Multiple vulnerabilities in Adobe Acrobat and Acrobat Reader. Malicious users can exploit these vulnerabilities to execute arbitrary code, obtain sensitive information and bypass security restrictions. Includes heap buffer overflow, use-after-free, out-of-bounds write, security bypass, type confusion and untrusted pointer dereference vulnerabilities
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo