (Tue, 16 Jul 2019)\");\n script_tag(name:\"creation_date\", value:\"2018-12-13 12:23:21 +0530 (Thu, 13 Dec 2018)\");\n script_name(\"Adobe Reader 2017 Security Updates(apsb18-41)-MAC OS X\");\n\n script_tag(name:\"summary\", value:\"This host is installed with Adobe Acrobat Reader 2017\n and is prone to multiple vulnerabilities.\");\n\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable version is present\n on the target host.\");\n\n script_tag(name:\"insight\", value:\"Multiple flaws exist due to,\n\n - Multiple buffer errors.\n\n - Multiple untrusted pointer dereference errors.\n\n - Multiple security bypass errors.\n\n - Multiple use after free errors.\n\n - Multiple out-of-bounds write and read errors.\n\n - Multiple heap overflow errors.\n\n - Multiple integer overflow errors\");\n\n script_tag(name:\"impact\", value:\"Successful exploitation of this vulnerability\n will allow remote attackers to execute arbitrary code, escalate privileges and\n disclose sensitive information.\");\n\n script_tag(name:\"affected\", value:\"Adobe Acrobat Reader 2017 version 2017.x\n before 2017.011.30110 on MAC OS X.\");\n\n script_tag(name:\"solution\", value:\"Upgrade to Adobe Acrobat Reader 2017 version\n 2017.011.30110 or later. Please see the references for more information.\");\n\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_tag(name:\"qod_type\", value:\"executable_version\");\n script_xref(name:\"URL\", value:\"https://helpx.adobe.com/security/products/acrobat/apsb18-41.html\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2018 Greenbone Networks GmbH\");\n script_family(\"General\");\n script_dependencies(\"secpod_adobe_prdts_detect_macosx.nasl\");\n script_mandatory_keys(\"Adobe/Reader/MacOSX/Version\");\n exit(0);\n}\n\ninclude(\"host_details.inc\");\ninclude(\"version_func.inc\");\n\nif(!infos = get_app_version_and_location(cpe:CPE, exit_no_version:TRUE))\n exit(0);\n\nvers = infos['version'];\npath = infos['location'];\n\nif(version_in_range(version:vers, test_version:\"17.0\", test_version2:\"17.011.30109\")){\n report = report_fixed_ver(installed_version:vers, fixed_version:\"2017.011.30110\", install_path:path);\n security_message(data:report);\n exit(0);\n}\n\nexit(99);\n", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2019-07-17T14:18:29", "description": "This host is installed with Adobe Acrobat DC\n (Classic Track) and is prone to multiple vulnerabilities.", "cvss3": {}, "published": "2018-12-13T00:00:00", "type": "openvas", "title": "Adobe Acrobat DC (Classic Track) Security Updates (apsb18-34) - Mac OS X", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2018-19714", "CVE-2018-19713", "CVE-2018-19698", "CVE-2018-15988", "CVE-2018-16001", "CVE-2018-16033", "CVE-2018-19704", "CVE-2018-16038", "CVE-2018-16014", "CVE-2018-16044", "CVE-2018-16019", "CVE-2018-16008", "CVE-2018-15991", "CVE-2018-19700", "CVE-2018-15985", "CVE-2018-15989", "CVE-2018-16039", "CVE-2018-19709", "CVE-2018-16015", "CVE-2018-19719", "CVE-2018-19703", "CVE-2018-16025", "CVE-2018-16041", "CVE-2018-16042", "CVE-2018-19717", "CVE-2018-15992", "CVE-2018-19716", "CVE-2018-16027", "CVE-2018-16017", "CVE-2018-19712", "CVE-2018-16016", "CVE-2018-16037", "CVE-2018-16002", "CVE-2018-19720", "CVE-2018-19701", "CVE-2018-15986", "CVE-2018-16028", "CVE-2018-16006", "CVE-2018-16022", "CVE-2018-16004", "CVE-2018-16005", "CVE-2018-16013", "CVE-2018-19699", "CVE-2018-15997", "CVE-2018-16035", "CVE-2018-15998", "CVE-2018-16031", "CVE-2018-16009", "CVE-2018-15999", "CVE-2018-16036", "CVE-2018-16030", "CVE-2018-16029", "CVE-2018-16007", "CVE-2018-19715", "CVE-2018-19710", "CVE-2018-15993", "CVE-2018-19728", "CVE-2018-16026", "CVE-2018-16010", "CVE-2018-16021", "CVE-2018-16032", "CVE-2018-15994", "CVE-2018-15987", "CVE-2018-16018", "CVE-2018-12830", "CVE-2018-15996", "CVE-2018-16043", "CVE-2018-15984", "CVE-2018-16046", "CVE-2018-19706", "CVE-2018-15995", "CVE-2018-16024", "CVE-2018-15990", "CVE-2018-16045", "CVE-2018-19711", "CVE-2018-19708", "CVE-2018-16000", "CVE-2018-16003", "CVE-2018-16034", "CVE-2018-16023", "CVE-2018-19702", "CVE-2018-16047", "CVE-2018-16012", "CVE-2018-19705", "CVE-2018-19707", "CVE-2018-16040", "CVE-2018-16020"], "modified": "2019-07-05T00:00:00", "id": "OPENVAS:1361412562310814385", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310814385", "sourceData": "##############################################################################\n# OpenVAS Vulnerability Test\n#\n# Adobe Acrobat DC (Classic Track) Security Updates (apsb18-41)-Mac OS X\n#\n# Authors:\n# Vidita V Koushik <vidita@secpod.com>\n#\n# Copyright:\n# Copyright (C) 2018 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nCPE = \"cpe:/a:adobe:acrobat_dc_classic\";\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.814385\");\n script_version(\"2019-07-05T08:07:19+0000\");\n script_cve_id(\"CVE-2018-15998\", \"CVE-2018-15987\", \"CVE-2018-16004\", \"CVE-2018-19720\",\n \"CVE-2018-16045\", \"CVE-2018-16044\", \"CVE-2018-16018\", \"CVE-2018-19715\",\n \"CVE-2018-19713\", \"CVE-2018-19708\", \"CVE-2018-19707\", \"CVE-2018-19700\",\n \"CVE-2018-19698\", \"CVE-2018-16046\", \"CVE-2018-16040\", \"CVE-2018-16039\",\n \"CVE-2018-16037\", \"CVE-2018-16036\", \"CVE-2018-16029\", \"CVE-2018-16027\",\n \"CVE-2018-16026\", \"CVE-2018-16025\", \"CVE-2018-16014\", \"CVE-2018-16008\",\n \"CVE-2018-16003\", \"CVE-2018-15994\", \"CVE-2018-15993\", \"CVE-2018-15992\",\n \"CVE-2018-15991\", \"CVE-2018-15990\", \"CVE-2018-19702\", \"CVE-2018-16016\",\n \"CVE-2018-16000\", \"CVE-2018-15999\", \"CVE-2018-15988\", \"CVE-2018-19716\",\n \"CVE-2018-16021\", \"CVE-2018-12830\", \"CVE-2018-19717\", \"CVE-2018-19714\",\n \"CVE-2018-19712\", \"CVE-2018-19711\", \"CVE-2018-19710\", \"CVE-2018-19709\",\n \"CVE-2018-19706\", \"CVE-2018-19705\", \"CVE-2018-19704\", \"CVE-2018-19703\",\n \"CVE-2018-19701\", \"CVE-2018-19699\", \"CVE-2018-16047\", \"CVE-2018-16043\",\n \"CVE-2018-16041\", \"CVE-2018-16038\", \"CVE-2018-16035\", \"CVE-2018-16034\",\n \"CVE-2018-16033\", \"CVE-2018-16032\", \"CVE-2018-16031\", \"CVE-2018-16030\",\n \"CVE-2018-16028\", \"CVE-2018-16024\", \"CVE-2018-16023\", \"CVE-2018-16022\",\n \"CVE-2018-16020\", \"CVE-2018-16019\", \"CVE-2018-16017\", \"CVE-2018-16015\",\n \"CVE-2018-16013\", \"CVE-2018-16012\", \"CVE-2018-16010\", \"CVE-2018-16006\",\n \"CVE-2018-16005\", \"CVE-2018-16002\", \"CVE-2018-16001\", \"CVE-2018-15997\",\n \"CVE-2018-15996\", \"CVE-2018-15989\", \"CVE-2018-15985\", \"CVE-2018-15984\",\n \"CVE-2018-19719\", \"CVE-2018-16009\", \"CVE-2018-16007\", \"CVE-2018-15995\",\n \"CVE-2018-15986\", \"CVE-2018-16042\", \"CVE-2018-19728\");\n script_tag(name:\"cvss_base\", value:\"10.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_tag(name:\"last_modification\", value:\"2019-07-05 08:07:19 +0000 (Fri, 05 Jul 2019)\");\n script_tag(name:\"creation_date\", value:\"2018-12-13 12:21:21 +0530 (Thu, 13 Dec 2018)\");\n\n script_name(\"Adobe Acrobat DC (Classic Track) Security Updates (apsb18-34) - Mac OS X\");\n\n script_tag(name:\"summary\", value:\"This host is installed with Adobe Acrobat DC\n (Classic Track) and is prone to multiple vulnerabilities.\");\n\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable version is present\n on the target host.\");\n\n script_tag(name:\"insight\", value:\"Multiple flaws exist due to,\n\n - Multiple buffer errors.\n\n - Multiple untrusted pointer dereference errors.\n\n - Multiple security bypass errors.\n\n - Multiple use after free errors.\n\n - Multiple out-of-bounds write and read errors.\n\n - Multiple heap overflow errors.\n\n - Multiple integer overflow errors\");\n\n script_tag(name:\"impact\", value:\"Successful exploitation of this vulnerability\n will allow remote attackers to execute arbitrary code, escalate privileges and\n disclose sensitive information.\");\n\n script_tag(name:\"affected\", value:\"Adobe Acrobat DC (Classic Track)\n 2015.006.30456 and earlier versions on Mac OS X.\");\n\n script_tag(name:\"solution\", value:\"Upgrade to Adobe Acrobat DC (Classic Track)\n version 2015.006.30461 or later. Please see the references for more information.\");\n\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_tag(name:\"qod_type\", value:\"executable_version\");\n script_xref(name:\"URL\", value:\"https://helpx.adobe.com/security/products/acrobat/apsb18-41.html\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2018 Greenbone Networks GmbH\");\n script_family(\"General\");\n script_dependencies(\"gb_adobe_acrobat_dc_classic_detect_macosx.nasl\");\n script_mandatory_keys(\"Adobe/AcrobatDC/Classic/MacOSX/Version\");\n exit(0);\n}\n\ninclude(\"host_details.inc\");\ninclude(\"version_func.inc\");\n\nif(!infos = get_app_version_and_location(cpe:CPE, exit_no_version:TRUE)) exit(0);\nvers = infos['version'];\npath = infos['location'];\n\nif(version_is_less(version:vers, test_version:\"15.006.30461\")) {\n report = report_fixed_ver(installed_version:vers, fixed_version:\"15.006.30461 (2015.006.30461)\", install_path:path);\n security_message(data:report);\n exit(0);\n}\n\nexit(99);\n", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2019-07-17T14:17:51", "description": "This host is installed with Adobe Acrobat 2017\n and is prone to multiple vulnerabilities.", "cvss3": {}, "published": "2018-12-13T00:00:00", "type": "openvas", "title": "Adobe Acrobat 2017 Security Updates(apsb18-41)-Windows", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2018-19714", "CVE-2018-19713", "CVE-2018-19698", "CVE-2018-15988", "CVE-2018-16001", "CVE-2018-16033", "CVE-2018-19704", "CVE-2018-16038", "CVE-2018-16014", "CVE-2018-16044", "CVE-2018-16019", "CVE-2018-16008", "CVE-2018-15991", "CVE-2018-19700", "CVE-2018-15985", "CVE-2018-15989", "CVE-2018-16039", "CVE-2018-19709", "CVE-2018-16015", "CVE-2018-19719", "CVE-2018-19703", "CVE-2018-16025", "CVE-2018-16041", "CVE-2018-16042", "CVE-2018-19717", "CVE-2018-15992", "CVE-2018-19716", "CVE-2018-16027", "CVE-2018-16017", "CVE-2018-19712", "CVE-2018-16016", "CVE-2018-16037", "CVE-2018-16002", "CVE-2018-19720", "CVE-2018-19701", "CVE-2018-15986", "CVE-2018-16028", "CVE-2018-16006", "CVE-2018-16022", "CVE-2018-16004", "CVE-2018-16005", "CVE-2018-16013", "CVE-2018-19699", "CVE-2018-15997", "CVE-2018-16035", "CVE-2018-15998", "CVE-2018-16031", "CVE-2018-16009", "CVE-2018-15999", "CVE-2018-16036", "CVE-2018-16030", "CVE-2018-16029", "CVE-2018-16007", "CVE-2018-19715", "CVE-2018-19710", "CVE-2018-15993", "CVE-2018-19728", "CVE-2018-16026", "CVE-2018-16010", "CVE-2018-16021", "CVE-2018-16032", "CVE-2018-15994", "CVE-2018-15987", "CVE-2018-16018", "CVE-2018-12830", "CVE-2018-15996", "CVE-2018-16043", "CVE-2018-15984", "CVE-2018-16046", "CVE-2018-19706", "CVE-2018-15995", "CVE-2018-16024", "CVE-2018-15990", "CVE-2018-16045", "CVE-2018-19711", "CVE-2018-19708", "CVE-2018-16000", "CVE-2018-16003", "CVE-2018-16034", "CVE-2018-16023", "CVE-2018-19702", "CVE-2018-16047", "CVE-2018-16012", "CVE-2018-19705", "CVE-2018-19707", "CVE-2018-16040", "CVE-2018-16020"], "modified": "2019-07-16T00:00:00", "id": "OPENVAS:1361412562310814390", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310814390", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Adobe Acrobat 2017 Security Updates(apsb18-41)-Windows\n#\n# Authors:\n# Vidita V Koushik <vidita@secpod.com>\n#\n# Copyright:\n# Copyright (C) 2018 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nCPE = \"cpe:/a:adobe:acrobat\";\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.814390\");\n script_version(\"2019-07-16T10:51:36+0000\");\n script_cve_id(\"CVE-2018-15998\", \"CVE-2018-15987\", \"CVE-2018-16004\", \"CVE-2018-19720\",\n \"CVE-2018-16045\", \"CVE-2018-16044\", \"CVE-2018-16018\", \"CVE-2018-19715\",\n \"CVE-2018-19713\", \"CVE-2018-19708\", \"CVE-2018-19707\", \"CVE-2018-19700\",\n \"CVE-2018-19698\", \"CVE-2018-16046\", \"CVE-2018-16040\", \"CVE-2018-16039\",\n \"CVE-2018-16037\", \"CVE-2018-16036\", \"CVE-2018-16029\", \"CVE-2018-16027\",\n \"CVE-2018-16026\", \"CVE-2018-16025\", \"CVE-2018-16014\", \"CVE-2018-16008\",\n \"CVE-2018-16003\", \"CVE-2018-15994\", \"CVE-2018-15993\", \"CVE-2018-15992\",\n \"CVE-2018-15991\", \"CVE-2018-15990\", \"CVE-2018-19702\", \"CVE-2018-16016\",\n \"CVE-2018-16000\", \"CVE-2018-15999\", \"CVE-2018-15988\", \"CVE-2018-19716\",\n \"CVE-2018-16021\", \"CVE-2018-12830\", \"CVE-2018-19717\", \"CVE-2018-19714\",\n \"CVE-2018-19712\", \"CVE-2018-19711\", \"CVE-2018-19710\", \"CVE-2018-19709\",\n \"CVE-2018-19706\", \"CVE-2018-19705\", \"CVE-2018-19704\", \"CVE-2018-19703\",\n \"CVE-2018-19701\", \"CVE-2018-19699\", \"CVE-2018-16047\", \"CVE-2018-16043\",\n \"CVE-2018-16041\", \"CVE-2018-16038\", \"CVE-2018-16035\", \"CVE-2018-16034\",\n \"CVE-2018-16033\", \"CVE-2018-16032\", \"CVE-2018-16031\", \"CVE-2018-16030\",\n \"CVE-2018-16028\", \"CVE-2018-16024\", \"CVE-2018-16023\", \"CVE-2018-16022\",\n \"CVE-2018-16020\", \"CVE-2018-16019\", \"CVE-2018-16017\", \"CVE-2018-16015\",\n \"CVE-2018-16013\", \"CVE-2018-16012\", \"CVE-2018-16010\", \"CVE-2018-16006\",\n \"CVE-2018-16005\", \"CVE-2018-16002\", \"CVE-2018-16001\", \"CVE-2018-15997\",\n \"CVE-2018-15996\", \"CVE-2018-15989\", \"CVE-2018-15985\", \"CVE-2018-15984\",\n \"CVE-2018-19719\", \"CVE-2018-16009\", \"CVE-2018-16007\", \"CVE-2018-15995\",\n \"CVE-2018-15986\", \"CVE-2018-16042\", \"CVE-2018-19728\");\n script_tag(name:\"cvss_base\", value:\"10.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_tag(name:\"last_modification\", value:\"2019-07-16 10:51:36 +0000 (Tue, 16 Jul 2019)\");\n script_tag(name:\"creation_date\", value:\"2018-12-13 12:45:21 +0530 (Thu, 13 Dec 2018)\");\n script_name(\"Adobe Acrobat 2017 Security Updates(apsb18-41)-Windows\");\n\n script_tag(name:\"summary\", value:\"This host is installed with Adobe Acrobat 2017\n and is prone to multiple vulnerabilities.\");\n\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable version is present\n on the target host.\");\n\n script_tag(name:\"insight\", value:\"Multiple flaws exist due to,\n\n - Multiple buffer errors.\n\n - Multiple untrusted pointer dereference errors.\n\n - Multiple security bypass errors.\n\n - Multiple use after free errors.\n\n - Multiple out-of-bounds write and read errors.\n\n - Multiple heap overflow errors.\n\n - Multiple integer overflow errors\");\n\n script_tag(name:\"impact\", value:\"Successful exploitation of this vulnerability\n will allow remote attackers to execute arbitrary code, escalate privileges and\n disclose sensitive information.\");\n\n\n script_tag(name:\"affected\", value:\"Adobe Acrobat 2017 version 2017.011.30106\n and earlier on Windows.\");\n\n script_tag(name:\"solution\", value:\"Upgrade to Adobe Acrobat 2017 version\n 2017.011.30110 or later. Please see the references for more information.\");\n\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_tag(name:\"qod_type\", value:\"registry\");\n script_xref(name:\"URL\", value:\"https://helpx.adobe.com/security/products/acrobat/apsb18-41.html\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2018 Greenbone Networks GmbH\");\n script_family(\"General\");\n script_dependencies(\"secpod_adobe_prdts_detect_win.nasl\");\n script_mandatory_keys(\"Adobe/Acrobat/Win/Ver\");\n exit(0);\n}\n\ninclude(\"host_details.inc\");\ninclude(\"version_func.inc\");\n\nif(!infos = get_app_version_and_location(cpe:CPE, exit_no_version:TRUE))\n exit(0);\n\nvers = infos['version'];\npath = infos['location'];\n\nif(version_in_range(version:vers, test_version:\"17.0\", test_version2:\"17.011.30106\")) {\n report = report_fixed_ver(installed_version:vers, fixed_version:\"17.011.30110 (2017.011.30110)\", install_path:path);\n security_message(data:report);\n exit(0);\n}\n\nexit(99);\n", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2019-07-17T14:17:35", "description": "This host is installed with Adobe Acrobat\n Reader DC (Continuous Track) and is prone to multiple vulnerabilities.", "cvss3": {}, "published": "2018-12-13T00:00:00", "type": "openvas", "title": "Adobe Acrobat Reader DC (Continuous Track) Security Updates (apsb18-34) - Windows", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2018-19714", "CVE-2018-19713", "CVE-2018-19698", "CVE-2018-15988", "CVE-2018-16001", "CVE-2018-16033", "CVE-2018-19704", "CVE-2018-16038", "CVE-2018-16014", "CVE-2018-16044", "CVE-2018-16019", "CVE-2018-16008", "CVE-2018-15991", "CVE-2018-19700", "CVE-2018-15985", "CVE-2018-15989", "CVE-2018-16039", "CVE-2018-19709", "CVE-2018-16015", "CVE-2018-19719", "CVE-2018-19703", "CVE-2018-16025", "CVE-2018-16041", "CVE-2018-16042", "CVE-2018-19717", "CVE-2018-15992", "CVE-2018-19716", "CVE-2018-16027", "CVE-2018-16017", "CVE-2018-19712", "CVE-2018-16016", "CVE-2018-16037", "CVE-2018-16002", "CVE-2018-19720", "CVE-2018-19701", "CVE-2018-15986", "CVE-2018-16028", "CVE-2018-16006", "CVE-2018-16022", "CVE-2018-16004", "CVE-2018-16005", "CVE-2018-16013", "CVE-2018-19699", "CVE-2018-15997", "CVE-2018-16035", "CVE-2018-15998", "CVE-2018-16031", "CVE-2018-16009", "CVE-2018-15999", "CVE-2018-16036", "CVE-2018-16030", "CVE-2018-16029", "CVE-2018-16007", "CVE-2018-19715", "CVE-2018-19710", "CVE-2018-15993", "CVE-2018-19728", "CVE-2018-16026", "CVE-2018-16010", "CVE-2018-16021", "CVE-2018-16032", "CVE-2018-15994", "CVE-2018-15987", "CVE-2018-16018", "CVE-2018-12830", "CVE-2018-15996", "CVE-2018-16043", "CVE-2018-15984", "CVE-2018-16046", "CVE-2018-19706", "CVE-2018-15995", "CVE-2018-16024", "CVE-2018-15990", "CVE-2018-16045", "CVE-2018-19711", "CVE-2018-19708", "CVE-2018-16000", "CVE-2018-16003", "CVE-2018-16034", "CVE-2018-16023", "CVE-2018-19702", "CVE-2018-16047", "CVE-2018-16012", "CVE-2018-19705", "CVE-2018-19707", "CVE-2018-16040", "CVE-2018-16020"], "modified": "2019-07-05T00:00:00", "id": "OPENVAS:1361412562310814381", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310814381", "sourceData": "##############################################################################\n# OpenVAS Vulnerability Test\n#\n# Adobe Acrobat Reader DC (Continuous Track) Security Updates (apsb18-41)-Windows\n#\n# Authors:\n# Vidita V Koushik <vidita@secpod.com>\n#\n# Copyright:\n# Copyright (C) 2018 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nCPE = \"cpe:/a:adobe:acrobat_reader_dc_continuous\";\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.814381\");\n script_version(\"2019-07-05T08:07:19+0000\");\n script_cve_id(\"CVE-2018-15998\", \"CVE-2018-15987\", \"CVE-2018-16004\", \"CVE-2018-19720\",\n \"CVE-2018-16045\", \"CVE-2018-16044\", \"CVE-2018-16018\", \"CVE-2018-19715\",\n \"CVE-2018-19713\", \"CVE-2018-19708\", \"CVE-2018-19707\", \"CVE-2018-19700\",\n \"CVE-2018-19698\", \"CVE-2018-16046\", \"CVE-2018-16040\", \"CVE-2018-16039\",\n \"CVE-2018-16037\", \"CVE-2018-16036\", \"CVE-2018-16029\", \"CVE-2018-16027\",\n \"CVE-2018-16026\", \"CVE-2018-16025\", \"CVE-2018-16014\", \"CVE-2018-16008\",\n \"CVE-2018-16003\", \"CVE-2018-15994\", \"CVE-2018-15993\", \"CVE-2018-15992\",\n \"CVE-2018-15991\", \"CVE-2018-15990\", \"CVE-2018-19702\", \"CVE-2018-16016\",\n \"CVE-2018-16000\", \"CVE-2018-15999\", \"CVE-2018-15988\", \"CVE-2018-19716\",\n \"CVE-2018-16021\", \"CVE-2018-12830\", \"CVE-2018-19717\", \"CVE-2018-19714\",\n \"CVE-2018-19712\", \"CVE-2018-19711\", \"CVE-2018-19710\", \"CVE-2018-19709\",\n \"CVE-2018-19706\", \"CVE-2018-19705\", \"CVE-2018-19704\", \"CVE-2018-19703\",\n \"CVE-2018-19701\", \"CVE-2018-19699\", \"CVE-2018-16047\", \"CVE-2018-16043\",\n \"CVE-2018-16041\", \"CVE-2018-16038\", \"CVE-2018-16035\", \"CVE-2018-16034\",\n \"CVE-2018-16033\", \"CVE-2018-16032\", \"CVE-2018-16031\", \"CVE-2018-16030\",\n \"CVE-2018-16028\", \"CVE-2018-16024\", \"CVE-2018-16023\", \"CVE-2018-16022\",\n \"CVE-2018-16020\", \"CVE-2018-16019\", \"CVE-2018-16017\", \"CVE-2018-16015\",\n \"CVE-2018-16013\", \"CVE-2018-16012\", \"CVE-2018-16010\", \"CVE-2018-16006\",\n \"CVE-2018-16005\", \"CVE-2018-16002\", \"CVE-2018-16001\", \"CVE-2018-15997\",\n \"CVE-2018-15996\", \"CVE-2018-15989\", \"CVE-2018-15985\", \"CVE-2018-15984\",\n \"CVE-2018-19719\", \"CVE-2018-16009\", \"CVE-2018-16007\", \"CVE-2018-15995\",\n \"CVE-2018-15986\", \"CVE-2018-16042\", \"CVE-2018-19728\");\n script_tag(name:\"cvss_base\", value:\"10.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_tag(name:\"last_modification\", value:\"2019-07-05 08:07:19 +0000 (Fri, 05 Jul 2019)\");\n script_tag(name:\"creation_date\", value:\"2018-12-13 12:25:21 +0530 (Thu, 13 Dec 2018)\");\n script_name(\"Adobe Acrobat Reader DC (Continuous Track) Security Updates (apsb18-34) - Windows\");\n\n script_tag(name:\"summary\", value:\"This host is installed with Adobe Acrobat\n Reader DC (Continuous Track) and is prone to multiple vulnerabilities.\");\n\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable version is present\n on the target host.\");\n\n script_tag(name:\"insight\", value:\"Multiple flaws exist due to,\n\n - Multiple buffer errors.\n\n - Multiple untrusted pointer dereference errors.\n\n - Multiple security bypass errors.\n\n - Multiple use after free errors.\n\n - Multiple out-of-bounds write and read errors.\n\n - Multiple heap overflow errors.\n\n - Multiple integer overflow errors\");\n\n script_tag(name:\"impact\", value:\"Successful exploitation of this vulnerability\n will allow remote attackers to execute arbitrary code, escalate privileges and\n disclose sensitive information.\");\n\n script_tag(name:\"affected\", value:\"Adobe Acrobat Reader DC (Continuous Track)\n 2019.010.20064 and earlier versions on Windows.\");\n\n script_tag(name:\"solution\", value:\"Upgrade to Adobe Acrobat Reader DC Continuous\n version 2019.010.20064 or later. Please see the references for more information.\");\n\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_tag(name:\"qod_type\", value:\"registry\");\n script_xref(name:\"URL\", value:\"https://helpx.adobe.com/security/products/acrobat/apsb18-41.html\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2018 Greenbone Networks GmbH\");\n script_family(\"General\");\n script_dependencies(\"gb_adobe_acrobat_reader_dc_cont_detect_win.nasl\");\n script_mandatory_keys(\"Adobe/Acrobat/ReaderDC/Continuous/Win/Ver\");\n exit(0);\n}\n\ninclude(\"host_details.inc\");\ninclude(\"version_func.inc\");\n\nif(!infos = get_app_version_and_location(cpe:CPE, exit_no_version:TRUE)) exit(0);\nvers = infos['version'];\npath = infos['location'];\n\nif(version_is_less(version:vers, test_version:\"19.010.20064\")) {\n report = report_fixed_ver(installed_version:vers, fixed_version:\"19.010.20064 (2019.010.20064)\", install_path:path);\n security_message(data:report);\n exit(0);\n}\n\nexit(99);\n", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2019-07-17T14:17:36", "description": "This host is installed with Adobe Acrobat DC\n (Continuous Track) and is prone to multiple vulnerabilities.", "cvss3": {}, "published": "2018-12-13T00:00:00", "type": "openvas", "title": "Adobe Acrobat DC (Continuous Track) Security Updates (apsb18-41) - Windows", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2018-19714", "CVE-2018-19713", "CVE-2018-19698", "CVE-2018-15988", "CVE-2018-16001", "CVE-2018-16033", "CVE-2018-19704", "CVE-2018-16038", "CVE-2018-16014", "CVE-2018-16044", "CVE-2018-16019", "CVE-2018-16008", "CVE-2018-15991", "CVE-2018-19700", "CVE-2018-15985", "CVE-2018-15989", "CVE-2018-16039", "CVE-2018-19709", "CVE-2018-16015", "CVE-2018-19719", "CVE-2018-19703", "CVE-2018-16025", "CVE-2018-16041", "CVE-2018-16042", "CVE-2018-19717", "CVE-2018-15992", "CVE-2018-19716", "CVE-2018-16027", "CVE-2018-16017", "CVE-2018-19712", "CVE-2018-16016", "CVE-2018-16037", "CVE-2018-16002", "CVE-2018-19720", "CVE-2018-19701", "CVE-2018-15986", "CVE-2018-16028", "CVE-2018-16006", "CVE-2018-16022", "CVE-2018-16004", "CVE-2018-16005", "CVE-2018-16013", "CVE-2018-19699", "CVE-2018-15997", "CVE-2018-16035", "CVE-2018-15998", "CVE-2018-16031", "CVE-2018-16009", "CVE-2018-15999", "CVE-2018-16036", "CVE-2018-16030", "CVE-2018-16029", "CVE-2018-16007", "CVE-2018-19715", "CVE-2018-19710", "CVE-2018-15993", "CVE-2018-19728", "CVE-2018-16026", "CVE-2018-16010", "CVE-2018-16021", "CVE-2018-16032", "CVE-2018-15994", "CVE-2018-15987", "CVE-2018-16018", "CVE-2018-12830", "CVE-2018-15996", "CVE-2018-16043", "CVE-2018-15984", "CVE-2018-16046", "CVE-2018-19706", "CVE-2018-15995", "CVE-2018-16024", "CVE-2018-15990", "CVE-2018-16045", "CVE-2018-19711", "CVE-2018-19708", "CVE-2018-16000", "CVE-2018-16003", "CVE-2018-16034", "CVE-2018-16023", "CVE-2018-19702", "CVE-2018-16047", "CVE-2018-16012", "CVE-2018-19705", "CVE-2018-19707", "CVE-2018-16040", "CVE-2018-16020"], "modified": "2019-07-05T00:00:00", "id": "OPENVAS:1361412562310814382", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310814382", "sourceData": "##############################################################################\n# OpenVAS Vulnerability Test\n#\n# Adobe Acrobat DC (Continuous Track) Security Updates (apsb18-41)-Windows\n#\n# Authors:\n# Vidita V Koushik <vidita@secpod.com>\n#\n# Copyright:\n# Copyright (C) 2018 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nCPE = \"cpe:/a:adobe:acrobat_dc_continuous\";\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.814382\");\n script_version(\"2019-07-05T08:07:19+0000\");\n script_cve_id(\"CVE-2018-15998\", \"CVE-2018-15987\", \"CVE-2018-16004\", \"CVE-2018-19720\",\n \"CVE-2018-16045\", \"CVE-2018-16044\", \"CVE-2018-16018\", \"CVE-2018-19715\",\n \"CVE-2018-19713\", \"CVE-2018-19708\", \"CVE-2018-19707\", \"CVE-2018-19700\",\n \"CVE-2018-19698\", \"CVE-2018-16046\", \"CVE-2018-16040\", \"CVE-2018-16039\",\n \"CVE-2018-16037\", \"CVE-2018-16036\", \"CVE-2018-16029\", \"CVE-2018-16027\",\n \"CVE-2018-16026\", \"CVE-2018-16025\", \"CVE-2018-16014\", \"CVE-2018-16008\",\n \"CVE-2018-16003\", \"CVE-2018-15994\", \"CVE-2018-15993\", \"CVE-2018-15992\",\n \"CVE-2018-15991\", \"CVE-2018-15990\", \"CVE-2018-19702\", \"CVE-2018-16016\",\n \"CVE-2018-16000\", \"CVE-2018-15999\", \"CVE-2018-15988\", \"CVE-2018-19716\",\n \"CVE-2018-16021\", \"CVE-2018-12830\", \"CVE-2018-19717\", \"CVE-2018-19714\",\n \"CVE-2018-19712\", \"CVE-2018-19711\", \"CVE-2018-19710\", \"CVE-2018-19709\",\n \"CVE-2018-19706\", \"CVE-2018-19705\", \"CVE-2018-19704\", \"CVE-2018-19703\",\n \"CVE-2018-19701\", \"CVE-2018-19699\", \"CVE-2018-16047\", \"CVE-2018-16043\",\n \"CVE-2018-16041\", \"CVE-2018-16038\", \"CVE-2018-16035\", \"CVE-2018-16034\",\n \"CVE-2018-16033\", \"CVE-2018-16032\", \"CVE-2018-16031\", \"CVE-2018-16030\",\n \"CVE-2018-16028\", \"CVE-2018-16024\", \"CVE-2018-16023\", \"CVE-2018-16022\",\n \"CVE-2018-16020\", \"CVE-2018-16019\", \"CVE-2018-16017\", \"CVE-2018-16015\",\n \"CVE-2018-16013\", \"CVE-2018-16012\", \"CVE-2018-16010\", \"CVE-2018-16006\",\n \"CVE-2018-16005\", \"CVE-2018-16002\", \"CVE-2018-16001\", \"CVE-2018-15997\",\n \"CVE-2018-15996\", \"CVE-2018-15989\", \"CVE-2018-15985\", \"CVE-2018-15984\",\n \"CVE-2018-19719\", \"CVE-2018-16009\", \"CVE-2018-16007\", \"CVE-2018-15995\",\n \"CVE-2018-15986\", \"CVE-2018-16042\", \"CVE-2018-19728\");\n script_tag(name:\"cvss_base\", value:\"10.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_tag(name:\"last_modification\", value:\"2019-07-05 08:07:19 +0000 (Fri, 05 Jul 2019)\");\n script_tag(name:\"creation_date\", value:\"2018-12-13 12:33:21 +0530 (Thu, 13 Dec 2018)\");\n script_name(\"Adobe Acrobat DC (Continuous Track) Security Updates (apsb18-41) - Windows\");\n\n script_tag(name:\"summary\", value:\"This host is installed with Adobe Acrobat DC\n (Continuous Track) and is prone to multiple vulnerabilities.