ID CVE-2019-7123 Type cve Reporter cve@mitre.org Modified 2019-08-21T16:20:00
Description
Adobe Acrobat and Reader versions 2019.010.20098 and earlier, 2019.010.20098 and earlier, 2017.011.30127 and earlier version, and 2015.006.30482 and earlier have an out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure .
{"openvas": [{"lastseen": "2019-07-17T14:03:36", "bulletinFamily": "scanner", "cvelist": ["CVE-2019-7127", "CVE-2019-7120", "CVE-2019-7118", "CVE-2019-7116", "CVE-2019-7112", "CVE-2019-7111", "CVE-2019-7117", "CVE-2019-7123", "CVE-2019-7114", "CVE-2019-7109", "CVE-2019-7122", "CVE-2019-7113", "CVE-2019-7125", "CVE-2019-7124", "CVE-2019-7088", "CVE-2019-7115", "CVE-2019-7061", "CVE-2019-7119", "CVE-2019-7121", "CVE-2019-7110", "CVE-2019-7128"], "description": "This host is installed with Adobe Acrobat\n 2017 and is prone to multiple vulnerabilities.", "modified": "2019-07-16T00:00:00", "published": "2019-04-11T00:00:00", "id": "OPENVAS:1361412562310814786", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310814786", "type": "openvas", "title": "Adobe Acrobat 2017 Security Updates (apsb19-17)-Mac OS X", "sourceData": "# Copyright (C) 2019 Greenbone Networks GmbH\n# Text descriptions are largely excerpted from the referenced\n# advisory, and are Copyright (C) the respective author(s)\n#\n# SPDX-License-Identifier: GPL-2.0-or-later\n#\n# This program is free software; you can redistribute it and/or\n# modify it under the terms of the GNU General Public License\n# as published by the Free Software Foundation; either version 2\n# of the License, or (at your option) any later version.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n\nCPE = \"cpe:/a:adobe:acrobat\";\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.814786\");\n script_version(\"2019-07-16T10:51:36+0000\");\n script_cve_id(\"CVE-2019-7061\", \"CVE-2019-7109\", \"CVE-2019-7110\", \"CVE-2019-7114\",\n \"CVE-2019-7115\", \"CVE-2019-7116\", \"CVE-2019-7121\", \"CVE-2019-7122\",\n \"CVE-2019-7123\", \"CVE-2019-7127\", \"CVE-2019-7111\", \"CVE-2019-7118\",\n \"CVE-2019-7119\", \"CVE-2019-7120\", \"CVE-2019-7124\", \"CVE-2019-7117\",\n \"CVE-2019-7128\", \"CVE-2019-7088\", \"CVE-2019-7112\", \"CVE-2019-7113\",\n \"CVE-2019-7125\");\n script_tag(name:\"cvss_base\", value:\"10.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_tag(name:\"last_modification\", value:\"2019-07-16 10:51:36 +0000 (Tue, 16 Jul 2019)\");\n script_tag(name:\"creation_date\", value:\"2019-04-11 11:09:50 +0530 (Thu, 11 Apr 2019)\");\n script_name(\"Adobe Acrobat 2017 Security Updates (apsb19-17)-Mac OS X\");\n\n script_tag(name:\"summary\", value:\"This host is installed with Adobe Acrobat\n 2017 and is prone to multiple vulnerabilities.\");\n\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable version is present\n on the target host.\");\n\n script_tag(name:\"insight\", value:\"Multiple flaws exists due to,\n\n - Multiple out-of-bounds read errors.\n\n - Multiple out-of-bounds write errors.\n\n - Type confusionerrors.\n\n - Use After Free errors.\n\n - Heap Overflow errors.\");\n\n script_tag(name:\"impact\", value:\"Successful exploitation will allow an attacker\n to gain access to sensitive information and run arbitrary code in context of\n current user.\");\n\n script_tag(name:\"affected\", value:\"Adobe Acrobat 2017.011.30127 and earlier\n versions on Mac OS X.\");\n\n script_tag(name:\"solution\", value:\"Upgrade to Adobe Acrobat 2017 version\n 2017.011.30138 or later. Please see the references for more information.\");\n\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_tag(name:\"qod_type\", value:\"executable_version\");\n script_xref(name:\"URL\", value:\"https://helpx.adobe.com/security/products/acrobat/apsb19-17.html\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2019 Greenbone Networks GmbH\");\n script_family(\"General\");\n script_dependencies(\"secpod_adobe_prdts_detect_macosx.nasl\");\n script_mandatory_keys(\"Adobe/Acrobat/MacOSX/Version\");\n exit(0);\n}\n\ninclude(\"host_details.inc\");\ninclude(\"version_func.inc\");\n\nif(!infos = get_app_version_and_location(cpe:CPE, exit_no_version:TRUE))\n exit(0);\n\nvers = infos['version'];\npath = infos['location'];\n\n## 2017.011.30127 == 17.011.30127\nif(version_in_range(version:vers, test_version:\"17.0\", test_version2:\"17.011.30127\")) {\n report = report_fixed_ver(installed_version:vers, fixed_version:\"17.011.30138 (2017.011.30138)\", install_path:path);\n security_message(data:report);\n exit(0);\n}\n\nexit(99);\n", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2019-07-17T14:03:32", "bulletinFamily": "scanner", "cvelist": ["CVE-2019-7127", "CVE-2019-7120", "CVE-2019-7118", "CVE-2019-7116", "CVE-2019-7112", "CVE-2019-7111", "CVE-2019-7117", "CVE-2019-7123", "CVE-2019-7114", "CVE-2019-7109", "CVE-2019-7122", "CVE-2019-7113", "CVE-2019-7125", "CVE-2019-7124", "CVE-2019-7088", "CVE-2019-7115", "CVE-2019-7061", "CVE-2019-7119", "CVE-2019-7121", "CVE-2019-7110", "CVE-2019-7128"], "description": "This host is installed with Adobe Acrobat DC\n (Continuous Track) and is prone to multiple vulnerabilities.", "modified": "2019-07-05T00:00:00", "published": "2019-04-11T00:00:00", "id": "OPENVAS:1361412562310814791", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310814791", "type": "openvas", "title": "Adobe Acrobat DC (Continuous Track) Security Updates (apsb19-17) - Windows", "sourceData": "# Copyright (C) 2019 Greenbone Networks GmbH\n# Text descriptions are largely excerpted from the referenced\n# advisory, and are Copyright (C) the respective author(s)\n#\n# SPDX-License-Identifier: GPL-2.0-or-later\n#\n# This program is free software; you can redistribute it and/or\n# modify it under the terms of the GNU General Public License\n# as published by the Free Software Foundation; either version 2\n# of the License, or (at your option) any later version.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n\nCPE = \"cpe:/a:adobe:acrobat_dc_continuous\";\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.814791\");\n script_version(\"2019-07-05T08:29:17+0000\");\n script_cve_id(\"CVE-2019-7061\", \"CVE-2019-7109\", \"CVE-2019-7110\", \"CVE-2019-7114\",\n \"CVE-2019-7115\", \"CVE-2019-7116\", \"CVE-2019-7121\", \"CVE-2019-7122\",\n \"CVE-2019-7123\", \"CVE-2019-7127\", \"CVE-2019-7111\", \"CVE-2019-7118\",\n \"CVE-2019-7119\", \"CVE-2019-7120\", \"CVE-2019-7124\", \"CVE-2019-7117\",\n \"CVE-2019-7128\", \"CVE-2019-7088\", \"CVE-2019-7112\", \"CVE-2019-7113\",\n \"CVE-2019-7125\");\n script_tag(name:\"cvss_base\", value:\"10.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_tag(name:\"last_modification\", value:\"2019-07-05 08:29:17 +0000 (Fri, 05 Jul 2019)\");\n script_tag(name:\"creation_date\", value:\"2019-04-11 12:09:50 +0530 (Thu, 11 Apr 2019)\");\n script_name(\"Adobe Acrobat DC (Continuous Track) Security Updates (apsb19-17) - Windows\");\n\n script_tag(name:\"summary\", value:\"This host is installed with Adobe Acrobat DC\n (Continuous Track) and is prone to multiple vulnerabilities.\");\n\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable version is present\n on the target host.\");\n\n script_tag(name:\"insight\", value:\"Multiple flaws exists due to,\n\n - Multiple out-of-bounds read errors.\n\n - Multiple out-of-bounds write errors.\n\n - Type confusionerrors.\n\n - Use After Free errors.\n\n - Heap Overflow errors.\");\n\n script_tag(name:\"impact\", value:\"Successful exploitation will allow an attacker\n to gain access to sensitive information and run arbitrary code in context of\n current user.\");\n\n script_tag(name:\"affected\", value:\"Adobe Acrobat DC (Continuous Track)\n 2019.010.20098 and earlier versions on Windows.\");\n\n script_tag(name:\"solution\", value:\"Upgrade to Adobe Acrobat DC Continuous\n version 2019.010.20099 or later. Please see the references for more information.