Adobe Acrobat Reader DC (Continuous Track) Security Updates (apsb19-49) - Windows
2019-10-16T00:00:00
ID OPENVAS:1361412562310815812 Type openvas Reporter Copyright (C) 2019 Greenbone Networks GmbH Modified 2019-10-17T00:00:00
Description
This host is installed with Adobe Acrobat Reader
DC (Continuous Track) and is prone to multiple vulnerabilities.
# Copyright (C) 2019 Greenbone Networks GmbH
# Text descriptions are largely excerpted from the referenced
# advisory, and are Copyright (C) the respective author(s)
#
# SPDX-License-Identifier: GPL-2.0-or-later
#
# This program is free software; you can redistribute it and/or
# modify it under the terms of the GNU General Public License
# as published by the Free Software Foundation; either version 2
# of the License, or (at your option) any later version.
#
# This program is distributed in the hope that it will be useful,
# but WITHOUT ANY WARRANTY; without even the implied warranty of
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
# GNU General Public License for more details.
#
# You should have received a copy of the GNU General Public License
# along with this program; if not, write to the Free Software
# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
CPE = "cpe:/a:adobe:acrobat_reader_dc_continuous";
if(description)
{
script_oid("1.3.6.1.4.1.25623.1.0.815812");
script_version("2019-10-17T05:12:29+0000");
script_cve_id("CVE-2019-8064", "CVE-2019-8160", "CVE-2019-8161", "CVE-2019-8162",
"CVE-2019-8163", "CVE-2019-8164", "CVE-2019-8165", "CVE-2019-8166",
"CVE-2019-8167", "CVE-2019-8168", "CVE-2019-8169", "CVE-2019-8170",
"CVE-2019-8171", "CVE-2019-8172", "CVE-2019-8173", "CVE-2019-8174",
"CVE-2019-8175", "CVE-2019-8176", "CVE-2019-8177", "CVE-2019-8178",
"CVE-2019-8179", "CVE-2019-8180", "CVE-2019-8181", "CVE-2019-8182",
"CVE-2019-8183", "CVE-2019-8184", "CVE-2019-8185", "CVE-2019-8186",
"CVE-2019-8187", "CVE-2019-8188", "CVE-2019-8189", "CVE-2019-8190",
"CVE-2019-8191", "CVE-2019-8192", "CVE-2019-8193", "CVE-2019-8194",
"CVE-2019-8195", "CVE-2019-8196", "CVE-2019-8197", "CVE-2019-8198",
"CVE-2019-8199", "CVE-2019-8200", "CVE-2019-8201", "CVE-2019-8202",
"CVE-2019-8203", "CVE-2019-8204", "CVE-2019-8205", "CVE-2019-8206",
"CVE-2019-8207", "CVE-2019-8208", "CVE-2019-8209", "CVE-2019-8210",
"CVE-2019-8211", "CVE-2019-8212", "CVE-2019-8213", "CVE-2019-8214",
"CVE-2019-8215", "CVE-2019-8216", "CVE-2019-8217", "CVE-2019-8218",
"CVE-2019-8219", "CVE-2019-8220", "CVE-2019-8221", "CVE-2019-8222",
"CVE-2019-8223", "CVE-2019-8224", "CVE-2019-8225", "CVE-2019-8226");
script_tag(name:"cvss_base", value:"10.0");
script_tag(name:"cvss_base_vector", value:"AV:N/AC:L/Au:N/C:C/I:C/A:C");
script_tag(name:"last_modification", value:"2019-10-17 05:12:29 +0000 (Thu, 17 Oct 2019)");
script_tag(name:"creation_date", value:"2019-10-16 11:08:11 +0530 (Wed, 16 Oct 2019)");
script_name("Adobe Acrobat Reader DC (Continuous Track) Security Updates (apsb19-49) - Windows");
script_tag(name:"summary", value:"This host is installed with Adobe Acrobat Reader
DC (Continuous Track) and is prone to multiple vulnerabilities.");
script_tag(name:"vuldetect", value:"Checks if a vulnerable version is present
on the target host.");
script_tag(name:"insight", value:"Multiple flaws exists due to,
- Multiple out-of-bounds read errors.
- Multiple out-of-bounds write errors.
- Multiple type confusion errors.
- Multiple use after free errors.
- Multiple heap overflow errors.
- A buffer overrun error.
- A cross site scripting error.
- A race condition error.
- An incomplete implementation of security mechanism.
- An untrusted pointer dereference error.");
script_tag(name:"impact", value:"Successful exploitation will allow an attacker
to gain access to sensitive information and run arbitrary code in context of
current user.");
script_tag(name:"affected", value:"Adobe Acrobat Reader DC (Continuous Track)
2019.012.20040 and earlier versions on Windows.");
script_tag(name:"solution", value:"Upgrade to Adobe Acrobat Reader DC Continuous
version 2019.021.20047 or later. Please see the references for more information.");
script_tag(name:"solution_type", value:"VendorFix");
script_tag(name:"qod_type", value:"registry");
script_xref(name:"URL", value:"https://helpx.adobe.com/security/products/acrobat/apsb19-49.html");
script_category(ACT_GATHER_INFO);
script_copyright("Copyright (C) 2019 Greenbone Networks GmbH");
script_family("General");
script_dependencies("gb_adobe_acrobat_reader_dc_cont_detect_win.nasl");
script_mandatory_keys("Adobe/Acrobat/ReaderDC/Continuous/Win/Ver");
exit(0);
}
include("host_details.inc");
include("version_func.inc");
if( ! infos = get_app_version_and_location( cpe:CPE, exit_no_version:TRUE) ) exit( 0 );
vers = infos['version'];
path = infos['location'];
## 2019.012.20040 == 19.012.20040
if(version_is_less_equal(version:vers, test_version:"19.012.20040")) {
report = report_fixed_ver(installed_version:vers, fixed_version:"19.021.20047 (2019.021.20047)", install_path:path);
security_message(data:report);
exit(0);
}
exit(99);
{"id": "OPENVAS:1361412562310815812", "type": "openvas", "bulletinFamily": "scanner", "title": "Adobe Acrobat Reader DC (Continuous Track) Security Updates (apsb19-49) - Windows", "description": "This host is installed with Adobe Acrobat Reader\n DC (Continuous Track) and is prone to multiple vulnerabilities.", "published": "2019-10-16T00:00:00", "modified": "2019-10-17T00:00:00", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}, "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310815812", "reporter": "Copyright (C) 2019 Greenbone Networks GmbH", "references": ["https://helpx.adobe.com/security/products/acrobat/apsb19-49.html"], "cvelist": ["CVE-2019-8183", "CVE-2019-8180", "CVE-2019-8181", "CVE-2019-8219", "CVE-2019-8185", "CVE-2019-8215", "CVE-2019-8176", "CVE-2019-8216", "CVE-2019-8190", "CVE-2019-8162", "CVE-2019-8161", "CVE-2019-8184", "CVE-2019-8195", "CVE-2019-8191", "CVE-2019-8200", "CVE-2019-8193", "CVE-2019-8160", "CVE-2019-8177", "CVE-2019-8169", "CVE-2019-8199", "CVE-2019-8167", "CVE-2019-8210", "CVE-2019-8217", "CVE-2019-8222", "CVE-2019-8196", "CVE-2019-8225", "CVE-2019-8203", "CVE-2019-8188", "CVE-2019-8194", "CVE-2019-8187", "CVE-2019-8192", "CVE-2019-8211", "CVE-2019-8221", "CVE-2019-8179", "CVE-2019-8163", "CVE-2019-8172", "CVE-2019-8197", "CVE-2019-8168", "CVE-2019-8189", "CVE-2019-8164", "CVE-2019-8208", "CVE-2019-8204", "CVE-2019-8226", "CVE-2019-8182", "CVE-2019-8170", "CVE-2019-8205", "CVE-2019-8174", "CVE-2019-8213", "CVE-2019-8201", "CVE-2019-8224", "CVE-2019-8178", "CVE-2019-8198", "CVE-2019-8212", "CVE-2019-8209", "CVE-2019-8214", "CVE-2019-8166", "CVE-2019-8223", "CVE-2019-8175", "CVE-2019-8207", "CVE-2019-8218", "CVE-2019-8220", "CVE-2019-8173", "CVE-2019-8186", "CVE-2019-8064", "CVE-2019-8202", "CVE-2019-8165", "CVE-2019-8171", "CVE-2019-8206"], "lastseen": "2019-10-23T12:50:57", "viewCount": 12, "enchantments": {"dependencies": {"references": [{"type": "kaspersky", "idList": ["KLA11583"]}, {"type": "openvas", "idList": ["OPENVAS:1361412562310815802", "OPENVAS:1361412562310815811", "OPENVAS:1361412562310815804", "OPENVAS:1361412562310815810", "OPENVAS:1361412562310815807", "OPENVAS:1361412562310815803", "OPENVAS:1361412562310815805", "OPENVAS:1361412562310815806", "OPENVAS:1361412562310815808", "OPENVAS:1361412562310815809"]}, {"type": "nessus", "idList": ["ADOBE_READER_APSB19-49.NASL", "MACOS_ADOBE_ACROBAT_APSB19-49.NASL", "ADOBE_ACROBAT_APSB19-49.NASL", "MACOS_ADOBE_READER_APSB19-49.NASL"]}, {"type": "cve", "idList": ["CVE-2019-8190", "CVE-2019-8186", "CVE-2019-8180", "CVE-2019-8188", "CVE-2019-8191", "CVE-2019-8199", "CVE-2019-8198", "CVE-2019-8189", "CVE-2019-8192", "CVE-2019-8197"]}, {"type": "symantec", "idList": ["SMNTC-110511", "SMNTC-110512", "SMNTC-110513", "SMNTC-110514"]}, {"type": "zdi", "idList": ["ZDI-19-881", "ZDI-19-887", "ZDI-19-884", "ZDI-19-889", "ZDI-19-890", "ZDI-19-883", "ZDI-19-899", "ZDI-19-875", "ZDI-19-885"]}, {"type": "zdt", "idList": ["1337DAY-ID-33392"]}, {"type": "exploitdb", "idList": ["EDB-ID:47528"]}], "modified": "2019-10-23T12:50:57", "rev": 2}, "score": {"value": 8.3, "vector": "NONE", "modified": "2019-10-23T12:50:57", "rev": 2}, "vulnersScore": 8.3}, "pluginID": "1361412562310815812", "sourceData": "# Copyright (C) 2019 Greenbone Networks GmbH\n# Text descriptions are largely excerpted from the referenced\n# advisory, and are Copyright (C) the respective author(s)\n#\n# SPDX-License-Identifier: GPL-2.0-or-later\n#\n# This program is free software; you can redistribute it and/or\n# modify it under the terms of the GNU General Public License\n# as published by the Free Software Foundation; either version 2\n# of the License, or (at your option) any later version.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n\nCPE = \"cpe:/a:adobe:acrobat_reader_dc_continuous\";\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.815812\");\n script_version(\"2019-10-17T05:12:29+0000\");\n script_cve_id(\"CVE-2019-8064\", \"CVE-2019-8160\", \"CVE-2019-8161\", \"CVE-2019-8162\",\n \"CVE-2019-8163\", \"CVE-2019-8164\", \"CVE-2019-8165\", \"CVE-2019-8166\",\n \"CVE-2019-8167\", \"CVE-2019-8168\", \"CVE-2019-8169\", \"CVE-2019-8170\",\n \"CVE-2019-8171\", \"CVE-2019-8172\", \"CVE-2019-8173\", \"CVE-2019-8174\",\n \"CVE-2019-8175\", \"CVE-2019-8176\", \"CVE-2019-8177\", \"CVE-2019-8178\",\n \"CVE-2019-8179\", \"CVE-2019-8180\", \"CVE-2019-8181\", \"CVE-2019-8182\",\n \"CVE-2019-8183\", \"CVE-2019-8184\", \"CVE-2019-8185\", \"CVE-2019-8186\",\n \"CVE-2019-8187\", \"CVE-2019-8188\", \"CVE-2019-8189\", \"CVE-2019-8190\",\n \"CVE-2019-8191\", \"CVE-2019-8192\", \"CVE-2019-8193\", \"CVE-2019-8194\",\n \"CVE-2019-8195\", \"CVE-2019-8196\", \"CVE-2019-8197\", \"CVE-2019-8198\",\n \"CVE-2019-8199\", \"CVE-2019-8200\", \"CVE-2019-8201\", \"CVE-2019-8202\",\n \"CVE-2019-8203\", \"CVE-2019-8204\", \"CVE-2019-8205\", \"CVE-2019-8206\",\n \"CVE-2019-8207\", \"CVE-2019-8208\", \"CVE-2019-8209\", \"CVE-2019-8210\",\n \"CVE-2019-8211\", \"CVE-2019-8212\", \"CVE-2019-8213\", \"CVE-2019-8214\",\n \"CVE-2019-8215\", \"CVE-2019-8216\", \"CVE-2019-8217\", \"CVE-2019-8218\",\n \"CVE-2019-8219\", \"CVE-2019-8220\", \"CVE-2019-8221\", \"CVE-2019-8222\",\n \"CVE-2019-8223\", \"CVE-2019-8224\", \"CVE-2019-8225\", \"CVE-2019-8226\");\n script_tag(name:\"cvss_base\", value:\"10.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_tag(name:\"last_modification\", value:\"2019-10-17 05:12:29 +0000 (Thu, 17 Oct 2019)\");\n script_tag(name:\"creation_date\", value:\"2019-10-16 11:08:11 +0530 (Wed, 16 Oct 2019)\");\n script_name(\"Adobe Acrobat Reader DC (Continuous Track) Security Updates (apsb19-49) - Windows\");\n\n script_tag(name:\"summary\", value:\"This host is installed with Adobe Acrobat Reader\n DC (Continuous Track) and is prone to multiple vulnerabilities.\");\n\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable version is present\n on the target host.\");\n\n script_tag(name:\"insight\", value:\"Multiple flaws exists due to,\n\n - Multiple out-of-bounds read errors.\n\n - Multiple out-of-bounds write errors.\n\n - Multiple type confusion errors.\n\n - Multiple use after free errors.\n\n - Multiple heap overflow errors.\n\n - A buffer overrun error.\n\n - A cross site scripting error.\n\n - A race condition error.\n\n - An incomplete implementation of security mechanism.\n\n - An untrusted pointer dereference error.\");\n\n script_tag(name:\"impact\", value:\"Successful exploitation will allow an attacker\n to gain access to sensitive information and run arbitrary code in context of\n current user.\");\n\n script_tag(name:\"affected\", value:\"Adobe Acrobat Reader DC (Continuous Track)\n 2019.012.20040 and earlier versions on Windows.\");\n\n script_tag(name:\"solution\", value:\"Upgrade to Adobe Acrobat Reader DC Continuous\n version 2019.021.20047 or later. Please see the references for more information.\");\n\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_tag(name:\"qod_type\", value:\"registry\");\n script_xref(name:\"URL\", value:\"https://helpx.adobe.com/security/products/acrobat/apsb19-49.html\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2019 Greenbone Networks GmbH\");\n script_family(\"General\");\n script_dependencies(\"gb_adobe_acrobat_reader_dc_cont_detect_win.nasl\");\n script_mandatory_keys(\"Adobe/Acrobat/ReaderDC/Continuous/Win/Ver\");\n exit(0);\n}\n\ninclude(\"host_details.inc\");\ninclude(\"version_func.inc\");\n\nif( ! infos = get_app_version_and_location( cpe:CPE, exit_no_version:TRUE) ) exit( 0 );\nvers = infos['version'];\npath = infos['location'];\n\n## 2019.012.20040 == 19.012.20040\nif(version_is_less_equal(version:vers, test_version:\"19.012.20040\")) {\n report = report_fixed_ver(installed_version:vers, fixed_version:\"19.021.20047 (2019.021.20047)\", install_path:path);\n security_message(data:report);\n exit(0);\n}\n\nexit(99);\n", "naslFamily": "General"}
{"kaspersky": [{"lastseen": "2020-09-02T11:54:59", "bulletinFamily": "info", "cvelist": ["CVE-2019-8183", "CVE-2019-8180", "CVE-2019-8181", "CVE-2019-8219", "CVE-2019-8185", "CVE-2019-8215", "CVE-2019-8176", "CVE-2019-8216", "CVE-2019-8190", "CVE-2019-8162", "CVE-2019-8161", "CVE-2019-8184", "CVE-2019-8195", "CVE-2019-8191", "CVE-2019-8200", "CVE-2019-8193", "CVE-2019-8160", "CVE-2019-8177", "CVE-2019-8169", "CVE-2019-8199", "CVE-2019-8167", "CVE-2019-8210", "CVE-2019-8217", "CVE-2019-8222", "CVE-2019-8196", "CVE-2019-8225", "CVE-2019-8203", "CVE-2019-8188", "CVE-2019-8194", "CVE-2019-8187", "CVE-2019-8192", "CVE-2019-8211", "CVE-2019-8221", "CVE-2019-8179", "CVE-2019-8163", "CVE-2019-8172", "CVE-2019-8197", "CVE-2019-8168", "CVE-2019-8189", "CVE-2019-8164", "CVE-2019-8208", "CVE-2019-8204", "CVE-2019-8226", "CVE-2019-8182", "CVE-2019-8170", "CVE-2019-8205", "CVE-2019-8174", "CVE-2019-8213", "CVE-2019-8201", "CVE-2019-8224", "CVE-2019-8178", "CVE-2019-8198", "CVE-2019-8212", "CVE-2019-8209", "CVE-2019-8214", "CVE-2019-8166", "CVE-2019-8223", "CVE-2019-8175", "CVE-2019-8207", "CVE-2019-8218", "CVE-2019-8220", "CVE-2019-8173", "CVE-2019-8186", "CVE-2019-8064", "CVE-2019-8202", "CVE-2019-8165", "CVE-2019-8171", "CVE-2019-8206"], "description": "### *Detect date*:\n09/15/2019\n\n### *Severity*:\nCritical\n\n### *Description*:\nMultiple vulnerabilities were found in Adobe Acrobat and Adobe Acrobat Reader. Malicious users can exploit these vulnerabilities to execute arbitrary code, obtain sensitive information.\n\n### *Affected products*:\nAdobe Acrobat DC (Continuous track) earlier than 2019.021.20047 \nAdobe Acrobat Reader DC (Continuous track) earlier than 2019.021.20047 \nAdobe Acrobat 2017 (Classic 2017 track) earlier than 2017.011.30150 \nAdobe Acrobat Reader 2017 (Classic 2017 track) earlier than 2017.011.30150 \nAdobe Acrobat (Classic 2015 track) earlier than 2015.006.30504 \nAdobe Acrobat Reader (Classic 2015 track) earlier than 2015.006.30504\n\n### *Solution*:\nUpdate to the latest version \n[Download Adobe Acrobat Reader DC](<https://get.adobe.com/ru/reader/>)\n\n### *Original advisories*:\n[APSB19-49](<https://helpx.adobe.com/security/products/acrobat/apsb19-49.html>) \n\n\n### *Impacts*:\nACE \n\n### *Related products*:\n[Adobe Acrobat Reader DC Continuous](<https://threats.kaspersky.com/en/product/Adobe-Acrobat-Reader-DC-Continuous/>)\n\n### *CVE-IDS*:\n[CVE-2019-8169](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8169>)0.0Unknown \n[CVE-2019-8183](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8183>)0.0Unknown \n[CVE-2019-8218](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8218>)0.0Unknown \n[CVE-2019-8186](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8186>)0.0Unknown \n[CVE-2019-8216](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8216>)0.0Unknown \n[CVE-2019-8203](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8203>)0.0Unknown \n[CVE-2019-8194](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8194>)0.0Unknown \n[CVE-2019-8173](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8173>)0.0Unknown \n[CVE-2019-8190](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8190>)0.0Unknown \n[CVE-2019-8220](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8220>)0.0Unknown \n[CVE-2019-8207](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8207>)0.0Unknown \n[CVE-2019-8064](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8064>)0.0Unknown \n[CVE-2019-8198](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8198>)0.0Unknown \n[CVE-2019-8181](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8181>)0.0Unknown \n[CVE-2019-8182](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8182>)0.0Unknown \n[CVE-2019-8219](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8219>)0.0Unknown \n[CVE-2019-8209](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8209>)0.0Unknown \n[CVE-2019-8205](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8205>)0.0Unknown \n[CVE-2019-8206](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8206>)0.0Unknown \n[CVE-2019-8222](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8222>)0.0Unknown \n[CVE-2019-8202](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8202>)0.0Unknown \n[CVE-2019-8226](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8226>)0.0Unknown \n[CVE-2019-8193](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8193>)0.0Unknown \n[CVE-2019-8195](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8195>)0.0Unknown \n[CVE-2019-8168](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8168>)0.0Unknown \n[CVE-2019-8200](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8200>)0.0Unknown \n[CVE-2019-8167](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8167>)0.0Unknown \n[CVE-2019-8197](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8197>)0.0Unknown \n[CVE-2019-8170](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8170>)0.0Unknown \n[CVE-2019-8217](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8217>)0.0Unknown \n[CVE-2019-8162](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8162>)0.0Unknown \n[CVE-2019-8199](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8199>)0.0Unknown \n[CVE-2019-8196](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8196>)0.0Unknown \n[CVE-2019-8174](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8174>)0.0Unknown \n[CVE-2019-8178](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8178>)0.0Unknown \n[CVE-2019-8225](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8225>)0.0Unknown \n[CVE-2019-8160](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8160>)0.0Unknown \n[CVE-2019-8224](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8224>)0.0Unknown \n[CVE-2019-8177](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8177>)0.0Unknown \n[CVE-2019-8204](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8204>)0.0Unknown \n[CVE-2019-8210](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8210>)0.0Unknown \n[CVE-2019-8164](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8164>)0.0Unknown \n[CVE-2019-8185](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8185>)0.0Unknown \n[CVE-2019-8212](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8212>)0.0Unknown \n[CVE-2019-8201](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8201>)0.0Unknown \n[CVE-2019-8215](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8215>)0.0Unknown \n[CVE-2019-8165](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8165>)0.0Unknown \n[CVE-2019-8187](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8187>)0.0Unknown \n[CVE-2019-8188](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8188>)0.0Unknown \n[CVE-2019-8208](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8208>)0.0Unknown \n[CVE-2019-8223](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8223>)0.0Unknown \n[CVE-2019-8184](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8184>)0.0Unknown \n[CVE-2019-8191](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8191>)0.0Unknown \n[CVE-2019-8172](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8172>)0.0Unknown \n[CVE-2019-8175](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8175>)0.0Unknown \n[CVE-2019-8180](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8180>)0.0Unknown \n[CVE-2019-8179](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8179>)0.0Unknown \n[CVE-2019-8163](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8163>)0.0Unknown \n[CVE-2019-8171](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8171>)0.0Unknown \n[CVE-2019-8161](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8161>)0.0Unknown \n[CVE-2019-8221](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8221>)0.0Unknown \n[CVE-2019-8189](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8189>)0.0Unknown \n[CVE-2019-8176](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8176>)0.0Unknown \n[CVE-2019-8214](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8214>)0.0Unknown \n[CVE-2019-8192](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8192>)0.0Unknown \n[CVE-2019-8213](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8213>)0.0Unknown \n[CVE-2019-8211](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8211>)0.0Unknown \n[CVE-2019-8166](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8166>)0.0Unknown", "edition": 1, "modified": "2020-05-22T00:00:00", "published": "2019-09-15T00:00:00", "id": "KLA11583", "href": "https://threats.kaspersky.com/en/vulnerability/KLA11583", "title": "\r KLA11583Multiple vulnerabilities in Adobe Acrobat and Adobe Acrobat Reader ", "type": "kaspersky", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}], "openvas": [{"lastseen": "2019-10-23T12:50:50", "bulletinFamily": "scanner", "cvelist": ["CVE-2019-8183", "CVE-2019-8180", "CVE-2019-8181", "CVE-2019-8219", "CVE-2019-8185", "CVE-2019-8215", "CVE-2019-8176", "CVE-2019-8216", "CVE-2019-8190", "CVE-2019-8162", "CVE-2019-8161", "CVE-2019-8184", "CVE-2019-8195", "CVE-2019-8191", "CVE-2019-8200", "CVE-2019-8193", "CVE-2019-8160", "CVE-2019-8177", "CVE-2019-8169", "CVE-2019-8199", "CVE-2019-8167", "CVE-2019-8210", "CVE-2019-8217", "CVE-2019-8222", "CVE-2019-8196", "CVE-2019-8225", "CVE-2019-8203", "CVE-2019-8188", "CVE-2019-8194", "CVE-2019-8187", "CVE-2019-8192", "CVE-2019-8211", "CVE-2019-8221", "CVE-2019-8179", "CVE-2019-8163", "CVE-2019-8172", "CVE-2019-8197", "CVE-2019-8168", "CVE-2019-8189", "CVE-2019-8164", "CVE-2019-8208", "CVE-2019-8204", "CVE-2019-8226", "CVE-2019-8182", "CVE-2019-8170", "CVE-2019-8205", "CVE-2019-8174", "CVE-2019-8213", "CVE-2019-8201", "CVE-2019-8224", "CVE-2019-8178", "CVE-2019-8198", "CVE-2019-8212", "CVE-2019-8209", "CVE-2019-8214", "CVE-2019-8166", "CVE-2019-8223", "CVE-2019-8175", "CVE-2019-8207", "CVE-2019-8218", "CVE-2019-8220", "CVE-2019-8173", "CVE-2019-8186", "CVE-2019-8064", "CVE-2019-8202", "CVE-2019-8165", "CVE-2019-8171", "CVE-2019-8206"], "description": "This host is installed with Adobe Acrobat DC\n (Continuous Track) and is prone to multiple vulnerabilities.", "modified": "2019-10-17T00:00:00", "published": "2019-10-16T00:00:00", "id": "OPENVAS:1361412562310815805", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310815805", "type": "openvas", "title": "Adobe Acrobat DC (Continuous Track) Security Updates (apsb19-49) - Mac OS X", "sourceData": "# Copyright (C) 2019 Greenbone Networks GmbH\n# Text descriptions are largely excerpted from the referenced\n# advisory, and are Copyright (C) the respective author(s)\n#\n# SPDX-License-Identifier: GPL-2.0-or-later\n#\n# This program is free software; you can redistribute it and/or\n# modify it under the terms of the GNU General Public License\n# as published by the Free Software Foundation; either version 2\n# of the License, or (at your option) any later version.