\");\n\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable version is present\n on the target host.\");\n\n script_tag(name:\"insight\", value:\"Multiple flaws exist due to,\n\n - Multiple buffer errors.\n\n - Multiple untrusted pointer dereference errors.\n\n - Multiple security bypass errors.\n\n - Multiple use after free errors.\n\n - Multiple out-of-bounds write and read errors.\n\n - Multiple heap overflow errors.\n\n - Multiple integer overflow errors\");\n\n script_tag(name:\"impact\", value:\"Successful exploitation of this vulnerability\n will allow remote attackers to execute arbitrary code, escalate privileges and\n disclose sensitive information.\");\n\n script_tag(name:\"affected\", value:\"Adobe Acrobat DC (Continuous Track)\n 2019.008.20081 and earlier versions on Windows.\");\n\n script_tag(name:\"solution\", value:\"Upgrade to Adobe Acrobat DC Continuous\n version 2019.010.20064 or later. Please see the references for more information.\");\n\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_tag(name:\"qod_type\", value:\"registry\");\n script_xref(name:\"URL\", value:\"https://helpx.adobe.com/security/products/acrobat/apsb18-41.html\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2018 Greenbone Networks GmbH\");\n script_family(\"General\");\n script_dependencies(\"gb_adobe_acrobat_dc_cont_detect_win.nasl\");\n script_mandatory_keys(\"Adobe/AcrobatDC/Continuous/Win/Ver\");\n exit(0);\n}\n\ninclude(\"host_details.inc\");\ninclude(\"version_func.inc\");\n\nif(!infos = get_app_version_and_location(cpe:CPE, exit_no_version:TRUE)) exit(0);\nvers = infos['version'];\npath = infos['location'];\n\nif(version_is_less(version:vers, test_version:\"19.010.20064\")) {\n report = report_fixed_ver(installed_version:vers, fixed_version:\"19.010.20064 (2019.010.20064)\", install_path:path);\n security_message(data:report);\n exit(0);\n}\n\nexit(99);\n", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2019-07-17T14:18:23", "description": "This host is installed with Adobe Acrobat\n Reader DC (Continuous Track) and is prone to multiple vulnerabilities.", "cvss3": {}, "published": "2018-12-13T00:00:00", "type": "openvas", "title": "Adobe Acrobat Reader DC (Continuous Track) Security Updates (apsb18-41) - Mac OS X", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2018-19714", "CVE-2018-19713", "CVE-2018-19698", "CVE-2018-15988", "CVE-2018-16001", "CVE-2018-16033", "CVE-2018-19704", "CVE-2018-16038", "CVE-2018-16014", "CVE-2018-16044", "CVE-2018-16019", "CVE-2018-16008", "CVE-2018-15991", "CVE-2018-19700", "CVE-2018-15985", "CVE-2018-15989", "CVE-2018-16039", "CVE-2018-19709", "CVE-2018-16015", "CVE-2018-19719", "CVE-2018-19703", "CVE-2018-16025", "CVE-2018-16041", "CVE-2018-16042", "CVE-2018-19717", "CVE-2018-15992", "CVE-2018-19716", "CVE-2018-16027", "CVE-2018-16017", "CVE-2018-19712", "CVE-2018-16016", "CVE-2018-16037", "CVE-2018-16002", "CVE-2018-19720", "CVE-2018-19701", "CVE-2018-15986", "CVE-2018-16028", "CVE-2018-16006", "CVE-2018-16022", "CVE-2018-16004", "CVE-2018-16005", "CVE-2018-16013", "CVE-2018-19699", "CVE-2018-15997", "CVE-2018-16035", "CVE-2018-15998", "CVE-2018-16031", "CVE-2018-16009", "CVE-2018-15999", "CVE-2018-16036", "CVE-2018-16030", "CVE-2018-16029", "CVE-2018-16007", "CVE-2018-19715", "CVE-2018-19710", "CVE-2018-15993", "CVE-2018-19728", "CVE-2018-16026", "CVE-2018-16010", "CVE-2018-16021", "CVE-2018-16032", "CVE-2018-15994", "CVE-2018-15987", "CVE-2018-16018", "CVE-2018-12830", "CVE-2018-15996", "CVE-2018-16043", "CVE-2018-15984", "CVE-2018-16046", "CVE-2018-19706", "CVE-2018-15995", "CVE-2018-16024", "CVE-2018-15990", "CVE-2018-16045", "CVE-2018-19711", "CVE-2018-19708", "CVE-2018-16000", "CVE-2018-16003", "CVE-2018-16034", "CVE-2018-16023", "CVE-2018-19702", "CVE-2018-16047", "CVE-2018-16012", "CVE-2018-19705", "CVE-2018-19707", "CVE-2018-16040", "CVE-2018-16020"], "modified": "2019-07-05T00:00:00", "id": "OPENVAS:1361412562310814380", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310814380", "sourceData": "##############################################################################\n# OpenVAS Vulnerability Test\n#\n# Adobe Acrobat Reader DC (Continuous Track) Security Updates (apsb18-41)-Mac OS X\n#\n# Authors:\n# Vidita V Koushik <vidita@secpod.com>\n#\n# Copyright:\n# Copyright (C) 2018 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nCPE = \"cpe:/a:adobe:acrobat_reader_dc_continuous\";\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.814380\");\n script_version(\"2019-07-05T08:07:19+0000\");\n script_cve_id(\"CVE-2018-15998\", \"CVE-2018-15987\", \"CVE-2018-16004\", \"CVE-2018-19720\",\n \"CVE-2018-16045\", \"CVE-2018-16044\", \"CVE-2018-16018\", \"CVE-2018-19715\",\n \"CVE-2018-19713\", \"CVE-2018-19708\", \"CVE-2018-19707\", \"CVE-2018-19700\",\n \"CVE-2018-19698\", \"CVE-2018-16046\", \"CVE-2018-16040\", \"CVE-2018-16039\",\n \"CVE-2018-16037\", \"CVE-2018-16036\", \"CVE-2018-16029\", \"CVE-2018-16027\",\n \"CVE-2018-16026\", \"CVE-2018-16025\", \"CVE-2018-16014\", \"CVE-2018-16008\",\n \"CVE-2018-16003\", \"CVE-2018-15994\", \"CVE-2018-15993\", \"CVE-2018-15992\",\n \"CVE-2018-15991\", \"CVE-2018-15990\", \"CVE-2018-19702\", \"CVE-2018-16016\",\n \"CVE-2018-16000\", \"CVE-2018-15999\", \"CVE-2018-15988\", \"CVE-2018-19716\",\n \"CVE-2018-16021\", \"CVE-2018-12830\", \"CVE-2018-19717\", \"CVE-2018-19714\",\n \"CVE-2018-19712\", \"CVE-2018-19711\", \"CVE-2018-19710\", \"CVE-2018-19709\",\n \"CVE-2018-19706\", \"CVE-2018-19705\", \"CVE-2018-19704\", \"CVE-2018-19703\",\n \"CVE-2018-19701\", \"CVE-2018-19699\", \"CVE-2018-16047\", \"CVE-2018-16043\",\n \"CVE-2018-16041\", \"CVE-2018-16038\", \"CVE-2018-16035\", \"CVE-2018-16034\",\n \"CVE-2018-16033\", \"CVE-2018-16032\", \"CVE-2018-16031\", \"CVE-2018-16030\",\n \"CVE-2018-16028\", \"CVE-2018-16024\", \"CVE-2018-16023\", \"CVE-2018-16022\",\n \"CVE-2018-16020\", \"CVE-2018-16019\", \"CVE-2018-16017\", \"CVE-2018-16015\",\n \"CVE-2018-16013\", \"CVE-2018-16012\", \"CVE-2018-16010\", \"CVE-2018-16006\",\n \"CVE-2018-16005\", \"CVE-2018-16002\", \"CVE-2018-16001\", \"CVE-2018-15997\",\n \"CVE-2018-15996\", \"CVE-2018-15989\", \"CVE-2018-15985\", \"CVE-2018-15984\",\n \"CVE-2018-19719\", \"CVE-2018-16009\", \"CVE-2018-16007\", \"CVE-2018-15995\",\n \"CVE-2018-15986\", \"CVE-2018-16042\", \"CVE-2018-19728\");\n script_tag(name:\"cvss_base\", value:\"10.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_tag(name:\"last_modification\", value:\"2019-07-05 08:07:19 +0000 (Fri, 05 Jul 2019)\");\n script_tag(name:\"creation_date\", value:\"2018-12-13 12:24:21 +0530 (Thu, 13 Dec 2018)\");\n\n script_name(\"Adobe Acrobat Reader DC (Continuous Track) Security Updates (apsb18-41) - Mac OS X\");\n\n script_tag(name:\"summary\", value:\"This host is installed with Adobe Acrobat\n Reader DC (Continuous Track) and is prone to multiple vulnerabilities.\");\n\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable version is present\n on the target host.\");\n\n script_tag(name:\"insight\", value:\"Multiple flaws exist due to,\n\n - Multiple buffer errors.\n\n - Multiple untrusted pointer dereference errors.\n\n - Multiple security bypass errors.\n\n - Multiple use after free errors.\n\n - Multiple out-of-bounds write and read errors.\n\n - Multiple heap overflow errors.\n\n - Multiple integer overflow errors\");\n\n script_tag(name:\"impact\", value:\"Successful exploitation of this vulnerability\n will allow remote attackers to execute arbitrary code, escalate privileges and\n disclose sensitive information.\");\n\n script_tag(name:\"affected\", value:\"Adobe Acrobat Reader DC (Continuous Track)\n 2019.010.20064 and earlier versions on Mac OS X.\");\n\n script_tag(name:\"solution\", value:\"Upgrade to Adobe Acrobat Reader DC Continuous\n version 2019.010.20064 or later. Please see the references for more information.\");\n\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_tag(name:\"qod_type\", value:\"executable_version\");\n script_xref(name:\"URL\", value:\"https://helpx.adobe.com/security/products/acrobat/apsb18-41.html\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2018 Greenbone Networks GmbH\");\n script_family(\"General\");\n script_dependencies(\"gb_adobe_acrobat_reader_dc_cont_detect_macosx.nasl\");\n script_mandatory_keys(\"Adobe/Acrobat/ReaderDC/Continuous/MacOSX/Version\");\n exit(0);\n}\n\ninclude(\"host_details.inc\");\ninclude(\"version_func.inc\");\n\nif(!infos = get_app_version_and_location(cpe:CPE, exit_no_version:TRUE)) exit(0);\nvers = infos['version'];\npath = infos['location'];\n\nif(version_is_less(version:vers, test_version:\"19.010.20064\")) {\n report = report_fixed_ver(installed_version:vers, fixed_version:\"19.010.20064 (2019.010.20064)\", install_path:path);\n security_message(data:report);\n exit(0);\n}\n\nexit(99);\n", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2019-07-17T14:17:55", "description": "This host is installed with Adobe Acrobat 2017\n and is prone to multiple vulnerabilities.", "cvss3": {}, "published": "2018-12-17T00:00:00", "type": "openvas", "title": "Adobe Acrobat 2017 Security Updates(apsb18-34)-MAC OS X", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2018-19714", "CVE-2018-19713", "CVE-2018-19698", "CVE-2018-15988", "CVE-2018-16001", "CVE-2018-16033", "CVE-2018-19704", "CVE-2018-16038", "CVE-2018-16014", "CVE-2018-16044", "CVE-2018-16019", "CVE-2018-16008", "CVE-2018-15991", "CVE-2018-19700", "CVE-2018-15985", "CVE-2018-15989", "CVE-2018-16039", "CVE-2018-19709", "CVE-2018-16015", "CVE-2018-19719", "CVE-2018-19703", "CVE-2018-16025", "CVE-2018-16041", "CVE-2018-16042", "CVE-2018-19717", "CVE-2018-15992", "CVE-2018-19716", "CVE-2018-16027", "CVE-2018-16017", "CVE-2018-19712", "CVE-2018-16016", "CVE-2018-16037", "CVE-2018-16002", "CVE-2018-19720", "CVE-2018-19701", "CVE-2018-15986", "CVE-2018-16028", "CVE-2018-16006", "CVE-2018-16022", "CVE-2018-16004", "CVE-2018-16005", "CVE-2018-16013", "CVE-2018-19699", "CVE-2018-15997", "CVE-2018-16035", "CVE-2018-15998", "CVE-2018-16031", "CVE-2018-16009", "CVE-2018-15999", "CVE-2018-16036", "CVE-2018-16030", "CVE-2018-16029", "CVE-2018-16007", "CVE-2018-19715", "CVE-2018-19710", "CVE-2018-15993", "CVE-2018-19728", "CVE-2018-16026", "CVE-2018-16010", "CVE-2018-16021", "CVE-2018-16032", "CVE-2018-15994", "CVE-2018-15987", "CVE-2018-16018", "CVE-2018-12830", "CVE-2018-15996", "CVE-2018-16043", "CVE-2018-15984", "CVE-2018-16046", "CVE-2018-19706", "CVE-2018-15995", "CVE-2018-16024", "CVE-2018-15990", "CVE-2018-16045", "CVE-2018-19711", "CVE-2018-19708", "CVE-2018-16000", "CVE-2018-16003", "CVE-2018-16034", "CVE-2018-16023", "CVE-2018-19702", "CVE-2018-16047", "CVE-2018-16012", "CVE-2018-19705", "CVE-2018-19707", "CVE-2018-16040", "CVE-2018-16020"], "modified": "2019-07-16T00:00:00", "id": "OPENVAS:1361412562310814391", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310814391", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Adobe Acrobat 2017 Security Updates(apsb18-41)-MAC OS X\n#\n# Authors:\n# Vidita V Koushik <vidita@secpod.com>\n#\n# Copyright:\n# Copyright (C) 2018 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nCPE = \"cpe:/a:adobe:acrobat\";\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.814391\");\n script_version(\"2019-07-16T10:51:36+0000\");\n script_cve_id(\"CVE-2018-15998\", \"CVE-2018-15987\", \"CVE-2018-16004\", \"CVE-2018-19720\",\n \"CVE-2018-16045\", \"CVE-2018-16044\", \"CVE-2018-16018\", \"CVE-2018-19715\",\n \"CVE-2018-19713\", \"CVE-2018-19708\", \"CVE-2018-19707\", \"CVE-2018-19700\",\n \"CVE-2018-19698\", \"CVE-2018-16046\", \"CVE-2018-16040\", \"CVE-2018-16039\",\n \"CVE-2018-16037\", \"CVE-2018-16036\", \"CVE-2018-16029\", \"CVE-2018-16027\",\n \"CVE-2018-16026\", \"CVE-2018-16025\", \"CVE-2018-16014\", \"CVE-2018-16008\",\n \"CVE-2018-16003\", \"CVE-2018-15994\", \"CVE-2018-15993\", \"CVE-2018-15992\",\n \"CVE-2018-15991\", \"CVE-2018-15990\", \"CVE-2018-19702\", \"CVE-2018-16016\",\n \"CVE-2018-16000\", \"CVE-2018-15999\", \"CVE-2018-15988\", \"CVE-2018-19716\",\n \"CVE-2018-16021\", \"CVE-2018-12830\", \"CVE-2018-19717\", \"CVE-2018-19714\",\n \"CVE-2018-19712\", \"CVE-2018-19711\", \"CVE-2018-19710\", \"CVE-2018-19709\",\n \"CVE-2018-19706\", \"CVE-2018-19705\", \"CVE-2018-19704\", \"CVE-2018-19703\",\n \"CVE-2018-19701\", \"CVE-2018-19699\", \"CVE-2018-16047\", \"CVE-2018-16043\",\n \"CVE-2018-16041\", \"CVE-2018-16038\", \"CVE-2018-16035\", \"CVE-2018-16034\",\n \"CVE-2018-16033\", \"CVE-2018-16032\", \"CVE-2018-16031\", \"CVE-2018-16030\",\n \"CVE-2018-16028\", \"CVE-2018-16024\", \"CVE-2018-16023\", \"CVE-2018-16022\",\n \"CVE-2018-16020\", \"CVE-2018-16019\", \"CVE-2018-16017\", \"CVE-2018-16015\",\n \"CVE-2018-16013\", \"CVE-2018-16012\", \"CVE-2018-16010\", \"CVE-2018-16006\",\n \"CVE-2018-16005\", \"CVE-2018-16002\", \"CVE-2018-16001\", \"CVE-2018-15997\",\n \"CVE-2018-15996\", \"CVE-2018-15989\", \"CVE-2018-15985\", \"CVE-2018-15984\",\n \"CVE-2018-19719\", \"CVE-2018-16009\", \"CVE-2018-16007\", \"CVE-2018-15995\",\n \"CVE-2018-15986\", \"CVE-2018-16042\", \"CVE-2018-19728\");\n script_tag(name:\"cvss_base\", value:\"10.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_tag(name:\"last_modification\", value:\"2019-07-16 10:51:36 +0000 (Tue, 16 Jul 2019)\");\n script_tag(name:\"creation_date\", value:\"2018-12-17 13:00:45 +0530 (Mon, 17 Dec 2018)\");\n script_name(\"Adobe Acrobat 2017 Security Updates(apsb18-34)-MAC OS X\");\n\n script_tag(name:\"summary\", value:\"This host is installed with Adobe Acrobat 2017\n and is prone to multiple vulnerabilities.\");\n\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable version is present\n on the target host.\");\n\n script_tag(name:\"insight\", value:\"Multiple flaws exist due to,\n\n - Multiple buffer errors.\n\n - Multiple untrusted pointer dereference errors.\n\n - Multiple security bypass errors.\n\n - Multiple use after free errors.\n\n - Multiple out-of-bounds write and read errors.\n\n - Multiple heap overflow errors.\n\n - Multiple integer overflow errors\");\n\n script_tag(name:\"impact\", value:\"Successful exploitation of this vulnerability\n will allow remote attackers to execute arbitrary code, escalate privileges and\n disclose sensitive information.\");\n\n script_tag(name:\"affected\", value:\"Adobe Acrobat 2017 version 2017.011.30106\n and earlier on MAC OS X.\");\n\n script_tag(name:\"solution\", value:\"Upgrade to Adobe Acrobat 2017 version\n 2017.011.30110 or later. Please see the references for more information.\");\n\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_tag(name:\"qod_type\", value:\"executable_version\");\n script_xref(name:\"URL\", value:\"https://helpx.adobe.com/security/products/acrobat/apsb18-34.html\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2018 Greenbone Networks GmbH\");\n script_family(\"General\");\n script_dependencies(\"secpod_adobe_prdts_detect_macosx.nasl\");\n script_mandatory_keys(\"Adobe/Acrobat/MacOSX/Version\");\n exit(0);\n}\n\ninclude(\"host_details.inc\");\ninclude(\"version_func.inc\");\n\nif(!infos = get_app_version_and_location(cpe:CPE, exit_no_version:TRUE))\n exit(0);\n\nvers = infos['version'];\npath = infos['location'];\n\nif(version_in_range(version:vers, test_version:\"17.0\", test_version2:\"17.011.30106\")) {\n report = report_fixed_ver(installed_version:vers, fixed_version:\"17.011.30110 (2017.011.30110)\", install_path:path);\n security_message(data:report);\n exit(0);\n}\n\nexit(99);\n", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2019-07-17T14:18:01", "description": "This host is installed with Adobe Acrobat DC\n (Continuous Track) and is prone to multiple vulnerabilities.", "cvss3": {}, "published": "2018-12-13T00:00:00", "type": "openvas", "title": "Adobe Acrobat DC (Continuous Track) Security Updates (apsb18-41) - Mac OS X", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2018-19714", "CVE-2018-19713", "CVE-2018-19698", "CVE-2018-15988", "CVE-2018-16001", "CVE-2018-16033", "CVE-2018-19704", "CVE-2018-16038", "CVE-2018-16014", "CVE-2018-16044", "CVE-2018-16019", "CVE-2018-16008", "CVE-2018-15991", "CVE-2018-19700", "CVE-2018-15985", "CVE-2018-15989", "CVE-2018-16039", "CVE-2018-19709", "CVE-2018-16015", "CVE-2018-19719", "CVE-2018-19703", "CVE-2018-16025", "CVE-2018-16041", "CVE-2018-16042", "CVE-2018-19717", "CVE-2018-15992", "CVE-2018-19716", "CVE-2018-16027", "CVE-2018-16017", "CVE-2018-19712", "CVE-2018-16016", "CVE-2018-16037", "CVE-2018-16002", "CVE-2018-19720", "CVE-2018-19701", "CVE-2018-15986", "CVE-2018-16028", "CVE-2018-16006", "CVE-2018-16022", "CVE-2018-16004", "CVE-2018-16005", "CVE-2018-16013", "CVE-2018-19699", "CVE-2018-15997", "CVE-2018-16035", "CVE-2018-15998", "CVE-2018-16031", "CVE-2018-16009", "CVE-2018-15999", "CVE-2018-16036", "CVE-2018-16030", "CVE-2018-16029", "CVE-2018-16007", "CVE-2018-19715", "CVE-2018-19710", "CVE-2018-15993", "CVE-2018-19728", "CVE-2018-16026", "CVE-2018-16010", "CVE-2018-16021", "CVE-2018-16032", "CVE-2018-15994", "CVE-2018-15987", "CVE-2018-16018", "CVE-2018-12830", "CVE-2018-15996", "CVE-2018-16043", "CVE-2018-15984", "CVE-2018-16046", "CVE-2018-19706", "CVE-2018-15995", "CVE-2018-16024", "CVE-2018-15990", "CVE-2018-16045", "CVE-2018-19711", "CVE-2018-19708", "CVE-2018-16000", "CVE-2018-16003", "CVE-2018-16034", "CVE-2018-16023", "CVE-2018-19702", "CVE-2018-16047", "CVE-2018-16012", "CVE-2018-19705", "CVE-2018-19707", "CVE-2018-16040", "CVE-2018-16020"], "modified": "2019-07-05T00:00:00", "id": "OPENVAS:1361412562310814383", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310814383", "sourceData": "##############################################################################\n# OpenVAS Vulnerability Test\n#\n# Adobe Acrobat DC (Continuous Track) Security Updates (apsb18-41)-Mac OS X\n#\n# Authors:\n# Vidita V Koushik <vidita@secpod.com>\n#\n# Copyright:\n# Copyright (C) 2018 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nCPE = \"cpe:/a:adobe:acrobat_dc_continuous\";\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.814383\");\n script_version(\"2019-07-05T08:07:19+0000\");\n script_cve_id(\"CVE-2018-15998\", \"CVE-2018-15987\", \"CVE-2018-16004\", \"CVE-2018-19720\",\n \"CVE-2018-16045\", \"CVE-2018-16044\", \"CVE-2018-16018\", \"CVE-2018-19715\",\n \"CVE-2018-19713\", \"CVE-2018-19708\", \"CVE-2018-19707\", \"CVE-2018-19700\",\n \"CVE-2018-19698\", \"CVE-2018-16046\", \"CVE-2018-16040\", \"CVE-2018-16039\",\n \"CVE-2018-16037\", \"CVE-2018-16036\", \"CVE-2018-16029\", \"CVE-2018-16027\",\n \"CVE-2018-16026\", \"CVE-2018-16025\", \"CVE-2018-16014\", \"CVE-2018-16008\",\n \"CVE-2018-16003\", \"CVE-2018-15994\", \"CVE-2018-15993\", \"CVE-2018-15992\",\n \"CVE-2018-15991\", \"CVE-2018-15990\", \"CVE-2018-19702\", \"CVE-2018-16016\",\n \"CVE-2018-16000\", \"CVE-2018-15999\", \"CVE-2018-15988\", \"CVE-2018-19716\",\n \"CVE-2018-16021\", \"CVE-2018-12830\", \"CVE-2018-19717\", \"CVE-2018-19714\",\n \"CVE-2018-19712\", \"CVE-2018-19711\", \"CVE-2018-19710\", \"CVE-2018-19709\",\n \"CVE-2018-19706\", \"CVE-2018-19705\", \"CVE-2018-19704\", \"CVE-2018-19703\",\n \"CVE-2018-19701\", \"CVE-2018-19699\", \"CVE-2018-16047\", \"CVE-2018-16043\",\n \"CVE-2018-16041\", \"CVE-2018-16038\", \"CVE-2018-16035\", \"CVE-2018-16034\",\n \"CVE-2018-16033\", \"CVE-2018-16032\", \"CVE-2018-16031\", \"CVE-2018-16030\",\n \"CVE-2018-16028\", \"CVE-2018-16024\", \"CVE-2018-16023\", \"CVE-2018-16022\",\n \"CVE-2018-16020\", \"CVE-2018-16019\", \"CVE-2018-16017\", \"CVE-2018-16015\",\n \"CVE-2018-16013\", \"CVE-2018-16012\", \"CVE-2018-16010\", \"CVE-2018-16006\",\n \"CVE-2018-16005\", \"CVE-2018-16002\", \"CVE-2018-16001\", \"CVE-2018-15997\",\n \"CVE-2018-15996\", \"CVE-2018-15989\", \"CVE-2018-15985\", \"CVE-2018-15984\",\n \"CVE-2018-19719\", \"CVE-2018-16009\", \"CVE-2018-16007\", \"CVE-2018-15995\",\n \"CVE-2018-15986\", \"CVE-2018-16042\", \"CVE-2018-19728\");\n script_tag(name:\"cvss_base\", value:\"10.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_tag(name:\"last_modification\", value:\"2019-07-05 08:07:19 +0000 (Fri, 05 Jul 2019)\");\n script_tag(name:\"creation_date\", value:\"2018-12-13 12:27:21 +0530 (Thu, 13 Dec 2018)\");\n\n script_name(\"Adobe Acrobat DC (Continuous Track) Security Updates (apsb18-41) - Mac OS X\");\n\n script_tag(name:\"summary\", value:\"This host is installed with Adobe Acrobat DC\n (Continuous Track) and is prone to multiple vulnerabilities.\");\n\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable version is present\n on the target host.\");\n\n script_tag(name:\"insight\", value:\"Multiple flaws exist due to,\n\n - Multiple buffer errors.\n\n - Multiple untrusted pointer dereference errors.\n\n - Multiple security bypass errors.\n\n - Multiple use after free errors.\n\n - Multiple out-of-bounds write and read errors.\n\n - Multiple heap overflow errors.\n\n - Multiple integer overflow errors\");\n\n script_tag(name:\"impact\", value:\"Successful exploitation of this vulnerability\n will allow remote attackers to execute arbitrary code, escalate privileges and\n disclose sensitive information.\");\n\n script_tag(name:\"affected\", value:\"Adobe Acrobat DC (Continuous Track) versions\n 2019.008.20080 and earlier on Mac OS X.\");\n\n script_tag(name:\"solution\", value:\"Upgrade to Adobe Acrobat DC Continuous\n version 2019.010.20064 or later. Please see the references for more information.\");\n\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_tag(name:\"qod_type\", value:\"executable_version\");\n script_xref(name:\"URL\", value:\"https://helpx.adobe.com/security/products/acrobat/apsb18-41.html\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2018 Greenbone Networks GmbH\");\n script_family(\"General\");\n script_dependencies(\"gb_adobe_acrobat_dc_cont_detect_macosx.nasl\");\n script_mandatory_keys(\"Adobe/AcrobatDC/Continuous/MacOSX/Version\");\n exit(0);\n}\n\ninclude(\"host_details.inc\");\ninclude(\"version_func.inc\");\n\nif(!infos = get_app_version_and_location(cpe:CPE, exit_no_version:TRUE)) exit(0);\nvers = infos['version'];\npath = infos['location'];\n\nif(version_is_less(version:vers, test_version:\"19.010.20064\")) {\n report = report_fixed_ver(installed_version:vers, fixed_version:\"19.010.20064 (2019.010.20064)\", install_path:path);\n security_message(data:report);\n exit(0);\n}\n\nexit(99);\n", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2019-07-17T14:17:52", "description": "This host is installed with Adobe Acrobat Reader\n DC (Classic Track) and is prone to multiple vulnerabilities.", "cvss3": {}, "published": "2018-12-13T00:00:00", "type": "openvas", "title": "Adobe Acrobat Reader DC (Classic Track) Security Updates (apsb18-41) - Windows", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2018-19714", "CVE-2018-19713", "CVE-2018-19698", "CVE-2018-15988", "CVE-2018-16001", "CVE-2018-16033", "CVE-2018-19704", "CVE-2018-16038", "CVE-2018-16014", "CVE-2018-16044", "CVE-2018-16019", "CVE-2018-16008", "CVE-2018-15991", "CVE-2018-19700", "CVE-2018-15985", "CVE-2018-15989", "CVE-2018-16039", "CVE-2018-19709", "CVE-2018-16015", "CVE-2018-19719", "CVE-2018-19703", "CVE-2018-16025", "CVE-2018-16041", "CVE-2018-16042", "CVE-2018-19717", "CVE-2018-15992", "CVE-2018-19716", "CVE-2018-16027", "CVE-2018-16017", "CVE-2018-19712", "CVE-2018-16016", "CVE-2018-16037", "CVE-2018-16002", "CVE-2018-19720", "CVE-2018-19701", "CVE-2018-15986", "CVE-2018-16028", "CVE-2018-16006", "CVE-2018-16022", "CVE-2018-16004", "CVE-2018-16005", "CVE-2018-16013", "CVE-2018-19699", "CVE-2018-15997", "CVE-2018-16035", "CVE-2018-15998", "CVE-2018-16031", "CVE-2018-16009", "CVE-2018-15999", "CVE-2018-16036", "CVE-2018-16030", "CVE-2018-16029", "CVE-2018-16007", "CVE-2018-19715", "CVE-2018-19710", "CVE-2018-15993", "CVE-2018-19728", "CVE-2018-16026", "CVE-2018-16010", "CVE-2018-16021", "CVE-2018-16032", "CVE-2018-15994", "CVE-2018-15987", "CVE-2018-16018", "CVE-2018-12830", "CVE-2018-15996", "CVE-2018-16043", "CVE-2018-15984", "CVE-2018-16046", "CVE-2018-19706", "CVE-2018-15995", "CVE-2018-16024", "CVE-2018-15990", "CVE-2018-16045", "CVE-2018-19711", "CVE-2018-19708", "CVE-2018-16000", "CVE-2018-16003", "CVE-2018-16034", "CVE-2018-16023", "CVE-2018-19702", "CVE-2018-16047", "CVE-2018-16012", "CVE-2018-19705", "CVE-2018-19707", "CVE-2018-16040", "CVE-2018-16020"], "modified": "2019-07-05T00:00:00", "id": "OPENVAS:1361412562310814386", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310814386", "sourceData": "##############################################################################\n# OpenVAS Vulnerability Test\n#\n# Adobe Acrobat Reader DC (Classic Track) Security Updates (apsb18-41)-Windows\n#\n# Authors:\n# Vidita V Koushik <vidita@secpod.com>\n#\n# Copyright:\n# Copyright (C) 2018 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nCPE = \"cpe:/a:adobe:acrobat_reader_dc_classic\";\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.814386\");\n script_version(\"2019-07-05T08:07:19+0000\");\n script_cve_id(\"CVE-2018-15998\", \"CVE-2018-15987\", \"CVE-2018-16004\", \"CVE-2018-19720\",\n \"CVE-2018-16045\", \"CVE-2018-16044\", \"CVE-2018-16018\", \"CVE-2018-19715\",\n \"CVE-2018-19713\", \"CVE-2018-19708\", \"CVE-2018-19707\", \"CVE-2018-19700\",\n \"CVE-2018-19698\", \"CVE-2018-16046\", \"CVE-2018-16040\", \"CVE-2018-16039\",\n \"CVE-2018-16037\", \"CVE-2018-16036\", \"CVE-2018-16029\", \"CVE-2018-16027\",\n \"CVE-2018-16026\", \"CVE-2018-16025\", \"CVE-2018-16014\", \"CVE-2018-16008\",\n \"CVE-2018-16003\", \"CVE-2018-15994\", \"CVE-2018-15993\", \"CVE-2018-15992\",\n \"CVE-2018-15991\", \"CVE-2018-15990\", \"CVE-2018-19702\", \"CVE-2018-16016\",\n \"CVE-2018-16000\", \"CVE-2018-15999\", \"CVE-2018-15988\", \"CVE-2018-19716\",\n \"CVE-2018-16021\", \"CVE-2018-12830\", \"CVE-2018-19717\", \"CVE-2018-19714\",\n \"CVE-2018-19712\", \"CVE-2018-19711\", \"CVE-2018-19710\", \"CVE-2018-19709\",\n \"CVE-2018-19706\", \"CVE-2018-19705\", \"CVE-2018-19704\", \"CVE-2018-19703\",\n \"CVE-2018-19701\", \"CVE-2018-19699\", \"CVE-2018-16047\", \"CVE-2018-16043\",\n \"CVE-2018-16041\", \"CVE-2018-16038\", \"CVE-2018-16035\", \"CVE-2018-16034\",\n \"CVE-2018-16033\", \"CVE-2018-16032\", \"CVE-2018-16031\", \"CVE-2018-16030\",\n \"CVE-2018-16028\", \"CVE-2018-16024\", \"CVE-2018-16023\", \"CVE-2018-16022\",\n \"CVE-2018-16020\", \"CVE-2018-16019\", \"CVE-2018-16017\", \"CVE-2018-16015\",\n \"CVE-2018-16013\", \"CVE-2018-16012\", \"CVE-2018-16010\", \"CVE-2018-16006\",\n \"CVE-2018-16005\", \"CVE-2018-16002\", \"CVE-2018-16001\", \"CVE-2018-15997\",\n \"CVE-2018-15996\", \"CVE-2018-15989\", \"CVE-2018-15985\", \"CVE-2018-15984\",\n \"CVE-2018-19719\", \"CVE-2018-16009\", \"CVE-2018-16007\", \"CVE-2018-15995\",\n \"CVE-2018-15986\", \"CVE-2018-16042\", \"CVE-2018-19728\");\n script_tag(name:\"cvss_base\", value:\"10.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_tag(name:\"last_modification\", value:\"2019-07-05 08:07:19 +0000 (Fri, 05 Jul 2019)\");\n script_tag(name:\"creation_date\", value:\"2018-12-13 11:23:21 +0530 (Thu, 13 Dec 2018)\");\n\n script_name(\"Adobe Acrobat Reader DC (Classic Track) Security Updates (apsb18-41) - Windows\");\n\n script_tag(name:\"summary\", value:\"This host is installed with Adobe Acrobat Reader\n DC (Classic Track) and is prone to multiple vulnerabilities.\");\n\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable version is present\n on the target host.