\");\n\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_tag(name:\"qod_type\", value:\"registry\");\n script_xref(name:\"URL\", value:\"https://helpx.adobe.com/security/products/acrobat/apsb19-17.html\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2019 Greenbone Networks GmbH\");\n script_family(\"General\");\n script_dependencies(\"gb_adobe_acrobat_dc_cont_detect_win.nasl\");\n script_mandatory_keys(\"Adobe/AcrobatDC/Continuous/Win/Ver\");\n exit(0);\n}\n\ninclude(\"host_details.inc\");\ninclude(\"version_func.inc\");\n\nif( ! infos = get_app_version_and_location( cpe:CPE, exit_no_version:TRUE) ) exit( 0 );\nvers = infos['version'];\npath = infos['location'];\n\n## 2019.010.20099 == 19.010.20099\nif(version_is_less(version:vers, test_version:\"19.010.20099\")) {\n report = report_fixed_ver(installed_version:vers, fixed_version:\"19.010.20099 (2019.010.20099)\", install_path:path);\n security_message(data:report);\n exit(0);\n}\n\nexit(99);\n", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2019-07-17T14:03:33", "bulletinFamily": "scanner", "cvelist": ["CVE-2019-7127", "CVE-2019-7120", "CVE-2019-7118", "CVE-2019-7116", "CVE-2019-7112", "CVE-2019-7111", "CVE-2019-7117", "CVE-2019-7123", "CVE-2019-7114", "CVE-2019-7109", "CVE-2019-7122", "CVE-2019-7113", "CVE-2019-7125", "CVE-2019-7124", "CVE-2019-7088", "CVE-2019-7115", "CVE-2019-7061", "CVE-2019-7119", "CVE-2019-7121", "CVE-2019-7110", "CVE-2019-7128"], "description": "This host is installed with Adobe Acrobat\n 2017 and is prone to multiple vulnerabilities.", "modified": "2019-07-16T00:00:00", "published": "2019-04-11T00:00:00", "id": "OPENVAS:1361412562310814785", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310814785", "type": "openvas", "title": "Adobe Acrobat 2017 Security Updates (apsb19-17)-Windows", "sourceData": "# Copyright (C) 2019 Greenbone Networks GmbH\n# Text descriptions are largely excerpted from the referenced\n# advisory, and are Copyright (C) the respective author(s)\n#\n# SPDX-License-Identifier: GPL-2.0-or-later\n#\n# This program is free software; you can redistribute it and/or\n# modify it under the terms of the GNU General Public License\n# as published by the Free Software Foundation; either version 2\n# of the License, or (at your option) any later version.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n\nCPE = \"cpe:/a:adobe:acrobat\";\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.814785\");\n script_version(\"2019-07-16T10:51:36+0000\");\n script_cve_id(\"CVE-2019-7061\", \"CVE-2019-7109\", \"CVE-2019-7110\", \"CVE-2019-7114\",\n \"CVE-2019-7115\", \"CVE-2019-7116\", \"CVE-2019-7121\", \"CVE-2019-7122\",\n \"CVE-2019-7123\", \"CVE-2019-7127\", \"CVE-2019-7111\", \"CVE-2019-7118\",\n \"CVE-2019-7119\", \"CVE-2019-7120\", \"CVE-2019-7124\", \"CVE-2019-7117\",\n \"CVE-2019-7128\", \"CVE-2019-7088\", \"CVE-2019-7112\", \"CVE-2019-7113\",\n \"CVE-2019-7125\");\n script_tag(name:\"cvss_base\", value:\"10.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_tag(name:\"last_modification\", value:\"2019-07-16 10:51:36 +0000 (Tue, 16 Jul 2019)\");\n script_tag(name:\"creation_date\", value:\"2019-04-11 11:09:50 +0530 (Thu, 11 Apr 2019)\");\n script_name(\"Adobe Acrobat 2017 Security Updates (apsb19-17)-Windows\");\n\n script_tag(name:\"summary\", value:\"This host is installed with Adobe Acrobat\n 2017 and is prone to multiple vulnerabilities.\");\n\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable version is present\n on the target host.\");\n\n script_tag(name:\"insight\", value:\"Multiple flaws exists due to,\n\n - Multiple out-of-bounds read errors.\n\n - Multiple out-of-bounds write errors.\n\n - Type confusionerrors.\n\n - Use After Free errors.\n\n - Heap Overflow errors.\");\n\n script_tag(name:\"impact\", value:\"Successful exploitation will allow an attacker\n to gain access to sensitive information and run arbitrary code in context of\n current user.\");\n\n script_tag(name:\"affected\", value:\"Adobe Acrobat versions 2017.011.30127 and\n earlier on Windows.\");\n\n script_tag(name:\"solution\", value:\"Upgrade to Adobe Acrobat 2017 version\n 2017.011.30138 or later. Please see the references for more information.\");\n\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_tag(name:\"qod_type\", value:\"registry\");\n script_xref(name:\"URL\", value:\"https://helpx.adobe.com/security/products/acrobat/apsb19-17.html\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2019 Greenbone Networks GmbH\");\n script_family(\"General\");\n script_dependencies(\"secpod_adobe_prdts_detect_win.nasl\");\n script_mandatory_keys(\"Adobe/Acrobat/Win/Ver\");\n exit(0);\n}\n\ninclude(\"host_details.inc\");\ninclude(\"version_func.inc\");\n\nif(!infos = get_app_version_and_location(cpe:CPE, exit_no_version:TRUE))\n exit(0);\n\nvers = infos['version'];\npath = infos['location'];\n\n## 2017.011.30127 == 17.011.30127\nif(version_in_range(version:vers, test_version:\"17.0\", test_version2:\"17.011.30127\")) {\n report = report_fixed_ver(installed_version:vers, fixed_version:\"17.011.30138 (2017.011.30138)\", install_path:path);\n security_message(data:report);\n exit(0);\n}\n\nexit(99);\n", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2019-07-17T14:03:53", "bulletinFamily": "scanner", "cvelist": ["CVE-2019-7127", "CVE-2019-7120", "CVE-2019-7118", "CVE-2019-7116", "CVE-2019-7112", "CVE-2019-7111", "CVE-2019-7117", "CVE-2019-7123", "CVE-2019-7114", "CVE-2019-7109", "CVE-2019-7122", "CVE-2019-7113", "CVE-2019-7125", "CVE-2019-7124", "CVE-2019-7088", "CVE-2019-7115", "CVE-2019-7061", "CVE-2019-7119", "CVE-2019-7121", "CVE-2019-7110", "CVE-2019-7128"], "description": "This host is installed with Adobe Acrobat DC\n (Continuous Track) and is prone to multiple vulnerabilities.", "modified": "2019-07-05T00:00:00", "published": "2019-04-11T00:00:00", "id": "OPENVAS:1361412562310814792", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310814792", "type": "openvas", "title": "Adobe Acrobat DC (Continuous Track) Security Updates (apsb19-17) - Mac OS X", "sourceData": "# Copyright (C) 2019 Greenbone Networks GmbH\n# Text descriptions are largely excerpted from the referenced\n# advisory, and are Copyright (C) the respective author(s)\n#\n# SPDX-License-Identifier: GPL-2.0-or-later\n#\n# This program is free software; you can redistribute it and/or\n# modify it under the terms of the GNU General Public License\n# as published by the Free Software Foundation; either version 2\n# of the License, or (at your option) any later version.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n\nCPE = \"cpe:/a:adobe:acrobat_dc_continuous\";\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.814792\");\n script_version(\"2019-07-05T08:29:17+0000\");\n script_cve_id(\"CVE-2019-7061\", \"CVE-2019-7109\", \"CVE-2019-7110\", \"CVE-2019-7114\",\n \"CVE-2019-7115\", \"CVE-2019-7116\", \"CVE-2019-7121\", \"CVE-2019-7122\",\n \"CVE-2019-7123\", \"CVE-2019-7127\", \"CVE-2019-7111\", \"CVE-2019-7118\",\n \"CVE-2019-7119\", \"CVE-2019-7120\", \"CVE-2019-7124\", \"CVE-2019-7117\",\n \"CVE-2019-7128\", \"CVE-2019-7088\", \"CVE-2019-7112\", \"CVE-2019-7113\",\n \"CVE-2019-7125\");\n script_tag(name:\"cvss_base\", value:\"10.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_tag(name:\"last_modification\", value:\"2019-07-05 08:29:17 +0000 (Fri, 05 Jul 2019)\");\n script_tag(name:\"creation_date\", value:\"2019-04-11 12:09:50 +0530 (Thu, 11 Apr 2019)\");\n script_name(\"Adobe Acrobat DC (Continuous Track) Security Updates (apsb19-17) - Mac OS X\");\n\n script_tag(name:\"summary\", value:\"This host is installed with Adobe Acrobat DC\n (Continuous Track) and is prone to multiple vulnerabilities.\");\n\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable version is present\n on the target host.\");\n\n script_tag(name:\"insight\", value:\"Multiple flaws exists due to,\n\n - Multiple out-of-bounds read errors.\n\n - Multiple out-of-bounds write errors.\n\n - Type confusionerrors.\n\n - Use After Free errors.\n\n - Heap Overflow errors.\");\n\n script_tag(name:\"impact\", value:\"Successful exploitation will allow an attacker\n to gain access to sensitive information and run arbitrary code in context of\n current user.\");\n\n script_tag(name:\"affected\", value:\"Adobe Acrobat DC (Continuous Track)\n 2019.010.20098 and earlier versions on Mac OS X.\");\n\n script_tag(name:\"solution\", value:\"Upgrade to Adobe Acrobat DC Continuous\n version 2019.010.20099 or later. Please see the references for more information.\");\n\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_tag(name:\"qod_type\", value:\"executable_version\");\n script_xref(name:\"URL\", value:\"https://helpx.adobe.com/security/products/acrobat/apsb19-17.html\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2019 Greenbone Networks GmbH\");\n script_family(\"General\");\n script_dependencies(\"gb_adobe_acrobat_dc_cont_detect_macosx.nasl\");\n script_mandatory_keys(\"Adobe/AcrobatDC/Continuous/MacOSX/Version\");\n exit(0);\n}\n\ninclude(\"host_details.inc\");\ninclude(\"version_func.inc\");\n\nif( ! infos = get_app_version_and_location( cpe:CPE, exit_no_version:TRUE) ) exit( 0 );\nvers = infos['version'];\npath = infos['location'];\n\n## 2019.010.20099 == 19.010.20099\nif(version_is_less(version:vers, test_version:\"19.010.20099\")) {\n report = report_fixed_ver(installed_version:vers, fixed_version:\"19.010.20099 (2019.010.20099)\", install_path:path);\n security_message(data:report);\n exit(0);\n}\n\nexit(99);\n", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2019-07-17T14:03:54", "bulletinFamily": "scanner", "cvelist": ["CVE-2019-7127", "CVE-2019-7120", "CVE-2019-7118", "CVE-2019-7116", "CVE-2019-7112", "CVE-2019-7111", "CVE-2019-7117", "CVE-2019-7123", "CVE-2019-7114", "CVE-2019-7109", "CVE-2019-7122", "CVE-2019-7113", "CVE-2019-7125", "CVE-2019-7124", "CVE-2019-7088", "CVE-2019-7115", "CVE-2019-7061", "CVE-2019-7119", "CVE-2019-7121", "CVE-2019-7110", "CVE-2019-7128"], "description": "This host is installed with Adobe Acrobat DC\n Classic 2015 and is prone to multiple vulnerabilities.", "modified": "2019-07-05T00:00:00", "published": "2019-04-11T00:00:00", "id": "OPENVAS:1361412562310814788", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310814788", "type": "openvas", "title": "Adobe Acrobat DC (Classic Track) Security Updates (apsb19-17) - Mac OS X", "sourceData": "# Copyright (C) 2019 Greenbone Networks GmbH\n# Text descriptions are largely excerpted from the referenced\n# advisory, and are Copyright (C) the respective author(s)\n#\n# SPDX-License-Identifier: GPL-2.0-or-later\n#\n# This program is free software; you can redistribute it and/or\n# modify it under the terms of the GNU General Public License\n# as published by the Free Software Foundation; either version 2\n# of the License, or (at your option) any later version.