6.8
CVSSv2

CVE-2016-0932

Published: 14/01/2016 Updated: 07/12/2016
CVSS v2 Base Score: 6.8 | Impact Score: 6.4 | Exploitability Score: 8.6
CVSS v3 Base Score: 8.8 | Impact Score: 5.9 | Exploitability Score: 2.8
VMScore: 605
Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P

Vulnerability Summary

Use-after-free vulnerability in the Doc object implementation in Adobe Reader and Acrobat prior to 11.0.14, Acrobat and Acrobat Reader DC Classic prior to 15.006.30119, and Acrobat and Acrobat Reader DC Continuous prior to 15.010.20056 on Windows and OS X allows malicious users to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2016-0934, CVE-2016-0937, CVE-2016-0940, and CVE-2016-0941.

Vulnerable Product Search on Vulmon Subscribe to Product

adobe acrobat_reader 11.0.11

adobe acrobat_reader 11.0.9

adobe acrobat_reader 11.0.2

adobe acrobat_reader 11.0.0

adobe acrobat_reader

adobe acrobat_reader 11.0.12

adobe acrobat_reader 11.0.7

adobe acrobat_reader 11.0.6

adobe acrobat_reader 11.0.5

adobe acrobat_reader 11.0.4

adobe acrobat_reader 11.0.10

adobe acrobat_reader 11.0.8

adobe acrobat_reader 11.0.3

adobe acrobat_reader 11.0.1

adobe acrobat 11.0.0

adobe acrobat 11.0.2

adobe acrobat 11.0.7

adobe acrobat 11.0.9

adobe acrobat 11.0.11

adobe acrobat 11.0.12

adobe acrobat 11.0.3

adobe acrobat 11.0.4

adobe acrobat 11.0.5

adobe acrobat 11.0.6

adobe acrobat

adobe acrobat 11.0.1

adobe acrobat 11.0.8

adobe acrobat 11.0.10

adobe acrobat_dc

adobe acrobat_reader_dc

Github Repositories

icat for JSON with Golang

icat for JSON with Golang Example package main import ( "fmt" "log" "githubcom/spiegel-im-spiegel/icat4json" ) func main() { json, err := icat4jsonGet(icat4jsonToolICATW) if err != nil { logFatal(err) } data, err := jsonDecode() if err != nil { logFatal(err) } fmtPrintf("Title: %v\n", dataTitle) fmtPrintf(&quo