\");\n script_tag(name:\"insight\", value:\"Multiple flaws exist due to,\n\n - Multiple buffer errors.\n\n - Multiple untrusted pointer dereference errors.\n\n - Multiple security bypass errors.\n\n - Multiple use after free errors.\n\n - Multiple out-of-bounds write and read errors.\n\n - Multiple heap overflow errors.\n\n - Multiple integer overflow errors\");\n\n script_tag(name:\"impact\", value:\"Successful exploitation of this vulnerability\n will allow remote attackers to execute arbitrary code, escalate privileges and\n disclose sensitive information.\");\n\n script_tag(name:\"affected\", value:\"Adobe Acrobat Reader DC (Classic Track)\n 2015.006.30457 and earlier versions on Windows.\");\n\n script_tag(name:\"solution\", value:\"Upgrade to Adobe Acrobat Reader DC (Classic\n Track) version 2015.006.30461 or later. Please see the references for more information.\");\n\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_tag(name:\"qod_type\", value:\"registry\");\n script_xref(name:\"URL\", value:\"https://helpx.adobe.com/security/products/acrobat/apsb18-29.html\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2018 Greenbone Networks GmbH\");\n script_family(\"General\");\n script_dependencies(\"gb_adobe_acrobat_reader_dc_classic_detect_win.nasl\");\n script_mandatory_keys(\"Adobe/Acrobat/ReaderDC/Classic/Win/Ver\");\n exit(0);\n}\n\ninclude(\"host_details.inc\");\ninclude(\"version_func.inc\");\n\nif(!infos = get_app_version_and_location(cpe:CPE, exit_no_version:TRUE)) exit(0);\nvers = infos['version'];\npath = infos['location'];\n\nif(version_is_less(version:vers, test_version:\"15.006.30461\")) {\n report = report_fixed_ver(installed_version:vers, fixed_version:\"15.006.30461 (2015.006.30461)\", install_path:path);\n security_message(data:report);\n exit(0);\n}\n\nexit(99);\n", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2019-07-17T14:18:25", "description": "This host is installed with Adobe Acrobat DC\n (Classic Track) and is prone to multiple vulnerabilities.", "cvss3": {}, "published": "2018-12-13T00:00:00", "type": "openvas", "title": "Adobe Acrobat DC (Classic Track) Security Updates (apsb18-34) - Windows", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2018-19714", "CVE-2018-19713", "CVE-2018-19698", "CVE-2018-15988", "CVE-2018-16001", "CVE-2018-16033", "CVE-2018-19704", "CVE-2018-16038", "CVE-2018-16014", "CVE-2018-16044", "CVE-2018-16019", "CVE-2018-16008", "CVE-2018-15991", "CVE-2018-19700", "CVE-2018-15985", "CVE-2018-15989", "CVE-2018-16039", "CVE-2018-19709", "CVE-2018-16015", "CVE-2018-19719", "CVE-2018-19703", "CVE-2018-16025", "CVE-2018-16041", "CVE-2018-16042", "CVE-2018-19717", "CVE-2018-15992", "CVE-2018-19716", "CVE-2018-16027", "CVE-2018-16017", "CVE-2018-19712", "CVE-2018-16016", "CVE-2018-16037", "CVE-2018-16002", "CVE-2018-19720", "CVE-2018-19701", "CVE-2018-15986", "CVE-2018-16028", "CVE-2018-16006", "CVE-2018-16022", "CVE-2018-16004", "CVE-2018-16005", "CVE-2018-16013", "CVE-2018-19699", "CVE-2018-15997", "CVE-2018-16035", "CVE-2018-15998", "CVE-2018-16031", "CVE-2018-16009", "CVE-2018-15999", "CVE-2018-16036", "CVE-2018-16030", "CVE-2018-16029", "CVE-2018-16007", "CVE-2018-19715", "CVE-2018-19710", "CVE-2018-15993", "CVE-2018-19728", "CVE-2018-16026", "CVE-2018-16010", "CVE-2018-16021", "CVE-2018-16032", "CVE-2018-15994", "CVE-2018-15987", "CVE-2018-16018", "CVE-2018-12830", "CVE-2018-15996", "CVE-2018-16043", "CVE-2018-15984", "CVE-2018-16046", "CVE-2018-19706", "CVE-2018-15995", "CVE-2018-16024", "CVE-2018-15990", "CVE-2018-16045", "CVE-2018-19711", "CVE-2018-19708", "CVE-2018-16000", "CVE-2018-16003", "CVE-2018-16034", "CVE-2018-16023", "CVE-2018-19702", "CVE-2018-16047", "CVE-2018-16012", "CVE-2018-19705", "CVE-2018-19707", "CVE-2018-16040", "CVE-2018-16020"], "modified": "2019-07-05T00:00:00", "id": "OPENVAS:1361412562310814384", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310814384", "sourceData": "##############################################################################\n# OpenVAS Vulnerability Test\n#\n# Adobe Acrobat DC (Classic Track) Security Updates (apsb18-41)-Windows\n#\n# Authors:\n# Vidita V Koushik <vidita@secpod.com>\n#\n# Copyright:\n# Copyright (C) 2018 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nCPE = \"cpe:/a:adobe:acrobat_dc_classic\";\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.814384\");\n script_version(\"2019-07-05T08:07:19+0000\");\n script_cve_id(\"CVE-2018-15998\", \"CVE-2018-15987\", \"CVE-2018-16004\", \"CVE-2018-19720\",\n \"CVE-2018-16045\", \"CVE-2018-16044\", \"CVE-2018-16018\", \"CVE-2018-19715\",\n \"CVE-2018-19713\", \"CVE-2018-19708\", \"CVE-2018-19707\", \"CVE-2018-19700\",\n \"CVE-2018-19698\", \"CVE-2018-16046\", \"CVE-2018-16040\", \"CVE-2018-16039\",\n \"CVE-2018-16037\", \"CVE-2018-16036\", \"CVE-2018-16029\", \"CVE-2018-16027\",\n \"CVE-2018-16026\", \"CVE-2018-16025\", \"CVE-2018-16014\", \"CVE-2018-16008\",\n \"CVE-2018-16003\", \"CVE-2018-15994\", \"CVE-2018-15993\", \"CVE-2018-15992\",\n \"CVE-2018-15991\", \"CVE-2018-15990\", \"CVE-2018-19702\", \"CVE-2018-16016\",\n \"CVE-2018-16000\", \"CVE-2018-15999\", \"CVE-2018-15988\", \"CVE-2018-19716\",\n \"CVE-2018-16021\", \"CVE-2018-12830\", \"CVE-2018-19717\", \"CVE-2018-19714\",\n \"CVE-2018-19712\", \"CVE-2018-19711\", \"CVE-2018-19710\", \"CVE-2018-19709\",\n \"CVE-2018-19706\", \"CVE-2018-19705\", \"CVE-2018-19704\", \"CVE-2018-19703\",\n \"CVE-2018-19701\", \"CVE-2018-19699\", \"CVE-2018-16047\", \"CVE-2018-16043\",\n \"CVE-2018-16041\", \"CVE-2018-16038\", \"CVE-2018-16035\", \"CVE-2018-16034\",\n \"CVE-2018-16033\", \"CVE-2018-16032\", \"CVE-2018-16031\", \"CVE-2018-16030\",\n \"CVE-2018-16028\", \"CVE-2018-16024\", \"CVE-2018-16023\", \"CVE-2018-16022\",\n \"CVE-2018-16020\", \"CVE-2018-16019\", \"CVE-2018-16017\", \"CVE-2018-16015\",\n \"CVE-2018-16013\", \"CVE-2018-16012\", \"CVE-2018-16010\", \"CVE-2018-16006\",\n \"CVE-2018-16005\", \"CVE-2018-16002\", \"CVE-2018-16001\", \"CVE-2018-15997\",\n \"CVE-2018-15996\", \"CVE-2018-15989\", \"CVE-2018-15985\", \"CVE-2018-15984\",\n \"CVE-2018-19719\", \"CVE-2018-16009\", \"CVE-2018-16007\", \"CVE-2018-15995\",\n \"CVE-2018-15986\", \"CVE-2018-16042\", \"CVE-2018-19728\");\n script_tag(name:\"cvss_base\", value:\"10.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_tag(name:\"last_modification\", value:\"2019-07-05 08:07:19 +0000 (Fri, 05 Jul 2019)\");\n script_tag(name:\"creation_date\", value:\"2018-12-13 12:23:21 +0530 (Thu, 13 Dec 2018)\");\n\n script_name(\"Adobe Acrobat DC (Classic Track) Security Updates (apsb18-34) - Windows\");\n\n script_tag(name:\"summary\", value:\"This host is installed with Adobe Acrobat DC\n (Classic Track) and is prone to multiple vulnerabilities.\");\n\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable version is present\n on the target host.\");\n\n script_tag(name:\"insight\", value:\"Multiple flaws exist due to,\n\n - Multiple buffer errors.\n\n - Multiple untrusted pointer dereference errors.\n\n - Multiple security bypass errors.\n\n - Multiple use after free errors.\n\n - Multiple out-of-bounds write and read errors.\n\n - Multiple heap overflow errors.\n\n - Multiple integer overflow errors\");\n\n script_tag(name:\"impact\", value:\"Successful exploitation of this vulnerability\n will allow remote attackers to execute arbitrary code, escalate privileges and\n disclose sensitive information.\");\n\n script_tag(name:\"affected\", value:\"Adobe Acrobat DC (Classic Track)\n 2015.006.30457 and earlier versions on Windows.\");\n\n script_tag(name:\"solution\", value:\"Upgrade to Adobe Acrobat DC (Classic Track)\n version 2015.006.30461 or later. Please see the references for more information.\");\n\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_tag(name:\"qod_type\", value:\"registry\");\n script_xref(name:\"URL\", value:\"https://helpx.adobe.com/security/products/acrobat/apsb18-41.html\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2018 Greenbone Networks GmbH\");\n script_family(\"General\");\n script_dependencies(\"gb_adobe_acrobat_dc_classic_detect_win.nasl\");\n script_mandatory_keys(\"Adobe/AcrobatDC/Classic/Win/Ver\");\n exit(0);\n}\n\ninclude(\"host_details.inc\");\ninclude(\"version_func.inc\");\n\nif(!infos = get_app_version_and_location(cpe:CPE, exit_no_version:TRUE)) exit(0);\nvers = infos['version'];\npath = infos['location'];\n\nif(version_is_less(version:vers, test_version:\"15.006.30461\")) {\n report = report_fixed_ver(installed_version:vers, fixed_version:\"15.006.30461 (2015.006.30461)\", install_path:path);\n security_message(data:report);\n exit(0);\n}\n\nexit(99);\n", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2019-07-17T14:18:15", "description": "This host is installed with Adobe Acrobat Reader\n DC (Classic Track) and is prone to multiple vulnerabilities.", "cvss3": {}, "published": "2018-12-13T00:00:00", "type": "openvas", "title": "Adobe Acrobat Reader DC (Classic Track) Security Updates (apsb18-41) - Mac OS X", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2018-19714", "CVE-2018-19713", "CVE-2018-19698", "CVE-2018-15988", "CVE-2018-16001", "CVE-2018-16033", "CVE-2018-19704", "CVE-2018-16038", "CVE-2018-16014", "CVE-2018-16044", "CVE-2018-16019", "CVE-2018-16008", "CVE-2018-15991", "CVE-2018-19700", "CVE-2018-15985", "CVE-2018-15989", "CVE-2018-16039", "CVE-2018-19709", "CVE-2018-16015", "CVE-2018-19719", "CVE-2018-19703", "CVE-2018-16025", "CVE-2018-16041", "CVE-2018-16042", "CVE-2018-19717", "CVE-2018-15992", "CVE-2018-19716", "CVE-2018-16027", "CVE-2018-16017", "CVE-2018-19712", "CVE-2018-16016", "CVE-2018-16037", "CVE-2018-16002", "CVE-2018-19720", "CVE-2018-19701", "CVE-2018-15986", "CVE-2018-16028", "CVE-2018-16006", "CVE-2018-16022", "CVE-2018-16004", "CVE-2018-16005", "CVE-2018-16013", "CVE-2018-19699", "CVE-2018-15997", "CVE-2018-16035", "CVE-2018-15998", "CVE-2018-16031", "CVE-2018-16009", "CVE-2018-15999", "CVE-2018-16036", "CVE-2018-16030", "CVE-2018-16029", "CVE-2018-16007", "CVE-2018-19715", "CVE-2018-19710", "CVE-2018-15993", "CVE-2018-19728", "CVE-2018-16026", "CVE-2018-16010", "CVE-2018-16021", "CVE-2018-16032", "CVE-2018-15994", "CVE-2018-15987", "CVE-2018-16018", "CVE-2018-12830", "CVE-2018-15996", "CVE-2018-16043", "CVE-2018-15984", "CVE-2018-16046", "CVE-2018-19706", "CVE-2018-15995", "CVE-2018-16024", "CVE-2018-15990", "CVE-2018-16045", "CVE-2018-19711", "CVE-2018-19708", "CVE-2018-16000", "CVE-2018-16003", "CVE-2018-16034", "CVE-2018-16023", "CVE-2018-19702", "CVE-2018-16047", "CVE-2018-16012", "CVE-2018-19705", "CVE-2018-19707", "CVE-2018-16040", "CVE-2018-16020"], "modified": "2019-07-05T00:00:00", "id": "OPENVAS:1361412562310814387", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310814387", "sourceData": "##############################################################################\n# OpenVAS Vulnerability Test\n#\n# Adobe Acrobat Reader DC (Classic Track) Security Updates (apsb18-41)-Mac OS X\n#\n# Authors:\n# Vidita V Koushik <vidita@secpod.com>\n#\n# Copyright:\n# Copyright (C) 2018 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nCPE = \"cpe:/a:adobe:acrobat_reader_dc_classic\";\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.814387\");\n script_version(\"2019-07-05T08:07:19+0000\");\n script_cve_id(\"CVE-2018-15998\", \"CVE-2018-15987\", \"CVE-2018-16004\", \"CVE-2018-19720\",\n \"CVE-2018-16045\", \"CVE-2018-16044\", \"CVE-2018-16018\", \"CVE-2018-19715\",\n \"CVE-2018-19713\", \"CVE-2018-19708\", \"CVE-2018-19707\", \"CVE-2018-19700\",\n \"CVE-2018-19698\", \"CVE-2018-16046\", \"CVE-2018-16040\", \"CVE-2018-16039\",\n \"CVE-2018-16037\", \"CVE-2018-16036\", \"CVE-2018-16029\", \"CVE-2018-16027\",\n \"CVE-2018-16026\", \"CVE-2018-16025\", \"CVE-2018-16014\", \"CVE-2018-16008\",\n \"CVE-2018-16003\", \"CVE-2018-15994\", \"CVE-2018-15993\", \"CVE-2018-15992\",\n \"CVE-2018-15991\", \"CVE-2018-15990\", \"CVE-2018-19702\", \"CVE-2018-16016\",\n \"CVE-2018-16000\", \"CVE-2018-15999\", \"CVE-2018-15988\", \"CVE-2018-19716\",\n \"CVE-2018-16021\", \"CVE-2018-12830\", \"CVE-2018-19717\", \"CVE-2018-19714\",\n \"CVE-2018-19712\", \"CVE-2018-19711\", \"CVE-2018-19710\", \"CVE-2018-19709\",\n \"CVE-2018-19706\", \"CVE-2018-19705\", \"CVE-2018-19704\", \"CVE-2018-19703\",\n \"CVE-2018-19701\", \"CVE-2018-19699\", \"CVE-2018-16047\", \"CVE-2018-16043\",\n \"CVE-2018-16041\", \"CVE-2018-16038\", \"CVE-2018-16035\", \"CVE-2018-16034\",\n \"CVE-2018-16033\", \"CVE-2018-16032\", \"CVE-2018-16031\", \"CVE-2018-16030\",\n \"CVE-2018-16028\", \"CVE-2018-16024\", \"CVE-2018-16023\", \"CVE-2018-16022\",\n \"CVE-2018-16020\", \"CVE-2018-16019\", \"CVE-2018-16017\", \"CVE-2018-16015\",\n \"CVE-2018-16013\", \"CVE-2018-16012\", \"CVE-2018-16010\", \"CVE-2018-16006\",\n \"CVE-2018-16005\", \"CVE-2018-16002\", \"CVE-2018-16001\", \"CVE-2018-15997\",\n \"CVE-2018-15996\", \"CVE-2018-15989\", \"CVE-2018-15985\", \"CVE-2018-15984\",\n \"CVE-2018-19719\", \"CVE-2018-16009\", \"CVE-2018-16007\", \"CVE-2018-15995\",\n \"CVE-2018-15986\", \"CVE-2018-16042\", \"CVE-2018-19728\");\n script_tag(name:\"cvss_base\", value:\"10.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_tag(name:\"last_modification\", value:\"2019-07-05 08:07:19 +0000 (Fri, 05 Jul 2019)\");\n script_tag(name:\"creation_date\", value:\"2018-12-13 12:43:21 +0530 (Thu, 13 Dec 2018)\");\n script_name(\"Adobe Acrobat Reader DC (Classic Track) Security Updates (apsb18-41) - Mac OS X\");\n\n script_tag(name:\"summary\", value:\"This host is installed with Adobe Acrobat Reader\n DC (Classic Track) and is prone to multiple vulnerabilities.\");\n\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable version is present\n on the target host.