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n\nCPE = \"cpe:/a:adobe:acrobat_dc_classic\";\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.814788\");\n script_version(\"2019-07-05T10:16:38+0000\");\n script_cve_id(\"CVE-2019-7061\", \"CVE-2019-7109\", \"CVE-2019-7110\", \"CVE-2019-7114\",\n \"CVE-2019-7115\", \"CVE-2019-7116\", \"CVE-2019-7121\", \"CVE-2019-7122\",\n \"CVE-2019-7123\", \"CVE-2019-7127\", \"CVE-2019-7111\", \"CVE-2019-7118\",\n \"CVE-2019-7119\", \"CVE-2019-7120\", \"CVE-2019-7124\", \"CVE-2019-7117\",\n \"CVE-2019-7128\", \"CVE-2019-7088\", \"CVE-2019-7112\", \"CVE-2019-7113\",\n \"CVE-2019-7125\");\n script_tag(name:\"cvss_base\", value:\"10.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_tag(name:\"last_modification\", value:\"2019-07-05 10:16:38 +0000 (Fri, 05 Jul 2019)\");\n script_tag(name:\"creation_date\", value:\"2019-04-11 11:09:50 +0530 (Thu, 11 Apr 2019)\");\n script_name(\"Adobe Acrobat DC (Classic Track) Security Updates (apsb19-17) - Mac OS X\");\n\n script_tag(name:\"summary\", value:\"This host is installed with Adobe Acrobat DC\n Classic 2015 and is prone to multiple vulnerabilities.\");\n\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable version is present\n on the target host.\");\n\n script_tag(name:\"insight\", value:\"Multiple flaws exists due to,\n\n - Multiple out-of-bounds read errors.\n\n - Multiple out-of-bounds write errors.\n\n - Type confusionerrors.\n\n - Use After Free errors.\n\n - Heap Overflow errors.\");\n\n script_tag(name:\"impact\", value:\"Successful exploitation will allow an attacker\n to gain access to sensitive information and run arbitrary code in context of\n current user.\");\n\n script_tag(name:\"affected\", value:\"Adobe Acrobat DC Classic 2015 version 2015.x\n before 2015.006.30493 on Mac OS X.\");\n\n script_tag(name:\"solution\", value:\"Upgrade to Adobe Acrobat DC Classic 2015 version\n 2015.006.30493 or later. Please see the references for more information.\");\n\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_tag(name:\"qod_type\", value:\"executable_version\");\n script_xref(name:\"URL\", value:\"https://helpx.adobe.com/security/products/acrobat/apsb19-17.html\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2019 Greenbone Networks GmbH\");\n script_family(\"General\");\n script_dependencies(\"gb_adobe_acrobat_dc_classic_detect_macosx.nasl\");\n script_mandatory_keys(\"Adobe/AcrobatDC/Classic/MacOSX/Version\");\n exit(0);\n}\n\ninclude(\"host_details.inc\");\ninclude(\"version_func.inc\");\n\nif( ! infos = get_app_version_and_location( cpe:CPE, exit_no_version:TRUE) ) exit( 0 );\nvers = infos['version'];\npath = infos['location'];\n\n## 2015.006.30493 == 15.006.30493\nif(version_is_less(version:vers, test_version:\"15.006.30493\")) {\n report = report_fixed_ver(installed_version:vers, fixed_version:\"15.006.30493 (2015.006.30493)\", install_path:path);\n security_message(data:report);\n exit(0);\n}\n\nexit(99);\n", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2019-07-17T14:03:27", "bulletinFamily": "scanner", "cvelist": ["CVE-2019-7127", "CVE-2019-7120", "CVE-2019-7118", "CVE-2019-7116", "CVE-2019-7112", "CVE-2019-7111", "CVE-2019-7117", "CVE-2019-7123", "CVE-2019-7114", "CVE-2019-7109", "CVE-2019-7122", "CVE-2019-7113", "CVE-2019-7125", "CVE-2019-7124", "CVE-2019-7088", "CVE-2019-7115", "CVE-2019-7061", "CVE-2019-7119", "CVE-2019-7121", "CVE-2019-7110", "CVE-2019-7128"], "description": "This host is installed with Adobe Acrobat\n Reader DC Classic 2015 and is prone to multiple vulnerabilities.", "modified": "2019-07-05T00:00:00", "published": "2019-04-11T00:00:00", "id": "OPENVAS:1361412562310814790", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310814790", "type": "openvas", "title": "Adobe Acrobat Reader DC (Classic Track) Security Updates (apsb19-17) - Mac OS X", "sourceData": "# Copyright (C) 2019 Greenbone Networks GmbH\n# Text descriptions are largely excerpted from the referenced\n# advisory, and are Copyright (C) the respective author(s)\n#\n# SPDX-License-Identifier: GPL-2.0-or-later\n#\n# This program is free software; you can redistribute it and/or\n# modify it under the terms of the GNU General Public License\n# as published by the Free Software Foundation; either version 2\n# of the License, or (at your option) any later version.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n\nCPE = \"cpe:/a:adobe:acrobat_reader_dc_classic\";\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.814790\");\n script_version(\"2019-07-05T08:29:17+0000\");\n script_cve_id(\"CVE-2019-7061\", \"CVE-2019-7109\", \"CVE-2019-7110\", \"CVE-2019-7114\",\n \"CVE-2019-7115\", \"CVE-2019-7116\", \"CVE-2019-7121\", \"CVE-2019-7122\",\n \"CVE-2019-7123\", \"CVE-2019-7127\", \"CVE-2019-7111\", \"CVE-2019-7118\",\n \"CVE-2019-7119\", \"CVE-2019-7120\", \"CVE-2019-7124\", \"CVE-2019-7117\",\n \"CVE-2019-7128\", \"CVE-2019-7088\", \"CVE-2019-7112\", \"CVE-2019-7113\",\n \"CVE-2019-7125\");\n script_tag(name:\"cvss_base\", value:\"10.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_tag(name:\"last_modification\", value:\"2019-07-05 08:29:17 +0000 (Fri, 05 Jul 2019)\");\n script_tag(name:\"creation_date\", value:\"2019-04-11 11:09:50 +0530 (Thu, 11 Apr 2019)\");\n script_name(\"Adobe Acrobat Reader DC (Classic Track) Security Updates (apsb19-17) - Mac OS X\");\n\n script_tag(name:\"summary\", value:\"This host is installed with Adobe Acrobat\n Reader DC Classic 2015 and is prone to multiple vulnerabilities.\");\n\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable version is present\n on the target host.\");\n\n script_tag(name:\"insight\", value:\"Multiple flaws exists due to,\n\n - Multiple out-of-bounds read errors.\n\n - Multiple out-of-bounds write errors.\n\n - Type confusionerrors.\n\n - Use After Free errors.\n\n - Heap Overflow errors.\");\n\n script_tag(name:\"impact\", value:\"Successful exploitation will allow an attacker\n to gain access to sensitive information and run arbitrary code in context of\n current user.\");\n\n script_tag(name:\"affected\", value:\"Adobe Acrobat Reader DC Classic 2015 version\n 2015.x before 2015.006.30493 on Mac OS X.\");\n\n script_tag(name:\"solution\", value:\"Upgrade to Adobe Acrobat DC Classic 2015 version\n 2015.006.30493 or later. Please see the references for more information.\");\n\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_tag(name:\"qod_type\", value:\"executable_version\");\n script_xref(name:\"URL\", value:\"https://helpx.adobe.com/security/products/acrobat/apsb19-17.html\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2019 Greenbone Networks GmbH\");\n script_family(\"General\");\n script_dependencies(\"gb_adobe_acrobat_reader_dc_classic_detect_macosx.nasl\");\n script_mandatory_keys(\"Adobe/Acrobat/ReaderDC/Classic/MacOSX/Version\");\n exit(0);\n}\n\ninclude(\"host_details.inc\");\ninclude(\"version_func.inc\");\n\nif( ! infos = get_app_version_and_location( cpe:CPE, exit_no_version:TRUE) ) exit( 0 );\nvers = infos['version'];\npath = infos['location'];\n\n## 2015.006.30493 == 15.006.30493\nif(version_is_less(version:vers, test_version:\"15.006.30493\")) {\n report = report_fixed_ver(installed_version:vers, fixed_version:\"15.006.30493 (2015.006.30493)\", install_path:path);\n security_message(data:report);\n exit(0);\n}\n\nexit(99);\n", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2019-07-17T14:03:33", "bulletinFamily": "scanner", "cvelist": ["CVE-2019-7127", "CVE-2019-7120", "CVE-2019-7118", "CVE-2019-7116", "CVE-2019-7112", "CVE-2019-7111", "CVE-2019-7117", "CVE-2019-7123", "CVE-2019-7114", "CVE-2019-7109", "CVE-2019-7122", "CVE-2019-7113", "CVE-2019-7125", "CVE-2019-7124", "CVE-2019-7088", "CVE-2019-7115", "CVE-2019-7061", "CVE-2019-7119", "CVE-2019-7121", "CVE-2019-7110", "CVE-2019-7128"], "description": "This host is installed with Adobe Acrobat Reader\n 2017 and is prone to multiple vulnerabilities.", "modified": "2019-07-16T00:00:00", "published": "2019-04-11T00:00:00", "id": "OPENVAS:1361412562310814783", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310814783", "type": "openvas", "title": "Adobe Acrobat Reader 2017 Security Updates (apsb19-17)-Windows", "sourceData": "# Copyright (C) 2019 Greenbone Networks GmbH\n# Text descriptions are largely excerpted from the referenced\n# advisory, and are Copyright (C) the respective author(s)\n#\n# SPDX-License-Identifier: GPL-2.0-or-later\n#\n# This program is free software; you can redistribute it and/or\n# modify it under the terms of the GNU General Public License\n# as published by the Free Software Foundation; either version 2\n# of the License, or (at your option) any later version.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n\nCPE = \"cpe:/a:adobe:acrobat_reader\";\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.814783\");\n script_version(\"2019-07-16T10:51:36+0000\");\n script_cve_id(\"CVE-2019-7061\", \"CVE-2019-7109\", \"CVE-2019-7110\", \"CVE-2019-7114\",\n \"CVE-2019-7115\", \"CVE-2019-7116\", \"CVE-2019-7121\", \"CVE-2019-7122\",\n \"CVE-2019-7123\", \"CVE-2019-7127\", \"CVE-2019-7111\", \"CVE-2019-7118\",\n \"CVE-2019-7119\", \"CVE-2019-7120\", \"CVE-2019-7124\", \"CVE-2019-7117\",\n \"CVE-2019-7128\", \"CVE-2019-7088\", \"CVE-2019-7112\", \"CVE-2019-7113\",\n \"CVE-2019-7125\");\n script_tag(name:\"cvss_base\", value:\"10.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_tag(name:\"last_modification\", value:\"2019-07-16 10:51:36 +0000 (Tue, 16 Jul 2019)\");\n script_tag(name:\"creation_date\", value:\"2019-04-11 10:51:50 +0530 (Thu, 11 Apr 2019)\");\n script_name(\"Adobe Acrobat Reader 2017 Security Updates (apsb19-17)-Windows\");\n\n script_tag(name:\"summary\", value:\"This host is installed with Adobe Acrobat Reader\n 2017 and is prone to multiple vulnerabilities.\");\n\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable version is present\n on the target host.\");\n\n script_tag(name:\"insight\", value:\"Multiple flaws exists due to,\n\n - Multiple out-of-bounds read errors.\n\n - Multiple out-of-bounds write errors.\n\n - Type confusionerrors.\n\n - Use After Free errors.\n\n - Heap Overflow errors.\");\n\n script_tag(name:\"impact\", value:\"Successful exploitation will allow an attacker\n to gain access to sensitive information and run arbitrary code in context of\n current user.\");\n\n script_tag(name:\"affected\", value:\"Adobe Acrobat Reader versions 2017.011.30127 and\n earlier on Windows.\");\n\n script_tag(name:\"solution\", value:\"Upgrade to Adobe Acrobat Reader 2017 version\n 2017.011.30138 or later. Please see the references for more information.\");\n\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_tag(name:\"qod_type\", value:\"registry\");\n script_xref(name:\"URL\", value:\"https://helpx.adobe.com/security/products/acrobat/apsb19-17.html\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2019 Greenbone Networks GmbH\");\n script_family(\"General\");\n script_dependencies(\"secpod_adobe_prdts_detect_win.nasl\");\n script_mandatory_keys(\"Adobe/Reader/Win/Ver\");\n exit(0);\n}\n\ninclude(\"host_details.inc\");\ninclude(\"version_func.inc\");\n\nif(!infos = get_app_version_and_location(cpe:CPE, exit_no_version:TRUE))\n exit(0);\n\nvers = infos['version'];\npath = infos['location'];\n\n## 2017.011.30127 == 17.011.30127\nif(version_in_range(version:vers, test_version:\"17.0\", test_version2:\"17.011.30127\")) {\n report = report_fixed_ver(installed_version:vers, fixed_version:\"17.011.30138 (2017.011.30138)\", install_path:path);\n security_message(data:report);\n exit(0);\n}\n\nexit(99);\n", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2019-07-17T14:03:23", "bulletinFamily": "scanner", "cvelist": ["CVE-2019-7127", "CVE-2019-7120", "CVE-2019-7118", "CVE-2019-7116", "CVE-2019-7112", "CVE-2019-7111", "CVE-2019-7117", "CVE-2019-7123", "CVE-2019-7114", "CVE-2019-7109", "CVE-2019-7122", "CVE-2019-7113", "CVE-2019-7125", "CVE-2019-7124", "CVE-2019-7088", "CVE-2019-7115", "CVE-2019-7061", "CVE-2019-7119", "CVE-2019-7121", "CVE-2019-7110", "CVE-2019-7128"], "description": "This host is installed with Adobe Acrobat Reader\n DC (Continuous Track) and is prone to multiple vulnerabilities.", "modified": "2019-07-05T00:00:00", "published": "2019-04-11T00:00:00", "id": "OPENVAS:1361412562310814794", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310814794", "type": "openvas", "title": "Adobe Acrobat Reader DC (Continuous Track) Security Updates (apsb19-17) - Mac OS X", "sourceData": "# Copyright (C) 2019 Greenbone Networks GmbH\n# Text descriptions are largely excerpted from the referenced\n# advisory, and are Copyright (C) the respective author(s)\n#\n# SPDX-License-Identifier: GPL-2.0-or-later\n#\n# This program is free software; you can redistribute it and/or\n# modify it under the terms of the GNU General Public License\n# as published by the Free Software Foundation; either version 2\n# of the License, or (at your option) any later version.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n\nCPE = \"cpe:/a:adobe:acrobat_reader_dc_continuous\";\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.814794\");\n script_version(\"2019-07-05T08:29:17+0000\");\n script_cve_id(\"CVE-2019-7061\", \"CVE-2019-7109\", \"CVE-2019-7110\", \"CVE-2019-7114\",\n \"CVE-2019-7115\", \"CVE-2019-7116\", \"CVE-2019-7121\", \"CVE-2019-7122\",\n \"CVE-2019-7123\", \"CVE-2019-7127\", \"CVE-2019-7111\", \"CVE-2019-7118\",\n \"CVE-2019-7119\", \"CVE-2019-7120\", \"CVE-2019-7124\", \"CVE-2019-7117\",\n \"CVE-2019-7128\", \"CVE-2019-7088\", \"CVE-2019-7112\", \"CVE-2019-7113\",\n \"CVE-2019-7125\");\n script_tag(name:\"cvss_base\", value:\"10.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_tag(name:\"last_modification\", value:\"2019-07-05 08:29:17 +0000 (Fri, 05 Jul 2019)\");\n script_tag(name:\"creation_date\", value:\"2019-04-11 12:09:50 +0530 (Thu, 11 Apr 2019)\");\n script_name(\"Adobe Acrobat Reader DC (Continuous Track) Security Updates (apsb19-17) - Mac OS X\");\n\n script_tag(name:\"summary\", value:\"This host is installed with Adobe Acrobat Reader\n DC (Continuous Track) and is prone to multiple vulnerabilities.\");\n\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable version is present\n on the target host.\");\n\n script_tag(name:\"insight\", value:\"Multiple flaws exists due to,\n\n - Multiple out-of-bounds read errors.\n\n - Multiple out-of-bounds write errors.\n\n - Type confusionerrors.\n\n - Use After Free errors.\n\n - Heap Overflow errors.\");\n\n script_tag(name:\"impact\", value:\"Successful exploitation will allow an attacker\n to gain access to sensitive information and run arbitrary code in context of\n current user.\");\n\n script_tag(name:\"affected\", value:\"Adobe Acrobat Reader DC (Continuous Track)\n 2019.010.20098 and earlier versions on Mac OS X.\");\n\n script_tag(name:\"solution\", value:\"Upgrade to Adobe Acrobat Reader DC Continuous\n version 2019.010.20099 or later. Please see the references for more information.\");\n\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_tag(name:\"qod_type\", value:\"executable_version\");\n script_xref(name:\"URL\", value:\"https://helpx.adobe.com/security/products/acrobat/apsb19-17.html\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2019 Greenbone Networks GmbH\");\n script_family(\"General\");\n script_dependencies(\"gb_adobe_acrobat_reader_dc_cont_detect_macosx.nasl\");\n script_mandatory_keys(\"Adobe/Acrobat/ReaderDC/Continuous/MacOSX/Version\");\n exit(0);\n}\n\ninclude(\"host_details.inc\");\ninclude(\"version_func.inc\");\n\nif( ! infos = get_app_version_and_location( cpe:CPE, exit_no_version:TRUE) ) exit( 0 );\nvers = infos['version'];\npath = infos['location'];\n\n## 2019.010.20099 == 19.010.20099\nif(version_is_less(version:vers, test_version:\"19.010.20099\")) {\n report = report_fixed_ver(installed_version:vers, fixed_version:\"19.010.20099 (2019.010.20099)\", install_path:path);\n security_message(data:report);\n exit(0);\n}\n\nexit(99);\n", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2019-07-17T14:03:28", "bulletinFamily": "scanner", "cvelist": ["CVE-2019-7127", "CVE-2019-7120", "CVE-2019-7118", "CVE-2019-7116", "CVE-2019-7112", "CVE-2019-7111", "CVE-2019-7117", "CVE-2019-7123", "CVE-2019-7114", "CVE-2019-7109", "CVE-2019-7122", "CVE-2019-7113", "CVE-2019-7125", "CVE-2019-7124", "CVE-2019-7088", "CVE-2019-7115", "CVE-2019-7061", "CVE-2019-7119", "CVE-2019-7121", "CVE-2019-7110", "CVE-2019-7128"], "description": "This host is installed with Adobe Acrobat Reader\n DC (Continuous Track) and is prone to multiple vulnerabilities.", "modified": "2019-07-05T00:00:00", "published": "2019-04-11T00:00:00", "id": "OPENVAS:1361412562310814793", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310814793", "type": "openvas", "title": "Adobe Acrobat Reader DC (Continuous Track) Security Updates (apsb19-17) - Windows", "sourceData": "# Copyright (C) 2019 Greenbone Networks GmbH\n# Text descriptions are largely excerpted from the referenced\n# advisory, and are Copyright (C) the respective author(s)\n#\n# SPDX-License-Identifier: GPL-2.0-or-later\n#\n# This program is free software; you can redistribute it and/or\n# modify it under the terms of the GNU General Public License\n# as published by the Free Software Foundation; either version 2\n# of the License, or (at your option) any later version.