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n\nCPE = \"cpe:/a:adobe:acrobat_dc_continuous\";\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.815805\");\n script_version(\"2019-10-17T05:12:29+0000\");\n script_cve_id(\"CVE-2019-8064\", \"CVE-2019-8160\", \"CVE-2019-8161\", \"CVE-2019-8162\",\n \"CVE-2019-8163\", \"CVE-2019-8164\", \"CVE-2019-8165\", \"CVE-2019-8166\",\n \"CVE-2019-8167\", \"CVE-2019-8168\", \"CVE-2019-8169\", \"CVE-2019-8170\",\n \"CVE-2019-8171\", \"CVE-2019-8172\", \"CVE-2019-8173\", \"CVE-2019-8174\",\n \"CVE-2019-8175\", \"CVE-2019-8176\", \"CVE-2019-8177\", \"CVE-2019-8178\",\n \"CVE-2019-8179\", \"CVE-2019-8180\", \"CVE-2019-8181\", \"CVE-2019-8182\",\n \"CVE-2019-8183\", \"CVE-2019-8184\", \"CVE-2019-8185\", \"CVE-2019-8186\",\n \"CVE-2019-8187\", \"CVE-2019-8188\", \"CVE-2019-8189\", \"CVE-2019-8190\",\n \"CVE-2019-8191\", \"CVE-2019-8192\", \"CVE-2019-8193\", \"CVE-2019-8194\",\n \"CVE-2019-8195\", \"CVE-2019-8196\", \"CVE-2019-8197\", \"CVE-2019-8198\",\n \"CVE-2019-8199\", \"CVE-2019-8200\", \"CVE-2019-8201\", \"CVE-2019-8202\",\n \"CVE-2019-8203\", \"CVE-2019-8204\", \"CVE-2019-8205\", \"CVE-2019-8206\",\n \"CVE-2019-8207\", \"CVE-2019-8208\", \"CVE-2019-8209\", \"CVE-2019-8210\",\n \"CVE-2019-8211\", \"CVE-2019-8212\", \"CVE-2019-8213\", \"CVE-2019-8214\",\n \"CVE-2019-8215\", \"CVE-2019-8216\", \"CVE-2019-8217\", \"CVE-2019-8218\",\n \"CVE-2019-8219\", \"CVE-2019-8220\", \"CVE-2019-8221\", \"CVE-2019-8222\",\n \"CVE-2019-8223\", \"CVE-2019-8224\", \"CVE-2019-8225\", \"CVE-2019-8226\");\n script_tag(name:\"cvss_base\", value:\"10.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_tag(name:\"last_modification\", value:\"2019-10-17 05:12:29 +0000 (Thu, 17 Oct 2019)\");\n script_tag(name:\"creation_date\", value:\"2019-10-16 12:01:55 +0530 (Wed, 16 Oct 2019)\");\n script_name(\"Adobe Acrobat DC (Continuous Track) Security Updates (apsb19-49) - Mac OS X\");\n\n script_tag(name:\"summary\", value:\"This host is installed with Adobe Acrobat DC\n (Continuous Track) and is prone to multiple vulnerabilities.\");\n\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable version is present\n on the target host.\");\n\n script_tag(name:\"insight\", value:\"Multiple flaws exists due to,\n\n - Multiple out-of-bounds read errors.\n\n - Multiple out-of-bounds write errors.\n\n - Multiple type confusion errors.\n\n - Multiple use after free errors.\n\n - Multiple heap overflow errors.\n\n - A buffer overrun error.\n\n - A cross site scripting error.\n\n - A race condition error.\n\n - An incomplete implementation of security mechanism.\n\n - An untrusted pointer dereference error.\");\n\n script_tag(name:\"impact\", value:\"Successful exploitation will allow an attacker\n to gain access to sensitive information and run arbitrary code in context of\n current user.\");\n\n script_tag(name:\"affected\", value:\"Adobe Acrobat DC (Continuous Track)\n 2019.012.20040 and earlier versions on Mac OS X.\");\n\n script_tag(name:\"solution\", value:\"Upgrade to Adobe Acrobat DC Continuous\n version 2019.021.20047 or later. Please see the references for more information.\");\n\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_tag(name:\"qod_type\", value:\"executable_version\");\n script_xref(name:\"URL\", value:\"https://helpx.adobe.com/security/products/acrobat/apsb19-49.html\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2019 Greenbone Networks GmbH\");\n script_family(\"General\");\n script_dependencies(\"gb_adobe_acrobat_dc_cont_detect_macosx.nasl\");\n script_mandatory_keys(\"Adobe/AcrobatDC/Continuous/MacOSX/Version\");\n exit(0);\n}\n\ninclude(\"host_details.inc\");\ninclude(\"version_func.inc\");\n\nif( ! infos = get_app_version_and_location( cpe:CPE, exit_no_version:TRUE) ) exit( 0 );\nvers = infos['version'];\npath = infos['location'];\n\n## 2019.012.20040 == 19.012.20040\nif(version_is_less_equal(version:vers, test_version:\"19.012.20040\")) {\n report = report_fixed_ver(installed_version:vers, fixed_version:\"19.021.20047 (2019.021.20047)\", install_path:path);\n security_message(data:report);\n exit(0);\n}\n\nexit(99);\n", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2019-10-23T12:50:49", "bulletinFamily": "scanner", "cvelist": ["CVE-2019-8183", "CVE-2019-8180", "CVE-2019-8181", "CVE-2019-8219", "CVE-2019-8185", "CVE-2019-8215", "CVE-2019-8176", "CVE-2019-8216", "CVE-2019-8190", "CVE-2019-8162", "CVE-2019-8161", "CVE-2019-8184", "CVE-2019-8195", "CVE-2019-8191", "CVE-2019-8200", "CVE-2019-8193", "CVE-2019-8160", "CVE-2019-8177", "CVE-2019-8169", "CVE-2019-8199", "CVE-2019-8167", "CVE-2019-8210", "CVE-2019-8217", "CVE-2019-8222", "CVE-2019-8196", "CVE-2019-8225", "CVE-2019-8203", "CVE-2019-8188", "CVE-2019-8194", "CVE-2019-8187", "CVE-2019-8192", "CVE-2019-8211", "CVE-2019-8221", "CVE-2019-8179", "CVE-2019-8163", "CVE-2019-8172", "CVE-2019-8197", "CVE-2019-8168", "CVE-2019-8189", "CVE-2019-8164", "CVE-2019-8208", "CVE-2019-8204", "CVE-2019-8226", "CVE-2019-8182", "CVE-2019-8170", "CVE-2019-8205", "CVE-2019-8174", "CVE-2019-8213", "CVE-2019-8201", "CVE-2019-8224", "CVE-2019-8178", "CVE-2019-8198", "CVE-2019-8212", "CVE-2019-8209", "CVE-2019-8214", "CVE-2019-8166", "CVE-2019-8223", "CVE-2019-8175", "CVE-2019-8207", "CVE-2019-8218", "CVE-2019-8220", "CVE-2019-8173", "CVE-2019-8186", "CVE-2019-8064", "CVE-2019-8202", "CVE-2019-8165", "CVE-2019-8171", "CVE-2019-8206"], "description": "This host is installed with Adobe Acrobat\n Reader DC Classic 2015 and is prone to multiple vulnerabilities.", "modified": "2019-10-17T00:00:00", "published": "2019-10-16T00:00:00", "id": "OPENVAS:1361412562310815809", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310815809", "type": "openvas", "title": "Adobe Acrobat Reader DC (Classic Track) Security Updates (apsb19-49) - Mac OS X", "sourceData": "# Copyright (C) 2019 Greenbone Networks GmbH\n# Text descriptions are largely excerpted from the referenced\n# advisory, and are Copyright (C) the respective author(s)\n#\n# SPDX-License-Identifier: GPL-2.0-or-later\n#\n# This program is free software; you can redistribute it and/or\n# modify it under the terms of the GNU General Public License\n# as published by the Free Software Foundation; either version 2\n# of the License, or (at your option) any later version.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n\nCPE = \"cpe:/a:adobe:acrobat_reader_dc_classic\";\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.815809\");\n script_version(\"2019-10-17T05:12:29+0000\");\n script_cve_id(\"CVE-2019-8064\", \"CVE-2019-8160\", \"CVE-2019-8161\", \"CVE-2019-8162\",\n \"CVE-2019-8163\", \"CVE-2019-8164\", \"CVE-2019-8165\", \"CVE-2019-8166\",\n \"CVE-2019-8167\", \"CVE-2019-8168\", \"CVE-2019-8169\", \"CVE-2019-8170\",\n \"CVE-2019-8171\", \"CVE-2019-8172\", \"CVE-2019-8173\", \"CVE-2019-8174\",\n \"CVE-2019-8175\", \"CVE-2019-8176\", \"CVE-2019-8177\", \"CVE-2019-8178\",\n \"CVE-2019-8179\", \"CVE-2019-8180\", \"CVE-2019-8181\", \"CVE-2019-8182\",\n \"CVE-2019-8183\", \"CVE-2019-8184\", \"CVE-2019-8185\", \"CVE-2019-8186\",\n \"CVE-2019-8187\", \"CVE-2019-8188\", \"CVE-2019-8189\", \"CVE-2019-8190\",\n \"CVE-2019-8191\", \"CVE-2019-8192\", \"CVE-2019-8193\", \"CVE-2019-8194\",\n \"CVE-2019-8195\", \"CVE-2019-8196\", \"CVE-2019-8197\", \"CVE-2019-8198\",\n \"CVE-2019-8199\", \"CVE-2019-8200\", \"CVE-2019-8201\", \"CVE-2019-8202\",\n \"CVE-2019-8203\", \"CVE-2019-8204\", \"CVE-2019-8205\", \"CVE-2019-8206\",\n \"CVE-2019-8207\", \"CVE-2019-8208\", \"CVE-2019-8209\", \"CVE-2019-8210\",\n \"CVE-2019-8211\", \"CVE-2019-8212\", \"CVE-2019-8213\", \"CVE-2019-8214\",\n \"CVE-2019-8215\", \"CVE-2019-8216\", \"CVE-2019-8217\", \"CVE-2019-8218\",\n \"CVE-2019-8219\", \"CVE-2019-8220\", \"CVE-2019-8221\", \"CVE-2019-8222\",\n \"CVE-2019-8223\", \"CVE-2019-8224\", \"CVE-2019-8225\", \"CVE-2019-8226\");\n script_tag(name:\"cvss_base\", value:\"10.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_tag(name:\"last_modification\", value:\"2019-10-17 05:12:29 +0000 (Thu, 17 Oct 2019)\");\n script_tag(name:\"creation_date\", value:\"2019-10-16 12:02:55 +0530 (Wed, 16 Oct 2019)\");\n script_name(\"Adobe Acrobat Reader DC (Classic Track) Security Updates (apsb19-49) - Mac OS X\");\n\n script_tag(name:\"summary\", value:\"This host is installed with Adobe Acrobat\n Reader DC Classic 2015 and is prone to multiple vulnerabilities.\");\n\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable version is present\n on the target host.\");\n\n script_tag(name:\"insight\", value:\"Multiple flaws exists due to,\n\n - Multiple out-of-bounds read errors.\n\n - Multiple out-of-bounds write errors.\n\n - Multiple type confusion errors.\n\n - Multiple use after free errors.\n\n - Multiple heap overflow errors.\n\n - A buffer overrun error.\n\n - A cross site scripting error.\n\n - A race condition error.\n\n - An incomplete implementation of security mechanism.\n\n - An untrusted pointer dereference error.\");\n\n script_tag(name:\"impact\", value:\"Successful exploitation will allow an attacker\n to gain access to sensitive information and run arbitrary code in context of\n current user.\");\n\n script_tag(name:\"affected\", value:\"Adobe Acrobat Reader DC Classic 2015 version\n 2015.x before 2015.006.30504 on Mac OS X.\");\n\n script_tag(name:\"solution\", value:\"Upgrade to Adobe Acrobat DC Classic 2015 version\n 2015.006.30504 or later. Please see the references for more information.\");\n\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_tag(name:\"qod_type\", value:\"executable_version\");\n script_xref(name:\"URL\", value:\"https://helpx.adobe.com/security/products/acrobat/apsb19-49.html\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2019 Greenbone Networks GmbH\");\n script_family(\"General\");\n script_dependencies(\"gb_adobe_acrobat_reader_dc_classic_detect_macosx.nasl\");\n script_mandatory_keys(\"Adobe/Acrobat/ReaderDC/Classic/MacOSX/Version\");\n exit(0);\n}\n\ninclude(\"host_details.inc\");\ninclude(\"version_func.inc\");\n\nif( ! infos = get_app_version_and_location( cpe:CPE, exit_no_version:TRUE) ) exit( 0 );\nvers = infos['version'];\npath = infos['location'];\n\n## 2015.006.30503 == 15.006.30503\nif(version_in_range(version:vers, test_version:\"15.0\", test_version2:\"15.006.30503\")) {\n report = report_fixed_ver(installed_version:vers, fixed_version:\"15.006.30504 (2015.006.30504)\", install_path:path);\n security_message(data:report);\n exit(0);\n}\n\nexit(99);\n", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2019-10-23T12:51:09", "bulletinFamily": "scanner", "cvelist": ["CVE-2019-8183", "CVE-2019-8180", "CVE-2019-8181", "CVE-2019-8219", "CVE-2019-8185", "CVE-2019-8215", "CVE-2019-8176", "CVE-2019-8216", "CVE-2019-8190", "CVE-2019-8162", "CVE-2019-8161", "CVE-2019-8184", "CVE-2019-8195", "CVE-2019-8191", "CVE-2019-8200", "CVE-2019-8193", "CVE-2019-8160", "CVE-2019-8177", "CVE-2019-8169", "CVE-2019-8199", "CVE-2019-8167", "CVE-2019-8210", "CVE-2019-8217", "CVE-2019-8222", "CVE-2019-8196", "CVE-2019-8225", "CVE-2019-8203", "CVE-2019-8188", "CVE-2019-8194", "CVE-2019-8187", "CVE-2019-8192", "CVE-2019-8211", "CVE-2019-8221", "CVE-2019-8179", "CVE-2019-8163", "CVE-2019-8172", "CVE-2019-8197", "CVE-2019-8168", "CVE-2019-8189", "CVE-2019-8164", "CVE-2019-8208", "CVE-2019-8204", "CVE-2019-8226", "CVE-2019-8182", "CVE-2019-8170", "CVE-2019-8205", "CVE-2019-8174", "CVE-2019-8213", "CVE-2019-8201", "CVE-2019-8224", "CVE-2019-8178", "CVE-2019-8198", "CVE-2019-8212", "CVE-2019-8209", "CVE-2019-8214", "CVE-2019-8166", "CVE-2019-8223", "CVE-2019-8175", "CVE-2019-8207", "CVE-2019-8218", "CVE-2019-8220", "CVE-2019-8173", "CVE-2019-8186", "CVE-2019-8064", "CVE-2019-8202", "CVE-2019-8165", "CVE-2019-8171", "CVE-2019-8206"], "description": "This host is installed with Adobe Acrobat DC\n Classic 2015 and is prone to multiple vulnerabilities.", "modified": "2019-10-17T00:00:00", "published": "2019-10-16T00:00:00", "id": "OPENVAS:1361412562310815803", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310815803", "type": "openvas", "title": "Adobe Acrobat DC (Classic Track) Security Updates (apsb19-49) - Mac OS X", "sourceData": "# Copyright (C) 2019 Greenbone Networks GmbH\n# Text descriptions are largely excerpted from the referenced\n# advisory, and are Copyright (C) the respective author(s)\n#\n# SPDX-License-Identifier: GPL-2.0-or-later\n#\n# This program is free software; you can redistribute it and/or\n# modify it under the terms of the GNU General Public License\n# as published by the Free Software Foundation; either version 2\n# of the License, or (at your option) any later version.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n\nCPE = \"cpe:/a:adobe:acrobat_dc_classic\";\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.815803\");\n script_version(\"2019-10-17T05:12:29+0000\");\n script_cve_id(\"CVE-2019-8064\", \"CVE-2019-8160\", \"CVE-2019-8161\", \"CVE-2019-8162\",\n \"CVE-2019-8163\", \"CVE-2019-8164\", \"CVE-2019-8165\", \"CVE-2019-8166\",\n \"CVE-2019-8167\", \"CVE-2019-8168\", \"CVE-2019-8169\", \"CVE-2019-8170\",\n \"CVE-2019-8171\", \"CVE-2019-8172\", \"CVE-2019-8173\", \"CVE-2019-8174\",\n \"CVE-2019-8175\", \"CVE-2019-8176\", \"CVE-2019-8177\", \"CVE-2019-8178\",\n \"CVE-2019-8179\", \"CVE-2019-8180\", \"CVE-2019-8181\", \"CVE-2019-8182\",\n \"CVE-2019-8183\", \"CVE-2019-8184\", \"CVE-2019-8185\", \"CVE-2019-8186\",\n \"CVE-2019-8187\", \"CVE-2019-8188\", \"CVE-2019-8189\", \"CVE-2019-8190\",\n \"CVE-2019-8191\", \"CVE-2019-8192\", \"CVE-2019-8193\", \"CVE-2019-8194\",\n \"CVE-2019-8195\", \"CVE-2019-8196\", \"CVE-2019-8197\", \"CVE-2019-8198\",\n \"CVE-2019-8199\", \"CVE-2019-8200\", \"CVE-2019-8201\", \"CVE-2019-8202\",\n \"CVE-2019-8203\", \"CVE-2019-8204\", \"CVE-2019-8205\", \"CVE-2019-8206\",\n \"CVE-2019-8207\", \"CVE-2019-8208\", \"CVE-2019-8209\", \"CVE-2019-8210\",\n \"CVE-2019-8211\", \"CVE-2019-8212\", \"CVE-2019-8213\", \"CVE-2019-8214\",\n \"CVE-2019-8215\", \"CVE-2019-8216\", \"CVE-2019-8217\", \"CVE-2019-8218\",\n \"CVE-2019-8219\", \"CVE-2019-8220\", \"CVE-2019-8221\", \"CVE-2019-8222\",\n \"CVE-2019-8223\", \"CVE-2019-8224\", \"CVE-2019-8225\", \"CVE-2019-8226\");\n script_tag(name:\"cvss_base\", value:\"10.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_tag(name:\"last_modification\", value:\"2019-10-17 05:12:29 +0000 (Thu, 17 Oct 2019)\");\n script_tag(name:\"creation_date\", value:\"2019-10-16 12:00:50 +0530 (Wed, 16 Oct 2019)\");\n script_name(\"Adobe Acrobat DC (Classic Track) Security Updates (apsb19-49) - Mac OS X\");\n\n script_tag(name:\"summary\", value:\"This host is installed with Adobe Acrobat DC\n Classic 2015 and is prone to multiple vulnerabilities.\");\n\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable version is present\n on the target host.\");\n\n script_tag(name:\"insight\", value:\"Multiple flaws exists due to,\n\n - Multiple out-of-bounds read errors.\n\n - Multiple out-of-bounds write errors.\n\n - Multiple type confusion errors.\n\n - Multiple use after free errors.\n\n - Multiple heap overflow errors.\n\n - A buffer overrun error.\n\n - A cross site scripting error.\n\n - A race condition error.\n\n - An incomplete implementation of security mechanism.\n\n - An untrusted pointer dereference error.\");\n\n script_tag(name:\"impact\", value:\"Successful exploitation will allow an attacker\n to gain access to sensitive information and run arbitrary code in context of\n current user.\");\n\n script_tag(name:\"affected\", value:\"Adobe Acrobat DC Classic 2015 version 2015.x\n before 2015.006.30504 on Mac OS X.\");\n\n script_tag(name:\"solution\", value:\"Upgrade to Adobe Acrobat DC Classic 2015 version\n 2015.006.30504 or later. Please see the references for more information.\");\n\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_tag(name:\"qod_type\", value:\"executable_version\");\n script_xref(name:\"URL\", value:\"https://helpx.adobe.com/security/products/acrobat/apsb19-49.html\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2019 Greenbone Networks GmbH\");\n script_family(\"General\");\n script_dependencies(\"gb_adobe_acrobat_dc_classic_detect_macosx.nasl\");\n script_mandatory_keys(\"Adobe/AcrobatDC/Classic/MacOSX/Version\");\n exit(0);\n}\n\ninclude(\"host_details.inc\");\ninclude(\"version_func.inc\");\n\nif( ! infos = get_app_version_and_location( cpe:CPE, exit_no_version:TRUE) ) exit( 0 );\nvers = infos['version'];\npath = infos['location'];\n\n## 2015.006.30503 == 15.006.30503\nif(version_in_range(version:vers, test_version:\"15.0\", test_version2:\"15.006.30503\")) {\n report = report_fixed_ver(installed_version:vers, fixed_version:\"15.006.30504 (2015.006.30504)\", install_path:path);\n security_message(data:report);\n exit(0);\n}\n\nexit(99);\n", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2019-10-23T12:51:07", "bulletinFamily": "scanner", "cvelist": ["CVE-2019-8183", "CVE-2019-8180", "CVE-2019-8181", "CVE-2019-8219", "CVE-2019-8185", "CVE-2019-8215", "CVE-2019-8176", "CVE-2019-8216", "CVE-2019-8190", "CVE-2019-8162", "CVE-2019-8161", "CVE-2019-8184", "CVE-2019-8195", "CVE-2019-8191", "CVE-2019-8200", "CVE-2019-8193", "CVE-2019-8160", "CVE-2019-8177", "CVE-2019-8169", "CVE-2019-8199", "CVE-2019-8167", "CVE-2019-8210", "CVE-2019-8217", "CVE-2019-8222", "CVE-2019-8196", "CVE-2019-8225", "CVE-2019-8203", "CVE-2019-8188", "CVE-2019-8194", "CVE-2019-8187", "CVE-2019-8192", "CVE-2019-8211", "CVE-2019-8221", "CVE-2019-8179", "CVE-2019-8163", "CVE-2019-8172", "CVE-2019-8197", "CVE-2019-8168", "CVE-2019-8189", "CVE-2019-8164", "CVE-2019-8208", "CVE-2019-8204", "CVE-2019-8226", "CVE-2019-8182", "CVE-2019-8170", "CVE-2019-8205", "CVE-2019-8174", "CVE-2019-8213", "CVE-2019-8201", "CVE-2019-8224", "CVE-2019-8178", "CVE-2019-8198", "CVE-2019-8212", "CVE-2019-8209", "CVE-2019-8214", "CVE-2019-8166", "CVE-2019-8223", "CVE-2019-8175", "CVE-2019-8207", "CVE-2019-8218", "CVE-2019-8220", "CVE-2019-8173", "CVE-2019-8186", "CVE-2019-8064", "CVE-2019-8202", "CVE-2019-8165", "CVE-2019-8171", "CVE-2019-8206"], "description": "This host is installed with Adobe Acrobat Reader\n 2017 and is prone to multiple vulnerabilities.", "modified": "2019-10-17T00:00:00", "published": "2019-10-16T00:00:00", "id": "OPENVAS:1361412562310815808", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310815808", "type": "openvas", "title": "Adobe Acrobat Reader 2017 Security Updates (apsb19-49)-Windows", "sourceData": "# Copyright (C) 2019 Greenbone Networks GmbH\n# Text descriptions are largely excerpted from the referenced\n# advisory, and are Copyright (C) the respective author(s)\n#\n# SPDX-License-Identifier: GPL-2.0-or-later\n#\n# This program is free software; you can redistribute it and/or\n# modify it under the terms of the GNU General Public License\n# as published by the Free Software Foundation; either version 2\n# of the License, or (at your option) any later version.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n\nCPE = \"cpe:/a:adobe:acrobat_reader\";\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.815808\");\n script_version(\"2019-10-17T05:12:29+0000\");\n script_cve_id(\"CVE-2019-8064\", \"CVE-2019-8160\", \"CVE-2019-8161\", \"CVE-2019-8162\",\n \"CVE-2019-8163\", \"CVE-2019-8164\", \"CVE-2019-8165\", \"CVE-2019-8166\",\n \"CVE-2019-8167\", \"CVE-2019-8168\", \"CVE-2019-8169\", \"CVE-2019-8170\",\n \"CVE-2019-8171\", \"CVE-2019-8172\", \"CVE-2019-8173\", \"CVE-2019-8174\",\n \"CVE-2019-8175\", \"CVE-2019-8176\", \"CVE-2019-8177\", \"CVE-2019-8178\",\n \"CVE-2019-8179\", \"CVE-2019-8180\", \"CVE-2019-8181\", \"CVE-2019-8182\",\n \"CVE-2019-8183\", \"CVE-2019-8184\", \"CVE-2019-8185\", \"CVE-2019-8186\",\n \"CVE-2019-8187\", \"CVE-2019-8188\", \"CVE-2019-8189\", \"CVE-2019-8190\",\n \"CVE-2019-8191\", \"CVE-2019-8192\", \"CVE-2019-8193\", \"CVE-2019-8194\",\n \"CVE-2019-8195\", \"CVE-2019-8196\", \"CVE-2019-8197\", \"CVE-2019-8198\",\n \"CVE-2019-8199\", \"CVE-2019-8200\", \"CVE-2019-8201\", \"CVE-2019-8202\",\n \"CVE-2019-8203\", \"CVE-2019-8204\", \"CVE-2019-8205\", \"CVE-2019-8206\",\n \"CVE-2019-8207\", \"CVE-2019-8208\", \"CVE-2019-8209\", \"CVE-2019-8210\",\n \"CVE-2019-8211\", \"CVE-2019-8212\", \"CVE-2019-8213\", \"CVE-2019-8214\",\n \"CVE-2019-8215\", \"CVE-2019-8216\", \"CVE-2019-8217\", \"CVE-2019-8218\",\n \"CVE-2019-8219\", \"CVE-2019-8220\", \"CVE-2019-8221\", \"CVE-2019-8222\",\n \"CVE-2019-8223\", \"CVE-2019-8224\", \"CVE-2019-8225\", \"CVE-2019-8226\");\n script_tag(name:\"cvss_base\", value:\"10.