\");\n\n script_tag(name:\"insight\", value:\"Multiple flaws exist due to,\n\n - Multiple buffer errors.\n\n - Multiple untrusted pointer dereference errors.\n\n - Multiple security bypass errors.\n\n - Multiple use after free errors.\n\n - Multiple out-of-bounds write and read errors.\n\n - Multiple heap overflow errors.\n\n - Multiple integer overflow errors\");\n\n script_tag(name:\"impact\", value:\"Successful exploitation of this vulnerability\n will allow remote attackers to execute arbitrary code, escalate privileges and\n disclose sensitive information.\");\n\n script_tag(name:\"affected\", value:\"Adobe Acrobat Reader DC (Classic Track)\n 2015.006.30456 and earlier versions on Mac OS X.\");\n\n script_tag(name:\"solution\", value:\"Upgrade to Adobe Acrobat Reader DC (Classic\n Track) version 2015.006.30461 or later. Please see the references for more information.\");\n\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_tag(name:\"qod_type\", value:\"executable_version\");\n script_xref(name:\"URL\", value:\"https://helpx.adobe.com/security/products/acrobat/apsb18-29.html\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2018 Greenbone Networks GmbH\");\n script_family(\"General\");\n script_dependencies(\"gb_adobe_acrobat_reader_dc_classic_detect_macosx.nasl\");\n script_mandatory_keys(\"Adobe/Acrobat/ReaderDC/Classic/MacOSX/Version\");\n exit(0);\n}\n\ninclude(\"host_details.inc\");\ninclude(\"version_func.inc\");\n\nif(!infos = get_app_version_and_location(cpe:CPE, exit_no_version:TRUE)) exit(0);\nvers = infos['version'];\npath = infos['location'];\n\nif(version_is_less(version:vers, test_version:\"15.006.30461\")) {\n report = report_fixed_ver(installed_version:vers, fixed_version:\"15.006.30461 (2015.006.30461)\", install_path:path);\n security_message(data:report);\n exit(0);\n}\n\nexit(99);\n", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2019-07-17T14:17:38", "description": "This host is installed with Adobe Reader 2017\n and is prone to multiple vulnerabilities.", "cvss3": {}, "published": "2018-12-13T00:00:00", "type": "openvas", "title": "Adobe Reader 2017 Security Updates(apsb18-41)-Windows", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2018-19714", "CVE-2018-19713", "CVE-2018-19698", "CVE-2018-15988", "CVE-2018-16001", "CVE-2018-16033", "CVE-2018-19704", "CVE-2018-16038", "CVE-2018-16014", "CVE-2018-16044", "CVE-2018-16019", "CVE-2018-16008", "CVE-2018-15991", "CVE-2018-19700", "CVE-2018-15985", "CVE-2018-15989", "CVE-2018-16039", "CVE-2018-19709", "CVE-2018-16015", "CVE-2018-19719", "CVE-2018-19703", "CVE-2018-16025", "CVE-2018-16041", "CVE-2018-16042", "CVE-2018-19717", "CVE-2018-15992", "CVE-2018-19716", "CVE-2018-16027", "CVE-2018-16017", "CVE-2018-19712", "CVE-2018-16016", "CVE-2018-16037", "CVE-2018-16002", "CVE-2018-19720", "CVE-2018-19701", "CVE-2018-15986", "CVE-2018-16028", "CVE-2018-16006", "CVE-2018-16022", "CVE-2018-16004", "CVE-2018-16005", "CVE-2018-16013", "CVE-2018-19699", "CVE-2018-15997", "CVE-2018-16035", "CVE-2018-15998", "CVE-2018-16031", "CVE-2018-16009", "CVE-2018-15999", "CVE-2018-16036", "CVE-2018-16030", "CVE-2018-16029", "CVE-2018-16007", "CVE-2018-19715", "CVE-2018-19710", "CVE-2018-15993", "CVE-2018-19728", "CVE-2018-16026", "CVE-2018-16010", "CVE-2018-16021", "CVE-2018-16032", "CVE-2018-15994", "CVE-2018-15987", "CVE-2018-16018", "CVE-2018-12830", "CVE-2018-15996", "CVE-2018-16043", "CVE-2018-15984", "CVE-2018-16046", "CVE-2018-19706", "CVE-2018-15995", "CVE-2018-16024", "CVE-2018-15990", "CVE-2018-16045", "CVE-2018-19711", "CVE-2018-19708", "CVE-2018-16000", "CVE-2018-16003", "CVE-2018-16034", "CVE-2018-16023", "CVE-2018-19702", "CVE-2018-16047", "CVE-2018-16012", "CVE-2018-19705", "CVE-2018-19707", "CVE-2018-16040", "CVE-2018-16020"], "modified": "2019-07-16T00:00:00", "id": "OPENVAS:1361412562310814389", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310814389", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Adobe Reader 2017 Security Updates(apsb18-41)-Windows\n#\n# Authors:\n# Vidita V Koushik <vidita@secpod.com>\n#\n# Copyright:\n# Copyright (C) 2018 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nCPE = \"cpe:/a:adobe:acrobat_reader\";\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.814389\");\n script_version(\"2019-07-16T10:27:00+0000\");\n script_cve_id(\"CVE-2018-15998\", \"CVE-2018-15987\", \"CVE-2018-16004\", \"CVE-2018-19720\",\n \"CVE-2018-16045\", \"CVE-2018-16044\", \"CVE-2018-16018\", \"CVE-2018-19715\",\n \"CVE-2018-19713\", \"CVE-2018-19708\", \"CVE-2018-19707\", \"CVE-2018-19700\",\n \"CVE-2018-19698\", \"CVE-2018-16046\", \"CVE-2018-16040\", \"CVE-2018-16039\",\n \"CVE-2018-16037\", \"CVE-2018-16036\", \"CVE-2018-16029\", \"CVE-2018-16027\",\n \"CVE-2018-16026\", \"CVE-2018-16025\", \"CVE-2018-16014\", \"CVE-2018-16008\",\n \"CVE-2018-16003\", \"CVE-2018-15994\", \"CVE-2018-15993\", \"CVE-2018-15992\",\n \"CVE-2018-15991\", \"CVE-2018-15990\", \"CVE-2018-19702\", \"CVE-2018-16016\",\n \"CVE-2018-16000\", \"CVE-2018-15999\", \"CVE-2018-15988\", \"CVE-2018-19716\",\n \"CVE-2018-16021\", \"CVE-2018-12830\", \"CVE-2018-19717\", \"CVE-2018-19714\",\n \"CVE-2018-19712\", \"CVE-2018-19711\", \"CVE-2018-19710\", \"CVE-2018-19709\",\n \"CVE-2018-19706\", \"CVE-2018-19705\", \"CVE-2018-19704\", \"CVE-2018-19703\",\n \"CVE-2018-19701\", \"CVE-2018-19699\", \"CVE-2018-16047\", \"CVE-2018-16043\",\n \"CVE-2018-16041\", \"CVE-2018-16038\", \"CVE-2018-16035\", \"CVE-2018-16034\",\n \"CVE-2018-16033\", \"CVE-2018-16032\", \"CVE-2018-16031\", \"CVE-2018-16030\",\n \"CVE-2018-16028\", \"CVE-2018-16024\", \"CVE-2018-16023\", \"CVE-2018-16022\",\n \"CVE-2018-16020\", \"CVE-2018-16019\", \"CVE-2018-16017\", \"CVE-2018-16015\",\n \"CVE-2018-16013\", \"CVE-2018-16012\", \"CVE-2018-16010\", \"CVE-2018-16006\",\n \"CVE-2018-16005\", \"CVE-2018-16002\", \"CVE-2018-16001\", \"CVE-2018-15997\",\n \"CVE-2018-15996\", \"CVE-2018-15989\", \"CVE-2018-15985\", \"CVE-2018-15984\",\n \"CVE-2018-19719\", \"CVE-2018-16009\", \"CVE-2018-16007\", \"CVE-2018-15995\",\n \"CVE-2018-15986\", \"CVE-2018-16042\", \"CVE-2018-19728\");\n script_tag(name:\"cvss_base\", value:\"10.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_tag(name:\"last_modification\", value:\"2019-07-16 10:27:00 +0000 (Tue, 16 Jul 2019)\");\n script_tag(name:\"creation_date\", value:\"2018-12-13 12:53:21 +0530 (Thu, 13 Dec 2018)\");\n script_name(\"Adobe Reader 2017 Security Updates(apsb18-41)-Windows\");\n\n script_tag(name:\"summary\", value:\"This host is installed with Adobe Reader 2017\n and is prone to multiple vulnerabilities.\");\n\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable version is present\n on the target host.\");\n\n script_tag(name:\"insight\", value:\"Multiple flaws exist due to,\n\n - Multiple buffer errors.\n\n - Multiple untrusted pointer dereference errors.\n\n - Multiple security bypass errors.\n\n - Multiple use after free errors.\n\n - Multiple out-of-bounds write and read errors.\n\n - Multiple heap overflow errors.\n\n - Multiple integer overflow errors\");\n\n script_tag(name:\"impact\", value:\"Successful exploitation of this vulnerability\n will allow remote attackers to execute arbitrary code, escalate privileges and\n disclose sensitive information.\");\n\n script_tag(name:\"affected\", value:\"Adobe Acrobat Reader 2017 version 2017.x\n before 2017.011.30110 on Windows.\");\n\n script_tag(name:\"solution\", value:\"Upgrade to Adobe Acrobat Reader 2017 version\n 2017.011.30110 or later. Please see the references for more information.\");\n\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_tag(name:\"qod_type\", value:\"registry\");\n script_xref(name:\"URL\", value:\"https://helpx.adobe.com/security/products/acrobat/apsb18-41.html\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2018 Greenbone Networks GmbH\");\n script_family(\"General\");\n script_dependencies(\"secpod_adobe_prdts_detect_win.nasl\");\n script_mandatory_keys(\"Adobe/Reader/Win/Ver\");\n exit(0);\n}\n\ninclude(\"host_details.inc\");\ninclude(\"version_func.inc\");\n\nif(!infos = get_app_version_and_location(cpe:CPE, exit_no_version:TRUE))\n exit(0);\n\nvers = infos['version'];\npath = infos['location'];\n\nif(version_in_range(version:vers, test_version:\"17.0\", test_version2:\"17.011.30109\")) {\n report = report_fixed_ver(installed_version:vers, fixed_version:\"2017.011.30110\", install_path:path);\n security_message(data:report);\n exit(0);\n}\n\nexit(99);\n", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}], "nessus": [{"lastseen": "2021-10-16T13:11:02", "description": "The version of Adobe Reader installed on the remote macOS or Mac OS X host is a version prior or equal to 15.006.30456, 17.011.30105, or 19.008.20080. It is, therefore, affected by multiple arbitrary code execution, privilege escalation, and information disclosure vulnerabilities.\n\nNote that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.", "cvss3": {"score": 9.8, "vector": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}, "published": "2018-12-14T00:00:00", "type": "nessus", "title": "Adobe Reader <= 15.006.30456 / 17.011.30105 / 19.008.20080 Multiple Vulnerabilities (APSB18-41) (macOS)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2018-12830", "CVE-2018-15984", "CVE-2018-15985", "CVE-2018-15986", "CVE-2018-15987", "CVE-2018-15988", "CVE-2018-15989", "CVE-2018-15990", "CVE-2018-15991", "CVE-2018-15992", "CVE-2018-15993", "CVE-2018-15994", "CVE-2018-15995", "CVE-2018-15996", "CVE-2018-15997", "CVE-2018-15998", "CVE-2018-15999", "CVE-2018-16000", "CVE-2018-16001", "CVE-2018-16002", "CVE-2018-16003", "CVE-2018-16004", "CVE-2018-16005", "CVE-2018-16006", "CVE-2018-16007", "CVE-2018-16008", "CVE-2018-16009", "CVE-2018-16010", "CVE-2018-16012", "CVE-2018-16013", "CVE-2018-16014", "CVE-2018-16015", "CVE-2018-16016", "CVE-2018-16017", "CVE-2018-16019", "CVE-2018-16020", "CVE-2018-16021", "CVE-2018-16022", "CVE-2018-16023", "CVE-2018-16024", "CVE-2018-16025", "CVE-2018-16026", "CVE-2018-16027", "CVE-2018-16028", "CVE-2018-16029", "CVE-2018-16030", "CVE-2018-16031", "CVE-2018-16032", "CVE-2018-16033", "CVE-2018-16034", "CVE-2018-16035", "CVE-2018-16036", "CVE-2018-16037", "CVE-2018-16038", "CVE-2018-16039", "CVE-2018-16040", "CVE-2018-16041", "CVE-2018-16042", "CVE-2018-16043", "CVE-2018-16044", "CVE-2018-16045", "CVE-2018-16046", "CVE-2018-16047", "CVE-2018-19698", "CVE-2018-19699", "CVE-2018-19700", "CVE-2018-19701", "CVE-2018-19702", "CVE-2018-19703", "CVE-2018-19704", "CVE-2018-19705", "CVE-2018-19706", "CVE-2018-19707", "CVE-2018-19708", "CVE-2018-19709", "CVE-2018-19710", "CVE-2018-19711", "CVE-2018-19712", "CVE-2018-19713", "CVE-2018-19714", "CVE-2018-19715", "CVE-2018-19716", "CVE-2018-19717", "CVE-2018-19719", "CVE-2018-19720"], "modified": "2019-11-01T00:00:00", "cpe": ["cpe:/a:adobe:acrobat_reader"], "id": "MACOSX_ADOBE_READER_APSB18-41.NASL", "href": "https://www.tenable.com/plugins/nessus/119674", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(119674);\n script_version(\"1.7\");\n script_cvs_date(\"Date: 2019/11/01\");\n\n script_cve_id(\n \"CVE-2018-12830\",\n \"CVE-2018-15984\",\n \"CVE-2018-15985\",\n \"CVE-2018-15986\",\n \"CVE-2018-15987\",\n \"CVE-2018-15988\",\n \"CVE-2018-15989\",\n \"CVE-2018-15990\",\n \"CVE-2018-15991\",\n \"CVE-2018-15992\",\n \"CVE-2018-15993\",\n \"CVE-2018-15994\",\n \"CVE-2018-15995\",\n \"CVE-2018-15996\",\n \"CVE-2018-15997\",\n \"CVE-2018-15998\",\n \"CVE-2018-15999\",\n \"CVE-2018-16000\",\n \"CVE-2018-16001\",\n \"CVE-2018-16002\",\n \"CVE-2018-16003\",\n \"CVE-2018-16004\",\n \"CVE-2018-16005\",\n \"CVE-2018-16006\",\n \"CVE-2018-16007\",\n \"CVE-2018-16008\",\n \"CVE-2018-16009\",\n \"CVE-2018-16010\",\n \"CVE-2018-16012\",\n \"CVE-2018-16013\",\n \"CVE-2018-16014\",\n \"CVE-2018-16015\",\n \"CVE-2018-16016\",\n \"CVE-2018-16017\",\n \"CVE-2018-16019\",\n \"CVE-2018-16020\",\n \"CVE-2018-16021\",\n \"CVE-2018-16022\",\n \"CVE-2018-16023\",\n \"CVE-2018-16024\",\n \"CVE-2018-16025\",\n \"CVE-2018-16026\",\n \"CVE-2018-16027\",\n \"CVE-2018-16028\",\n \"CVE-2018-16029\",\n \"CVE-2018-16030\",\n \"CVE-2018-16031\",\n \"CVE-2018-16032\",\n \"CVE-2018-16033\",\n \"CVE-2018-16034\",\n \"CVE-2018-16035\",\n \"CVE-2018-16036\",\n \"CVE-2018-16037\",\n \"CVE-2018-16038\",\n \"CVE-2018-16039\",\n \"CVE-2018-16040\",\n \"CVE-2018-16041\",\n \"CVE-2018-16042\",\n \"CVE-2018-16043\",\n \"CVE-2018-16044\",\n \"CVE-2018-16045\",\n \"CVE-2018-16046\",\n \"CVE-2018-16047\",\n \"CVE-2018-19698\",\n \"CVE-2018-19699\",\n \"CVE-2018-19700\",\n \"CVE-2018-19701\",\n \"CVE-2018-19702\",\n \"CVE-2018-19703\",\n \"CVE-2018-19704\",\n \"CVE-2018-19705\",\n \"CVE-2018-19706\",\n \"CVE-2018-19707\",\n \"CVE-2018-19708\",\n \"CVE-2018-19709\",\n \"CVE-2018-19710\",\n \"CVE-2018-19711\",\n \"CVE-2018-19712\",\n \"CVE-2018-19713\",\n \"CVE-2018-19714\",\n \"CVE-2018-19715\",\n \"CVE-2018-19716\",\n \"CVE-2018-19717\",\n \"CVE-2018-19719\",\n \"CVE-2018-19720\"\n );\n\n script_name(english:\"Adobe Reader <= 15.006.30456 / 17.011.30105 / 19.008.20080 Multiple Vulnerabilities (APSB18-41) (macOS)\");\n script_summary(english:\"Checks the version of Adobe Reader.\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The version of Adobe Reader installed on the remote host is affected\nby multiple vulnerabilities.\");\n script_set_attribute(attribute:\"description\", value:\n\"The version of Adobe Reader installed on the remote macOS or Mac OS X\nhost is a version prior or equal to 15.006.30456, 17.011.30105, or\n19.008.20080. It is, therefore, affected by multiple \narbitrary code execution, privilege escalation, and information \ndisclosure vulnerabilities.