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n\nCPE = \"cpe:/a:adobe:acrobat_reader_dc_continuous\";\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.814793\");\n script_version(\"2019-07-05T08:29:17+0000\");\n script_cve_id(\"CVE-2019-7061\", \"CVE-2019-7109\", \"CVE-2019-7110\", \"CVE-2019-7114\",\n \"CVE-2019-7115\", \"CVE-2019-7116\", \"CVE-2019-7121\", \"CVE-2019-7122\",\n \"CVE-2019-7123\", \"CVE-2019-7127\", \"CVE-2019-7111\", \"CVE-2019-7118\",\n \"CVE-2019-7119\", \"CVE-2019-7120\", \"CVE-2019-7124\", \"CVE-2019-7117\",\n \"CVE-2019-7128\", \"CVE-2019-7088\", \"CVE-2019-7112\", \"CVE-2019-7113\",\n \"CVE-2019-7125\");\n script_tag(name:\"cvss_base\", value:\"10.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_tag(name:\"last_modification\", value:\"2019-07-05 08:29:17 +0000 (Fri, 05 Jul 2019)\");\n script_tag(name:\"creation_date\", value:\"2019-04-11 12:09:50 +0530 (Thu, 11 Apr 2019)\");\n script_name(\"Adobe Acrobat Reader DC (Continuous Track) Security Updates (apsb19-17) - Windows\");\n\n script_tag(name:\"summary\", value:\"This host is installed with Adobe Acrobat Reader\n DC (Continuous Track) and is prone to multiple vulnerabilities.\");\n\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable version is present\n on the target host.\");\n\n script_tag(name:\"insight\", value:\"Multiple flaws exists due to,\n\n - Multiple out-of-bounds read errors.\n\n - Multiple out-of-bounds write errors.\n\n - Type confusionerrors.\n\n - Use After Free errors.\n\n - Heap Overflow errors.\");\n\n script_tag(name:\"impact\", value:\"Successful exploitation will allow an attacker\n to gain access to sensitive information and run arbitrary code in context of\n current user.\");\n\n script_tag(name:\"affected\", value:\"Adobe Acrobat Reader DC (Continuous Track)\n 2019.010.20098 and earlier versions on Windows.\");\n\n script_tag(name:\"solution\", value:\"Upgrade to Adobe Acrobat Reader DC Continuous\n version 2019.010.20099 or later. Please see the references for more information.\");\n\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_tag(name:\"qod_type\", value:\"registry\");\n script_xref(name:\"URL\", value:\"https://helpx.adobe.com/security/products/acrobat/apsb19-17.html\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2019 Greenbone Networks GmbH\");\n script_family(\"General\");\n script_dependencies(\"gb_adobe_acrobat_reader_dc_cont_detect_win.nasl\");\n script_mandatory_keys(\"Adobe/Acrobat/ReaderDC/Continuous/Win/Ver\");\n exit(0);\n}\n\ninclude(\"host_details.inc\");\ninclude(\"version_func.inc\");\n\nif( ! infos = get_app_version_and_location( cpe:CPE, exit_no_version:TRUE) ) exit( 0 );\nvers = infos['version'];\npath = infos['location'];\n\n## 2019.010.20099 == 19.010.20099\nif(version_is_less(version:vers, test_version:\"19.010.20099\")) {\n report = report_fixed_ver(installed_version:vers, fixed_version:\"19.010.20099 (2019.010.20099)\", install_path:path);\n security_message(data:report);\n exit(0);\n}\n\nexit(99);\n", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2019-07-17T14:03:51", "bulletinFamily": "scanner", "cvelist": ["CVE-2019-7127", "CVE-2019-7120", "CVE-2019-7118", "CVE-2019-7116", "CVE-2019-7112", "CVE-2019-7111", "CVE-2019-7117", "CVE-2019-7123", "CVE-2019-7114", "CVE-2019-7109", "CVE-2019-7122", "CVE-2019-7113", "CVE-2019-7125", "CVE-2019-7124", "CVE-2019-7088", "CVE-2019-7115", "CVE-2019-7061", "CVE-2019-7119", "CVE-2019-7121", "CVE-2019-7110", "CVE-2019-7128"], "description": "This host is installed with Adobe Acrobat DC\n Classic 2015 and is prone to multiple vulnerabilities.", "modified": "2019-07-05T00:00:00", "published": "2019-04-11T00:00:00", "id": "OPENVAS:1361412562310814787", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310814787", "type": "openvas", "title": "Adobe Acrobat DC (Classic Track) Security Updates (apsb19-17) - Windows", "sourceData": "# Copyright (C) 2019 Greenbone Networks GmbH\n# Text descriptions are largely excerpted from the referenced\n# advisory, and are Copyright (C) the respective author(s)\n#\n# SPDX-License-Identifier: GPL-2.0-or-later\n#\n# This program is free software; you can redistribute it and/or\n# modify it under the terms of the GNU General Public License\n# as published by the Free Software Foundation; either version 2\n# of the License, or (at your option) any later version.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n\nCPE = \"cpe:/a:adobe:acrobat_dc_classic\";\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.814787\");\n script_version(\"2019-07-05T08:29:17+0000\");\n script_cve_id(\"CVE-2019-7061\", \"CVE-2019-7109\", \"CVE-2019-7110\", \"CVE-2019-7114\",\n \"CVE-2019-7115\", \"CVE-2019-7116\", \"CVE-2019-7121\", \"CVE-2019-7122\",\n \"CVE-2019-7123\", \"CVE-2019-7127\", \"CVE-2019-7111\", \"CVE-2019-7118\",\n \"CVE-2019-7119\", \"CVE-2019-7120\", \"CVE-2019-7124\", \"CVE-2019-7117\",\n \"CVE-2019-7128\", \"CVE-2019-7088\", \"CVE-2019-7112\", \"CVE-2019-7113\",\n \"CVE-2019-7125\");\n script_tag(name:\"cvss_base\", value:\"10.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_tag(name:\"last_modification\", value:\"2019-07-05 08:29:17 +0000 (Fri, 05 Jul 2019)\");\n script_tag(name:\"creation_date\", value:\"2019-04-11 11:09:50 +0530 (Thu, 11 Apr 2019)\");\n script_name(\"Adobe Acrobat DC (Classic Track) Security Updates (apsb19-17) - Windows\");\n\n script_tag(name:\"summary\", value:\"This host is installed with Adobe Acrobat DC\n Classic 2015 and is prone to multiple vulnerabilities.\");\n\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable version is present\n on the target host.\");\n\n script_tag(name:\"insight\", value:\"Multiple flaws exists due to,\n\n - Multiple out-of-bounds read errors.\n\n - Multiple out-of-bounds write errors.\n\n - Type confusionerrors.\n\n - Use After Free errors.\n\n - Heap Overflow errors.\");\n\n script_tag(name:\"impact\", value:\"Successful exploitation will allow an attacker\n to gain access to sensitive information and run arbitrary code in context of\n current user.\");\n\n script_tag(name:\"affected\", value:\"Adobe Acrobat DC Classic 2015 version 2015.x\n before 2015.006.30493 on Windows.\");\n\n script_tag(name:\"solution\", value:\"Upgrade to Adobe Acrobat DC Classic 2015 version\n 2015.006.30493 or later. Please see the references for more information.\");\n\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_tag(name:\"qod_type\", value:\"registry\");\n script_xref(name:\"URL\", value:\"https://helpx.adobe.com/security/products/acrobat/apsb19-17.html\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2019 Greenbone Networks GmbH\");\n script_family(\"General\");\n script_dependencies(\"gb_adobe_acrobat_dc_classic_detect_win.nasl\");\n script_mandatory_keys(\"Adobe/AcrobatDC/Classic/Win/Ver\");\n exit(0);\n}\n\ninclude(\"host_details.inc\");\ninclude(\"version_func.inc\");\n\nif( ! infos = get_app_version_and_location( cpe:CPE, exit_no_version:TRUE) ) exit( 0 );\nvers = infos['version'];\npath = infos['location'];\n\n## 2015.006.30493 == 15.006.30493\nif(version_is_less(version:vers, test_version:\"15.006.30493\")) {\n report = report_fixed_ver(installed_version:vers, fixed_version:\"15.006.30493 (2015.006.30493)\", install_path:path);\n security_message(data:report);\n exit(0);\n}\n\nexit(99);\n", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}], "nessus": [{"lastseen": "2021-01-01T01:13:29", "description": "The version of Adobe Acrobat installed on the remote Windows host is a\nversion prior or equal to 2015.006.30482, 2017.011.30127, or\n2019.010.20098. It is, therefore, affected by multiple\nvulnerabilities.