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_tag(name:\"last_modification\", value:\"2019-10-17 05:12:29 +0000 (Thu, 17 Oct 2019)\");\n script_tag(name:\"creation_date\", value:\"2019-10-16 11:08:11 +0530 (Wed, 16 Oct 2019)\");\n script_name(\"Adobe Acrobat Reader 2017 Security Updates (apsb19-49)-Windows\");\n\n script_tag(name:\"summary\", value:\"This host is installed with Adobe Acrobat Reader\n 2017 and is prone to multiple vulnerabilities.\");\n\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable version is present\n on the target host.\");\n\n script_tag(name:\"insight\", value:\"Multiple flaws exists due to,\n\n - Multiple out-of-bounds read errors.\n\n - Multiple out-of-bounds write errors.\n\n - Multiple type confusion errors.\n\n - Multiple use after free errors.\n\n - Multiple heap overflow errors.\n\n - A buffer overrun error.\n\n - A cross site scripting error.\n\n - A race condition error.\n\n - An incomplete implementation of security mechanism.\n\n - An untrusted pointer dereference error.\");\n\n script_tag(name:\"impact\", value:\"Successful exploitation will allow an attacker\n to gain access to sensitive information and run arbitrary code in context of\n current user.\");\n\n script_tag(name:\"affected\", value:\"Adobe Acrobat Reader versions 2017.011.30148\n and earlier on Windows.\");\n\n script_tag(name:\"solution\", value:\"Upgrade to Adobe Acrobat Reader 2017 version\n 2017.011.30150 or later. Please see the references for more information.\");\n\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_tag(name:\"qod_type\", value:\"registry\");\n script_xref(name:\"URL\", value:\"https://helpx.adobe.com/security/products/acrobat/apsb19-49.html\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2019 Greenbone Networks GmbH\");\n script_family(\"General\");\n script_dependencies(\"secpod_adobe_prdts_detect_win.nasl\");\n script_mandatory_keys(\"Adobe/Reader/Win/Ver\");\n exit(0);\n}\n\ninclude(\"host_details.inc\");\ninclude(\"version_func.inc\");\n\nif(!infos = get_app_version_and_location(cpe:CPE, exit_no_version:TRUE))\n exit(0);\n\nvers = infos['version'];\npath = infos['location'];\n\n## 2017.011.30148 == 17.011.30148\nif(version_in_range(version:vers, test_version:\"17.0\", test_version2:\"17.011.30148\")) {\n report = report_fixed_ver(installed_version:vers, fixed_version:\"17.011.30150 (2017.011.30150)\", install_path:path);\n security_message(data:report);\n exit(0);\n}\n\nexit(99);\n", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2019-10-23T12:51:32", "bulletinFamily": "scanner", "cvelist": ["CVE-2019-8183", "CVE-2019-8180", "CVE-2019-8181", "CVE-2019-8219", "CVE-2019-8185", "CVE-2019-8215", "CVE-2019-8176", "CVE-2019-8216", "CVE-2019-8190", "CVE-2019-8162", "CVE-2019-8161", "CVE-2019-8184", "CVE-2019-8195", "CVE-2019-8191", "CVE-2019-8200", "CVE-2019-8193", "CVE-2019-8160", "CVE-2019-8177", "CVE-2019-8169", "CVE-2019-8199", "CVE-2019-8167", "CVE-2019-8210", "CVE-2019-8217", "CVE-2019-8222", "CVE-2019-8196", "CVE-2019-8225", "CVE-2019-8203", "CVE-2019-8188", "CVE-2019-8194", "CVE-2019-8187", "CVE-2019-8192", "CVE-2019-8211", "CVE-2019-8221", "CVE-2019-8179", "CVE-2019-8163", "CVE-2019-8172", "CVE-2019-8197", "CVE-2019-8168", "CVE-2019-8189", "CVE-2019-8164", "CVE-2019-8208", "CVE-2019-8204", "CVE-2019-8226", "CVE-2019-8182", "CVE-2019-8170", "CVE-2019-8205", "CVE-2019-8174", "CVE-2019-8213", "CVE-2019-8201", "CVE-2019-8224", "CVE-2019-8178", "CVE-2019-8198", "CVE-2019-8212", "CVE-2019-8209", "CVE-2019-8214", "CVE-2019-8166", "CVE-2019-8223", "CVE-2019-8175", "CVE-2019-8207", "CVE-2019-8218", "CVE-2019-8220", "CVE-2019-8173", "CVE-2019-8186", "CVE-2019-8064", "CVE-2019-8202", "CVE-2019-8165", "CVE-2019-8171", "CVE-2019-8206"], "description": "This host is installed with Adobe Acrobat DC\n Classic 2015 and is prone to multiple vulnerabilities.", "modified": "2019-10-17T00:00:00", "published": "2019-10-16T00:00:00", "id": "OPENVAS:1361412562310815804", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310815804", "type": "openvas", "title": "Adobe Acrobat DC (Classic Track) Security Updates (apsb19-49) - Windows", "sourceData": "# Copyright (C) 2019 Greenbone Networks GmbH\n# Text descriptions are largely excerpted from the referenced\n# advisory, and are Copyright (C) the respective author(s)\n#\n# SPDX-License-Identifier: GPL-2.0-or-later\n#\n# This program is free software; you can redistribute it and/or\n# modify it under the terms of the GNU General Public License\n# as published by the Free Software Foundation; either version 2\n# of the License, or (at your option) any later version.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n\nCPE = \"cpe:/a:adobe:acrobat_dc_classic\";\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.815804\");\n script_version(\"2019-10-17T05:12:29+0000\");\n script_cve_id(\"CVE-2019-8064\", \"CVE-2019-8160\", \"CVE-2019-8161\", \"CVE-2019-8162\",\n \"CVE-2019-8163\", \"CVE-2019-8164\", \"CVE-2019-8165\", \"CVE-2019-8166\",\n \"CVE-2019-8167\", \"CVE-2019-8168\", \"CVE-2019-8169\", \"CVE-2019-8170\",\n \"CVE-2019-8171\", \"CVE-2019-8172\", \"CVE-2019-8173\", \"CVE-2019-8174\",\n \"CVE-2019-8175\", \"CVE-2019-8176\", \"CVE-2019-8177\", \"CVE-2019-8178\",\n \"CVE-2019-8179\", \"CVE-2019-8180\", \"CVE-2019-8181\", \"CVE-2019-8182\",\n \"CVE-2019-8183\", \"CVE-2019-8184\", \"CVE-2019-8185\", \"CVE-2019-8186\",\n \"CVE-2019-8187\", \"CVE-2019-8188\", \"CVE-2019-8189\", \"CVE-2019-8190\",\n \"CVE-2019-8191\", \"CVE-2019-8192\", \"CVE-2019-8193\", \"CVE-2019-8194\",\n \"CVE-2019-8195\", \"CVE-2019-8196\", \"CVE-2019-8197\", \"CVE-2019-8198\",\n \"CVE-2019-8199\", \"CVE-2019-8200\", \"CVE-2019-8201\", \"CVE-2019-8202\",\n \"CVE-2019-8203\", \"CVE-2019-8204\", \"CVE-2019-8205\", \"CVE-2019-8206\",\n \"CVE-2019-8207\", \"CVE-2019-8208\", \"CVE-2019-8209\", \"CVE-2019-8210\",\n \"CVE-2019-8211\", \"CVE-2019-8212\", \"CVE-2019-8213\", \"CVE-2019-8214\",\n \"CVE-2019-8215\", \"CVE-2019-8216\", \"CVE-2019-8217\", \"CVE-2019-8218\",\n \"CVE-2019-8219\", \"CVE-2019-8220\", \"CVE-2019-8221\", \"CVE-2019-8222\",\n \"CVE-2019-8223\", \"CVE-2019-8224\", \"CVE-2019-8225\", \"CVE-2019-8226\");\n script_tag(name:\"cvss_base\", value:\"10.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_tag(name:\"last_modification\", value:\"2019-10-17 05:12:29 +0000 (Thu, 17 Oct 2019)\");\n script_tag(name:\"creation_date\", value:\"2019-10-16 11:08:11 +0530 (Wed, 16 Oct 2019)\");\n script_name(\"Adobe Acrobat DC (Classic Track) Security Updates (apsb19-49) - Windows\");\n\n script_tag(name:\"summary\", value:\"This host is installed with Adobe Acrobat DC\n Classic 2015 and is prone to multiple vulnerabilities.\");\n\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable version is present\n on the target host.\");\n\n script_tag(name:\"insight\", value:\"Multiple flaws exists due to,\n\n - Multiple out-of-bounds read errors.\n\n - Multiple out-of-bounds write errors.\n\n - Multiple type confusion errors.\n\n - Multiple use after free errors.\n\n - Multiple heap overflow errors.\n\n - A buffer overrun error.\n\n - A cross site scripting error.\n\n - A race condition error.\n\n - An incomplete implementation of security mechanism.\n\n - An untrusted pointer dereference error.\");\n\n script_tag(name:\"impact\", value:\"Successful exploitation will allow an attacker\n to gain access to sensitive information and run arbitrary code in context of\n current user.\");\n\n script_tag(name:\"affected\", value:\"Adobe Acrobat DC Classic 2015 version 2015.x\n before 2015.006.30504 on Windows.\");\n\n script_tag(name:\"solution\", value:\"Upgrade to Adobe Acrobat DC Classic 2015 version\n 2015.006.30504 or later. Please see the references for more information.\");\n\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_tag(name:\"qod_type\", value:\"registry\");\n script_xref(name:\"URL\", value:\"https://helpx.adobe.com/security/products/acrobat/apsb19-49.html\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2019 Greenbone Networks GmbH\");\n script_family(\"General\");\n script_dependencies(\"gb_adobe_acrobat_dc_classic_detect_win.nasl\");\n script_mandatory_keys(\"Adobe/AcrobatDC/Classic/Win/Ver\");\n exit(0);\n}\n\ninclude(\"host_details.inc\");\ninclude(\"version_func.inc\");\n\nif( ! infos = get_app_version_and_location( cpe:CPE, exit_no_version:TRUE) ) exit( 0 );\nvers = infos['version'];\npath = infos['location'];\n\n## 2015.006.30503 == 15.006.30503\nif(version_in_range(version:vers, test_version:\"15.0\", test_version2:\"15.006.30503\")) {\n report = report_fixed_ver(installed_version:vers, fixed_version:\"15.006.30504 (2015.006.30504)\", install_path:path);\n security_message(data:report);\n exit(0);\n}\n\nexit(99);\n", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2019-10-23T12:50:49", "bulletinFamily": "scanner", "cvelist": ["CVE-2019-8183", "CVE-2019-8180", "CVE-2019-8181", "CVE-2019-8219", "CVE-2019-8185", "CVE-2019-8215", "CVE-2019-8176", "CVE-2019-8216", "CVE-2019-8190", "CVE-2019-8162", "CVE-2019-8161", "CVE-2019-8184", "CVE-2019-8195", "CVE-2019-8191", "CVE-2019-8200", "CVE-2019-8193", "CVE-2019-8160", "CVE-2019-8177", "CVE-2019-8169", "CVE-2019-8199", "CVE-2019-8167", "CVE-2019-8210", "CVE-2019-8217", "CVE-2019-8222", "CVE-2019-8196", "CVE-2019-8225", "CVE-2019-8203", "CVE-2019-8188", "CVE-2019-8194", "CVE-2019-8187", "CVE-2019-8192", "CVE-2019-8211", "CVE-2019-8221", "CVE-2019-8179", "CVE-2019-8163", "CVE-2019-8172", "CVE-2019-8197", "CVE-2019-8168", "CVE-2019-8189", "CVE-2019-8164", "CVE-2019-8208", "CVE-2019-8204", "CVE-2019-8226", "CVE-2019-8182", "CVE-2019-8170", "CVE-2019-8205", "CVE-2019-8174", "CVE-2019-8213", "CVE-2019-8201", "CVE-2019-8224", "CVE-2019-8178", "CVE-2019-8198", "CVE-2019-8212", "CVE-2019-8209", "CVE-2019-8214", "CVE-2019-8166", "CVE-2019-8223", "CVE-2019-8175", "CVE-2019-8207", "CVE-2019-8218", "CVE-2019-8220", "CVE-2019-8173", "CVE-2019-8186", "CVE-2019-8064", "CVE-2019-8202", "CVE-2019-8165", "CVE-2019-8171", "CVE-2019-8206"], "description": "This host is installed with Adobe Acrobat\n Reader DC Classic 2015 and is prone to multiple vulnerabilities.", "modified": "2019-10-17T00:00:00", "published": "2019-10-16T00:00:00", "id": "OPENVAS:1361412562310815810", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310815810", "type": "openvas", "title": "Adobe Acrobat Reader DC (Classic Track) Security Updates (apsb19-49) - Windows", "sourceData": "# Copyright (C) 2019 Greenbone Networks GmbH\n# Text descriptions are largely excerpted from the referenced\n# advisory, and are Copyright (C) the respective author(s)\n#\n# SPDX-License-Identifier: GPL-2.0-or-later\n#\n# This program is free software; you can redistribute it and/or\n# modify it under the terms of the GNU General Public License\n# as published by the Free Software Foundation; either version 2\n# of the License, or (at your option) any later version.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n\nCPE = \"cpe:/a:adobe:acrobat_reader_dc_classic\";\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.815810\");\n script_version(\"2019-10-17T05:12:29+0000\");\n script_cve_id(\"CVE-2019-8064\", \"CVE-2019-8160\", \"CVE-2019-8161\", \"CVE-2019-8162\",\n \"CVE-2019-8163\", \"CVE-2019-8164\", \"CVE-2019-8165\", \"CVE-2019-8166\",\n \"CVE-2019-8167\", \"CVE-2019-8168\", \"CVE-2019-8169\", \"CVE-2019-8170\",\n \"CVE-2019-8171\", \"CVE-2019-8172\", \"CVE-2019-8173\", \"CVE-2019-8174\",\n \"CVE-2019-8175\", \"CVE-2019-8176\", \"CVE-2019-8177\", \"CVE-2019-8178\",\n \"CVE-2019-8179\", \"CVE-2019-8180\", \"CVE-2019-8181\", \"CVE-2019-8182\",\n \"CVE-2019-8183\", \"CVE-2019-8184\", \"CVE-2019-8185\", \"CVE-2019-8186\",\n \"CVE-2019-8187\", \"CVE-2019-8188\", \"CVE-2019-8189\", \"CVE-2019-8190\",\n \"CVE-2019-8191\", \"CVE-2019-8192\", \"CVE-2019-8193\", \"CVE-2019-8194\",\n \"CVE-2019-8195\", \"CVE-2019-8196\", \"CVE-2019-8197\", \"CVE-2019-8198\",\n \"CVE-2019-8199\", \"CVE-2019-8200\", \"CVE-2019-8201\", \"CVE-2019-8202\",\n \"CVE-2019-8203\", \"CVE-2019-8204\", \"CVE-2019-8205\", \"CVE-2019-8206\",\n \"CVE-2019-8207\", \"CVE-2019-8208\", \"CVE-2019-8209\", \"CVE-2019-8210\",\n \"CVE-2019-8211\", \"CVE-2019-8212\", \"CVE-2019-8213\", \"CVE-2019-8214\",\n \"CVE-2019-8215\", \"CVE-2019-8216\", \"CVE-2019-8217\", \"CVE-2019-8218\",\n \"CVE-2019-8219\", \"CVE-2019-8220\", \"CVE-2019-8221\", \"CVE-2019-8222\",\n \"CVE-2019-8223\", \"CVE-2019-8224\", \"CVE-2019-8225\", \"CVE-2019-8226\");\n script_tag(name:\"cvss_base\", value:\"10.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_tag(name:\"last_modification\", value:\"2019-10-17 05:12:29 +0000 (Thu, 17 Oct 2019)\");\n script_tag(name:\"creation_date\", value:\"2019-10-16 11:08:11 +0530 (Wed, 16 Oct 2019)\");\n script_name(\"Adobe Acrobat Reader DC (Classic Track) Security Updates (apsb19-49) - Windows\");\n\n script_tag(name:\"summary\", value:\"This host is installed with Adobe Acrobat\n Reader DC Classic 2015 and is prone to multiple vulnerabilities.\");\n\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable version is present\n on the target host.\");\n\n script_tag(name:\"insight\", value:\"Multiple flaws exists due to,\n\n - Multiple out-of-bounds read errors.\n\n - Multiple out-of-bounds write errors.\n\n - Multiple type confusion errors.\n\n - Multiple use after free errors.\n\n - Multiple heap overflow errors.\n\n - A buffer overrun error.\n\n - A cross site scripting error.\n\n - A race condition error.\n\n - An incomplete implementation of security mechanism.\n\n - An untrusted pointer dereference error.\");\n\n script_tag(name:\"impact\", value:\"Successful exploitation will allow an attacker\n to gain access to sensitive information and run arbitrary code in context of\n current user.\");\n\n script_tag(name:\"affected\", value:\"Adobe Acrobat Reader DC Classic 2015 version\n 2015.x before 2015.006.30504 on Windows.\");\n\n script_tag(name:\"solution\", value:\"Upgrade to Adobe Acrobat DC Classic 2015 version\n 2015.006.30504 or later. Please see the references for more information.\");\n\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_tag(name:\"qod_type\", value:\"registry\");\n script_xref(name:\"URL\", value:\"https://helpx.adobe.com/security/products/acrobat/apsb19-49.html\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2019 Greenbone Networks GmbH\");\n script_family(\"General\");\n script_dependencies(\"gb_adobe_acrobat_reader_dc_classic_detect_win.nasl\");\n script_mandatory_keys(\"Adobe/Acrobat/ReaderDC/Classic/Win/Ver\");\n exit(0);\n}\n\ninclude(\"host_details.inc\");\ninclude(\"version_func.inc\");\n\nif( ! infos = get_app_version_and_location( cpe:CPE, exit_no_version:TRUE) ) exit( 0 );\nvers = infos['version'];\npath = infos['location'];\n\n## 2015.006.30503 == 15.006.30503\nif(version_in_range(version:vers, test_version:\"15.0\", test_version2:\"15.006.30503\")) {\n report = report_fixed_ver(installed_version:vers, fixed_version:\"15.006.30504 (2015.006.30504)\", install_path:path);\n security_message(data:report);\n exit(0);\n}\n\nexit(99);\n", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2019-10-23T12:51:48", "bulletinFamily": "scanner", "cvelist": ["CVE-2019-8183", "CVE-2019-8180", "CVE-2019-8181", "CVE-2019-8219", "CVE-2019-8185", "CVE-2019-8215", "CVE-2019-8176", "CVE-2019-8216", "CVE-2019-8190", "CVE-2019-8162", "CVE-2019-8161", "CVE-2019-8184", "CVE-2019-8195", "CVE-2019-8191", "CVE-2019-8200", "CVE-2019-8193", "CVE-2019-8160", "CVE-2019-8177", "CVE-2019-8169", "CVE-2019-8199", "CVE-2019-8167", "CVE-2019-8210", "CVE-2019-8217", "CVE-2019-8222", "CVE-2019-8196", "CVE-2019-8225", "CVE-2019-8203", "CVE-2019-8188", "CVE-2019-8194", "CVE-2019-8187", "CVE-2019-8192", "CVE-2019-8211", "CVE-2019-8221", "CVE-2019-8179", "CVE-2019-8163", "CVE-2019-8172", "CVE-2019-8197", "CVE-2019-8168", "CVE-2019-8189", "CVE-2019-8164", "CVE-2019-8208", "CVE-2019-8204", "CVE-2019-8226", "CVE-2019-8182", "CVE-2019-8170", "CVE-2019-8205", "CVE-2019-8174", "CVE-2019-8213", "CVE-2019-8201", "CVE-2019-8224", "CVE-2019-8178", "CVE-2019-8198", "CVE-2019-8212", "CVE-2019-8209", "CVE-2019-8214", "CVE-2019-8166", "CVE-2019-8223", "CVE-2019-8175", "CVE-2019-8207", "CVE-2019-8218", "CVE-2019-8220", "CVE-2019-8173", "CVE-2019-8186", "CVE-2019-8064", "CVE-2019-8202", "CVE-2019-8165", "CVE-2019-8171", "CVE-2019-8206"], "description": "This host is installed with Adobe Acrobat DC\n (Continuous Track) and is prone to multiple vulnerabilities.", "modified": "2019-10-17T00:00:00", "published": "2019-10-16T00:00:00", "id": "OPENVAS:1361412562310815806", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310815806", "type": "openvas", "title": "Adobe Acrobat DC (Continuous Track) Security Updates (apsb19-49) - Windows", "sourceData": "# Copyright (C) 2019 Greenbone Networks GmbH\n# Text descriptions are largely excerpted from the referenced\n# advisory, and are Copyright (C) the respective author(s)\n#\n# SPDX-License-Identifier: GPL-2.0-or-later\n#\n# This program is free software; you can redistribute it and/or\n# modify it under the terms of the GNU General Public License\n# as published by the Free Software Foundation; either version 2\n# of the License, or (at your option) any later version.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n\nCPE = \"cpe:/a:adobe:acrobat_dc_continuous\";\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.815806\");\n script_version(\"2019-10-17T05:12:29+0000\");\n script_cve_id(\"CVE-2019-8064\", \"CVE-2019-8160\", \"CVE-2019-8161\", \"CVE-2019-8162\",\n \"CVE-2019-8163\", \"CVE-2019-8164\", \"CVE-2019-8165\", \"CVE-2019-8166\",\n \"CVE-2019-8167\", \"CVE-2019-8168\", \"CVE-2019-8169\", \"CVE-2019-8170\",\n \"CVE-2019-8171\", \"CVE-2019-8172\", \"CVE-2019-8173\", \"CVE-2019-8174\",\n \"CVE-2019-8175\", \"CVE-2019-8176\", \"CVE-2019-8177\", \"CVE-2019-8178\",\n \"CVE-2019-8179\", \"CVE-2019-8180\", \"CVE-2019-8181\", \"CVE-2019-8182\",\n \"CVE-2019-8183\", \"CVE-2019-8184\", \"CVE-2019-8185\", \"CVE-2019-8186\",\n \"CVE-2019-8187\", \"CVE-2019-8188\", \"CVE-2019-8189\", \"CVE-2019-8190\",\n \"CVE-2019-8191\", \"CVE-2019-8192\", \"CVE-2019-8193\", \"CVE-2019-8194\",\n \"CVE-2019-8195\", \"CVE-2019-8196\", \"CVE-2019-8197\", \"CVE-2019-8198\",\n \"CVE-2019-8199\", \"CVE-2019-8200\", \"CVE-2019-8201\", \"CVE-2019-8202\",\n \"CVE-2019-8203\", \"CVE-2019-8204\", \"CVE-2019-8205\", \"CVE-2019-8206\",\n \"CVE-2019-8207\", \"CVE-2019-8208\", \"CVE-2019-8209\", \"CVE-2019-8210\",\n \"CVE-2019-8211\", \"CVE-2019-8212\", \"CVE-2019-8213\", \"CVE-2019-8214\",\n \"CVE-2019-8215\", \"CVE-2019-8216\", \"CVE-2019-8217\", \"CVE-2019-8218\",\n \"CVE-2019-8219\", \"CVE-2019-8220\", \"CVE-2019-8221\", \"CVE-2019-8222\",\n \"CVE-2019-8223\", \"CVE-2019-8224\", \"CVE-2019-8225\", \"CVE-2019-8226\");\n script_tag(name:\"cvss_base\", value:\"10.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_tag(name:\"last_modification\", value:\"2019-10-17 05:12:29 +0000 (Thu, 17 Oct 2019)\");\n script_tag(name:\"creation_date\", value:\"2019-10-16 11:08:11 +0530 (Wed, 16 Oct 2019)\");\n script_name(\"Adobe Acrobat DC (Continuous Track) Security Updates (apsb19-49) - Windows\");\n\n script_tag(name:\"summary\", value:\"This host is installed with Adobe Acrobat DC\n (Continuous Track) and is prone to multiple vulnerabilities.\");\n\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable version is present\n on the target host.\");\n\n script_tag(name:\"insight\", value:\"Multiple flaws exists due to,\n\n - Multiple out-of-bounds read errors.\n\n - Multiple out-of-bounds write errors.\n\n - Multiple type confusion errors.\n\n - Multiple use after free errors.\n\n - Multiple heap overflow errors.\n\n - A buffer overrun error.\n\n - A cross site scripting error.\n\n - A race condition error.\n\n - An incomplete implementation of security mechanism.\n\n - An untrusted pointer dereference error.\");\n\n script_tag(name:\"impact\", value:\"Successful exploitation will allow an attacker\n to gain access to sensitive information and run arbitrary code in context of\n current user.\");\n\n script_tag(name:\"affected\", value:\"Adobe Acrobat DC (Continuous Track)\n 2019.012.20040 and earlier versions on Windows.\");\n\n script_tag(name:\"solution\", value:\"Upgrade to Adobe Acrobat DC Continuous\n version 2019.021.20047 or later. Please see the references for more information.\");\n\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_tag(name:\"qod_type\", value:\"registry\");\n script_xref(name:\"URL\", value:\"https://helpx.adobe.com/security/products/acrobat/apsb19-49.html\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2019 Greenbone Networks GmbH\");\n script_family(\"General\");\n script_dependencies(\"gb_adobe_acrobat_dc_cont_detect_win.nasl\");\n script_mandatory_keys(\"Adobe/AcrobatDC/Continuous/Win/Ver\");\n exit(0);\n}\n\ninclude(\"host_details.inc\");\ninclude(\"version_func.inc\");\n\nif( ! infos = get_app_version_and_location( cpe:CPE, exit_no_version:TRUE) ) exit( 0 );\nvers = infos['version'];\npath = infos['location'];\n\n## 2019.012.20040 == 19.012.20040\nif(version_is_less_equal(version:vers, test_version:\"19.012.20040\")) {\n report = report_fixed_ver(installed_version:vers, fixed_version:\"19.021.20047 (2019.021.20047)\", install_path:path);\n security_message(data:report);\n exit(0);\n}\n\nexit(99);\n", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2019-10-23T12:51:39", "bulletinFamily": "scanner", "cvelist": ["CVE-2019-8183", "CVE-2019-8180", "CVE-2019-8181", "CVE-2019-8219", "CVE-2019-8185", "CVE-2019-8215", "CVE-2019-8176", "CVE-2019-8216", "CVE-2019-8190", "CVE-2019-8162", "CVE-2019-8161", "CVE-2019-8184", "CVE-2019-8195", "CVE-2019-8191", "CVE-2019-8200", "CVE-2019-8193", "CVE-2019-8160", "CVE-2019-8177", "CVE-2019-8169", "CVE-2019-8199", "CVE-2019-8167", "CVE-2019-8210", "CVE-2019-8217", "CVE-2019-8222", "CVE-2019-8196", "CVE-2019-8225", "CVE-2019-8203", "CVE-2019-8188", "CVE-2019-8194", "CVE-2019-8187", "CVE-2019-8192", "CVE-2019-8211", "CVE-2019-8221", "CVE-2019-8179", "CVE-2019-8163", "CVE-2019-8172", "CVE-2019-8197", "CVE-2019-8168", "CVE-2019-8189", "CVE-2019-8164", "CVE-2019-8208", "CVE-2019-8204", "CVE-2019-8226", "CVE-2019-8182", "CVE-2019-8170", "CVE-2019-8205", "CVE-2019-8174", "CVE-2019-8213", "CVE-2019-8201", "CVE-2019-8224", "CVE-2019-8178", "CVE-2019-8198", "CVE-2019-8212", "CVE-2019-8209", "CVE-2019-8214", "CVE-2019-8166", "CVE-2019-8223", "CVE-2019-8175", "CVE-2019-8207", "CVE-2019-8218", "CVE-2019-8220", "CVE-2019-8173", "CVE-2019-8186", "CVE-2019-8064", "CVE-2019-8202", "CVE-2019-8165", "CVE-2019-8171", "CVE-2019-8206"], "description": "This host is installed with Adobe Acrobat Reader\n DC (Continuous Track) and is prone to multiple vulnerabilities.", "modified": "2019-10-17T00:00:00", "published": "2019-10-16T00:00:00", "id": "OPENVAS:1361412562310815811", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310815811", "type": "openvas", "title": "Adobe Acrobat Reader DC (Continuous Track) Security Updates (apsb19-49) - Mac OS X", "sourceData": "# Copyright (C) 2019 Greenbone Networks GmbH\n# Text descriptions are largely excerpted from the referenced\n# advisory, and are Copyright (C) the respective author(s)\n#\n# SPDX-License-Identifier: GPL-2.0-or-later\n#\n# This program is free software; you can redistribute it and/or\n# modify it under the terms of the GNU General Public License\n# as published by the Free Software Foundation; either version 2\n# of the License, or (at your option) any later version.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n\nCPE = \"cpe:/a:adobe:acrobat_reader_dc_continuous\";\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.815811\");\n script_version(\"2019-10-17T05:12:29+0000\");\n script_cve_id(\"CVE-2019-8064\", \"CVE-2019-8160\", \"CVE-2019-8161\", \"CVE-2019-8162\",\n \"CVE-2019-8163\", \"CVE-2019-8164\", \"CVE-2019-8165\", \"CVE-2019-8166\",\n \"CVE-2019-8167\", \"CVE-2019-8168\", \"CVE-2019-8169\", \"CVE-2019-8170\",\n \"CVE-2019-8171\", \"CVE-2019-8172\", \"CVE-2019-8173\", \"CVE-2019-8174\",\n \"CVE-2019-8175\", \"CVE-2019-8176\", \"CVE-2019-8177\", \"CVE-2019-8178\",\n \"CVE-2019-8179\", \"CVE-2019-8180\", \"CVE-2019-8181\", \"CVE-2019-8182\",\n \"CVE-2019-8183\", \"CVE-2019-8184\", \"CVE-2019-8185\", \"CVE-2019-8186\",\n \"CVE-2019-8187\", \"CVE-2019-8188\", \"CVE-2019-8189\", \"CVE-2019-8190\",\n \"CVE-2019-8191\", \"CVE-2019-8192\", \"CVE-2019-8193\", \"CVE-2019-8194\",\n \"CVE-2019-8195\", \"CVE-2019-8196\", \"CVE-2019-8197\", \"CVE-2019-8198\",\n \"CVE-2019-8199\", \"CVE-2019-8200\", \"CVE-2019-8201\", \"CVE-2019-8202\",\n \"CVE-2019-8203\", \"CVE-2019-8204\", \"CVE-2019-8205\", \"CVE-2019-8206\",\n \"CVE-2019-8207\", \"CVE-2019-8208\", \"CVE-2019-8209\", \"CVE-2019-8210\",\n \"CVE-2019-8211\", \"CVE-2019-8212\", \"CVE-2019-8213\", \"CVE-2019-8214\",\n \"CVE-2019-8215\", \"CVE-2019-8216\", \"CVE-2019-8217\", \"CVE-2019-8218\",\n \"CVE-2019-8219\", \"CVE-2019-8220\", \"CVE-2019-8221\", \"CVE-2019-8222\",\n \"CVE-2019-8223\", \"CVE-2019-8224\", \"CVE-2019-8225\", \"CVE-2019-8226\");\n script_tag(name:\"cvss_base\", value:\"10.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_tag(name:\"last_modification\", value:\"2019-10-17 05:12:29 +0000 (Thu, 17 Oct 2019)\");\n script_tag(name:\"creation_date\", value:\"2019-10-16 12:03:47 +0530 (Wed, 16 Oct 2019)\");\n script_name(\"Adobe Acrobat Reader DC (Continuous Track) Security Updates (apsb19-49) - Mac OS X\");\n\n script_tag(name:\"summary\", value:\"This host is installed with Adobe Acrobat Reader\n DC (Continuous Track) and is prone to multiple vulnerabilities.\");\n\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable version is present\n on the target host.\");\n\n script_tag(name:\"insight\", value:\"Multiple flaws exists due to,\n\n - Multiple out-of-bounds read errors.\n\n - Multiple out-of-bounds write errors.\n\n - Multiple type confusion errors.\n\n - Multiple use after free errors.\n\n - Multiple heap overflow errors.\n\n - A buffer overrun error.\n\n - A cross site scripting error.\n\n - A race condition error.\n\n - An incomplete implementation of security mechanism.\n\n - An untrusted pointer dereference error.\");\n\n script_tag(name:\"impact\", value:\"Successful exploitation will allow an attacker\n to gain access to sensitive information and run arbitrary code in context of\n current user.\");\n\n script_tag(name:\"affected\", value:\"Adobe Acrobat Reader DC (Continuous Track)\n 2019.012.20040 and earlier versions on Mac OS X.\");\n\n script_tag(name:\"solution\", value:\"Upgrade to Adobe Acrobat Reader DC Continuous\n version 2019.021.20047 or later. Please see the references for more information.\");\n\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_tag(name:\"qod_type\", value:\"executable_version\");\n script_xref(name:\"URL\", value:\"https://helpx.adobe.com/security/products/acrobat/apsb19-49.html\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2019 Greenbone Networks GmbH\");\n script_family(\"General\");\n script_dependencies(\"gb_adobe_acrobat_reader_dc_cont_detect_macosx.nasl\");\n script_mandatory_keys(\"Adobe/Acrobat/ReaderDC/Continuous/MacOSX/Version\");\n exit(0);\n}\n\ninclude(\"host_details.inc\");\ninclude(\"version_func.inc\");\n\nif( ! infos = get_app_version_and_location( cpe:CPE, exit_no_version:TRUE) ) exit( 0 );\nvers = infos['version'];\npath = infos['location'];\n\n## 2019.012.20040 == 19.012.20040\nif(version_is_less_equal(version:vers, test_version:\"19.012.20040\")) {\n report = report_fixed_ver(installed_version:vers, fixed_version:\"19.021.20047 (2019.021.20047)\", install_path:path);\n security_message(data:report);\n exit(0);\n}\n\nexit(99);\n", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2019-10-23T12:50:49", "bulletinFamily": "scanner", "cvelist": ["CVE-2019-8183", "CVE-2019-8180", "CVE-2019-8181", "CVE-2019-8219", "CVE-2019-8185", "CVE-2019-8215", "CVE-2019-8176", "CVE-2019-8216", "CVE-2019-8190", "CVE-2019-8162", "CVE-2019-8161", "CVE-2019-8184", "CVE-2019-8195", "CVE-2019-8191", "CVE-2019-8200", "CVE-2019-8193", "CVE-2019-8160", "CVE-2019-8177", "CVE-2019-8169", "CVE-2019-8199", "CVE-2019-8167", "CVE-2019-8210", "CVE-2019-8217", "CVE-2019-8222", "CVE-2019-8196", "CVE-2019-8225", "CVE-2019-8203", "CVE-2019-8188", "CVE-2019-8194", "CVE-2019-8187", "CVE-2019-8192", "CVE-2019-8211", "CVE-2019-8221", "CVE-2019-8179", "CVE-2019-8163", "CVE-2019-8172", "CVE-2019-8197", "CVE-2019-8168", "CVE-2019-8189", "CVE-2019-8164", "CVE-2019-8208", "CVE-2019-8204", "CVE-2019-8226", "CVE-2019-8182", "CVE-2019-8170", "CVE-2019-8205", "CVE-2019-8174", "CVE-2019-8213", "CVE-2019-8201", "CVE-2019-8224", "CVE-2019-8178", "CVE-2019-8198", "CVE-2019-8212", "CVE-2019-8209", "CVE-2019-8214", "CVE-2019-8166", "CVE-2019-8223", "CVE-2019-8175", "CVE-2019-8207", "CVE-2019-8218", "CVE-2019-8220", "CVE-2019-8173", "CVE-2019-8186", "CVE-2019-8064", "CVE-2019-8202", "CVE-2019-8165", "CVE-2019-8171", "CVE-2019-8206"], "description": "This host is installed with Adobe Acrobat Reader\n 2017 and is prone to multiple vulnerabilities.", "modified": "2019-10-17T00:00:00", "published": "2019-10-16T00:00:00", "id": "OPENVAS:1361412562310815807", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310815807", "type": "openvas", "title": "Adobe Acrobat Reader 2017 Security Updates (apsb19-49)-Mac OS X", "sourceData": "# Copyright (C) 2019 Greenbone Networks GmbH\n# Text descriptions are largely excerpted from the referenced\n# advisory, and are Copyright (C) the respective author(s)\n#\n# SPDX-License-Identifier: GPL-2.0-or-later\n#\n# This program is free software; you can redistribute it and/or\n# modify it under the terms of the GNU General Public License\n# as published by the Free Software Foundation; either version 2\n# of the License, or (at your option) any later version.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n\nCPE = \"cpe:/a:adobe:acrobat_reader\";\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.815807\");\n script_version(\"2019-10-17T05:12:29+0000\");\n script_cve_id(\"CVE-2019-8064\", \"CVE-2019-8160\", \"CVE-2019-8161\", \"CVE-2019-8162\",\n \"CVE-2019-8163\", \"CVE-2019-8164\", \"CVE-2019-8165\", \"CVE-2019-8166\",\n \"CVE-2019-8167\", \"CVE-2019-8168\", \"CVE-2019-8169\", \"CVE-2019-8170\",\n \"CVE-2019-8171\", \"CVE-2019-8172\", \"CVE-2019-8173\", \"CVE-2019-8174\",\n \"CVE-2019-8175\", \"CVE-2019-8176\", \"CVE-2019-8177\", \"CVE-2019-8178\",\n \"CVE-2019-8179\", \"CVE-2019-8180\", \"CVE-2019-8181\", \"CVE-2019-8182\",\n \"CVE-2019-8183\", \"CVE-2019-8184\", \"CVE-2019-8185\", \"CVE-2019-8186\",\n \"CVE-2019-8187\", \"CVE-2019-8188\", \"CVE-2019-8189\", \"CVE-2019-8190\",\n \"CVE-2019-8191\", \"CVE-2019-8192\", \"CVE-2019-8193\", \"CVE-2019-8194\",\n \"CVE-2019-8195\", \"CVE-2019-8196\", \"CVE-2019-8197\", \"CVE-2019-8198\",\n \"CVE-2019-8199\", \"CVE-2019-8200\", \"CVE-2019-8201\", \"CVE-2019-8202\",\n \"CVE-2019-8203\", \"CVE-2019-8204\", \"CVE-2019-8205\", \"CVE-2019-8206\",\n \"CVE-2019-8207\", \"CVE-2019-8208\", \"CVE-2019-8209\", \"CVE-2019-8210\",\n \"CVE-2019-8211\", \"CVE-2019-8212\", \"CVE-2019-8213\", \"CVE-2019-8214\",\n \"CVE-2019-8215\", \"CVE-2019-8216\", \"CVE-2019-8217\", \"CVE-2019-8218\",\n \"CVE-2019-8219\", \"CVE-2019-8220\", \"CVE-2019-8221\", \"CVE-2019-8222\",\n \"CVE-2019-8223\", \"CVE-2019-8224\", \"CVE-2019-8225\", \"CVE-2019-8226\");\n script_tag(name:\"cvss_base\", value:\"10.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_tag(name:\"last_modification\", value:\"2019-10-17 05:12:29 +0000 (Thu, 17 Oct 2019)\");\n script_tag(name:\"creation_date\", value:\"2019-10-16 12:02:40 +0530 (Wed, 16 Oct 2019)\");\n script_name(\"Adobe Acrobat Reader 2017 Security Updates (apsb19-49)-Mac OS X\");\n\n script_tag(name:\"summary\", value:\"This host is installed with Adobe Acrobat Reader\n 2017 and is prone to multiple vulnerabilities.\");\n\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable version is present\n on the target host.\");\n\n script_tag(name:\"insight\", value:\"Multiple flaws exists due to,\n\n - Multiple out-of-bounds read errors.\n\n - Multiple out-of-bounds write errors.\n\n - Multiple type confusion errors.\n\n - Multiple use after free errors.\n\n - Multiple heap overflow errors.\n\n - A buffer overrun error.\n\n - A cross site scripting error.\n\n - A race condition error.\n\n - An incomplete implementation of security mechanism.\n\n - An untrusted pointer dereference error.\");\n\n script_tag(name:\"impact\", value:\"Successful exploitation will allow an attacker\n to gain access to sensitive information and run arbitrary code in context of\n current user.\");\n\n script_tag(name:\"affected\", value:\"Adobe Acrobat Reader versions 2017.011.30148\n and earlier on Mac OS X.\");\n\n script_tag(name:\"solution\", value:\"Upgrade to Adobe Acrobat Reader 2017 version\n 2017.011.30150 or later. Please see the references for more information.\");\n\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_tag(name:\"qod_type\", value:\"executable_version\");\n script_xref(name:\"URL\", value:\"https://helpx.adobe.com/security/products/acrobat/apsb19-49.html\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2019 Greenbone Networks GmbH\");\n script_family(\"General\");\n script_dependencies(\"secpod_adobe_prdts_detect_macosx.nasl\");\n script_mandatory_keys(\"Adobe/Reader/MacOSX/Version\");\n exit(0);\n}\n\ninclude(\"host_details.inc\");\ninclude(\"version_func.inc\");\n\nif(!infos = get_app_version_and_location(cpe:CPE, exit_no_version:TRUE))\n exit(0);\n\nvers = infos['version'];\npath = infos['location'];\n\n## 2017.011.30148 == 17.011.30148\nif(version_in_range(version:vers, test_version:\"17.0\", test_version2:\"17.011.30148\")) {\n report = report_fixed_ver(installed_version:vers, fixed_version:\"17.011.30150 (2017.011.30150)\", install_path:path);\n security_message(data:report);\n exit(0);\n}\n\nexit(99);\n", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2019-10-23T12:50:55", "bulletinFamily": "scanner", "cvelist": ["CVE-2019-8183", "CVE-2019-8180", "CVE-2019-8181", "CVE-2019-8219", "CVE-2019-8185", "CVE-2019-8215", "CVE-2019-8176", "CVE-2019-8216", "CVE-2019-8190", "CVE-2019-8162", "CVE-2019-8161", "CVE-2019-8184", "CVE-2019-8195", "CVE-2019-8191", "CVE-2019-8200", "CVE-2019-8193", "CVE-2019-8160", "CVE-2019-8177", "CVE-2019-8169", "CVE-2019-8199", "CVE-2019-8167", "CVE-2019-8210", "CVE-2019-8217", "CVE-2019-8222", "CVE-2019-8196", "CVE-2019-8225", "CVE-2019-8203", "CVE-2019-8188", "CVE-2019-8194", "CVE-2019-8187", "CVE-2019-8192", "CVE-2019-8211", "CVE-2019-8221", "CVE-2019-8179", "CVE-2019-8163", "CVE-2019-8172", "CVE-2019-8197", "CVE-2019-8168", "CVE-2019-8189", "CVE-2019-8164", "CVE-2019-8208", "CVE-2019-8204", "CVE-2019-8226", "CVE-2019-8182", "CVE-2019-8170", "CVE-2019-8205", "CVE-2019-8174", "CVE-2019-8213", "CVE-2019-8201", "CVE-2019-8224", "CVE-2019-8178", "CVE-2019-8198", "CVE-2019-8212", "CVE-2019-8209", "CVE-2019-8214", "CVE-2019-8166", "CVE-2019-8223", "CVE-2019-8175", "CVE-2019-8207", "CVE-2019-8218", "CVE-2019-8220", "CVE-2019-8173", "CVE-2019-8186", "CVE-2019-8064", "CVE-2019-8202", "CVE-2019-8165", "CVE-2019-8171", "CVE-2019-8206"], "description": "This host is installed with Adobe Acrobat\n 2017 and is prone to multiple vulnerabilities.", "modified": "2019-10-17T00:00:00", "published": "2019-10-16T00:00:00", "id": "OPENVAS:1361412562310815802", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310815802", "type": "openvas", "title": "Adobe Acrobat 2017 Security Updates (apsb19-49)-Windows", "sourceData": "# Copyright (C) 2019 Greenbone Networks GmbH\n# Text descriptions are largely excerpted from the referenced\n# advisory, and are Copyright (C) the respective author(s)\n#\n# SPDX-License-Identifier: GPL-2.0-or-later\n#\n# This program is free software; you can redistribute it and/or\n# modify it under the terms of the GNU General Public License\n# as published by the Free Software Foundation; either version 2\n# of the License, or (at your option) any later version.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n\nCPE = \"cpe:/a:adobe:acrobat\";\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.815802\");\n script_version(\"2019-10-17T05:12:29+0000\");\n script_cve_id(\"CVE-2019-8064\", \"CVE-2019-8160\", \"CVE-2019-8161\", \"CVE-2019-8162\",\n \"CVE-2019-8163\", \"CVE-2019-8164\", \"CVE-2019-8165\", \"CVE-2019-8166\",\n \"CVE-2019-8167\", \"CVE-2019-8168\", \"CVE-2019-8169\", \"CVE-2019-8170\",\n \"CVE-2019-8171\", \"CVE-2019-8172\", \"CVE-2019-8173\", \"CVE-2019-8174\",\n \"CVE-2019-8175\", \"CVE-2019-8176\", \"CVE-2019-8177\", \"CVE-2019-8178\",\n \"CVE-2019-8179\", \"CVE-2019-8180\", \"CVE-2019-8181\", \"CVE-2019-8182\",\n \"CVE-2019-8183\", \"CVE-2019-8184\", \"CVE-2019-8185\", \"CVE-2019-8186\",\n \"CVE-2019-8187\", \"CVE-2019-8188\", \"CVE-2019-8189\", \"CVE-2019-8190\",\n \"CVE-2019-8191\", \"CVE-2019-8192\", \"CVE-2019-8193\", \"CVE-2019-8194\",\n \"CVE-2019-8195\", \"CVE-2019-8196\", \"CVE-2019-8197\", \"CVE-2019-8198\",\n \"CVE-2019-8199\", \"CVE-2019-8200\", \"CVE-2019-8201\", \"CVE-2019-8202\",\n \"CVE-2019-8203\", \"CVE-2019-8204\", \"CVE-2019-8205\", \"CVE-2019-8206\",\n \"CVE-2019-8207\", \"CVE-2019-8208\", \"CVE-2019-8209\", \"CVE-2019-8210\",\n \"CVE-2019-8211\", \"CVE-2019-8212\", \"CVE-2019-8213\", \"CVE-2019-8214\",\n \"CVE-2019-8215\", \"CVE-2019-8216\", \"CVE-2019-8217\", \"CVE-2019-8218\",\n \"CVE-2019-8219\", \"CVE-2019-8220\", \"CVE-2019-8221\", \"CVE-2019-8222\",\n \"CVE-2019-8223\", \"CVE-2019-8224\", \"CVE-2019-8225\", \"CVE-2019-8226\");\n script_tag(name:\"cvss_base\", value:\"10.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_tag(name:\"last_modification\", value:\"2019-10-17 05:12:29 +0000 (Thu, 17 Oct 2019)\");\n script_tag(name:\"creation_date\", value:\"2019-10-16 11:08:11 +0530 (Wed, 16 Oct 2019)\");\n script_name(\"Adobe Acrobat 2017 Security Updates (apsb19-49)-Windows\");\n\n script_tag(name:\"summary\", value:\"This host is installed with Adobe Acrobat\n 2017 and is prone to multiple vulnerabilities.\");\n\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable version is present\n on the target host.\");\n\n script_tag(name:\"insight\", value:\"Multiple flaws exists due to,\n\n - Multiple out-of-bounds read errors.\n\n - Multiple out-of-bounds write errors.\n\n - Multiple type confusion errors.\n\n - Multiple use after free errors.\n\n - Multiple heap overflow errors.\n\n - A buffer overrun error.\n\n - A cross site scripting error.\n\n - A race condition error.\n\n - An incomplete implementation of security mechanism.\n\n - An untrusted pointer dereference error.\");\n\n script_tag(name:\"impact\", value:\"Successful exploitation will allow an attacker\n to gain access to sensitive information and run arbitrary code in context of\n current user.\");\n\n script_tag(name:\"affected\", value:\"Adobe Acrobat versions 2017.011.30148 and\n earlier on Windows.\");\n\n script_tag(name:\"solution\", value:\"Upgrade to Adobe Acrobat 2017 version\n 2017.011.30150 or later. Please see the references for more information.\");\n\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_tag(name:\"qod_type\", value:\"registry\");\n script_xref(name:\"URL\", value:\"https://helpx.adobe.com/security/products/acrobat/apsb19-49.html\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2019 Greenbone Networks GmbH\");\n script_family(\"General\");\n script_dependencies(\"secpod_adobe_prdts_detect_win.nasl\");\n script_mandatory_keys(\"Adobe/Acrobat/Win/Ver\");\n exit(0);\n}\n\ninclude(\"host_details.inc\");\ninclude(\"version_func.inc\");\n\nif(!infos = get_app_version_and_location(cpe:CPE, exit_no_version:TRUE)) exit(0);\n\nvers = infos['version'];\npath = infos['location'];\n\n## 2017.011.30148 == 17.011.30148\nif(version_in_range(version:vers, test_version:\"17.0\", test_version2:\"17.011.30148\")) {\n report = report_fixed_ver(installed_version:vers, fixed_version:\"17.011.30150 (2017.011.30150)\", install_path:path);\n security_message(data:report);\n exit(0);\n}\n\nexit(99);\n", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}], "nessus": [{"lastseen": "2021-02-01T01:15:26", "description": "The version of Adobe Acrobat installed on the remote Windows host is a version prior or equal to 2015.006.30503, \n2017.011.30148, or 2019.012.20040. It is, therefore, affected by multiple vulnerabilities.\n\n - Out-of-Bounds Read potentially leading to Information Disclosure \n (CVE-2019-8064, CVE-2019-8163, CVE-2019-8164, CVE-2019-8168, CVE-2019-8172, CVE-2019-8173, CVE-2019-8182, \n CVE-2019-8184, CVE-2019-8185, CVE-2019-8189, CVE-2019-8190, CVE-2019-8193, CVE-2019-8194, CVE-2019-8198, \n CVE-2019-8201, CVE-2019-8202, CVE-2019-8204, CVE-2019-8207, CVE-2019-8216, CVE-2019-8218, CVE-2019-8222)\n\n - Out-of-Bounds Write potentially leading to Arbitrary Code Execution \n (CVE-2019-8165, CVE-2019-8171, CVE-2019-8186, CVE-2019-8191, CVE-2019-8199, CVE-2019-8206)\n\n - Use After Free potentially leading to Arbitrary Code Execution \n (CVE-2019-8175, CVE-2019-8176, CVE-2019-8177, CVE-2019-8178, CVE-2019-8179, CVE-2019-8180, CVE-2019-8181, \n CVE-2019-8187, CVE-2019-8188, CVE-2019-8192, CVE-2019-8203, CVE-2019-8208, CVE-2019-8209, CVE-2019-8210, \n CVE-2019-8211, CVE-2019-8212, CVE-2019-8213, CVE-2019-8214, CVE-2019-8215, CVE-2019-8217, CVE-2019-8219, \n CVE-2019-8220, CVE-2019-8221, CVE-2019-8223, CVE-2019-8224, CVE-2019-8225)\n\nNote that Nessus has not tested for this issue but has instead relied only on the application's self-reported version \nnumber.", "edition": 19, "cvss3": {"score": 9.8, "vector": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}, "published": "2019-10-16T00:00:00", "title": "Adobe Acrobat <= 2015.006.30503 / 2017.011.30148 / 2019.012.20040 Multiple Vulnerabilities (APSB19-49)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2019-8183", "CVE-2019-8180", "CVE-2019-8181", "CVE-2019-8219", "CVE-2019-8185", "CVE-2019-8215", "CVE-2019-8176", "CVE-2019-8216", "CVE-2019-8190", "CVE-2019-8162", "CVE-2019-8161", "CVE-2019-8184", "CVE-2019-8195", "CVE-2019-8191", "CVE-2019-8200", "CVE-2019-8193", "CVE-2019-8160", "CVE-2019-8177", "CVE-2019-8169", "CVE-2019-8199", "CVE-2019-8167", "CVE-2019-8210", "CVE-2019-8217", "CVE-2019-8222", "CVE-2019-8196", "CVE-2019-8225", "CVE-2019-8203", "CVE-2019-8188", "CVE-2019-8194", "CVE-2019-8187", "CVE-2019-8192", "CVE-2019-8211", "CVE-2019-8221", "CVE-2019-8179", "CVE-2019-8163", "CVE-2019-8172", "CVE-2019-8197", "CVE-2019-8168", "CVE-2019-8189", "CVE-2019-8164", "CVE-2019-8208", "CVE-2019-8204", "CVE-2019-8226", "CVE-2019-8182", "CVE-2019-8170", "CVE-2019-8205", "CVE-2019-8174", "CVE-2019-8213", "CVE-2019-8201", "CVE-2019-8224", "CVE-2019-8178", "CVE-2019-8198", "CVE-2019-8212", "CVE-2019-8209", "CVE-2019-8214", "CVE-2019-8166", "CVE-2019-8223", "CVE-2019-8175", "CVE-2019-8207", "CVE-2019-8218", "CVE-2019-8220", "CVE-2019-8173", "CVE-2019-8186", "CVE-2019-8064", "CVE-2019-8202", "CVE-2019-8165", "CVE-2019-8171", "CVE-2019-8206"], "modified": "2021-02-02T00:00:00", "cpe": ["cpe:/a:adobe:acrobat"], "id": "ADOBE_ACROBAT_APSB19-49.NASL", "href": "https://www.tenable.com/plugins/nessus/129977", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\ninclude('compat.inc');\n\nif (description)\n{\n script_id(129977);\n script_version(\"1.5\");\n script_cvs_date(\"Date: 2019/12/13\");\n\n script_cve_id(\n \"CVE-2019-8064\",\n \"CVE-2019-8160\",\n \"CVE-2019-8161\",\n \"CVE-2019-8162\",\n \"CVE-2019-8163\",\n \"CVE-2019-8164\",\n \"CVE-2019-8165\",\n \"CVE-2019-8166\",\n \"CVE-2019-8167\",\n \"CVE-2019-8168\",\n \"CVE-2019-8169\",\n \"CVE-2019-8170\",\n \"CVE-2019-8171\",\n \"CVE-2019-8172\",\n \"CVE-2019-8173\",\n \"CVE-2019-8174\",\n \"CVE-2019-8175\",\n \"CVE-2019-8176\",\n \"CVE-2019-8177\",\n \"CVE-2019-8178\",\n \"CVE-2019-8179\",\n \"CVE-2019-8180\",\n \"CVE-2019-8181\",\n \"CVE-2019-8182\",\n \"CVE-2019-8183\",\n \"CVE-2019-8184\",\n \"CVE-2019-8185\",\n \"CVE-2019-8186\",\n \"CVE-2019-8187\",\n \"CVE-2019-8188\",\n \"CVE-2019-8189\",\n \"CVE-2019-8190\",\n \"CVE-2019-8191\",\n \"CVE-2019-8192\",\n \"CVE-2019-8193\",\n \"CVE-2019-8194\",\n \"CVE-2019-8195\",\n \"CVE-2019-8196\",\n \"CVE-2019-8197\",\n \"CVE-2019-8198\",\n \"CVE-2019-8199\",\n \"CVE-2019-8200\",\n \"CVE-2019-8201\",\n \"CVE-2019-8202\",\n \"CVE-2019-8203\",\n \"CVE-2019-8204\",\n \"CVE-2019-8205\",\n \"CVE-2019-8206\",\n \"CVE-2019-8207\",\n \"CVE-2019-8208\",\n \"CVE-2019-8209\",\n \"CVE-2019-8210\",\n \"CVE-2019-8211\",\n \"CVE-2019-8212\",\n \"CVE-2019-8213\",\n \"CVE-2019-8214\",\n \"CVE-2019-8215\",\n \"CVE-2019-8216\",\n \"CVE-2019-8217\",\n \"CVE-2019-8218\",\n \"CVE-2019-8219\",\n \"CVE-2019-8220\",\n \"CVE-2019-8221\",\n \"CVE-2019-8222\",\n \"CVE-2019-8223\",\n \"CVE-2019-8224\",\n \"CVE-2019-8225\",\n \"CVE-2019-8226\"\n );\n\n script_name(english:\"Adobe Acrobat <= 2015.006.30503 / 2017.011.30148 / 2019.012.20040 Multiple Vulnerabilities (APSB19-49)\");\n script_summary(english:\"Checks the version of Adobe Acrobat.