\n\nNote that Nessus has not tested for these issues but has instead\nrelied only on the application's self-reported version number.\");\n script_set_attribute(attribute:\"see_also\", value:\"https://helpx.adobe.com/security/products/acrobat/apsb18-41.html\");\n script_set_attribute(attribute:\"solution\", value:\n\"Upgrade to Adobe Reader 2015.006.30461 / 2017.011.30110 / 2019.010.20064 or later.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:H/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:H/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2018-19715\");\n\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n script_set_attribute(attribute:\"exploited_by_malware\", value:\"true\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2018/12/11\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2018/12/11\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2018/12/14\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/a:adobe:acrobat_reader\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"MacOS X Local Security Checks\");\n\n script_copyright(english:\"This script is Copyright (C) 2018-2019 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"macosx_adobe_reader_installed.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/MacOSX/Version\", \"installed_sw/Adobe Reader\");\n\n exit(0);\n}\n\ninclude(\"vcf.inc\");\ninclude(\"vcf_extras.inc\");\n\nget_kb_item_or_exit(\"Host/local_checks_enabled\");\nos = get_kb_item(\"Host/MacOSX/Version\");\nif (empty_or_null(os)) audit(AUDIT_OS_NOT, \"Mac OS X\");\n\napp_info = vcf::get_app_info(app:\"Adobe Reader\");\n\n# vcf::adobe_reader::check_version_and_report will\n# properly separate tracks when checking constraints.\n# x.y.20zzz = DC Classic\n# x.y.30zzz = DC Continuous\nconstraints = [\n { \"min_version\" : \"15.6\", \"max_version\":\"15.6.30457\", \"fixed_version\" : \"15.6.30461\" },\n { \"min_version\" : \"17.8\", \"max_version\":\"17.11.30106\", \"fixed_version\" : \"17.11.30110\" },\n { \"min_version\" : \"15.8\", \"max_version\":\"19.8.20081\", \"fixed_version\" : \"19.10.20064\" }\n];\n\nvcf::adobe_reader::check_version_and_report(app_info:app_info, constraints:constraints, severity:SECURITY_HOLE);\n", "cvss": {"score": 10, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2021-10-16T13:10:44", "description": "The version of Adobe Acrobat installed on the remote macOS or Mac OS host is a version prior or equal to 15.006.30456, 17.011.30105, or 19.008.20080. It is, therefore, affected by multiple arbitrary code execution, privilege escalation, and information disclosure vulnerabilities.\n\nNote that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.", "cvss3": {"score": 9.8, "vector": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}, "published": "2018-12-14T00:00:00", "type": "nessus", "title": "Adobe Acrobat <= 15.006.30456 / 17.011.30105 / 19.008.20080 Multiple Vulnerabilities (APSB18-41) (macOS)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2018-12830", "CVE-2018-15984", "CVE-2018-15985", "CVE-2018-15986", "CVE-2018-15987", "CVE-2018-15988", "CVE-2018-15989", "CVE-2018-15990", "CVE-2018-15991", "CVE-2018-15992", "CVE-2018-15993", "CVE-2018-15994", "CVE-2018-15995", "CVE-2018-15996", "CVE-2018-15997", "CVE-2018-15998", "CVE-2018-15999", "CVE-2018-16000", "CVE-2018-16001", "CVE-2018-16002", "CVE-2018-16003", "CVE-2018-16004", "CVE-2018-16005", "CVE-2018-16006", "CVE-2018-16007", "CVE-2018-16008", "CVE-2018-16009", "CVE-2018-16010", "CVE-2018-16012", "CVE-2018-16013", "CVE-2018-16014", "CVE-2018-16015", "CVE-2018-16016", "CVE-2018-16017", "CVE-2018-16019", "CVE-2018-16020", "CVE-2018-16021", "CVE-2018-16022", "CVE-2018-16023", "CVE-2018-16024", "CVE-2018-16025", "CVE-2018-16026", "CVE-2018-16027", "CVE-2018-16028", "CVE-2018-16029", "CVE-2018-16030", "CVE-2018-16031", "CVE-2018-16032", "CVE-2018-16033", "CVE-2018-16034", "CVE-2018-16035", "CVE-2018-16036", "CVE-2018-16037", "CVE-2018-16038", "CVE-2018-16039", "CVE-2018-16040", "CVE-2018-16041", "CVE-2018-16042", "CVE-2018-16043", "CVE-2018-16044", "CVE-2018-16045", "CVE-2018-16046", "CVE-2018-16047", "CVE-2018-19698", "CVE-2018-19699", "CVE-2018-19700", "CVE-2018-19701", "CVE-2018-19702", "CVE-2018-19703", "CVE-2018-19704", "CVE-2018-19705", "CVE-2018-19706", "CVE-2018-19707", "CVE-2018-19708", "CVE-2018-19709", "CVE-2018-19710", "CVE-2018-19711", "CVE-2018-19712", "CVE-2018-19713", "CVE-2018-19714", "CVE-2018-19715", "CVE-2018-19716", "CVE-2018-19717", "CVE-2018-19719", "CVE-2018-19720"], "modified": "2019-11-01T00:00:00", "cpe": ["cpe:/a:adobe:acrobat"], "id": "MACOSX_ADOBE_ACROBAT_APSB18-41.NASL", "href": "https://www.tenable.com/plugins/nessus/119673", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(119673);\n script_version(\"1.7\");\n script_cvs_date(\"Date: 2019/11/01\");\n\n script_cve_id(\n \"CVE-2018-12830\",\n \"CVE-2018-15984\",\n \"CVE-2018-15985\",\n \"CVE-2018-15986\",\n \"CVE-2018-15987\",\n \"CVE-2018-15988\",\n \"CVE-2018-15989\",\n \"CVE-2018-15990\",\n \"CVE-2018-15991\",\n \"CVE-2018-15992\",\n \"CVE-2018-15993\",\n \"CVE-2018-15994\",\n \"CVE-2018-15995\",\n \"CVE-2018-15996\",\n \"CVE-2018-15997\",\n \"CVE-2018-15998\",\n \"CVE-2018-15999\",\n \"CVE-2018-16000\",\n \"CVE-2018-16001\",\n \"CVE-2018-16002\",\n \"CVE-2018-16003\",\n \"CVE-2018-16004\",\n \"CVE-2018-16005\",\n \"CVE-2018-16006\",\n \"CVE-2018-16007\",\n \"CVE-2018-16008\",\n \"CVE-2018-16009\",\n \"CVE-2018-16010\",\n \"CVE-2018-16012\",\n \"CVE-2018-16013\",\n \"CVE-2018-16014\",\n \"CVE-2018-16015\",\n \"CVE-2018-16016\",\n \"CVE-2018-16017\",\n \"CVE-2018-16019\",\n \"CVE-2018-16020\",\n \"CVE-2018-16021\",\n \"CVE-2018-16022\",\n \"CVE-2018-16023\",\n \"CVE-2018-16024\",\n \"CVE-2018-16025\",\n \"CVE-2018-16026\",\n \"CVE-2018-16027\",\n \"CVE-2018-16028\",\n \"CVE-2018-16029\",\n \"CVE-2018-16030\",\n \"CVE-2018-16031\",\n \"CVE-2018-16032\",\n \"CVE-2018-16033\",\n \"CVE-2018-16034\",\n \"CVE-2018-16035\",\n \"CVE-2018-16036\",\n \"CVE-2018-16037\",\n \"CVE-2018-16038\",\n \"CVE-2018-16039\",\n \"CVE-2018-16040\",\n \"CVE-2018-16041\",\n \"CVE-2018-16042\",\n \"CVE-2018-16043\",\n \"CVE-2018-16044\",\n \"CVE-2018-16045\",\n \"CVE-2018-16046\",\n \"CVE-2018-16047\",\n \"CVE-2018-19698\",\n \"CVE-2018-19699\",\n \"CVE-2018-19700\",\n \"CVE-2018-19701\",\n \"CVE-2018-19702\",\n \"CVE-2018-19703\",\n \"CVE-2018-19704\",\n \"CVE-2018-19705\",\n \"CVE-2018-19706\",\n \"CVE-2018-19707\",\n \"CVE-2018-19708\",\n \"CVE-2018-19709\",\n \"CVE-2018-19710\",\n \"CVE-2018-19711\",\n \"CVE-2018-19712\",\n \"CVE-2018-19713\",\n \"CVE-2018-19714\",\n \"CVE-2018-19715\",\n \"CVE-2018-19716\",\n \"CVE-2018-19717\",\n \"CVE-2018-19719\",\n \"CVE-2018-19720\"\n );\n\n script_name(english:\"Adobe Acrobat <= 15.006.30456 / 17.011.30105 / 19.008.20080 Multiple Vulnerabilities (APSB18-41) (macOS)\");\n script_summary(english:\"Checks the version of Adobe Acrobat.\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The version of Adobe Acrobat installed on the remote host is affected\nby multiple vulnerabilities.\");\n script_set_attribute(attribute:\"description\", value:\n\"The version of Adobe Acrobat installed on the remote macOS or Mac OS\nhost is a version prior or equal to 15.006.30456, 17.011.30105, or\n19.008.20080. It is, therefore, affected by multiple \narbitrary code execution, privilege escalation, and information \ndisclosure vulnerabilities.\n\nNote that Nessus has not tested for these issues but has instead\nrelied only on the application's self-reported version number.\");\n script_set_attribute(attribute:\"see_also\", value:\"https://helpx.adobe.com/security/products/acrobat/apsb18-41.html\");\n script_set_attribute(attribute:\"solution\", value:\n\"Upgrade to Adobe Acrobat 2015.006.30461 / 2017.011.30110 / 2019.010.20064 or later.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:H/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:H/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2018-19715\");\n\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n script_set_attribute(attribute:\"exploited_by_malware\", value:\"true\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2018/12/11\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2018/12/11\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2018/12/14\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/a:adobe:acrobat\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"MacOS X Local Security Checks\");\n\n script_copyright(english:\"This script is Copyright (C) 2018-2019 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"macosx_adobe_acrobat_installed.nbin\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/MacOSX/Version\", \"installed_sw/Adobe Acrobat\");\n\n exit(0);\n}\n\ninclude(\"vcf.inc\");\ninclude(\"vcf_extras.inc\");\n\nget_kb_item_or_exit(\"Host/local_checks_enabled\");\nos = get_kb_item(\"Host/MacOSX/Version\");\nif (empty_or_null(os)) audit(AUDIT_OS_NOT, \"Mac OS X\");\n\napp_info = vcf::get_app_info(app:\"Adobe Acrobat\");\n\n# vcf::adobe_reader::check_version_and_report will\n# properly separate tracks when checking constraints.\n# x.y.20zzz = DC Classic\n# x.y.30zzz = DC Continuous\nconstraints = [\n { \"min_version\" : \"15.6\", \"max_version\":\"15.6.30457\", \"fixed_version\" : \"15.6.30461\" },\n { \"min_version\" : \"17.8\", \"max_version\":\"17.11.30106\", \"fixed_version\" : \"17.11.30110\" },\n { \"min_version\" : \"15.8\", \"max_version\":\"19.8.20081\", \"fixed_version\" : \"19.10.20064\" }\n];\n\nvcf::adobe_reader::check_version_and_report(app_info:app_info, constraints:constraints, severity:SECURITY_HOLE);\n", "cvss": {"score": 10, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2021-10-16T00:47:12", "description": "The version of Adobe Acrobat installed on the remote Windows host is a version prior or equal to 2015.006.30457, 2017.011.30106, or 2019.008.20081. It is, therefore, affected by multiple arbitrary code execution, privilege escalation, and information disclosure vulnerabilities.\n\nNote that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.", "cvss3": {"score": 9.8, "vector": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}, "published": "2018-12-14T00:00:00", "type": "nessus", "title": "Adobe Acrobat <= 15.006.30457 / 17.011.30106 / 19.008.20081 Multiple Vulnerabilities (APSB18-41)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2018-12830", "CVE-2018-15984", "CVE-2018-15985", "CVE-2018-15986", "CVE-2018-15987", "CVE-2018-15988", "CVE-2018-15989", "CVE-2018-15990", "CVE-2018-15991", "CVE-2018-15992", "CVE-2018-15993", "CVE-2018-15994", "CVE-2018-15995", "CVE-2018-15996", "CVE-2018-15997", "CVE-2018-15998", "CVE-2018-15999", "CVE-2018-16000", "CVE-2018-16001", "CVE-2018-16002", "CVE-2018-16003", "CVE-2018-16004", "CVE-2018-16005", "CVE-2018-16006", "CVE-2018-16007", "CVE-2018-16008", "CVE-2018-16009", "CVE-2018-16010", "CVE-2018-16012", "CVE-2018-16013", "CVE-2018-16014", "CVE-2018-16015", "CVE-2018-16016", "CVE-2018-16017", "CVE-2018-16019", "CVE-2018-16020", "CVE-2018-16021", "CVE-2018-16022", "CVE-2018-16023", "CVE-2018-16024", "CVE-2018-16025", "CVE-2018-16026", "CVE-2018-16027", "CVE-2018-16028", "CVE-2018-16029", "CVE-2018-16030", "CVE-2018-16031", "CVE-2018-16032", "CVE-2018-16033", "CVE-2018-16034", "CVE-2018-16035", "CVE-2018-16036", "CVE-2018-16037", "CVE-2018-16038", "CVE-2018-16039", "CVE-2018-16040", "CVE-2018-16041", "CVE-2018-16042", "CVE-2018-16043", "CVE-2018-16044", "CVE-2018-16045", "CVE-2018-16046", "CVE-2018-16047", "CVE-2018-19698", "CVE-2018-19699", "CVE-2018-19700", "CVE-2018-19701", "CVE-2018-19702", "CVE-2018-19703", "CVE-2018-19704", "CVE-2018-19705", "CVE-2018-19706", "CVE-2018-19707", "CVE-2018-19708", "CVE-2018-19709", "CVE-2018-19710", "CVE-2018-19711", "CVE-2018-19712", "CVE-2018-19713", "CVE-2018-19714", "CVE-2018-19715", "CVE-2018-19716", "CVE-2018-19717", "CVE-2018-19719", "CVE-2018-19720"], "modified": "2019-11-01T00:00:00", "cpe": ["cpe:/a:adobe:acrobat"], "id": "ADOBE_ACROBAT_APSB18-41.NASL", "href": "https://www.tenable.com/plugins/nessus/119675", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(119675);\n script_version(\"1.8\");\n script_cvs_date(\"Date: 2019/11/01\");\n\n script_cve_id(\n \"CVE-2018-12830\",\n \"CVE-2018-15984\",\n \"CVE-2018-15985\",\n \"CVE-2018-15986\",\n \"CVE-2018-15987\",\n \"CVE-2018-15988\",\n \"CVE-2018-15989\",\n \"CVE-2018-15990\",\n \"CVE-2018-15991\",\n \"CVE-2018-15992\",\n \"CVE-2018-15993\",\n \"CVE-2018-15994\",\n \"CVE-2018-15995\",\n \"CVE-2018-15996\",\n \"CVE-2018-15997\",\n \"CVE-2018-15998\",\n \"CVE-2018-15999\",\n \"CVE-2018-16000\",\n \"CVE-2018-16001\",\n \"CVE-2018-16002\",\n \"CVE-2018-16003\",\n \"CVE-2018-16004\",\n \"CVE-2018-16005\",\n \"CVE-2018-16006\",\n \"CVE-2018-16007\",\n \"CVE-2018-16008\",\n \"CVE-2018-16009\",\n \"CVE-2018-16010\",\n \"CVE-2018-16012\",\n \"CVE-2018-16013\",\n \"CVE-2018-16014\",\n \"CVE-2018-16015\",\n \"CVE-2018-16016\",\n \"CVE-2018-16017\",\n \"CVE-2018-16019\",\n \"CVE-2018-16020\",\n \"CVE-2018-16021\",\n \"CVE-2018-16022\",\n \"CVE-2018-16023\",\n \"CVE-2018-16024\",\n \"CVE-2018-16025\",\n \"CVE-2018-16026\",\n \"CVE-2018-16027\",\n \"CVE-2018-16028\",\n \"CVE-2018-16029\",\n \"CVE-2018-16030\",\n \"CVE-2018-16031\",\n \"CVE-2018-16032\",\n \"CVE-2018-16033\",\n \"CVE-2018-16034\",\n \"CVE-2018-16035\",\n \"CVE-2018-16036\",\n \"CVE-2018-16037\",\n \"CVE-2018-16038\",\n \"CVE-2018-16039\",\n \"CVE-2018-16040\",\n \"CVE-2018-16041\",\n \"CVE-2018-16042\",\n \"CVE-2018-16043\",\n \"CVE-2018-16044\",\n \"CVE-2018-16045\",\n \"CVE-2018-16046\",\n \"CVE-2018-16047\",\n \"CVE-2018-19698\",\n \"CVE-2018-19699\",\n \"CVE-2018-19700\",\n \"CVE-2018-19701\",\n \"CVE-2018-19702\",\n \"CVE-2018-19703\",\n \"CVE-2018-19704\",\n \"CVE-2018-19705\",\n \"CVE-2018-19706\",\n \"CVE-2018-19707\",\n \"CVE-2018-19708\",\n \"CVE-2018-19709\",\n \"CVE-2018-19710\",\n \"CVE-2018-19711\",\n \"CVE-2018-19712\",\n \"CVE-2018-19713\",\n \"CVE-2018-19714\",\n \"CVE-2018-19715\",\n \"CVE-2018-19716\",\n \"CVE-2018-19717\",\n \"CVE-2018-19719\",\n \"CVE-2018-19720\"\n );\n\n script_name(english:\"Adobe Acrobat <= 15.006.30457 / 17.011.30106 / 19.008.20081 Multiple Vulnerabilities (APSB18-41)\");\n script_summary(english:\"Checks the version of Adobe Acrobat.