\n\n - Out-of-Bounds Read potentially leading to Information\n Disclosure (CVE-2019-7061, CVE-2019-7109, CVE-2019-7110,\n CVE-2019-7114, CVE-2019-7115, CVE-2019-7116,\n CVE-2019-7121, CVE-2019-7122, CVE-2019-7123,\n CVE-2019-7127)\n\n - Out-of-Bounds Write potentially leading to Arbitrary\n Code Execution (CVE-2019-7111, CVE-2019-7118,\n CVE-2019-7119, CVE-2019-7120, CVE-2019-7124)\n\n - Type Confusion potentially leading to Arbitrary Code\n Execution (CVE-2019-7117, CVE-2019-7128)\n\n - Use After Free potentially leading to Arbitrary Code\n Execution (CVE-2019-7088, CVE-2019-7112)\n\n - Heap Overflow potentially leading to Arbitrary Code\n Execution (CVE-2019-7113, CVE-2019-7125)\n\nNote that Nessus has not tested for this issue but has instead relied\nonly on the application's self-reported version number.", "edition": 18, "cvss3": {"score": 9.8, "vector": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}, "published": "2019-04-12T00:00:00", "title": "Adobe Acrobat <= 2015.006.30482 / 2017.011.30127 / 2019.010.20098 Multiple Vulnerabilities (APSB19-17)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2019-7127", "CVE-2019-7120", "CVE-2019-7118", "CVE-2019-7116", "CVE-2019-7112", "CVE-2019-7111", "CVE-2019-7117", "CVE-2019-7123", "CVE-2019-7114", "CVE-2019-7109", "CVE-2019-7122", "CVE-2019-7113", "CVE-2019-7125", "CVE-2019-7124", "CVE-2019-7088", "CVE-2019-7115", "CVE-2019-7061", "CVE-2019-7119", "CVE-2019-7121", "CVE-2019-7110", "CVE-2019-7128"], "modified": "2021-01-02T00:00:00", "cpe": ["cpe:/a:adobe:acrobat"], "id": "ADOBE_ACROBAT_APSB19-17.NASL", "href": "https://www.tenable.com/plugins/nessus/124007", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(124007);\n script_version(\"1.6\");\n script_cvs_date(\"Date: 2019/10/30 13:24:47\");\n\n script_cve_id(\n \"CVE-2019-7061\",\n \"CVE-2019-7088\",\n \"CVE-2019-7109\",\n \"CVE-2019-7110\",\n \"CVE-2019-7111\",\n \"CVE-2019-7112\",\n \"CVE-2019-7113\",\n \"CVE-2019-7114\",\n \"CVE-2019-7115\",\n \"CVE-2019-7116\",\n \"CVE-2019-7117\",\n \"CVE-2019-7118\",\n \"CVE-2019-7119\",\n \"CVE-2019-7120\",\n \"CVE-2019-7121\",\n \"CVE-2019-7122\",\n \"CVE-2019-7123\",\n \"CVE-2019-7124\",\n \"CVE-2019-7125\",\n \"CVE-2019-7127\",\n \"CVE-2019-7128\"\n );\n script_bugtraq_id(\n 107805,\n 107809,\n 107811,\n 107812,\n 107815\n );\n\n script_name(english:\"Adobe Acrobat <= 2015.006.30482 / 2017.011.30127 / 2019.010.20098 Multiple Vulnerabilities (APSB19-17)\");\n script_summary(english:\"Checks the version of Adobe Acrobat.\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The version of Adobe Acrobat installed on the remote Windows host is\naffected by multiple vulnerabilities.\");\n script_set_attribute(attribute:\"description\", value:\n\"The version of Adobe Acrobat installed on the remote Windows host is a\nversion prior or equal to 2015.006.30482, 2017.011.30127, or\n2019.010.20098. It is, therefore, affected by multiple\nvulnerabilities.\n\n - Out-of-Bounds Read potentially leading to Information\n Disclosure (CVE-2019-7061, CVE-2019-7109, CVE-2019-7110,\n CVE-2019-7114, CVE-2019-7115, CVE-2019-7116,\n CVE-2019-7121, CVE-2019-7122, CVE-2019-7123,\n CVE-2019-7127)\n\n - Out-of-Bounds Write potentially leading to Arbitrary\n Code Execution (CVE-2019-7111, CVE-2019-7118,\n CVE-2019-7119, CVE-2019-7120, CVE-2019-7124)\n\n - Type Confusion potentially leading to Arbitrary Code\n Execution (CVE-2019-7117, CVE-2019-7128)\n\n - Use After Free potentially leading to Arbitrary Code\n Execution (CVE-2019-7088, CVE-2019-7112)\n\n - Heap Overflow potentially leading to Arbitrary Code\n Execution (CVE-2019-7113, CVE-2019-7125)\n\nNote that Nessus has not tested for this issue but has instead relied\nonly on the application's self-reported version number.\");\n script_set_attribute(attribute:\"see_also\", value:\"https://helpx.adobe.com/security/products/acrobat/apsb19-17.html\");\n script_set_attribute(attribute:\"solution\", value:\n\"Upgrade to Adobe Acrobat version 2015.006.30493 or 2017.011.30138 or\n2019.010.20099 or later.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:H/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:H/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2019-7128\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n script_set_attribute(attribute:\"exploited_by_malware\", value:\"true\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2019/04/09\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2019/04/09\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2019/04/12\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/a:adobe:acrobat\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"Windows\");\n\n script_copyright(english:\"This script is Copyright (C) 2019 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"adobe_acrobat_installed.nasl\");\n script_require_keys(\"SMB/Registry/Enumerated\", \"installed_sw/Adobe Acrobat\");\n\n exit(0);\n}\n\ninclude(\"vcf.inc\");\ninclude(\"vcf_extras.inc\");\n\nget_kb_item_or_exit(\"SMB/Registry/Enumerated\");\napp_info = vcf::get_app_info(app:\"Adobe Acrobat\", win_local:TRUE);\n\n# vcf::adobe_reader::check_version_and_report will\n# properly separate tracks when checking constraints.\n# x.y.30zzz = DC Classic\n# x.y.20zzz = DC Continuous\nconstraints = [\n { \"min_version\" : \"15.6\", \"max_version\" : \"15.006.30482\", \"fixed_version\" : \"15.006.30493\" },\n { \"min_version\" : \"17.8\", \"max_version\" : \"17.011.30127\", \"fixed_version\" : \"17.011.30138\" },\n { \"min_version\" : \"15.7\", \"max_version\" : \"19.010.20098\", \"fixed_version\" : \"19.010.20099\" }\n];\nvcf::adobe_reader::check_version_and_report(app_info:app_info, constraints:constraints, severity:SECURITY_HOLE, max_segs:3);\n", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2021-01-01T01:14:53", "description": "The version of Adobe Reader installed on the remote Windows host is a\nversion prior or equal to 2015.006.30482, 2017.011.30127, or\n2019.010.20098. It is, therefore, affected by multiple\nvulnerabilities.\n\n - Out-of-Bounds Read potentially leading to Information\n Disclosure (CVE-2019-7061, CVE-2019-7109, CVE-2019-7110,\n CVE-2019-7114, CVE-2019-7115, CVE-2019-7116,\n CVE-2019-7121, CVE-2019-7122, CVE-2019-7123,\n CVE-2019-7127)\n\n - Out-of-Bounds Write potentially leading to Arbitrary\n Code Execution (CVE-2019-7111, CVE-2019-7118,\n CVE-2019-7119, CVE-2019-7120, CVE-2019-7124)\n\n - Type Confusion potentially leading to Arbitrary Code\n Execution (CVE-2019-7117, CVE-2019-7128)\n\n - Use After Free potentially leading to Arbitrary Code\n Execution (CVE-2019-7088, CVE-2019-7112)\n\n - Heap Overflow potentially leading to Arbitrary Code\n Execution (CVE-2019-7113, CVE-2019-7125)\n\nNote that Nessus has not tested for this issue but has instead relied\nonly on the application's self-reported version number.", "edition": 18, "cvss3": {"score": 9.8, "vector": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}, "published": "2019-04-12T00:00:00", "title": "Adobe Reader <= 2015.006.30482 / 2017.011.30127 / 2019.010.20098 Multiple Vulnerabilities (APSB19-17)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2019-7127", "CVE-2019-7120", "CVE-2019-7118", "CVE-2019-7116", "CVE-2019-7112", "CVE-2019-7111", "CVE-2019-7117", "CVE-2019-7123", "CVE-2019-7114", "CVE-2019-7109", "CVE-2019-7122", "CVE-2019-7113", "CVE-2019-7125", "CVE-2019-7124", "CVE-2019-7088", "CVE-2019-7115", "CVE-2019-7061", "CVE-2019-7119", "CVE-2019-7121", "CVE-2019-7110", "CVE-2019-7128"], "modified": "2021-01-02T00:00:00", "cpe": ["cpe:/a:adobe:acrobat_reader"], "id": "ADOBE_READER_APSB19-17.NASL", "href": "https://www.tenable.com/plugins/nessus/124008", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(124008);\n script_version(\"1.7\");\n script_cvs_date(\"Date: 2019/10/30 13:24:47\");\n\n script_cve_id(\n \"CVE-2019-7061\",\n \"CVE-2019-7088\",\n \"CVE-2019-7109\",\n \"CVE-2019-7110\",\n \"CVE-2019-7111\",\n \"CVE-2019-7112\",\n \"CVE-2019-7113\",\n \"CVE-2019-7114\",\n \"CVE-2019-7115\",\n \"CVE-2019-7116\",\n \"CVE-2019-7117\",\n \"CVE-2019-7118\",\n \"CVE-2019-7119\",\n \"CVE-2019-7120\",\n \"CVE-2019-7121\",\n \"CVE-2019-7122\",\n \"CVE-2019-7123\",\n \"CVE-2019-7124\",\n \"CVE-2019-7125\",\n \"CVE-2019-7127\",\n \"CVE-2019-7128\"\n );\n script_bugtraq_id(\n 107805,\n 107809,\n 107811,\n 107812,\n 107815\n );\n\n script_name(english:\"Adobe Reader <= 2015.006.30482 / 2017.011.30127 / 2019.010.20098 Multiple Vulnerabilities (APSB19-17)\");\n script_summary(english:\"Checks the version of Adobe Reader.\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The version of Adobe Reader installed on the remote Windows host is\naffected by multiple vulnerabilities.\");\n script_set_attribute(attribute:\"description\", value:\n\"The version of Adobe Reader installed on the remote Windows host is a\nversion prior or equal to 2015.006.30482, 2017.011.30127, or\n2019.010.20098. It is, therefore, affected by multiple\nvulnerabilities.\n\n - Out-of-Bounds Read potentially leading to Information\n Disclosure (CVE-2019-7061, CVE-2019-7109, CVE-2019-7110,\n CVE-2019-7114, CVE-2019-7115, CVE-2019-7116,\n CVE-2019-7121, CVE-2019-7122, CVE-2019-7123,\n CVE-2019-7127)\n\n - Out-of-Bounds Write potentially leading to Arbitrary\n Code Execution (CVE-2019-7111, CVE-2019-7118,\n CVE-2019-7119, CVE-2019-7120, CVE-2019-7124)\n\n - Type Confusion potentially leading to Arbitrary Code\n Execution (CVE-2019-7117, CVE-2019-7128)\n\n - Use After Free potentially leading to Arbitrary Code\n Execution (CVE-2019-7088, CVE-2019-7112)\n\n - Heap Overflow potentially leading to Arbitrary Code\n Execution (CVE-2019-7113, CVE-2019-7125)\n\nNote that Nessus has not tested for this issue but has instead relied\nonly on the application's self-reported version number.\");\n script_set_attribute(attribute:\"see_also\", value:\"https://helpx.adobe.com/security/products/acrobat/apsb19-17.html\");\n script_set_attribute(attribute:\"solution\", value:\n\"Upgrade to Adobe Reader version 2015.006.30493 or 2017.011.30138 or\n2019.010.20099 or later.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:H/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:H/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2019-7128\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n script_set_attribute(attribute:\"exploited_by_malware\", value:\"true\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2019/04/09\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2019/04/09\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2019/04/12\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/a:adobe:acrobat_reader\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"Windows\");\n\n script_copyright(english:\"This script is Copyright (C) 2019 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"adobe_reader_installed.nasl\");\n script_require_keys(\"SMB/Registry/Enumerated\", \"installed_sw/Adobe Reader\");\n\n exit(0);\n}\n\ninclude(\"vcf.inc\");\ninclude(\"vcf_extras.inc\");\n\nget_kb_item_or_exit(\"SMB/Registry/Enumerated\");\napp_info = vcf::adobe_reader::get_app_info();\n\n# vcf::adobe_reader::check_version_and_report will\n# properly separate tracks when checking constraints.\n# x.y.30zzz = DC Classic\n# x.y.20zzz = DC Continuous\nconstraints = [\n { \"min_version\" : \"15.6\", \"max_version\" : \"15.006.30482\", \"fixed_version\" : \"15.006.30493\" },\n { \"min_version\" : \"17.8\", \"max_version\" : \"17.011.30127\", \"fixed_version\" : \"17.011.30138\" },\n { \"min_version\" : \"15.7\", \"max_version\" : \"19.010.20098\", \"fixed_version\" : \"19.010.20099\" }\n];\nvcf::adobe_reader::check_version_and_report(app_info:app_info, constraints:constraints, severity:SECURITY_HOLE, max_segs:3);\n", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2021-01-01T03:21:18", "description": "The version of Adobe Reader installed on the remote macOS host is a\nversion prior or equal to 2015.006.30482, 2017.011.30127, or\n2019.010.20098. It is, therefore, affected by multiple\nvulnerabilities.\n\n - Out-of-Bounds Read potentially leading to Information\n Disclosure (CVE-2019-7061, CVE-2019-7109, CVE-2019-7110,\n CVE-2019-7114, CVE-2019-7115, CVE-2019-7116,\n CVE-2019-7121, CVE-2019-7122, CVE-2019-7123,\n CVE-2019-7127)\n\n - Out-of-Bounds Write potentially leading to Arbitrary\n Code Execution (CVE-2019-7111, CVE-2019-7118,\n CVE-2019-7119, CVE-2019-7120, CVE-2019-7124)\n\n - Type Confusion potentially leading to Arbitrary Code\n Execution (CVE-2019-7117, CVE-2019-7128)\n\n - Use After Free potentially leading to Arbitrary Code\n Execution (CVE-2019-7088, CVE-2019-7112)\n\n - Heap Overflow potentially leading to Arbitrary Code\n Execution (CVE-2019-7113, CVE-2019-7125)\n\nNote that Nessus has not tested for this issue but has instead relied\nonly on the application's self-reported version number.", "edition": 18, "cvss3": {"score": 9.8, "vector": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}, "published": "2019-04-12T00:00:00", "title": "Adobe Reader <= 2015.006.30482 / 2017.011.30127 / 2019.010.20098 Multiple Vulnerabilities (APSB19-17) (macOS)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2019-7127", "CVE-2019-7120", "CVE-2019-7118", "CVE-2019-7116", "CVE-2019-7112", "CVE-2019-7111", "CVE-2019-7117", "CVE-2019-7123", "CVE-2019-7114", "CVE-2019-7109", "CVE-2019-7122", "CVE-2019-7113", "CVE-2019-7125", "CVE-2019-7124", "CVE-2019-7088", "CVE-2019-7115", "CVE-2019-7061", "CVE-2019-7119", "CVE-2019-7121", "CVE-2019-7110", "CVE-2019-7128"], "modified": "2021-01-02T00:00:00", "cpe": ["cpe:/a:adobe:acrobat_reader"], "id": "MACOS_ADOBE_READER_APSB19-17.NASL", "href": "https://www.tenable.com/plugins/nessus/124006", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(124006);\n script_version(\"1.6\");\n script_cvs_date(\"Date: 2019/10/30 13:24:46\");\n\n script_cve_id(\n \"CVE-2019-7061\",\n \"CVE-2019-7088\",\n \"CVE-2019-7109\",\n \"CVE-2019-7110\",\n \"CVE-2019-7111\",\n \"CVE-2019-7112\",\n \"CVE-2019-7113\",\n \"CVE-2019-7114\",\n \"CVE-2019-7115\",\n \"CVE-2019-7116\",\n \"CVE-2019-7117\",\n \"CVE-2019-7118\",\n \"CVE-2019-7119\",\n \"CVE-2019-7120\",\n \"CVE-2019-7121\",\n \"CVE-2019-7122\",\n \"CVE-2019-7123\",\n \"CVE-2019-7124\",\n \"CVE-2019-7125\",\n \"CVE-2019-7127\",\n \"CVE-2019-7128\"\n );\n script_bugtraq_id(\n 107805,\n 107809,\n 107811,\n 107812,\n 107815\n );\n\n script_name(english:\"Adobe Reader <= 2015.006.30482 / 2017.011.30127 / 2019.010.20098 Multiple Vulnerabilities (APSB19-17) (macOS)\");\n script_summary(english:\"Checks the version of Adobe Reader.\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The version of Adobe Reader installed on the remote macOS host is\naffected by multiple vulnerabilities.\");\n script_set_attribute(attribute:\"description\", value:\n\"The version of Adobe Reader installed on the remote macOS host is a\nversion prior or equal to 2015.006.30482, 2017.011.30127, or\n2019.010.20098. It is, therefore, affected by multiple\nvulnerabilities.\n\n - Out-of-Bounds Read potentially leading to Information\n Disclosure (CVE-2019-7061, CVE-2019-7109, CVE-2019-7110,\n CVE-2019-7114, CVE-2019-7115, CVE-2019-7116,\n CVE-2019-7121, CVE-2019-7122, CVE-2019-7123,\n CVE-2019-7127)\n\n - Out-of-Bounds Write potentially leading to Arbitrary\n Code Execution (CVE-2019-7111, CVE-2019-7118,\n CVE-2019-7119, CVE-2019-7120, CVE-2019-7124)\n\n - Type Confusion potentially leading to Arbitrary Code\n Execution (CVE-2019-7117, CVE-2019-7128)\n\n - Use After Free potentially leading to Arbitrary Code\n Execution (CVE-2019-7088, CVE-2019-7112)\n\n - Heap Overflow potentially leading to Arbitrary Code\n Execution (CVE-2019-7113, CVE-2019-7125)\n\nNote that Nessus has not tested for this issue but has instead relied\nonly on the application's self-reported version number.\");\n script_set_attribute(attribute:\"see_also\", value:\"https://helpx.adobe.com/security/products/acrobat/apsb19-17.html\");\n script_set_attribute(attribute:\"solution\", value:\n\"Upgrade to Adobe Reader version 2015.006.30493 or 2017.011.30138 or\n2019.010.20099 or later.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:H/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:H/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2019-7128\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n script_set_attribute(attribute:\"exploited_by_malware\", value:\"true\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2019/04/09\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2019/04/09\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2019/04/12\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/a:adobe:acrobat_reader\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"MacOS X Local Security Checks\");\n\n script_copyright(english:\"This script is Copyright (C) 2019 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"macosx_adobe_reader_installed.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/MacOSX/Version\", \"installed_sw/Adobe Reader\");\n\n exit(0);\n}\n\ninclude(\"vcf.inc\");\ninclude(\"vcf_extras.inc\");\n\nget_kb_item_or_exit(\"Host/local_checks_enabled\");\nos = get_kb_item(\"Host/MacOSX/Version\");\nif (empty_or_null(os)) audit(AUDIT_OS_NOT, \"Mac OS X\");\n\napp_info = vcf::get_app_info(app:\"Adobe Reader\");\n\n# vcf::adobe_reader::check_version_and_report will\n# properly separate tracks when checking constraints.\n# x.y.30zzz = DC Classic\n# x.y.20zzz = DC Continuous\nconstraints = [\n { \"min_version\" : \"15.6\", \"max_version\" : \"15.006.30482\", \"fixed_version\" : \"15.006.30493\" },\n { \"min_version\" : \"17.8\", \"max_version\" : \"17.011.30127\", \"fixed_version\" : \"17.011.30138\" },\n { \"min_version\" : \"15.7\", \"max_version\" : \"19.010.20098\", \"fixed_version\" : \"19.010.20099\" }\n];\nvcf::adobe_reader::check_version_and_report(app_info:app_info, constraints:constraints, severity:SECURITY_HOLE, max_segs:3);\n", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2021-01-01T03:21:03", "description": "The version of Adobe Acrobat installed on the remote macOS host is a\nversion prior or equal to 2015.006.30482, 2017.011.30127, or\n2019.010.20098. It is, therefore, affected by multiple\nvulnerabilities.\n\n - Out-of-Bounds Read potentially leading to Information\n Disclosure (CVE-2019-7061, CVE-2019-7109, CVE-2019-7110,\n CVE-2019-7114, CVE-2019-7115, CVE-2019-7116,\n CVE-2019-7121, CVE-2019-7122, CVE-2019-7123,\n CVE-2019-7127)\n\n - Out-of-Bounds Write potentially leading to Arbitrary\n Code Execution (CVE-2019-7111, CVE-2019-7118,\n CVE-2019-7119, CVE-2019-7120, CVE-2019-7124)\n\n - Type Confusion potentially leading to Arbitrary Code\n Execution (CVE-2019-7117, CVE-2019-7128)\n\n - Use After Free potentially leading to Arbitrary Code\n Execution (CVE-2019-7088, CVE-2019-7112)\n\n - Heap Overflow potentially leading to Arbitrary Code\n Execution (CVE-2019-7113, CVE-2019-7125)\n\nNote that Nessus has not tested for this issue but has instead relied\nonly on the application's self-reported version number.", "edition": 18, "cvss3": {"score": 9.8, "vector": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}, "published": "2019-04-12T00:00:00", "title": "Adobe Acrobat <= 2015.006.30482 / 2017.011.30127 / 2019.010.20098 Multiple Vulnerabilities (APSB19-17) (macOS)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2019-7127", "CVE-2019-7120", "CVE-2019-7118", "CVE-2019-7116", "CVE-2019-7112", "CVE-2019-7111", "CVE-2019-7117", "CVE-2019-7123", "CVE-2019-7114", "CVE-2019-7109", "CVE-2019-7122", "CVE-2019-7113", "CVE-2019-7125", "CVE-2019-7124", "CVE-2019-7088", "CVE-2019-7115", "CVE-2019-7061", "CVE-2019-7119", "CVE-2019-7121", "CVE-2019-7110", "CVE-2019-7128"], "modified": "2021-01-02T00:00:00", "cpe": ["cpe:/a:adobe:acrobat"], "id": "MACOS_ADOBE_ACROBAT_APSB19-17.NASL", "href": "https://www.tenable.com/plugins/nessus/124005", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(124005);\n script_version(\"1.6\");\n script_cvs_date(\"Date: 2019/10/30 13:24:46\");\n\n script_cve_id(\n \"CVE-2019-7061\",\n \"CVE-2019-7088\",\n \"CVE-2019-7109\",\n \"CVE-2019-7110\",\n \"CVE-2019-7111\",\n \"CVE-2019-7112\",\n \"CVE-2019-7113\",\n \"CVE-2019-7114\",\n \"CVE-2019-7115\",\n \"CVE-2019-7116\",\n \"CVE-2019-7117\",\n \"CVE-2019-7118\",\n \"CVE-2019-7119\",\n \"CVE-2019-7120\",\n \"CVE-2019-7121\",\n \"CVE-2019-7122\",\n \"CVE-2019-7123\",\n \"CVE-2019-7124\",\n \"CVE-2019-7125\",\n \"CVE-2019-7127\",\n \"CVE-2019-7128\"\n );\n script_bugtraq_id(\n 107805,\n 107809,\n 107811,\n 107812,\n 107815\n );\n\n script_name(english:\"Adobe Acrobat <= 2015.006.30482 / 2017.011.30127 / 2019.010.20098 Multiple Vulnerabilities (APSB19-17) (macOS)\");\n script_summary(english:\"Checks the version of Adobe Acrobat.\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The version of Adobe Acrobat installed on the remote macOS host is\naffected by multiple vulnerabilities.\");\n script_set_attribute(attribute:\"description\", value:\n\"The version of Adobe Acrobat installed on the remote macOS host is a\nversion prior or equal to 2015.006.30482, 2017.011.30127, or\n2019.010.20098. It is, therefore, affected by multiple\nvulnerabilities.\n\n - Out-of-Bounds Read potentially leading to Information\n Disclosure (CVE-2019-7061, CVE-2019-7109, CVE-2019-7110,\n CVE-2019-7114, CVE-2019-7115, CVE-2019-7116,\n CVE-2019-7121, CVE-2019-7122, CVE-2019-7123,\n CVE-2019-7127)\n\n - Out-of-Bounds Write potentially leading to Arbitrary\n Code Execution (CVE-2019-7111, CVE-2019-7118,\n CVE-2019-7119, CVE-2019-7120, CVE-2019-7124)\n\n - Type Confusion potentially leading to Arbitrary Code\n Execution (CVE-2019-7117, CVE-2019-7128)\n\n - Use After Free potentially leading to Arbitrary Code\n Execution (CVE-2019-7088, CVE-2019-7112)\n\n - Heap Overflow potentially leading to Arbitrary Code\n Execution (CVE-2019-7113, CVE-2019-7125)\n\nNote that Nessus has not tested for this issue but has instead relied\nonly on the application's self-reported version number.\");\n script_set_attribute(attribute:\"see_also\", value:\"https://helpx.adobe.com/security/products/acrobat/apsb19-17.html\");\n script_set_attribute(attribute:\"solution\", value:\n\"Upgrade to Adobe Acrobat version 2015.006.30493 or 2017.011.30138 or\n2019.010.20099 or later.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:H/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:H/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2019-7128\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n script_set_attribute(attribute:\"exploited_by_malware\", value:\"true\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2019/04/09\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2019/04/09\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2019/04/12\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/a:adobe:acrobat\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"MacOS X Local Security Checks\");\n\n script_copyright(english:\"This script is Copyright (C) 2019 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"macosx_adobe_acrobat_installed.nbin\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/MacOSX/Version\", \"installed_sw/Adobe Acrobat\");\n\n exit(0);\n}\n\ninclude(\"vcf.inc\");\ninclude(\"vcf_extras.inc\");\n\nget_kb_item_or_exit(\"Host/local_checks_enabled\");\nos = get_kb_item(\"Host/MacOSX/Version\");\nif (empty_or_null(os)) audit(AUDIT_OS_NOT, \"Mac OS X\");\n\napp_info = vcf::get_app_info(app:\"Adobe Acrobat\");\n\n# vcf::adobe_reader::check_version_and_report will\n# properly separate tracks when checking constraints.\n# x.y.30zzz = DC Classic\n# x.y.20zzz = DC Continuous\nconstraints = [\n { \"min_version\" : \"15.6\", \"max_version\" : \"15.006.30482\", \"fixed_version\" : \"15.006.30493\" },\n { \"min_version\" : \"17.8\", \"max_version\" : \"17.011.30127\", \"fixed_version\" : \"17.011.30138\" },\n { \"min_version\" : \"15.7\", \"max_version\" : \"19.010.20098\", \"fixed_version\" : \"19.010.20099\" }\n];\nvcf::adobe_reader::check_version_and_report(app_info:app_info, constraints:constraints, severity:SECURITY_HOLE, max_segs:3);\n", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}], "kaspersky": [{"lastseen": "2020-09-02T11:42:02", "bulletinFamily": "info", "cvelist": ["CVE-2019-7127", "CVE-2019-7120", "CVE-2019-7118", "CVE-2019-7116", "CVE-2019-7112", "CVE-2019-7111", "CVE-2019-7117", "CVE-2019-7123", "CVE-2019-7114", "CVE-2019-7109", "CVE-2019-7122", "CVE-2019-7113", "CVE-2019-7125", "CVE-2019-7124", "CVE-2019-7088", "CVE-2019-7115", "CVE-2019-7061", "CVE-2019-7119", "CVE-2019-7121", "CVE-2019-7110", "CVE-2019-7128"], "description": "### *Detect date*:\n04/09/2019\n\n### *Severity*:\nCritical\n\n### *Description*:\nMultiple vulnerabilities were found in Adobe Acrobat and Reader. Malicious users can exploit these vulnerabilities to execute arbitrary code, obtain sensitive information.\n\n### *Exploitation*:\nMalware exists for this vulnerability. Usually such malware is classified as Exploit. [More details](<https://threats.kaspersky.com/en/class/Exploit/>).\n\n### *Affected products*:\nAcrobat DC Continuous 2019.010.20098 and earlier versions for Windows and macOS \nAcrobat Reader DC Continuous 2019.010.20098 and earlier versions for Windows and macOS \nAcrobat 2017 2017.011.30127 and earlier version for Windows and macOS \nAcrobat Reader 2017.011.30127 and earlier version for Windows and macOS \nAcrobat DC Classic 2015.006.30482 and earlier versions for Windows and macOS \nAcrobat Reader DC Classic 2015.006.30482 and earlier versions for Windows and macOS\n\n### *Solution*:\nUpdate to the latest version \n[Download Adobe Acrobat Reader DC](<https://get.adobe.com/ru/reader/>)\n\n### *Original advisories*:\n[Security updates available for Adobe Acrobat and Reader | APSB19-17](<https://helpx.adobe.com/security/products/acrobat/apsb19-17.html>) \n\n\n### *Impacts*:\nACE \n\n### *Related products*:\n[Adobe Acrobat Reader DC Continuous](<https://threats.kaspersky.com/en/product/Adobe-Acrobat-Reader-DC-Continuous/>)\n\n### *CVE-IDS*:\n[CVE-2019-7061](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7061>)0.0Unknown \n[CVE-2019-7109](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7109>)0.0Unknown \n[CVE-2019-7110](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7110>)0.0Unknown \n[CVE-2019-7114](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7114>)0.0Unknown \n[CVE-2019-7115](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7115>)0.0Unknown \n[CVE-2019-7116](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7116>)0.0Unknown \n[CVE-2019-7121](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7121>)0.0Unknown \n[CVE-2019-7122](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7122>)0.0Unknown \n[CVE-2019-7123](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7123>)0.0Unknown \n[CVE-2019-7127](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7127>)0.0Unknown \n[CVE-2019-7111](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7111>)0.0Unknown \n[CVE-2019-7118](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7118>)0.0Unknown \n[CVE-2019-7119](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7119>)0.0Unknown \n[CVE-2019-7120](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7120>)0.0Unknown \n[CVE-2019-7124](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7124>)0.0Unknown \n[CVE-2019-7117](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7117>)0.0Unknown \n[CVE-2019-7128](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7128>)0.0Unknown \n[CVE-2019-7088](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7088>)0.0Unknown \n[CVE-2019-7112](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7112>)0.0Unknown \n[CVE-2019-7113](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7113>)0.0Unknown \n[CVE-2019-7125](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7125>)0.0Unknown", "edition": 1, "modified": "2020-06-18T00:00:00", "published": "2019-04-09T00:00:00", "id": "KLA11458", "href": "https://threats.kaspersky.com/en/vulnerability/KLA11458", "title": "\r KLA11458Multiple vulnerabilities in Adobe Acrobat and Acrobat Reader ", "type": "kaspersky", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}]}