\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The version of Adobe Acrobat installed on the remote Windows host is affected by multiple vulnerabilities.\");\n script_set_attribute(attribute:\"description\", value:\n\"The version of Adobe Acrobat installed on the remote Windows host is a version prior or equal to 2015.006.30503, \n2017.011.30148, or 2019.012.20040. It is, therefore, affected by multiple vulnerabilities.\n\n - Out-of-Bounds Read potentially leading to Information Disclosure \n (CVE-2019-8064, CVE-2019-8163, CVE-2019-8164, CVE-2019-8168, CVE-2019-8172, CVE-2019-8173, CVE-2019-8182, \n CVE-2019-8184, CVE-2019-8185, CVE-2019-8189, CVE-2019-8190, CVE-2019-8193, CVE-2019-8194, CVE-2019-8198, \n CVE-2019-8201, CVE-2019-8202, CVE-2019-8204, CVE-2019-8207, CVE-2019-8216, CVE-2019-8218, CVE-2019-8222)\n\n - Out-of-Bounds Write potentially leading to Arbitrary Code Execution \n (CVE-2019-8165, CVE-2019-8171, CVE-2019-8186, CVE-2019-8191, CVE-2019-8199, CVE-2019-8206)\n\n - Use After Free potentially leading to Arbitrary Code Execution \n (CVE-2019-8175, CVE-2019-8176, CVE-2019-8177, CVE-2019-8178, CVE-2019-8179, CVE-2019-8180, CVE-2019-8181, \n CVE-2019-8187, CVE-2019-8188, CVE-2019-8192, CVE-2019-8203, CVE-2019-8208, CVE-2019-8209, CVE-2019-8210, \n CVE-2019-8211, CVE-2019-8212, CVE-2019-8213, CVE-2019-8214, CVE-2019-8215, CVE-2019-8217, CVE-2019-8219, \n CVE-2019-8220, CVE-2019-8221, CVE-2019-8223, CVE-2019-8224, CVE-2019-8225)\n\nNote that Nessus has not tested for this issue but has instead relied only on the application's self-reported version \nnumber.\");\n # https://helpx.adobe.com/security/products/acrobat/apsb19-49.html\n script_set_attribute(attribute:\"see_also\", value:\"http://www.nessus.org/u?20b7a288\");\n script_set_attribute(attribute:\"solution\", value:\n\"Upgrade to Adobe Acrobat version 2015.006.30504 or 2017.011.30150 \n or 2019.021.20047 or later.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:H/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:H/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2019-8171\");\n\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n script_set_attribute(attribute:\"exploited_by_malware\", value:\"true\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2019/10/15\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2019/10/15\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2019/10/16\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/a:adobe:acrobat\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"Windows\");\n\n script_copyright(english:\"This script is Copyright (C) 2019 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"adobe_acrobat_installed.nasl\");\n script_require_keys(\"SMB/Registry/Enumerated\", \"installed_sw/Adobe Acrobat\");\n\n exit(0);\n}\n\ninclude('vcf.inc');\ninclude('vcf_extras.inc');\n\nget_kb_item_or_exit('SMB/Registry/Enumerated');\napp_info = vcf::get_app_info(app:'Adobe Acrobat', win_local:TRUE);\n\n# vcf::adobe_reader::check_version_and_report will\n# properly separate tracks when checking constraints.\n# x.y.30zzz = DC Classic\n# x.y.20zzz = DC Continuous\nconstraints = [\n { 'min_version' : '15.6', 'max_version' : '15.006.30503', 'fixed_version' : '15.006.30504' },\n { 'min_version' : '17.8', 'max_version' : '17.011.30148', 'fixed_version' : '17.011.30150' },\n { 'min_version' : '15.7', 'max_version' : '19.012.20040', 'fixed_version' : '19.021.20047' }\n];\n\nvcf::adobe_reader::check_version_and_report(\n app_info:app_info,\n constraints:constraints,\n severity:SECURITY_HOLE,\n max_segs:3\n);\n", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2021-02-01T01:16:44", "description": "The version of Adobe Reader installed on the remote Windows host is a version prior or equal to 2015.006.30503, \n2017.011.30148, or 2019.012.20040. It is, therefore, affected by multiple vulnerabilities.\n\n - Out-of-Bounds Read potentially leading to Information Disclosure \n (CVE-2019-8064, CVE-2019-8163, CVE-2019-8164, CVE-2019-8168, CVE-2019-8172, CVE-2019-8173, CVE-2019-8182, \n CVE-2019-8184, CVE-2019-8185, CVE-2019-8189, CVE-2019-8190, CVE-2019-8193, CVE-2019-8194, CVE-2019-8198, \n CVE-2019-8201, CVE-2019-8202, CVE-2019-8204, CVE-2019-8207, CVE-2019-8216, CVE-2019-8218, CVE-2019-8222)\n\n - Out-of-Bounds Write potentially leading to Arbitrary Code Execution \n (CVE-2019-8165, CVE-2019-8171, CVE-2019-8186, CVE-2019-8191, CVE-2019-8199, CVE-2019-8206)\n\n - Use After Free potentially leading to Arbitrary Code Execution \n (CVE-2019-8175, CVE-2019-8176, CVE-2019-8177, CVE-2019-8178, CVE-2019-8179, CVE-2019-8180, CVE-2019-8181, \n CVE-2019-8187, CVE-2019-8188, CVE-2019-8192, CVE-2019-8203, CVE-2019-8208, CVE-2019-8209, CVE-2019-8210, \n CVE-2019-8211, CVE-2019-8212, CVE-2019-8213, CVE-2019-8214, CVE-2019-8215, CVE-2019-8217, CVE-2019-8219, \n CVE-2019-8220, CVE-2019-8221, CVE-2019-8223, CVE-2019-8224, CVE-2019-8225)\n\nNote that Nessus has not tested for this issue but has instead relied only on the application's self-reported version \nnumber.", "edition": 19, "cvss3": {"score": 9.8, "vector": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}, "published": "2019-10-16T00:00:00", "title": "Adobe Reader <= 2015.006.30503 / 2017.011.30148 / 2019.012.20040 Multiple Vulnerabilities (APSB19-49)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2019-8183", "CVE-2019-8180", "CVE-2019-8181", "CVE-2019-8219", "CVE-2019-8185", "CVE-2019-8215", "CVE-2019-8176", "CVE-2019-8216", "CVE-2019-8190", "CVE-2019-8162", "CVE-2019-8161", "CVE-2019-8184", "CVE-2019-8195", "CVE-2019-8191", "CVE-2019-8200", "CVE-2019-8193", "CVE-2019-8160", "CVE-2019-8177", "CVE-2019-8169", "CVE-2019-8199", "CVE-2019-8167", "CVE-2019-8210", "CVE-2019-8217", "CVE-2019-8222", "CVE-2019-8196", "CVE-2019-8225", "CVE-2019-8203", "CVE-2019-8188", "CVE-2019-8194", "CVE-2019-8187", "CVE-2019-8192", "CVE-2019-8211", "CVE-2019-8221", "CVE-2019-8179", "CVE-2019-8163", "CVE-2019-8172", "CVE-2019-8197", "CVE-2019-8168", "CVE-2019-8189", "CVE-2019-8164", "CVE-2019-8208", "CVE-2019-8204", "CVE-2019-8226", "CVE-2019-8182", "CVE-2019-8170", "CVE-2019-8205", "CVE-2019-8174", "CVE-2019-8213", "CVE-2019-8201", "CVE-2019-8224", "CVE-2019-8178", "CVE-2019-8198", "CVE-2019-8212", "CVE-2019-8209", "CVE-2019-8214", "CVE-2019-8166", "CVE-2019-8223", "CVE-2019-8175", "CVE-2019-8207", "CVE-2019-8218", "CVE-2019-8220", "CVE-2019-8173", "CVE-2019-8186", "CVE-2019-8064", "CVE-2019-8202", "CVE-2019-8165", "CVE-2019-8171", "CVE-2019-8206"], "modified": "2021-02-02T00:00:00", "cpe": ["cpe:/a:adobe:acrobat_reader"], "id": "ADOBE_READER_APSB19-49.NASL", "href": "https://www.tenable.com/plugins/nessus/129978", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\ninclude('compat.inc');\n\nif (description)\n{\n script_id(129978);\n script_version(\"1.5\");\n script_cvs_date(\"Date: 2019/12/13\");\n\n script_cve_id(\n \"CVE-2019-8064\",\n \"CVE-2019-8160\",\n \"CVE-2019-8161\",\n \"CVE-2019-8162\",\n \"CVE-2019-8163\",\n \"CVE-2019-8164\",\n \"CVE-2019-8165\",\n \"CVE-2019-8166\",\n \"CVE-2019-8167\",\n \"CVE-2019-8168\",\n \"CVE-2019-8169\",\n \"CVE-2019-8170\",\n \"CVE-2019-8171\",\n \"CVE-2019-8172\",\n \"CVE-2019-8173\",\n \"CVE-2019-8174\",\n \"CVE-2019-8175\",\n \"CVE-2019-8176\",\n \"CVE-2019-8177\",\n \"CVE-2019-8178\",\n \"CVE-2019-8179\",\n \"CVE-2019-8180\",\n \"CVE-2019-8181\",\n \"CVE-2019-8182\",\n \"CVE-2019-8183\",\n \"CVE-2019-8184\",\n \"CVE-2019-8185\",\n \"CVE-2019-8186\",\n \"CVE-2019-8187\",\n \"CVE-2019-8188\",\n \"CVE-2019-8189\",\n \"CVE-2019-8190\",\n \"CVE-2019-8191\",\n \"CVE-2019-8192\",\n \"CVE-2019-8193\",\n \"CVE-2019-8194\",\n \"CVE-2019-8195\",\n \"CVE-2019-8196\",\n \"CVE-2019-8197\",\n \"CVE-2019-8198\",\n \"CVE-2019-8199\",\n \"CVE-2019-8200\",\n \"CVE-2019-8201\",\n \"CVE-2019-8202\",\n \"CVE-2019-8203\",\n \"CVE-2019-8204\",\n \"CVE-2019-8205\",\n \"CVE-2019-8206\",\n \"CVE-2019-8207\",\n \"CVE-2019-8208\",\n \"CVE-2019-8209\",\n \"CVE-2019-8210\",\n \"CVE-2019-8211\",\n \"CVE-2019-8212\",\n \"CVE-2019-8213\",\n \"CVE-2019-8214\",\n \"CVE-2019-8215\",\n \"CVE-2019-8216\",\n \"CVE-2019-8217\",\n \"CVE-2019-8218\",\n \"CVE-2019-8219\",\n \"CVE-2019-8220\",\n \"CVE-2019-8221\",\n \"CVE-2019-8222\",\n \"CVE-2019-8223\",\n \"CVE-2019-8224\",\n \"CVE-2019-8225\",\n \"CVE-2019-8226\"\n );\n\n script_name(english:\"Adobe Reader <= 2015.006.30503 / 2017.011.30148 / 2019.012.20040 Multiple Vulnerabilities (APSB19-49)\");\n script_summary(english:\"Checks the version of Adobe Reader.\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The version of Adobe Reader installed on the remote Windows host is affected by multiple vulnerabilities.\");\n script_set_attribute(attribute:\"description\", value:\n\"The version of Adobe Reader installed on the remote Windows host is a version prior or equal to 2015.006.30503, \n2017.011.30148, or 2019.012.20040. It is, therefore, affected by multiple vulnerabilities.\n\n - Out-of-Bounds Read potentially leading to Information Disclosure \n (CVE-2019-8064, CVE-2019-8163, CVE-2019-8164, CVE-2019-8168, CVE-2019-8172, CVE-2019-8173, CVE-2019-8182, \n CVE-2019-8184, CVE-2019-8185, CVE-2019-8189, CVE-2019-8190, CVE-2019-8193, CVE-2019-8194, CVE-2019-8198, \n CVE-2019-8201, CVE-2019-8202, CVE-2019-8204, CVE-2019-8207, CVE-2019-8216, CVE-2019-8218, CVE-2019-8222)\n\n - Out-of-Bounds Write potentially leading to Arbitrary Code Execution \n (CVE-2019-8165, CVE-2019-8171, CVE-2019-8186, CVE-2019-8191, CVE-2019-8199, CVE-2019-8206)\n\n - Use After Free potentially leading to Arbitrary Code Execution \n (CVE-2019-8175, CVE-2019-8176, CVE-2019-8177, CVE-2019-8178, CVE-2019-8179, CVE-2019-8180, CVE-2019-8181, \n CVE-2019-8187, CVE-2019-8188, CVE-2019-8192, CVE-2019-8203, CVE-2019-8208, CVE-2019-8209, CVE-2019-8210, \n CVE-2019-8211, CVE-2019-8212, CVE-2019-8213, CVE-2019-8214, CVE-2019-8215, CVE-2019-8217, CVE-2019-8219, \n CVE-2019-8220, CVE-2019-8221, CVE-2019-8223, CVE-2019-8224, CVE-2019-8225)\n\nNote that Nessus has not tested for this issue but has instead relied only on the application's self-reported version \nnumber.\");\n # https://helpx.adobe.com/security/products/acrobat/apsb19-49.html\n script_set_attribute(attribute:\"see_also\", value:\"http://www.nessus.org/u?20b7a288\");\n script_set_attribute(attribute:\"solution\", value:\n\"Upgrade to Adobe Reader version 2015.006.30504 or 2017.011.30150 \n or 2019.021.20047 or later.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:H/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:H/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2019-8171\");\n\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n script_set_attribute(attribute:\"exploited_by_malware\", value:\"true\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2019/10/15\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2019/10/15\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2019/10/16\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/a:adobe:acrobat_reader\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"Windows\");\n\n script_copyright(english:\"This script is Copyright (C) 2019 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"adobe_reader_installed.nasl\");\n script_require_keys(\"SMB/Registry/Enumerated\", \"installed_sw/Adobe Reader\");\n\n exit(0);\n}\n\ninclude('vcf.inc');\ninclude('vcf_extras.inc');\n\nget_kb_item_or_exit('SMB/Registry/Enumerated');\napp_info = vcf::get_app_info(app:'Adobe Reader', win_local:TRUE);\n\n# vcf::adobe_reader::check_version_and_report will\n# properly separate tracks when checking constraints.\n# x.y.30zzz = DC Classic\n# x.y.20zzz = DC Continuous\nconstraints = [\n { 'min_version' : '15.6', 'max_version' : '15.006.30503', 'fixed_version' : '15.006.30504' },\n { 'min_version' : '17.8', 'max_version' : '17.011.30148', 'fixed_version' : '17.011.30150' },\n { 'min_version' : '15.7', 'max_version' : '19.012.20040', 'fixed_version' : '19.021.20047' }\n];\n\nvcf::adobe_reader::check_version_and_report(\n app_info:app_info,\n constraints:constraints,\n severity:SECURITY_HOLE,\n max_segs:3\n);\n", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2021-02-01T03:36:31", "description": "The version of Adobe Reader installed on the remote macOS host is a version prior or equal to 2015.006.30503,\n2017.011.30148, or 2019.012.20040. It is, therefore, affected by multiple vulnerabilities.\n \n - Out-of-Bounds Read potentially leading to Information Disclosure \n (CVE-2019-8064, CVE-2019-8163, CVE-2019-8164, CVE-2019-8168, CVE-2019-8172, CVE-2019-8173, CVE-2019-8182, \n CVE-2019-8184, CVE-2019-8185, CVE-2019-8189, CVE-2019-8190, CVE-2019-8193, CVE-2019-8194, CVE-2019-8198, \n CVE-2019-8201, CVE-2019-8202, CVE-2019-8204, CVE-2019-8207, CVE-2019-8216, CVE-2019-8218, CVE-2019-8222)\n\n - Out-of-Bounds Write potentially leading to Arbitrary Code Execution \n (CVE-2019-8165, CVE-2019-8171, CVE-2019-8186, CVE-2019-8191, CVE-2019-8199, CVE-2019-8206)\n\n - Use After Free potentially leading to Arbitrary Code Execution \n (CVE-2019-8175, CVE-2019-8176, CVE-2019-8177, CVE-2019-8178, CVE-2019-8179, CVE-2019-8180, CVE-2019-8181, \n CVE-2019-8187, CVE-2019-8188, CVE-2019-8192, CVE-2019-8203, CVE-2019-8208, CVE-2019-8209, CVE-2019-8210, \n CVE-2019-8211, CVE-2019-8212, CVE-2019-8213, CVE-2019-8214, CVE-2019-8215, CVE-2019-8217, CVE-2019-8219, \n CVE-2019-8220, CVE-2019-8221, CVE-2019-8223, CVE-2019-8224, CVE-2019-8225)\n\nNote that Nessus has not tested for this issue but has instead relied only on the application's self-reported version \nnumber.", "edition": 19, "cvss3": {"score": 9.8, "vector": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}, "published": "2019-10-16T00:00:00", "title": "Adobe Reader <= 2015.006.30503 / 2017.011.30148 / 2019.012.20040 Multiple Vulnerabilities (APSB19-49) (macOS)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2019-8183", "CVE-2019-8180", "CVE-2019-8181", "CVE-2019-8219", "CVE-2019-8185", "CVE-2019-8215", "CVE-2019-8176", "CVE-2019-8216", "CVE-2019-8190", "CVE-2019-8162", "CVE-2019-8161", "CVE-2019-8184", "CVE-2019-8195", "CVE-2019-8191", "CVE-2019-8200", "CVE-2019-8193", "CVE-2019-8160", "CVE-2019-8177", "CVE-2019-8169", "CVE-2019-8199", "CVE-2019-8167", "CVE-2019-8210", "CVE-2019-8217", "CVE-2019-8222", "CVE-2019-8196", "CVE-2019-8225", "CVE-2019-8203", "CVE-2019-8188", "CVE-2019-8194", "CVE-2019-8187", "CVE-2019-8192", "CVE-2019-8211", "CVE-2019-8221", "CVE-2019-8179", "CVE-2019-8163", "CVE-2019-8172", "CVE-2019-8197", "CVE-2019-8168", "CVE-2019-8189", "CVE-2019-8164", "CVE-2019-8208", "CVE-2019-8204", "CVE-2019-8226", "CVE-2019-8182", "CVE-2019-8170", "CVE-2019-8205", "CVE-2019-8174", "CVE-2019-8213", "CVE-2019-8201", "CVE-2019-8224", "CVE-2019-8178", "CVE-2019-8198", "CVE-2019-8212", "CVE-2019-8209", "CVE-2019-8214", "CVE-2019-8166", "CVE-2019-8223", "CVE-2019-8175", "CVE-2019-8207", "CVE-2019-8218", "CVE-2019-8220", "CVE-2019-8173", "CVE-2019-8186", "CVE-2019-8064", "CVE-2019-8202", "CVE-2019-8165", "CVE-2019-8171", "CVE-2019-8206"], "modified": "2021-02-02T00:00:00", "cpe": ["cpe:/a:adobe:acrobat_reader"], "id": "MACOS_ADOBE_READER_APSB19-49.NASL", "href": "https://www.tenable.com/plugins/nessus/129976", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\ninclude('compat.inc');\n\nif (description)\n{\n script_id(129976);\n script_version(\"1.5\");\n script_cvs_date(\"Date: 2019/12/13\");\n\n script_cve_id(\n \"CVE-2019-8064\",\n \"CVE-2019-8160\",\n \"CVE-2019-8161\",\n \"CVE-2019-8162\",\n \"CVE-2019-8163\",\n \"CVE-2019-8164\",\n \"CVE-2019-8165\",\n \"CVE-2019-8166\",\n \"CVE-2019-8167\",\n \"CVE-2019-8168\",\n \"CVE-2019-8169\",\n \"CVE-2019-8170\",\n \"CVE-2019-8171\",\n \"CVE-2019-8172\",\n \"CVE-2019-8173\",\n \"CVE-2019-8174\",\n \"CVE-2019-8175\",\n \"CVE-2019-8176\",\n \"CVE-2019-8177\",\n \"CVE-2019-8178\",\n \"CVE-2019-8179\",\n \"CVE-2019-8180\",\n \"CVE-2019-8181\",\n \"CVE-2019-8182\",\n \"CVE-2019-8183\",\n \"CVE-2019-8184\",\n \"CVE-2019-8185\",\n \"CVE-2019-8186\",\n \"CVE-2019-8187\",\n \"CVE-2019-8188\",\n \"CVE-2019-8189\",\n \"CVE-2019-8190\",\n \"CVE-2019-8191\",\n \"CVE-2019-8192\",\n \"CVE-2019-8193\",\n \"CVE-2019-8194\",\n \"CVE-2019-8195\",\n \"CVE-2019-8196\",\n \"CVE-2019-8197\",\n \"CVE-2019-8198\",\n \"CVE-2019-8199\",\n \"CVE-2019-8200\",\n \"CVE-2019-8201\",\n \"CVE-2019-8202\",\n \"CVE-2019-8203\",\n \"CVE-2019-8204\",\n \"CVE-2019-8205\",\n \"CVE-2019-8206\",\n \"CVE-2019-8207\",\n \"CVE-2019-8208\",\n \"CVE-2019-8209\",\n \"CVE-2019-8210\",\n \"CVE-2019-8211\",\n \"CVE-2019-8212\",\n \"CVE-2019-8213\",\n \"CVE-2019-8214\",\n \"CVE-2019-8215\",\n \"CVE-2019-8216\",\n \"CVE-2019-8217\",\n \"CVE-2019-8218\",\n \"CVE-2019-8219\",\n \"CVE-2019-8220\",\n \"CVE-2019-8221\",\n \"CVE-2019-8222\",\n \"CVE-2019-8223\",\n \"CVE-2019-8224\",\n \"CVE-2019-8225\",\n \"CVE-2019-8226\"\n );\n\n script_name(english:\"Adobe Reader <= 2015.006.30503 / 2017.011.30148 / 2019.012.20040 Multiple Vulnerabilities (APSB19-49) (macOS)\");\n script_summary(english:\"Checks the version of Adobe Reader.\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The version of Adobe Reader installed on the remote macOS host is affected by multiple vulnerabilities.\");\n script_set_attribute(attribute:\"description\", value:\n\"The version of Adobe Reader installed on the remote macOS host is a version prior or equal to 2015.006.30503,\n2017.011.30148, or 2019.012.20040. It is, therefore, affected by multiple vulnerabilities.\n \n - Out-of-Bounds Read potentially leading to Information Disclosure \n (CVE-2019-8064, CVE-2019-8163, CVE-2019-8164, CVE-2019-8168, CVE-2019-8172, CVE-2019-8173, CVE-2019-8182, \n CVE-2019-8184, CVE-2019-8185, CVE-2019-8189, CVE-2019-8190, CVE-2019-8193, CVE-2019-8194, CVE-2019-8198, \n CVE-2019-8201, CVE-2019-8202, CVE-2019-8204, CVE-2019-8207, CVE-2019-8216, CVE-2019-8218, CVE-2019-8222)\n\n - Out-of-Bounds Write potentially leading to Arbitrary Code Execution \n (CVE-2019-8165, CVE-2019-8171, CVE-2019-8186, CVE-2019-8191, CVE-2019-8199, CVE-2019-8206)\n\n - Use After Free potentially leading to Arbitrary Code Execution \n (CVE-2019-8175, CVE-2019-8176, CVE-2019-8177, CVE-2019-8178, CVE-2019-8179, CVE-2019-8180, CVE-2019-8181, \n CVE-2019-8187, CVE-2019-8188, CVE-2019-8192, CVE-2019-8203, CVE-2019-8208, CVE-2019-8209, CVE-2019-8210, \n CVE-2019-8211, CVE-2019-8212, CVE-2019-8213, CVE-2019-8214, CVE-2019-8215, CVE-2019-8217, CVE-2019-8219, \n CVE-2019-8220, CVE-2019-8221, CVE-2019-8223, CVE-2019-8224, CVE-2019-8225)\n\nNote that Nessus has not tested for this issue but has instead relied only on the application's self-reported version \nnumber.\");\n # https://helpx.adobe.com/security/products/acrobat/apsb19-49.html\n script_set_attribute(attribute:\"see_also\", value:\"http://www.nessus.org/u?20b7a288\");\n script_set_attribute(attribute:\"solution\", value:\n\"Upgrade to Adobe Reader version 2015.006.30504 or 2017.011.30150 \n or 2019.021.20047 or later.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:H/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:H/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2019-8171\");\n\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n script_set_attribute(attribute:\"exploited_by_malware\", value:\"true\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2019/10/15\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2019/10/15\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2019/10/16\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/a:adobe:acrobat_reader\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"MacOS X Local Security Checks\");\n\n script_copyright(english:\"This script is Copyright (C) 2019 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"macosx_adobe_reader_installed.