\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The version of Adobe Acrobat installed on the remote Windows host is\naffected by an information disclosure vulnerability.\");\n script_set_attribute(attribute:\"description\", value:\n\"The version of Adobe Acrobat installed on the remote Windows host is\na version prior or equal to 2015.006.30457, 2017.011.30106, or \n2019.008.20081. It is, therefore, affected by multiple \narbitrary code execution, privilege escalation, and information \ndisclosure vulnerabilities.\n\nNote that Nessus has not tested for these issues but has instead\nrelied only on the application's self-reported version number.\");\n script_set_attribute(attribute:\"see_also\", value:\"https://helpx.adobe.com/security/products/acrobat/apsb18-41.html\");\n script_set_attribute(attribute:\"solution\", value:\n\"Upgrade to Adobe Acrobat 2015.006.30461 / 2017.011.30110 / 2019.010.20064 or later.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:H/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:H/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2018-19715\");\n\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n script_set_attribute(attribute:\"exploited_by_malware\", value:\"true\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2018/12/11\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2018/12/11\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2018/12/14\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/a:adobe:acrobat\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"Windows\");\n\n script_copyright(english:\"This script is Copyright (C) 2018-2019 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"adobe_acrobat_installed.nasl\");\n script_require_keys(\"SMB/Registry/Enumerated\", \"installed_sw/Adobe Acrobat\");\n\n exit(0);\n}\n\ninclude(\"vcf.inc\");\ninclude(\"vcf_extras.inc\");\n\nget_kb_item_or_exit(\"SMB/Registry/Enumerated\");\napp_info = vcf::get_app_info(app:\"Adobe Acrobat\", win_local:TRUE);\n\n# vcf::adobe_reader::check_version_and_report will\n# properly separate tracks when checking constraints.\n# x.y.20zzz = DC Classic\n# x.y.30zzz = DC Continuous\nconstraints = [\n { \"min_version\" : \"15.6\", \"max_version\":\"15.6.30457\", \"fixed_version\" : \"15.6.30461\" },\n { \"min_version\" : \"17.8\", \"max_version\":\"17.11.30106\", \"fixed_version\" : \"17.11.30110\" },\n { \"min_version\" : \"15.7\", \"max_version\":\"19.8.20081\", \"fixed_version\" : \"19.10.20064\" }\n];\n# using adobe_reader namespace check_version_and_report to properly detect Continuous vs Classic, \n# and limit ver segments to 3 (18.x.y vs 18.x.y.12345) with max_segs:3\nvcf::adobe_reader::check_version_and_report(app_info:app_info, constraints:constraints, severity:SECURITY_HOLE, max_segs:3);\n", "cvss": {"score": 10, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2021-10-16T00:47:45", "description": "The version of Adobe Reader installed on the remote Windows host is a version prior or equal to 2015.006.30457, 2017.011.30106, or 2019.008.20081. It is, therefore, affected by multiple arbitrary code execution, privilege escalation, and information disclosure vulnerabilities.\n\nNote that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.", "cvss3": {"score": 9.8, "vector": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}, "published": "2018-12-14T00:00:00", "type": "nessus", "title": "Adobe Reader <= 15.006.30457 / 17.011.30106 / 19.008.20081 Multiple Vulnerabilities (APSB18-41)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2018-12830", "CVE-2018-15984", "CVE-2018-15985", "CVE-2018-15986", "CVE-2018-15987", "CVE-2018-15988", "CVE-2018-15989", "CVE-2018-15990", "CVE-2018-15991", "CVE-2018-15992", "CVE-2018-15993", "CVE-2018-15994", "CVE-2018-15995", "CVE-2018-15996", "CVE-2018-15997", "CVE-2018-15998", "CVE-2018-15999", "CVE-2018-16000", "CVE-2018-16001", "CVE-2018-16002", "CVE-2018-16003", "CVE-2018-16004", "CVE-2018-16005", "CVE-2018-16006", "CVE-2018-16007", "CVE-2018-16008", "CVE-2018-16009", "CVE-2018-16010", "CVE-2018-16012", "CVE-2018-16013", "CVE-2018-16014", "CVE-2018-16015", "CVE-2018-16016", "CVE-2018-16017", "CVE-2018-16019", "CVE-2018-16020", "CVE-2018-16021", "CVE-2018-16022", "CVE-2018-16023", "CVE-2018-16024", "CVE-2018-16025", "CVE-2018-16026", "CVE-2018-16027", "CVE-2018-16028", "CVE-2018-16029", "CVE-2018-16030", "CVE-2018-16031", "CVE-2018-16032", "CVE-2018-16033", "CVE-2018-16034", "CVE-2018-16035", "CVE-2018-16036", "CVE-2018-16037", "CVE-2018-16038", "CVE-2018-16039", "CVE-2018-16040", "CVE-2018-16041", "CVE-2018-16042", "CVE-2018-16043", "CVE-2018-16044", "CVE-2018-16045", "CVE-2018-16046", "CVE-2018-16047", "CVE-2018-19698", "CVE-2018-19699", "CVE-2018-19700", "CVE-2018-19701", "CVE-2018-19702", "CVE-2018-19703", "CVE-2018-19704", "CVE-2018-19705", "CVE-2018-19706", "CVE-2018-19707", "CVE-2018-19708", "CVE-2018-19709", "CVE-2018-19710", "CVE-2018-19711", "CVE-2018-19712", "CVE-2018-19713", "CVE-2018-19714", "CVE-2018-19715", "CVE-2018-19716", "CVE-2018-19717", "CVE-2018-19719", "CVE-2018-19720"], "modified": "2019-11-01T00:00:00", "cpe": ["cpe:/a:adobe:acrobat_reader"], "id": "ADOBE_READER_APSB18-41.NASL", "href": "https://www.tenable.com/plugins/nessus/119676", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(119676);\n script_version(\"1.8\");\n script_cvs_date(\"Date: 2019/11/01\");\n\n script_cve_id(\n \"CVE-2018-12830\",\n \"CVE-2018-15984\",\n \"CVE-2018-15985\",\n \"CVE-2018-15986\",\n \"CVE-2018-15987\",\n \"CVE-2018-15988\",\n \"CVE-2018-15989\",\n \"CVE-2018-15990\",\n \"CVE-2018-15991\",\n \"CVE-2018-15992\",\n \"CVE-2018-15993\",\n \"CVE-2018-15994\",\n \"CVE-2018-15995\",\n \"CVE-2018-15996\",\n \"CVE-2018-15997\",\n \"CVE-2018-15998\",\n \"CVE-2018-15999\",\n \"CVE-2018-16000\",\n \"CVE-2018-16001\",\n \"CVE-2018-16002\",\n \"CVE-2018-16003\",\n \"CVE-2018-16004\",\n \"CVE-2018-16005\",\n \"CVE-2018-16006\",\n \"CVE-2018-16007\",\n \"CVE-2018-16008\",\n \"CVE-2018-16009\",\n \"CVE-2018-16010\",\n \"CVE-2018-16012\",\n \"CVE-2018-16013\",\n \"CVE-2018-16014\",\n \"CVE-2018-16015\",\n \"CVE-2018-16016\",\n \"CVE-2018-16017\",\n \"CVE-2018-16019\",\n \"CVE-2018-16020\",\n \"CVE-2018-16021\",\n \"CVE-2018-16022\",\n \"CVE-2018-16023\",\n \"CVE-2018-16024\",\n \"CVE-2018-16025\",\n \"CVE-2018-16026\",\n \"CVE-2018-16027\",\n \"CVE-2018-16028\",\n \"CVE-2018-16029\",\n \"CVE-2018-16030\",\n \"CVE-2018-16031\",\n \"CVE-2018-16032\",\n \"CVE-2018-16033\",\n \"CVE-2018-16034\",\n \"CVE-2018-16035\",\n \"CVE-2018-16036\",\n \"CVE-2018-16037\",\n \"CVE-2018-16038\",\n \"CVE-2018-16039\",\n \"CVE-2018-16040\",\n \"CVE-2018-16041\",\n \"CVE-2018-16042\",\n \"CVE-2018-16043\",\n \"CVE-2018-16044\",\n \"CVE-2018-16045\",\n \"CVE-2018-16046\",\n \"CVE-2018-16047\",\n \"CVE-2018-19698\",\n \"CVE-2018-19699\",\n \"CVE-2018-19700\",\n \"CVE-2018-19701\",\n \"CVE-2018-19702\",\n \"CVE-2018-19703\",\n \"CVE-2018-19704\",\n \"CVE-2018-19705\",\n \"CVE-2018-19706\",\n \"CVE-2018-19707\",\n \"CVE-2018-19708\",\n \"CVE-2018-19709\",\n \"CVE-2018-19710\",\n \"CVE-2018-19711\",\n \"CVE-2018-19712\",\n \"CVE-2018-19713\",\n \"CVE-2018-19714\",\n \"CVE-2018-19715\",\n \"CVE-2018-19716\",\n \"CVE-2018-19717\",\n \"CVE-2018-19719\",\n \"CVE-2018-19720\"\n );\n\n script_name(english:\"Adobe Reader <= 15.006.30457 / 17.011.30106 / 19.008.20081 Multiple Vulnerabilities (APSB18-41)\");\n script_summary(english:\"Checks the version of Adobe Reader.\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The version of Adobe Reader installed on the remote Windows host is\naffected by an information disclosure vulnerability.\");\n script_set_attribute(attribute:\"description\", value:\n\"The version of Adobe Reader installed on the remote Windows host is a\nversion prior or equal to 2015.006.30457, 2017.011.30106, or \n2019.008.20081. It is, therefore, affected by multiple \narbitrary code execution, privilege escalation, and information \ndisclosure vulnerabilities.\n\nNote that Nessus has not tested for these issues but has instead\nrelied only on the application's self-reported version number.\");\n script_set_attribute(attribute:\"see_also\", value:\"https://helpx.adobe.com/security/products/acrobat/apsb18-41.html\");\n script_set_attribute(attribute:\"solution\", value:\n\"Upgrade to Adobe Reader 2015.006.30461 / 2017.011.30110 / 2019.010.20064 or later.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:H/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:H/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2018-19715\");\n\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n script_set_attribute(attribute:\"exploited_by_malware\", value:\"true\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2018/12/11\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2018/12/11\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2018/12/14\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/a:adobe:acrobat_reader\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"Windows\");\n\n script_copyright(english:\"This script is Copyright (C) 2018-2019 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"adobe_reader_installed.nasl\");\n script_require_keys(\"SMB/Registry/Enumerated\", \"installed_sw/Adobe Reader\");\n\n exit(0);\n}\n\ninclude(\"vcf.inc\");\ninclude(\"vcf_extras.inc\");\n\nget_kb_item_or_exit(\"SMB/Registry/Enumerated\");\n# Use adobe_reader::get_app_info()\n# to use DLL version if > app_info.version\napp_info = vcf::adobe_reader::get_app_info();\n\n# vcf::adobe_reader::check_version_and_report will\n# properly separate tracks when checking constraints.\n# x.y.20zzz = DC Classic\n# x.y.30zzz = DC Continuous\nconstraints = [\n { \"min_version\" : \"15.6\", \"max_version\":\"15.6.30457\", \"fixed_version\" : \"15.6.30461\" },\n { \"min_version\" : \"17.8\", \"max_version\":\"17.11.30106\", \"fixed_version\" : \"17.11.30110\" },\n { \"min_version\" : \"15.7\", \"max_version\":\"19.8.20081\", \"fixed_version\" : \"19.10.20064\" }\n];\n# using adobe_reader namespace check_version_and_report to properly detect Continuous vs Classic, \n# and limit ver segments to 3 (18.x.y vs 18.x.y.12345) with max_segs:3\nvcf::adobe_reader::check_version_and_report(app_info:app_info, constraints:constraints, severity:SECURITY_HOLE, max_segs:3);\n", "cvss": {"score": 10, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}], "adobe": [{"lastseen": "2021-09-30T17:39:33", "description": "Adobe has released security updates for Adobe Acrobat and Reader for Windows and MacOS. These updates address [critical]() and [important]() vulnerabilities. Successful exploitation could lead to arbitrary code execution in the context of the current user. \n", "cvss3": {"exploitabilityScore": 3.9, "cvssV3": {"baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "baseScore": 9.8, "privilegesRequired": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "userInteraction": "NONE", "version": "3.0"}, "impactScore": 5.9}, "published": "2018-12-11T00:00:00", "type": "adobe", "title": "APSB18-41 Security Updates Available for Adobe Acrobat and Reader", "bulletinFamily": "software", "cvss2": {"severity": "HIGH", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "COMPLETE", "availabilityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "baseScore": 10.0, "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "acInsufInfo": false, "impactScore": 10.0, "obtainUserPrivilege": false}, "cvelist": ["CVE-2018-12830", "CVE-2018-15984", "CVE-2018-15985", "CVE-2018-15986", "CVE-2018-15987", "CVE-2018-15988", "CVE-2018-15989", "CVE-2018-15990", "CVE-2018-15991", "CVE-2018-15992", "CVE-2018-15993", "CVE-2018-15994", "CVE-2018-15995", "CVE-2018-15996", "CVE-2018-15997", "CVE-2018-15998", "CVE-2018-15999", "CVE-2018-16000", "CVE-2018-16001", "CVE-2018-16002", "CVE-2018-16003", "CVE-2018-16004", "CVE-2018-16005", "CVE-2018-16006", "CVE-2018-16007", "CVE-2018-16008", "CVE-2018-16009", "CVE-2018-16010", "CVE-2018-16011", "CVE-2018-16012", "CVE-2018-16013", "CVE-2018-16014", "CVE-2018-16015", "CVE-2018-16016", "CVE-2018-16017", "CVE-2018-16018", "CVE-2018-16019", "CVE-2018-16020", "CVE-2018-16021", "CVE-2018-16022", "CVE-2018-16023", "CVE-2018-16024", "CVE-2018-16025", "CVE-2018-16026", "CVE-2018-16027", "CVE-2018-16028", "CVE-2018-16029", "CVE-2018-16030", "CVE-2018-16031", "CVE-2018-16032", "CVE-2018-16033", "CVE-2018-16034", "CVE-2018-16035", "CVE-2018-16036", "CVE-2018-16037", "CVE-2018-16038", "CVE-2018-16039", "CVE-2018-16040", "CVE-2018-16041", "CVE-2018-16042", "CVE-2018-16043", "CVE-2018-16044", "CVE-2018-16045", "CVE-2018-16046", "CVE-2018-16047", "CVE-2018-19698", "CVE-2018-19699", "CVE-2018-19700", "CVE-2018-19701", "CVE-2018-19702", "CVE-2018-19703", "CVE-2018-19704", "CVE-2018-19705", "CVE-2018-19706", "CVE-2018-19707", "CVE-2018-19708", "CVE-2018-19709", "CVE-2018-19710", "CVE-2018-19711", "CVE-2018-19712", "CVE-2018-19713", "CVE-2018-19714", "CVE-2018-19715", "CVE-2018-19716", "CVE-2018-19717", "CVE-2018-19719", "CVE-2018-19720", "CVE-2018-19728"], "modified": "2018-12-11T00:00:00", "id": "APSB18-41", "href": "https://helpx.adobe.com/security/products/acrobat/apsb18-41.html", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}]}