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/MacOSX/Version\", \"installed_sw/Adobe Reader\");\n\n exit(0);\n}\n\ninclude('vcf.inc');\ninclude('vcf_extras.inc');\n\nget_kb_item_or_exit('Host/local_checks_enabled');\nos = get_kb_item('Host/MacOSX/Version');\nif (empty_or_null(os)) audit(AUDIT_OS_NOT, 'Mac OS X');\n\napp_info = vcf::get_app_info(app:'Adobe Reader');\n\n# vcf::adobe_reader::check_version_and_report will\n# properly separate tracks when checking constraints.\n# x.y.30zzz = DC Classic\n# x.y.20zzz = DC Continuous\nconstraints = [\n { 'min_version' : '15.6', 'max_version' : '15.006.30503', 'fixed_version' : '15.006.30504' },\n { 'min_version' : '17.8', 'max_version' : '17.011.30148', 'fixed_version' : '17.011.30150' },\n { 'min_version' : '15.7', 'max_version' : '19.012.20040', 'fixed_version' : '19.021.20047' }\n];\n\nvcf::adobe_reader::check_version_and_report(\n app_info:app_info,\n constraints:constraints,\n severity:SECURITY_HOLE,\n max_segs:3\n);\n", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2021-02-01T03:36:14", "description": "The version of Adobe Acrobat installed on the remote macOS host is a version prior or equal to 2015.006.30503, \n2017.011.30148, or 2019.012.20040. It is, therefore, affected by multiple vulnerabilities.\n \n - Out-of-Bounds Read potentially leading to Information Disclosure \n (CVE-2019-8064, CVE-2019-8163, CVE-2019-8164, CVE-2019-8168, CVE-2019-8172, CVE-2019-8173, CVE-2019-8182, \n CVE-2019-8184, CVE-2019-8185, CVE-2019-8189, CVE-2019-8190, CVE-2019-8193, CVE-2019-8194, CVE-2019-8198, \n CVE-2019-8201, CVE-2019-8202, CVE-2019-8204, CVE-2019-8207, CVE-2019-8216, CVE-2019-8218, CVE-2019-8222)\n\n - Out-of-Bounds Write potentially leading to Arbitrary Code Execution \n (CVE-2019-8165, CVE-2019-8171, CVE-2019-8186, CVE-2019-8191, CVE-2019-8199, CVE-2019-8206)\n\n - Use After Free potentially leading to Arbitrary Code Execution \n (CVE-2019-8175, CVE-2019-8176, CVE-2019-8177, CVE-2019-8178, CVE-2019-8179, CVE-2019-8180, CVE-2019-8181, \n CVE-2019-8187, CVE-2019-8188, CVE-2019-8192, CVE-2019-8203, CVE-2019-8208, CVE-2019-8209, CVE-2019-8210, \n CVE-2019-8211, CVE-2019-8212, CVE-2019-8213, CVE-2019-8214, CVE-2019-8215, CVE-2019-8217, CVE-2019-8219, \n CVE-2019-8220, CVE-2019-8221, CVE-2019-8223, CVE-2019-8224, CVE-2019-8225)\n\nNote that Nessus has not tested for this issue but has instead relied only on the application's self-reported version \nnumber.", "edition": 19, "cvss3": {"score": 9.8, "vector": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}, "published": "2019-10-16T00:00:00", "title": "Adobe Acrobat <= 2015.006.30503 / 2017.011.30148 / 2019.012.20040 Multiple Vulnerabilities (APSB19-49) (macOS)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2019-8183", "CVE-2019-8180", "CVE-2019-8181", "CVE-2019-8219", "CVE-2019-8185", "CVE-2019-8215", "CVE-2019-8176", "CVE-2019-8216", "CVE-2019-8190", "CVE-2019-8162", "CVE-2019-8161", "CVE-2019-8184", "CVE-2019-8195", "CVE-2019-8191", "CVE-2019-8200", "CVE-2019-8193", "CVE-2019-8160", "CVE-2019-8177", "CVE-2019-8169", "CVE-2019-8199", "CVE-2019-8167", "CVE-2019-8210", "CVE-2019-8217", "CVE-2019-8222", "CVE-2019-8196", "CVE-2019-8225", "CVE-2019-8203", "CVE-2019-8188", "CVE-2019-8194", "CVE-2019-8187", "CVE-2019-8192", "CVE-2019-8211", "CVE-2019-8221", "CVE-2019-8179", "CVE-2019-8163", "CVE-2019-8172", "CVE-2019-8197", "CVE-2019-8168", "CVE-2019-8189", "CVE-2019-8164", "CVE-2019-8208", "CVE-2019-8204", "CVE-2019-8226", "CVE-2019-8182", "CVE-2019-8170", "CVE-2019-8205", "CVE-2019-8174", "CVE-2019-8213", "CVE-2019-8201", "CVE-2019-8224", "CVE-2019-8178", "CVE-2019-8198", "CVE-2019-8212", "CVE-2019-8209", "CVE-2019-8214", "CVE-2019-8166", "CVE-2019-8223", "CVE-2019-8175", "CVE-2019-8207", "CVE-2019-8218", "CVE-2019-8220", "CVE-2019-8173", "CVE-2019-8186", "CVE-2019-8064", "CVE-2019-8202", "CVE-2019-8165", "CVE-2019-8171", "CVE-2019-8206"], "modified": "2021-02-02T00:00:00", "cpe": ["cpe:/a:adobe:acrobat"], "id": "MACOS_ADOBE_ACROBAT_APSB19-49.NASL", "href": "https://www.tenable.com/plugins/nessus/129975", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\ninclude('compat.inc');\n\nif (description)\n{\n script_id(129975);\n script_version(\"1.5\");\n script_cvs_date(\"Date: 2019/12/13\");\n\n script_cve_id(\n \"CVE-2019-8064\",\n \"CVE-2019-8160\",\n \"CVE-2019-8161\",\n \"CVE-2019-8162\",\n \"CVE-2019-8163\",\n \"CVE-2019-8164\",\n \"CVE-2019-8165\",\n \"CVE-2019-8166\",\n \"CVE-2019-8167\",\n \"CVE-2019-8168\",\n \"CVE-2019-8169\",\n \"CVE-2019-8170\",\n \"CVE-2019-8171\",\n \"CVE-2019-8172\",\n \"CVE-2019-8173\",\n \"CVE-2019-8174\",\n \"CVE-2019-8175\",\n \"CVE-2019-8176\",\n \"CVE-2019-8177\",\n \"CVE-2019-8178\",\n \"CVE-2019-8179\",\n \"CVE-2019-8180\",\n \"CVE-2019-8181\",\n \"CVE-2019-8182\",\n \"CVE-2019-8183\",\n \"CVE-2019-8184\",\n \"CVE-2019-8185\",\n \"CVE-2019-8186\",\n \"CVE-2019-8187\",\n \"CVE-2019-8188\",\n \"CVE-2019-8189\",\n \"CVE-2019-8190\",\n \"CVE-2019-8191\",\n \"CVE-2019-8192\",\n \"CVE-2019-8193\",\n \"CVE-2019-8194\",\n \"CVE-2019-8195\",\n \"CVE-2019-8196\",\n \"CVE-2019-8197\",\n \"CVE-2019-8198\",\n \"CVE-2019-8199\",\n \"CVE-2019-8200\",\n \"CVE-2019-8201\",\n \"CVE-2019-8202\",\n \"CVE-2019-8203\",\n \"CVE-2019-8204\",\n \"CVE-2019-8205\",\n \"CVE-2019-8206\",\n \"CVE-2019-8207\",\n \"CVE-2019-8208\",\n \"CVE-2019-8209\",\n \"CVE-2019-8210\",\n \"CVE-2019-8211\",\n \"CVE-2019-8212\",\n \"CVE-2019-8213\",\n \"CVE-2019-8214\",\n \"CVE-2019-8215\",\n \"CVE-2019-8216\",\n \"CVE-2019-8217\",\n \"CVE-2019-8218\",\n \"CVE-2019-8219\",\n \"CVE-2019-8220\",\n \"CVE-2019-8221\",\n \"CVE-2019-8222\",\n \"CVE-2019-8223\",\n \"CVE-2019-8224\",\n \"CVE-2019-8225\",\n \"CVE-2019-8226\"\n );\n\n script_name(english:\"Adobe Acrobat <= 2015.006.30503 / 2017.011.30148 / 2019.012.20040 Multiple Vulnerabilities (APSB19-49) (macOS)\");\n script_summary(english:\"Checks the version of Adobe Acrobat.\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The version of Adobe Acrobat installed on the remote macOS host is affected by multiple vulnerabilities.\");\n script_set_attribute(attribute:\"description\", value:\n\"The version of Adobe Acrobat installed on the remote macOS host is a version prior or equal to 2015.006.30503, \n2017.011.30148, or 2019.012.20040. It is, therefore, affected by multiple vulnerabilities.\n \n - Out-of-Bounds Read potentially leading to Information Disclosure \n (CVE-2019-8064, CVE-2019-8163, CVE-2019-8164, CVE-2019-8168, CVE-2019-8172, CVE-2019-8173, CVE-2019-8182, \n CVE-2019-8184, CVE-2019-8185, CVE-2019-8189, CVE-2019-8190, CVE-2019-8193, CVE-2019-8194, CVE-2019-8198, \n CVE-2019-8201, CVE-2019-8202, CVE-2019-8204, CVE-2019-8207, CVE-2019-8216, CVE-2019-8218, CVE-2019-8222)\n\n - Out-of-Bounds Write potentially leading to Arbitrary Code Execution \n (CVE-2019-8165, CVE-2019-8171, CVE-2019-8186, CVE-2019-8191, CVE-2019-8199, CVE-2019-8206)\n\n - Use After Free potentially leading to Arbitrary Code Execution \n (CVE-2019-8175, CVE-2019-8176, CVE-2019-8177, CVE-2019-8178, CVE-2019-8179, CVE-2019-8180, CVE-2019-8181, \n CVE-2019-8187, CVE-2019-8188, CVE-2019-8192, CVE-2019-8203, CVE-2019-8208, CVE-2019-8209, CVE-2019-8210, \n CVE-2019-8211, CVE-2019-8212, CVE-2019-8213, CVE-2019-8214, CVE-2019-8215, CVE-2019-8217, CVE-2019-8219, \n CVE-2019-8220, CVE-2019-8221, CVE-2019-8223, CVE-2019-8224, CVE-2019-8225)\n\nNote that Nessus has not tested for this issue but has instead relied only on the application's self-reported version \nnumber.\");\n # https://helpx.adobe.com/security/products/acrobat/apsb19-49.html\n script_set_attribute(attribute:\"see_also\", value:\"http://www.nessus.org/u?20b7a288\");\n script_set_attribute(attribute:\"solution\", value:\n\"Upgrade to Adobe Acrobat version 2015.006.30504 or 2017.011.30150 \n or 2019.021.20047 or later.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:H/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:H/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2019-8171\");\n\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n script_set_attribute(attribute:\"exploited_by_malware\", value:\"true\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2019/10/15\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2019/10/15\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2019/10/16\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/a:adobe:acrobat\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"MacOS X Local Security Checks\");\n\n script_copyright(english:\"This script is Copyright (C) 2019 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"macosx_adobe_acrobat_installed.nbin\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/MacOSX/Version\", \"installed_sw/Adobe Acrobat\");\n\n exit(0);\n}\n\ninclude('vcf.inc');\ninclude('vcf_extras.inc');\n\nget_kb_item_or_exit('Host/local_checks_enabled');\nos = get_kb_item('Host/MacOSX/Version');\nif (empty_or_null(os)) audit(AUDIT_OS_NOT, 'Mac OS X');\n\napp_info = vcf::get_app_info(app:'Adobe Acrobat');\n\n# vcf::adobe_reader::check_version_and_report will\n# properly separate tracks when checking constraints.\n# x.y.30zzz = DC Classic\n# x.y.20zzz = DC Continuous\nconstraints = [\n { 'min_version' : '15.6', 'max_version' : '15.006.30503', 'fixed_version' : '15.006.30504' },\n { 'min_version' : '17.8', 'max_version' : '17.011.30148', 'fixed_version' : '17.011.30150' },\n { 'min_version' : '15.7', 'max_version' : '19.012.20040', 'fixed_version' : '19.021.20047' }\n];\n\nvcf::adobe_reader::check_version_and_report(\n app_info:app_info,\n constraints:constraints,\n severity:SECURITY_HOLE,\n max_segs:3\n);\n", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}], "cve": [{"lastseen": "2021-02-02T07:13:05", "description": "Adobe Acrobat and Reader versions , 2019.012.20040 and earlier, 2017.011.30148 and earlier, 2017.011.30148 and earlier, 2015.006.30503 and earlier, and 2015.006.30503 and earlier have an out-of-bounds write vulnerability. Successful exploitation could lead to arbitrary code execution .", "edition": 8, "cvss3": {"exploitabilityScore": 3.9, "cvssV3": {"baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "baseScore": 9.8, "privilegesRequired": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "userInteraction": "NONE", "version": "3.1"}, "impactScore": 5.9}, "published": "2019-10-17T21:15:00", "title": "CVE-2019-8186", "type": "cve", "cwe": ["CWE-787"], "bulletinFamily": "NVD", "cvss2": {"severity": "HIGH", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "COMPLETE", "availabilityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "baseScore": 10.0, "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "acInsufInfo": false, "impactScore": 10.0, "obtainUserPrivilege": false}, "cvelist": ["CVE-2019-8186"], "modified": "2019-10-22T15:15:00", "cpe": [], "id": "CVE-2019-8186", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-8186", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}, "cpe23": []}, {"lastseen": "2021-02-02T07:13:05", "description": "Adobe Acrobat and Reader versions , 2019.012.20040 and earlier, 2017.011.30148 and earlier, 2017.011.30148 and earlier, 2015.006.30503 and earlier, and 2015.006.30503 and earlier have an use after free vulnerability. Successful exploitation could lead to arbitrary code execution .", "edition": 8, "cvss3": {"exploitabilityScore": 2.8, "cvssV3": {"baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "NONE", "integrityImpact": "NONE", "baseScore": 4.3, "privilegesRequired": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N", "userInteraction": "REQUIRED", "version": "3.1"}, "impactScore": 1.4}, "published": "2019-10-17T21:15:00", "title": "CVE-2019-8188", "type": "cve", "cwe": ["CWE-416"], "bulletinFamily": "NVD", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "PARTIAL", "availabilityImpact": "NONE", "integrityImpact": "NONE", "baseScore": 4.3, "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "acInsufInfo": false, "impactScore": 2.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2019-8188"], "modified": "2019-10-22T15:07:00", "cpe": [], "id": "CVE-2019-8188", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-8188", "cvss": {"score": 4.3, "vector": "AV:N/AC:M/Au:N/C:P/I:N/A:N"}, "cpe23": []}, {"lastseen": "2021-02-02T07:13:05", "description": "Adobe Acrobat and Reader versions , 2019.012.20040 and earlier, 2017.011.30148 and earlier, 2017.011.30148 and earlier, 2015.006.30503 and earlier, and 2015.006.30503 and earlier have an use after free vulnerability. Successful exploitation could lead to arbitrary code execution .", "edition": 8, "cvss3": {"exploitabilityScore": 2.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "baseScore": 8.8, "privilegesRequired": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "userInteraction": "REQUIRED", "version": "3.1"}, "impactScore": 5.9}, "published": "2019-10-17T21:15:00", "title": "CVE-2019-8192", "type": "cve", "cwe": ["CWE-416"], "bulletinFamily": "NVD", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 6.8, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "acInsufInfo": false, "impactScore": 6.4, "obtainUserPrivilege": false}, "cvelist": ["CVE-2019-8192"], "modified": "2019-10-22T14:38:00", "cpe": [], "id": "CVE-2019-8192", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-8192", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}, "cpe23": []}, {"lastseen": "2021-02-02T07:13:05", "description": "Adobe Acrobat and Reader versions , 2019.012.20040 and earlier, 2017.011.30148 and earlier, 2017.011.30148 and earlier, 2015.006.30503 and earlier, and 2015.006.30503 and earlier have an use after free vulnerability. Successful exploitation could lead to arbitrary code execution .", "edition": 8, "cvss3": {"exploitabilityScore": 2.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "baseScore": 8.8, "privilegesRequired": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "userInteraction": "REQUIRED", "version": "3.1"}, "impactScore": 5.9}, "published": "2019-10-17T21:15:00", "title": "CVE-2019-8180", "type": "cve", "cwe": ["CWE-416"], "bulletinFamily": "NVD", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 6.8, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "acInsufInfo": false, "impactScore": 6.4, "obtainUserPrivilege": false}, "cvelist": ["CVE-2019-8180"], "modified": "2019-10-24T14:29:00", "cpe": [], "id": "CVE-2019-8180", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-8180", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}, "cpe23": []}, {"lastseen": "2021-02-02T07:13:05", "description": "Adobe Acrobat and Reader versions , 2019.012.20040 and earlier, 2017.011.30148 and earlier, 2017.011.30148 and earlier, 2015.006.30503 and earlier, and 2015.006.30503 and earlier have an out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure .", "edition": 8, "cvss3": {"exploitabilityScore": 2.8, "cvssV3": {"baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "NONE", "integrityImpact": "NONE", "baseScore": 4.3, "privilegesRequired": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N", "userInteraction": "REQUIRED", "version": "3.1"}, "impactScore": 1.4}, "published": "2019-10-17T21:15:00", "title": "CVE-2019-8189", "type": "cve", "cwe": ["CWE-125"], "bulletinFamily": "NVD", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "PARTIAL", "availabilityImpact": "NONE", "integrityImpact": "NONE", "baseScore": 4.3, "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "acInsufInfo": false, "impactScore": 2.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2019-8189"], "modified": "2019-10-22T15:30:00", "cpe": [], "id": "CVE-2019-8189", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-8189", "cvss": {"score": 4.3, "vector": "AV:N/AC:M/Au:N/C:P/I:N/A:N"}, "cpe23": []}, {"lastseen": "2021-02-02T07:13:05", "description": "Adobe Acrobat and Reader versions , 2019.012.20040 and earlier, 2017.011.30148 and earlier, 2017.011.30148 and earlier, 2015.006.30503 and earlier, and 2015.006.30503 and earlier have an out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure .", "edition": 8, "cvss3": {"exploitabilityScore": 3.9, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "NONE", "integrityImpact": "NONE", "baseScore": 7.5, "privilegesRequired": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "userInteraction": "NONE", "version": "3.1"}, "impactScore": 3.6}, "published": "2019-10-17T21:15:00", "title": "CVE-2019-8168", "type": "cve", "cwe": ["CWE-125"], "bulletinFamily": "NVD", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "NONE", "integrityImpact": "NONE", "baseScore": 5.0, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "acInsufInfo": false, "impactScore": 2.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2019-8168"], "modified": "2019-10-22T14:48:00", "cpe": [], "id": "CVE-2019-8168", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-8168", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:P/I:N/A:N"}, "cpe23": []}, {"lastseen": "2021-02-02T07:13:05", "description": "Adobe Acrobat and Reader versions , 2019.012.20040 and earlier, 2017.011.30148 and earlier, 2017.011.30148 and earlier, 2015.006.30503 and earlier, and 2015.006.30503 and earlier have an use after free vulnerability. Successful exploitation could lead to arbitrary code execution .", "edition": 8, "cvss3": {"exploitabilityScore": 2.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "baseScore": 8.8, "privilegesRequired": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "userInteraction": "REQUIRED", "version": "3.1"}, "impactScore": 5.9}, "published": "2019-10-17T21:15:00", "title": "CVE-2019-8175", "type": "cve", "cwe": ["CWE-416"], "bulletinFamily": "NVD", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 6.8, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "acInsufInfo": false, "impactScore": 6.4, "obtainUserPrivilege": false}, "cvelist": ["CVE-2019-8175"], "modified": "2019-10-24T14:18:00", "cpe": [], "id": "CVE-2019-8175", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-8175", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}, "cpe23": []}, {"lastseen": "2021-02-02T07:13:05", "description": "Adobe Acrobat and Reader versions , 2019.012.20040 and earlier, 2017.011.30148 and earlier, 2017.011.30148 and earlier, 2015.006.30503 and earlier, and 2015.006.30503 and earlier have an use after free vulnerability. Successful exploitation could lead to arbitrary code execution .", "edition": 8, "cvss3": {"exploitabilityScore": 2.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "baseScore": 8.8, "privilegesRequired": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "userInteraction": "REQUIRED", "version": "3.1"}, "impactScore": 5.9}, "published": "2019-10-17T21:15:00", "title": "CVE-2019-8203", "type": "cve", "cwe": ["CWE-416"], "bulletinFamily": "NVD", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 6.8, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "acInsufInfo": false, "impactScore": 6.4, "obtainUserPrivilege": false}, "cvelist": ["CVE-2019-8203"], "modified": "2019-10-23T12:45:00", "cpe": [], "id": "CVE-2019-8203", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-8203", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}, "cpe23": []}, {"lastseen": "2021-02-02T07:13:05", "description": "Adobe Acrobat and Reader versions , 2019.012.20040 and earlier, 2017.011.30148 and earlier, 2017.011.30148 and earlier, 2015.006.30503 and earlier, and 2015.006.30503 and earlier have an use after free vulnerability. Successful exploitation could lead to arbitrary code execution .", "edition": 8, "cvss3": {"exploitabilityScore": 2.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "baseScore": 8.8, "privilegesRequired": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "userInteraction": "REQUIRED", "version": "3.1"}, "impactScore": 5.9}, "published": "2019-10-17T21:15:00", "title": "CVE-2019-8181", "type": "cve", "cwe": ["CWE-416"], "bulletinFamily": "NVD", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 6.8, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "acInsufInfo": false, "impactScore": 6.4, "obtainUserPrivilege": false}, "cvelist": ["CVE-2019-8181"], "modified": "2019-10-24T14:29:00", "cpe": [], "id": "CVE-2019-8181", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-8181", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}, "cpe23": []}, {"lastseen": "2021-02-02T07:13:05", "description": "Adobe Acrobat and Reader versions , 2019.012.20040 and earlier, 2017.011.30148 and earlier, 2017.011.30148 and earlier, 2015.006.30503 and earlier, and 2015.006.30503 and earlier have an use after free vulnerability. Successful exploitation could lead to arbitrary code execution .", "edition": 8, "cvss3": {"exploitabilityScore": 2.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "baseScore": 8.8, "privilegesRequired": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "userInteraction": "REQUIRED", "version": "3.1"}, "impactScore": 5.9}, "published": "2019-10-17T21:15:00", "title": "CVE-2019-8209", "type": "cve", "cwe": ["CWE-416"], "bulletinFamily": "NVD", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 6.8, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "acInsufInfo": false, "impactScore": 6.4, "obtainUserPrivilege": false}, "cvelist": ["CVE-2019-8209"], "modified": "2019-10-22T21:05:00", "cpe": [], "id": "CVE-2019-8209", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-8209", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}, "cpe23": []}], "symantec": [{"lastseen": "2019-10-17T20:34:59", "bulletinFamily": "software", "cvelist": ["CVE-2019-8226"], "description": "### Description\n\nAdobe Acrobat and Reader are prone to information-disclosure vulnerability. An attacker can exploit this issue to gain access to sensitive information that may aid in further attacks.\n\n### Technologies Affected\n\n * Adobe Acrobat DC 2015.006.30060 \n * Adobe Acrobat DC 2015.006.30094 \n * Adobe Acrobat DC 2015.006.30306 \n * Adobe Acrobat DC 2015.006.30352 \n * Adobe Acrobat DC 2015.006.30355 \n * Adobe Acrobat DC 2015.006.30392 \n * Adobe Acrobat DC 2015.006.30394 \n * Adobe Acrobat DC 2015.006.30413 \n * Adobe Acrobat DC 2015.006.30416 \n * Adobe Acrobat DC 2015.006.30417 \n * Adobe Acrobat DC 2015.006.30418 \n * Adobe Acrobat DC 2015.006.30434 \n * Adobe Acrobat DC 2015.006.30448 \n * Adobe Acrobat DC 2015.006.30452 \n * Adobe Acrobat DC 2015.006.30456 \n * Adobe Acrobat DC 2015.006.30457 \n * Adobe Acrobat DC 2015.006.30461 \n * Adobe Acrobat DC 2015.006.30464 \n * Adobe Acrobat DC 2015.006.30475 \n * Adobe Acrobat DC 2015.006.30482 \n * Adobe Acrobat DC 2015.006.30493 \n * Adobe Acrobat DC 2015.006.30495 \n * Adobe Acrobat DC 2015.006.30497 \n * Adobe Acrobat DC 2015.006.30498 \n * Adobe Acrobat DC 2015.006.30503 \n * Adobe Acrobat DC 2017.009.20044 \n * Adobe Acrobat DC 2017.009.20058 \n * Adobe Acrobat DC 2017.011.30142 \n * Adobe Acrobat DC 2017.011.30143 \n * Adobe Acrobat DC 2017.011.30148 \n * Adobe Acrobat DC 2019.008.20071 \n * Adobe Acrobat DC 2019.008.20080 \n * Adobe Acrobat DC 2019.008.20081 \n * Adobe Acrobat DC 2019.010.20064 \n * Adobe Acrobat DC 2019.010.20069 \n * Adobe Acrobat DC 2019.010.20091 \n * Adobe Acrobat DC 2019.010.20098 \n * Adobe Acrobat DC 2019.010.20099 \n * Adobe Acrobat DC 2019.010.20100 \n * Adobe Acrobat DC 2019.012.20034 \n * Adobe Acrobat DC 2019.012.20035 \n * Adobe Acrobat DC 2019.012.20040 \n * Adobe Acrobat Reader DC 2015.006.30060 \n * Adobe Acrobat Reader DC 2015.006.30094 \n * Adobe Acrobat Reader DC 2015.006.30306 \n * Adobe Acrobat Reader DC 2015.006.30352 \n * Adobe Acrobat Reader DC 2015.006.30355 \n * Adobe Acrobat Reader DC 2015.006.30392 \n * Adobe Acrobat Reader DC 2015.006.30394 \n * Adobe Acrobat Reader DC 2015.006.30413 \n * Adobe Acrobat Reader DC 2015.006.30416 \n * Adobe Acrobat Reader DC 2015.006.30417 \n * Adobe Acrobat Reader DC 2015.006.30418 \n * Adobe Acrobat Reader DC 2015.006.30434 \n * Adobe Acrobat Reader DC 2015.006.30448 \n * Adobe Acrobat Reader DC 2015.006.30452 \n * Adobe Acrobat Reader DC 2015.006.30456 \n * Adobe Acrobat Reader DC 2015.006.30457 \n * Adobe Acrobat Reader DC 2015.006.30461 \n * Adobe Acrobat Reader DC 2015.006.30464 \n * Adobe Acrobat Reader DC 2015.006.30475 \n * Adobe Acrobat Reader DC 2015.006.30482 \n * Adobe Acrobat Reader DC 2015.006.30493 \n * Adobe Acrobat Reader DC 2015.006.30497 \n * Adobe Acrobat Reader DC 2015.006.30498 \n * Adobe Acrobat Reader DC 2015.006.30503 \n * Adobe Acrobat Reader DC 2017.009.20044 \n * Adobe Acrobat Reader DC 2017.009.20058 \n * Adobe Acrobat Reader DC 2017.011.30080 \n * Adobe Acrobat Reader DC 2017.011.30099 \n * Adobe Acrobat Reader DC 2017.011.30102 \n * Adobe Acrobat Reader DC 2017.011.30105 \n * Adobe Acrobat Reader DC 2017.011.30106 \n * Adobe Acrobat Reader DC 2017.011.30110 \n * Adobe Acrobat Reader DC 2017.011.30113 \n * Adobe Acrobat Reader DC 2017.011.30120 \n * Adobe Acrobat Reader DC 2017.011.30127 \n * Adobe Acrobat Reader DC 2017.011.30138 \n * Adobe Acrobat Reader DC 2017.011.30142 \n * Adobe Acrobat Reader DC 2017.011.30143 \n * Adobe Acrobat Reader DC 2017.011.30148 \n * Adobe Acrobat Reader DC 2019.008.20071 \n * Adobe Acrobat Reader DC 2019.008.20080 \n * Adobe Acrobat Reader DC 2019.008.20081 \n * Adobe Acrobat Reader DC 2019.010.20064 \n * Adobe Acrobat Reader DC 2019.010.20069 \n * Adobe Acrobat Reader DC 2019.010.20091 \n * Adobe Acrobat Reader DC 2019.010.20098 \n * Adobe Acrobat Reader DC 2019.010.20099 \n * Adobe Acrobat Reader DC 2019.010.20100 \n * Adobe Acrobat Reader DC 2019.012.20034 \n * Adobe Acrobat Reader DC 2019.012.20035 \n * Adobe Acrobat Reader DC 2019.012.20040 \n\n### Recommendations\n\n**Deploy network intrusion detection systems to monitor network traffic for malicious activity.** \nDeploy NIDS to monitor network traffic for signs of anomalous or suspicious activity. This includes but is not limited to requests that include NOP sleds and unexplained incoming and outgoing traffic. This may indicate exploit attempts or activity that results from a successful exploit. \n\n**Do not accept or execute files from untrusted or unknown sources.** \nTo limit exposure to these and other latent vulnerabilities, never handle files that originate from unfamiliar or untrusted sources.\n\n**Do not follow links provided by unknown or untrusted sources.** \nTo reduce the likelihood of attacks, never visit sites of questionable integrity or follow links provided by unfamiliar or untrusted sources.\n\n**Run all software as a nonprivileged user with minimal access rights.** \nTo reduce the impact of latent vulnerabilities, run applications with the minimal amount of privileges required for functionality. \n\nUpdates are available. Please see the references or vendor advisory for more information.\n", "modified": "2019-10-15T00:00:00", "published": "2019-10-15T00:00:00", "id": "SMNTC-110512", "href": "https://www.symantec.com/content/symantec/english/en/security-center/vulnerabilities/writeup.html/110512", "type": "symantec", "title": "Adobe Acrobat and Reader CVE-2019-8226 Information Disclosure Vulnerability", "cvss": {"score": 0.0, "vector": "NONE"}}, {"lastseen": "2019-10-18T10:32:19", "bulletinFamily": "software", "cvelist": ["CVE-2019-8162"], "description": "### Description\n\nAdobe Acrobat and Reader are prone to an arbitrary code-execution vulnerability. Successfully exploiting this issue allows attackers to execute arbitrary code in the context of current user running the affected application. Failed exploits will result in denial-of-service conditions.\n\n### Technologies Affected\n\n * Adobe Acrobat 2017.008.30051 \n * Adobe Acrobat 2017.011.30059 \n * Adobe Acrobat 2017.011.30066 \n * Adobe Acrobat 2017.011.30068 \n * Adobe Acrobat 2017.011.30070 \n * Adobe Acrobat 2017.011.30078 \n * Adobe Acrobat 2017.011.30079 \n * Adobe Acrobat 2017.011.30080 \n * Adobe Acrobat 2017.011.30096 \n * Adobe Acrobat 2017.011.30099 \n * Adobe Acrobat 2017.011.30102 \n * Adobe Acrobat 2017.011.30105 \n * Adobe Acrobat 2017.011.30106 \n * Adobe Acrobat 2017.011.30110 \n * Adobe Acrobat 2017.011.30113 \n * Adobe Acrobat 2017.011.30120 \n * Adobe Acrobat 2017.011.30127 \n * Adobe Acrobat 2017.011.30138 \n * Adobe Acrobat 2017.011.30140 \n * Adobe Acrobat 2017.011.30142 \n * Adobe Acrobat DC 2015.006.30060 \n * Adobe Acrobat DC 2015.006.30094 \n * Adobe Acrobat DC 2015.006.30306 \n * Adobe Acrobat DC 2015.006.30352 \n * Adobe Acrobat DC 2015.006.30355 \n * Adobe Acrobat DC 2015.006.30392 \n * Adobe Acrobat DC 2015.006.30394 \n * Adobe Acrobat DC 2015.006.30413 \n * Adobe Acrobat DC 2015.006.30416 \n * Adobe Acrobat DC 2015.006.30417 \n * Adobe Acrobat DC 2015.006.30418 \n * Adobe Acrobat DC 2015.006.30434 \n * Adobe Acrobat DC 2015.006.30448 \n * Adobe Acrobat DC 2015.006.30452 \n * Adobe Acrobat DC 2015.006.30456 \n * Adobe Acrobat DC 2015.006.30457 \n * Adobe Acrobat DC 2015.006.30461 \n * Adobe Acrobat DC 2015.006.30464 \n * Adobe Acrobat DC 2015.006.30475 \n * Adobe Acrobat DC 2015.006.30482 \n * Adobe Acrobat DC 2015.006.30493 \n * Adobe Acrobat DC 2015.006.30495 \n * Adobe Acrobat DC 2015.006.30497 \n * Adobe Acrobat DC 2015.006.30498 \n * Adobe Acrobat DC 2015.006.30499 \n * Adobe Acrobat DC 2015.006.30503 \n * Adobe Acrobat DC 2015.007.20033 \n * Adobe Acrobat DC 2015.008.20082 \n * Adobe Acrobat DC 2015.009.20069 \n * Adobe Acrobat DC 2015.06.30461 \n * Adobe Acrobat DC 2017.009.20044 \n * Adobe Acrobat DC 2017.009.20058 \n * Adobe Acrobat DC 2017.011.30142 \n * Adobe Acrobat DC 2017.011.30143 \n * Adobe Acrobat DC 2017.011.30144 \n * Adobe Acrobat DC 2017.011.30148 \n * Adobe Acrobat DC 2019.008.20071 \n * Adobe Acrobat DC 2019.008.20080 \n * Adobe Acrobat DC 2019.008.20081 \n * Adobe Acrobat DC 2019.010.20064 \n * Adobe Acrobat DC 2019.010.20069 \n * Adobe Acrobat DC 2019.010.20091 \n * Adobe Acrobat DC 2019.010.20098 \n * Adobe Acrobat DC 2019.010.20099 \n * Adobe Acrobat DC 2019.010.20100 \n * Adobe Acrobat DC 2019.012.20034 \n * Adobe Acrobat DC 2019.012.20035 \n * Adobe Acrobat DC 2019.012.20036 \n * Adobe Acrobat DC 2019.012.20040 \n * Adobe Acrobat Reader 2017.008.30051 \n * Adobe Acrobat Reader 2017.011.30059 \n * Adobe Acrobat Reader 2017.011.30066 \n * Adobe Acrobat Reader 2017.011.30068 \n * Adobe Acrobat Reader 2017.011.30070 \n * Adobe Acrobat Reader 2017.011.30078 \n * Adobe Acrobat Reader 2017.011.30079 \n * Adobe Acrobat Reader 2017.011.30080 \n * Adobe Acrobat Reader 2017.011.30096 \n * Adobe Acrobat Reader 2017.011.30105 \n * Adobe Acrobat Reader 2017.011.30106 \n * Adobe Acrobat Reader 2017.011.30110 \n * Adobe Acrobat Reader 2017.011.30113 \n * Adobe Acrobat Reader 2017.011.30138 \n * Adobe Acrobat Reader DC 2015.006.30060 \n * Adobe Acrobat Reader DC 2015.006.30094 \n * Adobe Acrobat Reader DC 2015.006.30306 \n * Adobe Acrobat Reader DC 2015.006.30352 \n * Adobe Acrobat Reader DC 2015.006.30355 \n * Adobe Acrobat Reader DC 2015.006.30392 \n * Adobe Acrobat Reader DC 2015.006.30394 \n * Adobe Acrobat Reader DC 2015.006.30413 \n * Adobe Acrobat Reader DC 2015.006.30416 \n * Adobe Acrobat Reader DC 2015.006.30417 \n * Adobe Acrobat Reader DC 2015.006.30418 \n * Adobe Acrobat Reader DC 2015.006.30434 \n * Adobe Acrobat Reader DC 2015.006.30448 \n * Adobe Acrobat Reader DC 2015.006.30452 \n * Adobe Acrobat Reader DC 2015.006.30456 \n * Adobe Acrobat Reader DC 2015.006.30457 \n * Adobe Acrobat Reader DC 2015.006.30461 \n * Adobe Acrobat Reader DC 2015.006.30464 \n * Adobe Acrobat Reader DC 2015.006.30475 \n * Adobe Acrobat Reader DC 2015.006.30482 \n * Adobe Acrobat Reader DC 2015.006.30493 \n * Adobe Acrobat Reader DC 2015.006.30497 \n * Adobe Acrobat Reader DC 2015.006.30498 \n * Adobe Acrobat Reader DC 2015.006.30499 \n * Adobe Acrobat Reader DC 2015.006.30503 \n * Adobe Acrobat Reader DC 2015.007.20033 \n * Adobe Acrobat Reader DC 2015.008.20082 \n * Adobe Acrobat Reader DC 2015.009.20069 \n * Adobe Acrobat Reader DC 2015.06.30461 \n * Adobe Acrobat Reader DC 2017.009.20044 \n * Adobe Acrobat Reader DC 2017.009.20058 \n * Adobe Acrobat Reader DC 2017.011.30080 \n * Adobe Acrobat Reader DC 2017.011.30099 \n * Adobe Acrobat Reader DC 2017.011.30102 \n * Adobe Acrobat Reader DC 2017.011.30105 \n * Adobe Acrobat Reader DC 2017.011.30106 \n * Adobe Acrobat Reader DC 2017.011.30110 \n * Adobe Acrobat Reader DC 2017.011.30113 \n * Adobe Acrobat Reader DC 2017.011.30120 \n * Adobe Acrobat Reader DC 2017.011.30127 \n * Adobe Acrobat Reader DC 2017.011.30138 \n * Adobe Acrobat Reader DC 2017.011.30142 \n * Adobe Acrobat Reader DC 2017.011.30143 \n * Adobe Acrobat Reader DC 2017.011.30144 \n * Adobe Acrobat Reader DC 2017.011.30148 \n * Adobe Acrobat Reader DC 2019.008.20071 \n * Adobe Acrobat Reader DC 2019.008.20080 \n * Adobe Acrobat Reader DC 2019.008.20081 \n * Adobe Acrobat Reader DC 2019.010.20064 \n * Adobe Acrobat Reader DC 2019.010.20069 \n * Adobe Acrobat Reader DC 2019.010.20091 \n * Adobe Acrobat Reader DC 2019.010.20098 \n * Adobe Acrobat Reader DC 2019.010.20099 \n * Adobe Acrobat Reader DC 2019.010.20100 \n * Adobe Acrobat Reader DC 2019.012.20034 \n * Adobe Acrobat Reader DC 2019.012.20035 \n * Adobe Acrobat Reader DC 2019.012.20036 \n * Adobe Acrobat Reader DC 2019.012.20040 \n * Adobe Adobe Acrobat DC 2017.011.30143 \n * Adobe Adobe Acrobat Reader DC 2015.006.30498 \n * Adobe Adobe Acrobat Reader DC 2017.011.30143 \n\n### Recommendations\n\n**Deploy network intrusion detection systems to monitor network traffic for malicious activity.** \nDeploy NIDS to monitor network traffic for signs of anomalous or suspicious activity. This includes but is not limited to requests that include NOP sleds and unexplained incoming and outgoing traffic \n\n**Do not accept or execute files from untrusted or unknown sources.** \nTo reduce the likelihood of successful exploits, do not open files that originate from untrusted sources.\n\n**Implement multiple redundant layers of security.** \nVarious memory-protection schemes (such as nonexecutable and randomly mapped memory segments) may hinder an attacker's ability to exploit this vulnerability to execute arbitrary code.\n\n**Run all software as a nonprivileged user with minimal access rights.** \nTo limit the impact of latent vulnerabilities, configure database servers and other applications to run as a nonadministrative user with minimal access rights.\n\nUpdates are available. Please see the references or vendor advisory for more information.\n", "modified": "2019-10-15T00:00:00", "published": "2019-10-15T00:00:00", "id": "SMNTC-110514", "href": "https://www.symantec.com/content/symantec/english/en/security-center/vulnerabilities/writeup.html/110514", "type": "symantec", "title": "Adobe Acrobat and Reader CVE-2019-8162 Arbitrary Code Execution Vulnerability", "cvss": {"score": 0.0, "vector": "NONE"}}, {"lastseen": "2019-10-17T10:30:53", "bulletinFamily": "software", "cvelist": ["CVE-2019-8166"], "description": "### Description\n\nAdobe Acrobat and Reader are prone to an arbitrary code-execution vulnerability. Successfully exploiting this issue allows attackers to execute arbitrary code in the context of current user running the affected application. Failed exploits will result in denial-of-service conditions.\n\n### Technologies Affected\n\n * Adobe Acrobat 2017.008.30051 \n * Adobe Acrobat 2017.011.30059 \n * Adobe Acrobat 2017.011.30066 \n * Adobe Acrobat 2017.011.30068 \n * Adobe Acrobat 2017.011.30070 \n * Adobe Acrobat 2017.011.30078 \n * Adobe Acrobat 2017.011.30079 \n * Adobe Acrobat 2017.011.30080 \n * Adobe Acrobat 2017.011.30096 \n * Adobe Acrobat 2017.011.30099 \n * Adobe Acrobat 2017.011.30102 \n * Adobe Acrobat 2017.011.30105 \n * Adobe Acrobat 2017.011.30106 \n * Adobe Acrobat 2017.011.30110 \n * Adobe Acrobat 2017.011.30113 \n * Adobe Acrobat 2017.011.30120 \n * Adobe Acrobat 2017.011.30127 \n * Adobe Acrobat 2017.011.30138 \n * Adobe Acrobat 2017.011.30140 \n * Adobe Acrobat 2017.011.30142 \n * Adobe Acrobat DC 2015.006.30060 \n * Adobe Acrobat DC 2015.006.30094 \n * Adobe Acrobat DC 2015.006.30306 \n * Adobe Acrobat DC 2015.006.30352 \n * Adobe Acrobat DC 2015.006.30355 \n * Adobe Acrobat DC 2015.006.30392 \n * Adobe Acrobat DC 2015.006.30394 \n * Adobe Acrobat DC 2015.006.30413 \n * Adobe Acrobat DC 2015.006.30416 \n * Adobe Acrobat DC 2015.006.30417 \n * Adobe Acrobat DC 2015.006.30418 \n * Adobe Acrobat DC 2015.006.30434 \n * Adobe Acrobat DC 2015.006.30448 \n * Adobe Acrobat DC 2015.006.30452 \n * Adobe Acrobat DC 2015.006.30456 \n * Adobe Acrobat DC 2015.006.30457 \n * Adobe Acrobat DC 2015.006.30461 \n * Adobe Acrobat DC 2015.006.30464 \n * Adobe Acrobat DC 2015.006.30475 \n * Adobe Acrobat DC 2015.006.30482 \n * Adobe Acrobat DC 2015.006.30493 \n * Adobe Acrobat DC 2015.006.30495 \n * Adobe Acrobat DC 2015.006.30497 \n * Adobe Acrobat DC 2015.006.30498 \n * Adobe Acrobat DC 2015.006.30499 \n * Adobe Acrobat DC 2015.006.30503 \n * Adobe Acrobat DC 2015.007.20033 \n * Adobe Acrobat DC 2015.008.20082 \n * Adobe Acrobat DC 2015.009.20069 \n * Adobe Acrobat DC 2015.06.30461 \n * Adobe Acrobat DC 2017.009.20044 \n * Adobe Acrobat DC 2017.009.20058 \n * Adobe Acrobat DC 2017.011.30142 \n * Adobe Acrobat DC 2017.011.30143 \n * Adobe Acrobat DC 2017.011.30144 \n * Adobe Acrobat DC 2017.011.30148 \n * Adobe Acrobat DC 2019.008.20071 \n * Adobe Acrobat DC 2019.008.20080 \n * Adobe Acrobat DC 2019.008.20081 \n * Adobe Acrobat DC 2019.010.20064 \n * Adobe Acrobat DC 2019.010.20069 \n * Adobe Acrobat DC 2019.010.20091 \n * Adobe Acrobat DC 2019.010.20098 \n * Adobe Acrobat DC 2019.010.20099 \n * Adobe Acrobat DC 2019.010.20100 \n * Adobe Acrobat DC 2019.012.20034 \n * Adobe Acrobat DC 2019.012.20035 \n * Adobe Acrobat DC 2019.012.20036 \n * Adobe Acrobat DC 2019.012.20040 \n * Adobe Acrobat Reader 2017.008.30051 \n * Adobe Acrobat Reader 2017.011.30059 \n * Adobe Acrobat Reader 2017.011.30066 \n * Adobe Acrobat Reader 2017.011.30068 \n * Adobe Acrobat Reader 2017.011.30070 \n * Adobe Acrobat Reader 2017.011.30078 \n * Adobe Acrobat Reader 2017.011.30079 \n * Adobe Acrobat Reader 2017.011.30080 \n * Adobe Acrobat Reader 2017.011.30096 \n * Adobe Acrobat Reader 2017.011.30105 \n * Adobe Acrobat Reader 2017.011.30106 \n * Adobe Acrobat Reader 2017.011.30110 \n * Adobe Acrobat Reader 2017.011.30113 \n * Adobe Acrobat Reader 2017.011.30138 \n * Adobe Acrobat Reader DC 2015.006.30060 \n * Adobe Acrobat Reader DC 2015.006.30094 \n * Adobe Acrobat Reader DC 2015.006.30306 \n * Adobe Acrobat Reader DC 2015.006.30352 \n * Adobe Acrobat Reader DC 2015.006.30355 \n * Adobe Acrobat Reader DC 2015.006.30392 \n * Adobe Acrobat Reader DC 2015.006.30394 \n * Adobe Acrobat Reader DC 2015.006.30413 \n * Adobe Acrobat Reader DC 2015.006.30416 \n * Adobe Acrobat Reader DC 2015.006.30417 \n * Adobe Acrobat Reader DC 2015.006.30418 \n * Adobe Acrobat Reader DC 2015.006.30434 \n * Adobe Acrobat Reader DC 2015.006.30448 \n * Adobe Acrobat Reader DC 2015.006.30452 \n * Adobe Acrobat Reader DC 2015.006.30456 \n * Adobe Acrobat Reader DC 2015.006.30457 \n * Adobe Acrobat Reader DC 2015.006.30461 \n * Adobe Acrobat Reader DC 2015.006.30464 \n * Adobe Acrobat Reader DC 2015.006.30475 \n * Adobe Acrobat Reader DC 2015.006.30482 \n * Adobe Acrobat Reader DC 2015.006.30493 \n * Adobe Acrobat Reader DC 2015.006.30497 \n * Adobe Acrobat Reader DC 2015.006.30498 \n * Adobe Acrobat Reader DC 2015.006.30499 \n * Adobe Acrobat Reader DC 2015.006.30503 \n * Adobe Acrobat Reader DC 2015.007.20033 \n * Adobe Acrobat Reader DC 2015.008.20082 \n * Adobe Acrobat Reader DC 2015.009.20069 \n * Adobe Acrobat Reader DC 2015.06.30461 \n * Adobe Acrobat Reader DC 2017.009.20044 \n * Adobe Acrobat Reader DC 2017.009.20058 \n * Adobe Acrobat Reader DC 2017.011.30080 \n * Adobe Acrobat Reader DC 2017.011.30099 \n * Adobe Acrobat Reader DC 2017.011.30102 \n * Adobe Acrobat Reader DC 2017.011.30105 \n * Adobe Acrobat Reader DC 2017.011.30106 \n * Adobe Acrobat Reader DC 2017.011.30110 \n * Adobe Acrobat Reader DC 2017.011.30113 \n * Adobe Acrobat Reader DC 2017.011.30120 \n * Adobe Acrobat Reader DC 2017.011.30127 \n * Adobe Acrobat Reader DC 2017.011.30138 \n * Adobe Acrobat Reader DC 2017.011.30142 \n * Adobe Acrobat Reader DC 2017.011.30143 \n * Adobe Acrobat Reader DC 2017.011.30144 \n * Adobe Acrobat Reader DC 2017.011.30148 \n * Adobe Acrobat Reader DC 2019.008.20071 \n * Adobe Acrobat Reader DC 2019.008.20080 \n * Adobe Acrobat Reader DC 2019.008.20081 \n * Adobe Acrobat Reader DC 2019.010.20064 \n * Adobe Acrobat Reader DC 2019.010.20069 \n * Adobe Acrobat Reader DC 2019.010.20091 \n * Adobe Acrobat Reader DC 2019.010.20098 \n * Adobe Acrobat Reader DC 2019.010.20099 \n * Adobe Acrobat Reader DC 2019.010.20100 \n * Adobe Acrobat Reader DC 2019.012.20034 \n * Adobe Acrobat Reader DC 2019.012.20035 \n * Adobe Acrobat Reader DC 2019.012.20036 \n * Adobe Acrobat Reader DC 2019.012.20040 \n * Adobe Adobe Acrobat DC 2017.011.30143 \n * Adobe Adobe Acrobat Reader DC 2015.006.30498 \n * Adobe Adobe Acrobat Reader DC 2017.011.30143 \n\n### Recommendations\n\n**Deploy network intrusion detection systems to monitor network traffic for malicious activity.** \nDeploy NIDS to monitor network traffic for signs of anomalous or suspicious activity. This includes but is not limited to requests that include NOP sleds and unexplained incoming and outgoing traffic \n\n**Do not accept or execute files from untrusted or unknown sources.** \nTo reduce the likelihood of successful exploits, do not open files that originate from untrusted sources.\n\n**Implement multiple redundant layers of security.** \nVarious memory-protection schemes (such as nonexecutable and randomly mapped memory segments) may hinder an attacker's ability to exploit this vulnerability to execute arbitrary code.\n\n**Run all software as a nonprivileged user with minimal access rights.** \nTo limit the impact of latent vulnerabilities, configure database servers and other applications to run as a nonadministrative user with minimal access rights.\n\nUpdates are available. Please see the references or vendor advisory for more information.\n", "modified": "2019-10-15T00:00:00", "published": "2019-10-15T00:00:00", "id": "SMNTC-110511", "href": "https://www.symantec.com/content/symantec/english/en/security-center/vulnerabilities/writeup.html/110511", "type": "symantec", "title": "Adobe Acrobat and Reader CVE-2019-8166 Arbitrary Code Execution Vulnerability", "cvss": {"score": 0.0, "vector": "NONE"}}, {"lastseen": "2019-10-17T10:30:53", "bulletinFamily": "software", "cvelist": ["CVE-2019-8160"], "description": "### Description\n\nAdobe Acrobat and Reader are prone to a cross-site scripting vulnerability. An attacker may leverage this issue to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This may allow the attacker to steal cookie-based authentication credentials and launch other attacks.\n\n### Technologies Affected\n\n * Adobe Acrobat DC 2015.006.30060 \n * Adobe Acrobat DC 2015.006.30094 \n * Adobe Acrobat DC 2015.006.30306 \n * Adobe Acrobat DC 2015.006.30352 \n * Adobe Acrobat DC 2015.006.30355 \n * Adobe Acrobat DC 2015.006.30392 \n * Adobe Acrobat DC 2015.006.30394 \n * Adobe Acrobat DC 2015.006.30413 \n * Adobe Acrobat DC 2015.006.30416 \n * Adobe Acrobat DC 2015.006.30417 \n * Adobe Acrobat DC 2015.006.30418 \n * Adobe Acrobat DC 2015.006.30434 \n * Adobe Acrobat DC 2015.006.30448 \n * Adobe Acrobat DC 2015.006.30452 \n * Adobe Acrobat DC 2015.006.30456 \n * Adobe Acrobat DC 2015.006.30457 \n * Adobe Acrobat DC 2015.006.30461 \n * Adobe Acrobat DC 2015.006.30464 \n * Adobe Acrobat DC 2015.006.30475 \n * Adobe Acrobat DC 2015.006.30482 \n * Adobe Acrobat DC 2015.006.30493 \n * Adobe Acrobat DC 2015.006.30495 \n * Adobe Acrobat DC 2015.006.30497 \n * Adobe Acrobat DC 2015.006.30498 \n * Adobe Acrobat DC 2015.006.30503 \n * Adobe Acrobat DC 2017.009.20044 \n * Adobe Acrobat DC 2017.009.20058 \n * Adobe Acrobat DC 2017.011.30142 \n * Adobe Acrobat DC 2017.011.30143 \n * Adobe Acrobat DC 2017.011.30148 \n * Adobe Acrobat DC 2019.008.20071 \n * Adobe Acrobat DC 2019.008.20080 \n * Adobe Acrobat DC 2019.008.20081 \n * Adobe Acrobat DC 2019.010.20064 \n * Adobe Acrobat DC 2019.010.20069 \n * Adobe Acrobat DC 2019.010.20091 \n * Adobe Acrobat DC 2019.010.20098 \n * Adobe Acrobat DC 2019.010.20099 \n * Adobe Acrobat DC 2019.010.20100 \n * Adobe Acrobat DC 2019.012.20034 \n * Adobe Acrobat DC 2019.012.20035 \n * Adobe Acrobat DC 2019.012.20040 \n * Adobe Acrobat Reader DC 2015.006.30060 \n * Adobe Acrobat Reader DC 2015.006.30094 \n * Adobe Acrobat Reader DC 2015.006.30306 \n * Adobe Acrobat Reader DC 2015.006.30352 \n * Adobe Acrobat Reader DC 2015.006.30355 \n * Adobe Acrobat Reader DC 2015.006.30392 \n * Adobe Acrobat Reader DC 2015.006.30394 \n * Adobe Acrobat Reader DC 2015.006.30413 \n * Adobe Acrobat Reader DC 2015.006.30416 \n * Adobe Acrobat Reader DC 2015.006.30417 \n * Adobe Acrobat Reader DC 2015.006.30418 \n * Adobe Acrobat Reader DC 2015.006.30434 \n * Adobe Acrobat Reader DC 2015.006.30448 \n * Adobe Acrobat Reader DC 2015.006.30452 \n * Adobe Acrobat Reader DC 2015.006.30456 \n * Adobe Acrobat Reader DC 2015.006.30457 \n * Adobe Acrobat Reader DC 2015.006.30461 \n * Adobe Acrobat Reader DC 2015.006.30464 \n * Adobe Acrobat Reader DC 2015.006.30475 \n * Adobe Acrobat Reader DC 2015.006.30482 \n * Adobe Acrobat Reader DC 2015.006.30493 \n * Adobe Acrobat Reader DC 2015.006.30497 \n * Adobe Acrobat Reader DC 2015.006.30498 \n * Adobe Acrobat Reader DC 2015.006.30503 \n * Adobe Acrobat Reader DC 2017.009.20044 \n * Adobe Acrobat Reader DC 2017.009.20058 \n * Adobe Acrobat Reader DC 2017.011.30080 \n * Adobe Acrobat Reader DC 2017.011.30099 \n * Adobe Acrobat Reader DC 2017.011.30102 \n * Adobe Acrobat Reader DC 2017.011.30105 \n * Adobe Acrobat Reader DC 2017.011.30106 \n * Adobe Acrobat Reader DC 2017.011.30110 \n * Adobe Acrobat Reader DC 2017.011.30113 \n * Adobe Acrobat Reader DC 2017.011.30120 \n * Adobe Acrobat Reader DC 2017.011.30127 \n * Adobe Acrobat Reader DC 2017.011.30138 \n * Adobe Acrobat Reader DC 2017.011.30142 \n * Adobe Acrobat Reader DC 2017.011.30143 \n * Adobe Acrobat Reader DC 2017.011.30148 \n * Adobe Acrobat Reader DC 2019.008.20071 \n * Adobe Acrobat Reader DC 2019.008.20080 \n * Adobe Acrobat Reader DC 2019.008.20081 \n * Adobe Acrobat Reader DC 2019.010.20064 \n * Adobe Acrobat Reader DC 2019.010.20069 \n * Adobe Acrobat Reader DC 2019.010.20091 \n * Adobe Acrobat Reader DC 2019.010.20098 \n * Adobe Acrobat Reader DC 2019.010.20099 \n * Adobe Acrobat Reader DC 2019.010.20100 \n * Adobe Acrobat Reader DC 2019.012.20034 \n * Adobe Acrobat Reader DC 2019.012.20035 \n * Adobe Acrobat Reader DC 2019.012.20040 \n\n### Recommendations\n\n**Deploy network intrusion detection systems to monitor network traffic for malicious activity.** \nDeploy NIDS to monitor network traffic for signs of anomalous or suspicious activity. This includes but is not limited to requests that include NOP sleds and unexplained incoming and outgoing traffic. This may indicate exploit attempts or activity that results from a successful exploit. \n\n**Do not accept or execute files from untrusted or unknown sources.** \nTo limit exposure to these and other latent vulnerabilities, never handle files that originate from unfamiliar or untrusted sources.\n\n**Do not follow links provided by unknown or untrusted sources.** \nTo reduce the likelihood of attacks, never visit sites of questionable integrity or follow links provided by unfamiliar or untrusted sources.\n\n**Run all software as a nonprivileged user with minimal access rights.** \nTo reduce the impact of latent vulnerabilities, run applications with the minimal amount of privileges required for functionality. \n\nUpdates are available. Please see the references or vendor advisory for more information.\n", "modified": "2019-10-15T00:00:00", "published": "2019-10-15T00:00:00", "id": "SMNTC-110513", "href": "https://www.symantec.com/content/symantec/english/en/security-center/vulnerabilities/writeup.html/110513", "type": "symantec", "title": "Adobe Acrobat and Reader CVE-2019-8160 Cross Site Scripting Vulnerability", "cvss": {"score": 0.0, "vector": "NONE"}}], "zdi": [{"lastseen": "2020-06-22T11:42:34", "bulletinFamily": "info", "cvelist": ["CVE-2019-8192"], "description": "This vulnerability allows remote attackers to execute arbitrary code on affected installations of Adobe Acrobat Pro DC. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of XFA form objects. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execute code in the context of the current process.", "edition": 1, "modified": "2019-06-22T00:00:00", "published": "2019-10-15T00:00:00", "id": "ZDI-19-890", "href": "https://www.zerodayinitiative.com/advisories/ZDI-19-890/", "title": "Adobe Acrobat Pro DC XFA Form Use-After-Free Remote Code Execution Vulnerability", "type": "zdi", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2020-06-22T11:40:30", "bulletinFamily": "info", "cvelist": ["CVE-2019-8188"], "description": "This vulnerability allows remote attackers to disclose sensitive information on affected installations of Adobe Acrobat Pro DC. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of DWG files. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this in conjunction with other vulnerabilities to execute code in the context of the current process.", "edition": 1, "modified": "2019-06-22T00:00:00", "published": "2019-10-15T00:00:00", "id": "ZDI-19-884", "href": "https://www.zerodayinitiative.com/advisories/ZDI-19-884/", "title": "Adobe Acrobat Pro DC DWG File Parsing Use-After-Free Information Disclosure Vulnerability", "type": "zdi", "cvss": {"score": 4.3, "vector": "AV:N/AC:M/Au:N/C:P/I:N/A:N"}}, {"lastseen": "2020-06-22T11:41:21", "bulletinFamily": "info", "cvelist": ["CVE-2019-8189"], "description": "This vulnerability allows remote attackers to disclose sensitive information on affected installations of Adobe Acrobat Pro DC. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the processing of DXF files. Crafted data in a DXF file can trigger a read past the end of an allocated buffer. An attacker can leverage this in conjunction with other vulnerabilities to execute code in the context of the current process.", "edition": 1, "modified": "2019-06-22T00:00:00", "published": "2019-10-15T00:00:00", "id": "ZDI-19-885", "href": "https://www.zerodayinitiative.com/advisories/ZDI-19-885/", "title": "Adobe Acrobat Pro DC DXF File Parsing Out-Of-Bounds Read Information Disclosure Vulnerability", "type": "zdi", "cvss": {"score": 4.3, "vector": "AV:N/AC:M/Au:N/C:P/I:N/A:N"}}, {"lastseen": "2020-06-22T11:42:21", "bulletinFamily": "info", "cvelist": ["CVE-2019-8180"], "description": "This vulnerability allows remote attackers to execute arbitrary code on affected installations of Adobe Acrobat Pro DC. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the processing of DST files. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execute code in the context of the current process.", "edition": 1, "modified": "2019-06-22T00:00:00", "published": "2019-10-15T00:00:00", "id": "ZDI-19-881", "href": "https://www.zerodayinitiative.com/advisories/ZDI-19-881/", "title": "Adobe Acrobat Pro DC DST File Parsing Use-After-Free Remote Code Execution Vulnerability", "type": "zdi", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2020-06-22T11:40:32", "bulletinFamily": "info", "cvelist": ["CVE-2019-8175"], "description": "This vulnerability allows remote attackers to execute arbitrary code on affected installations of Adobe Acrobat Pro DC. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the processing of DST files. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execute code in the context of the current process.", "edition": 1, "modified": "2019-06-22T00:00:00", "published": "2019-10-15T00:00:00", "id": "ZDI-19-875", "href": "https://www.zerodayinitiative.com/advisories/ZDI-19-875/", "title": "Adobe Acrobat Pro DC DST File Parsing Use-After-Free Remote Code Execution Vulnerability", "type": "zdi", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2020-06-22T11:42:23", "bulletinFamily": "info", "cvelist": ["CVE-2019-8190"], "description": "This vulnerability allows remote attackers to disclose sensitive information on affected installations of Adobe Acrobat Pro DC. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of DXF files. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated heap-based buffer. An attacker can leverage this in conjunction with other vulnerabilities to execute code in the context of the current process.", "edition": 1, "modified": "2019-06-22T00:00:00", "published": "2019-10-15T00:00:00", "id": "ZDI-19-887", "href": "https://www.zerodayinitiative.com/advisories/ZDI-19-887/", "title": "Adobe Acrobat Pro DC DXF File Parsing Out-Of-Bounds Read Information Disclosure Vulnerability", "type": "zdi", "cvss": {"score": 4.3, "vector": "AV:N/AC:M/Au:N/C:P/I:N/A:N"}}, {"lastseen": "2020-06-22T11:42:17", "bulletinFamily": "info", "cvelist": ["CVE-2019-8187"], "description": "This vulnerability allows remote attackers to disclose sensitive information on affected installations of Adobe Acrobat Pro DC. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of DWG files. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this in conjunction with other vulnerabilities to execute code in the context of the current process.", "edition": 1, "modified": "2019-06-22T00:00:00", "published": "2019-10-15T00:00:00", "id": "ZDI-19-883", "href": "https://www.zerodayinitiative.com/advisories/ZDI-19-883/", "title": "Adobe Acrobat Pro DC DWG File Parsing Use-After-Free Information Disclosure Vulnerability", "type": "zdi", "cvss": {"score": 4.3, "vector": "AV:N/AC:M/Au:N/C:P/I:N/A:N"}}, {"lastseen": "2020-06-22T11:40:48", "bulletinFamily": "info", "cvelist": ["CVE-2019-8223"], "description": "This vulnerability allows remote attackers to execute arbitrary code on affected installations of Adobe Acrobat Pro DC. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of the closeDoc method within XFA forms. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execute code in the context of the current process.", "edition": 1, "modified": "2019-06-22T00:00:00", "published": "2019-10-15T00:00:00", "id": "ZDI-19-899", "href": "https://www.zerodayinitiative.com/advisories/ZDI-19-899/", "title": "Adobe Acrobat Pro DC XFA closeDoc Use-After-Free Remote Code Execution Vulnerability", "type": "zdi", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2020-06-22T11:40:25", "bulletinFamily": "info", "cvelist": ["CVE-2019-8181"], "description": "This vulnerability allows remote attackers to execute arbitrary code on affected installations of Adobe Acrobat Pro DC. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the processing of DST files. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execute code in the context of the current process.", "edition": 1, "modified": "2019-06-22T00:00:00", "published": "2019-10-15T00:00:00", "id": "ZDI-19-882", "href": "https://www.zerodayinitiative.com/advisories/ZDI-19-882/", "title": "Adobe Acrobat Pro DC DST File Parsing Use-After-Free Remote Code Execution Vulnerability", "type": "zdi", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}], "talosblog": [{"lastseen": "2019-10-24T09:32:09", "bulletinFamily": "blog", "cvelist": ["CVE-2019-8183"], "description": "[](<https://1.bp.blogspot.com/-4KmzPgCzEnI/XUgv9m3AF_I/AAAAAAAAAC4/C28-47fWukERV4yT0uQnA2_xuy2aB8ZkgCPcBGAYYCw/s1600/recurring%2Bblog%2Bimages_vuln%2Bspotlight.jpg>)\n\n_ \n__Aleksandar Nikolic of Cisco Talos discovered this vulnerability._ \n \nCisco Talos once again would like to bring attention to a remote code execution vulnerability in Adobe Acrobat Reader. Acrobat, which is one of the most popular PDF readers on the market, contains a bug when the software incorrectly counts array elements. The same code present in the previously disclosed [TALOS-2018-0704](<https://www.talosintelligence.com/vulnerability_reports/TALOS-2018-0704>) and [TALOS-2019-0774](<https://www.talosintelligence.com/vulnerability_reports/TALOS-2019-0774>) could trigger this vulnerability, allowing the attacker to potentially execute remote code. Adobe previously patched those two vulnerabilities, but the fixes did not cover all possible cases. \n\n\n[](<https://1.bp.blogspot.com/-JXkSIehaKi4/XUgwEX6wLjI/AAAAAAAAAC8/8mea4rZfy7AGT_PIchejkERmCFmfdbxTACPcBGAYYCw/s1600/patch_availability_available.jpg>)\n\n \nIn accordance with our coordinated disclosure policy, Cisco Talos worked with Adobe to ensure that these issues are resolved and that [an update](<https://helpx.adobe.com/security/products/acrobat/apsb19-49.html>) is available for affected customers. \n \n\n\n### Vulnerability details\n\nAdobe Acrobat Reader DC text field value remote code execution vulnerability redux (TALOS-2019-0860/CVE-2019-8183) \n \nA specific JavaScript code embedded in a PDF file can lead to a heap corruption when opening a PDF document in Adobe Acrobat Reader DC, version 2019.012.20035. With careful memory manipulation, this can lead to arbitrary code execution. In order to trigger this vulnerability, the victim would need to open the malicious file or access a malicious web page. The vulnerability in this advisory is the same as TALOS-2018-0704 and TALOS-2019-0774, as it wasn't properly patched to cover all cases. \n \nRead the complete vulnerability advisory [here](<https://talosintelligence.com/vulnerability_reports/TALOS-2019-0860>) for additional information. \n\n\n### Versions tested\n\nTalos tested and confirmed that Adobe Acrobat Reader DC, version 2019.012.20035, is affected by this vulnerability. \n \n\n\n### Coverage\n\nThe following SNORT\u24c7 rules will detect exploitation attempts. Note that additional rules may be released at a future date and current rules are subject to change pending additional vulnerability information. For the most current rule information, please refer to your Firepower Management Center or Snort.org. \n \nSnort Rules: 48293, 48294 \n\n\n \n\n\n", "modified": "2019-10-15T12:34:36", "published": "2019-10-15T12:34:36", "id": "TALOSBLOG:E49BDBA6ED48ABB1895B3C7CEA85C81C", "href": "http://feedproxy.google.com/~r/feedburner/Talos/~3/Bbthfw2y8hE/vuln-spotlight-adobe-reader-redux-oct-2019.html", "type": "talosblog", "title": "Vulnerability Spotlight: Another fix for Adobe Acrobat Reader DC text field value remote code execution", "cvss": {"score": 9.3, "vector": "AV:N/AC:M/Au:N/C:C/I:C/A:C"}}], "talos": [{"lastseen": "2020-07-01T21:25:02", "bulletinFamily": "info", "cvelist": ["CVE-2019-8183"], "description": "# Talos Vulnerability Report\n\n### TALOS-2019-0860\n\n## Adobe Acrobat Reader DC text field value remote code execution vulnerability redux\n\n##### October 15, 2019\n\n##### CVE Number\n\nCVE-2019-8183\n\n### Summary\n\nA specific JavaScript code embedded in a PDF file can lead to a heap corruption when opening a PDF document in Adobe Acrobat Reader DC, version 2019.012.20035. With careful memory manipulation, this can lead to arbitrary code execution. In order to trigger this vulnerability, the victim would need to open the malicious file or access a malicious web page. The vulnerability in this advisory is the same as TALOS-2018-0704 and TALOS-2019-0774, as it wasn\u2019t properly patched to cover all cases.\n\n### Tested Versions\n\nAdobe Acrobat Reader DC 2019.012.20035\n\n### Product URLs\n\n<https://get.adobe.com/reader/>\n\n### CVSSv3 Score\n\n8.8 - CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\n\n### CWE\n\nCWE-194: Unexpected Sign Extension\n\n### Details\n\nAdobe Acrobat Reader is the most popular PDF reader currently on the market. It has a large user base, is usually a default PDF reader on systems and integrates into web browsers as a plugin for rendering PDFs. As such, tricking a user into visiting a malicious web page or sending a specially crafted email attachment can be enough to trigger this vulnerability.\n\nAdobe Acrobat Reader DC supports embedded JavaScript code in the PDF to allow for interactive PDF forms. This gives the potential attacker the ability to precisely control memory layout and poses additional attack surface.\n\nThis vulnerability stems from an incorrect counting of array elements and can be triggered by the same code as TALOS-2018-0704 and TALOS-2019-0774, with changed array size:\n \n \n var r = new RegExp(Array(32771).join(String.fromCharCode(24)));\n app.activeDocs[0].getField('mydata')['value'] = r;\n \n\nThe buffer allocation happens in the follwing code:\n \n \n .text:20BDCA9C\n .text:20BDCA9C loc_20BDCA9C:\n .text:20BDCA9C imul eax, edx, 14h\n .text:20BDCA9F push eax\n .text:20BDCAA0 xor eax, eax\n .text:20BDCAA2 inc eax\n .text:20BDCAA3 push eax\n .text:20BDCAA4 call sub_20860CF9 \n \n\nAs before, the number of elements is multiplied by 0x14 and a buffer is allocated by calling `sub_20860cf9`. Value in `edx` comes from preceeding code:\n \n \n .text:20BDCA8B cmp eax, edi\n .text:20BDCA8D jz short loc_20BDCA9C\n .text:20BDCA8F movzx ecx, word ptr [eax+0Ch]\n .text:20BDCA93 add edx, ecx\n .text:20BDCA95 mov dword ptr [ebp+var_54+4], edx\n .text:20BDCA98 mov eax, [eax]\n .text:20BDCA9A jmp short loc_20BDCA8B\n \n\nThe above code is walking the array and counting the elements. It doesn\u2019t, however, count the tail element so `edx` ends up being 32770 for our PoC. We can observe the size of allocated chunk:\n \n \n 6211caa4 e85042c8ff call AcroForm!PlugInMain+0xa19 (61da0cf9)\n 1:009> \n eax=7bcfafd8 ebx=00000000 ecx=00000000 edx=000a0028 esi=48e8ed50 edi=48e92fe0\n eip=6211caa9 esp=0053bb1c ebp=0053bb8c iopl=0 nv up ei pl nz na pe nc\n cs=0023 ss=002b ds=002b es=002b fs=0053 gs=002b efl=00000206\n AcroForm!DllUnregisterServer+0x15be29:\n 6211caa9 8bb68c020000 mov esi,dword ptr [esi+28Ch] ds:002b:48e8efdc=48e92fe0\n 1:009> ?eax\n Evaluate expression: 2077208536 = 7bcfafd8\n 1:009> !heap -p -a eax\n address 7bcfafd8 found in\n _DPH_HEAP_ROOT @ 9501000\n in busy allocation ( DPH_HEAP_BLOCK: UserAddr UserSize - VirtAddr VirtSize)\n 7bcc164c: 7bcfafd8 a0028 - 7bcfa000 a2000\n 6534abb0 verifier!AVrfDebugPageHeapAllocate+0x00000240\n 7771245b ntdll!RtlDebugAllocateHeap+0x00000039\n 77676dd9 ntdll!RtlpAllocateHeap+0x000000f9\n 77675ec9 ntdll!RtlpAllocateHeapInternal+0x00000179\n 77675d3e ntdll!RtlAllocateHeap+0x0000003e\n 76e01406 ucrtbase!_malloc_base+0x00000026\n 634cfcd9 AcroRd32!AcroWinMainSandbox+0x00003ed9\n 61da0d26 AcroForm!PlugInMain+0x00000a46\n 6211caa9 AcroForm!DllUnregisterServer+0x0015be29\n 6211e01e AcroForm!DllUnregisterServer+0x0015d39e\n 61ed77dc AcroForm!PlugInMain+0x001374fc\n \n\nWe can see the size is 0xa0028 which is just enough for 32770 elements, but not more. Continuing the execution results in the following crash:\n \n \n ===========================================================\n VERIFIER STOP 0000000F: pid 0xA22C: corrupted suffix pattern \n \n 09501000 : Heap handle\n 8BF5EFF8 : Heap block\n 00000002 : Block size\n 8BF5EFFA : corruption address\n ===========================================================\n This verifier stop is not continuable. Process will be terminated \n when you use the `go' debugger command.\n ===========================================================\n \n (a22c.4dc8): Break instruction exception - code 80000003 (first chance)\n eax=003e8000 ebx=00000000 ecx=00000001 edx=0053b47c esi=6534ad40 edi=00000000\n eip=6534ddf2 esp=0053b41c ebp=0053b424 iopl=0 nv up ei pl nz na po nc\n cs=0023 ss=002b ds=002b es=002b fs=0053 gs=002b efl=00000202\n verifier!VerifierBreakin+0x42:\n 6534ddf2 cc int 3\n 1:009> k\n # ChildEBP RetAddr \n 00 0053b424 6534def0 verifier!VerifierBreakin+0x42\n 01 0053b74c 6534e1f7 verifier!VerifierCaptureContextAndReportStop+0xf0\n 02 0053b794 6534bc55 verifier!VerifierStopMessage+0x2c7\n 03 0053b800 6534bf3c verifier!AVrfpDphReportCorruptedBlock+0x285\n 04 0053b870 65348bda verifier!AVrfpDphCheckPageHeapBlock+0x1bc\n 05 0053b89c 65348d90 verifier!AVrfpDphFindBusyMemory+0xda\n 06 0053b8b8 6534add0 verifier!AVrfpDphFindBusyMemoryAndRemoveFromBusyList+0x20\n 07 0053b8d4 77712c91 verifier!AVrfDebugPageHeapFree+0x90\n 08 0053b944 77673c45 ntdll!RtlDebugFreeHeap+0x3e\n 09 0053ba90 77673812 ntdll!RtlpFreeHeap+0xd5\n 0a 0053bae4 76dff43b ntdll!RtlFreeHeap+0x222\n 0b 0053baf8 76dff408 ucrtbase!_free_base+0x1b\n 0c 0053bb08 634d2849 ucrtbase!free+0x18\n WARNING: Stack unwind information not available. Following frames may be wrong.\n 0d 0053bb18 6211ce0e AcroRd32!AcroWinMainSandbox+0x6a49\n 0e 0053bb8c 6211e01e AcroForm!DllUnregisterServer+0x15c18e\n 0f 0053bb98 61ed77dc AcroForm!DllUnregisterServer+0x15d39e\n 10 00000000 00000000 AcroForm!PlugInMain+0x1374fc\n \n\nThe output shows heap corruption, which was caught while freeing heap memory. By precisely controlling the contents of the memory directly adjacent to the large chunk of memory allocated by the regular expression object, it is possible to further corrupt the heap which could possibly result in arbitrary code execution.\n\n### Timeline\n\n2019-07-22 - Vendor Disclosure \n2019-10-15 - Public Release\n\n##### Credit\n\nDiscovered by Aleksandar Nikolic of Cisco Talos.\n\n* * *\n\nVulnerability Reports Next Report\n\nTALOS-2019-0906\n\nPrevious Report\n\nTALOS-2019-0830\n", "edition": 4, "modified": "2019-10-15T00:00:00", "published": "2019-10-15T00:00:00", "id": "TALOS-2019-0860", "href": "http://www.talosintelligence.com/vulnerability_reports/TALOS-2019-0860", "title": "Adobe Acrobat Reader DC text field value remote code execution vulnerability redux", "type": "talos", "cvss": {"score": 9.3, "vector": "AV:N/AC:M/Au:N/C:C/I:C/A:C"}}]}