Acrobat Reader DC versions versions 2020.013.20074 (and previous versions), 2020.001.30018 (and previous versions) and 2017.011.30188 (and previous versions) are affected by a heap-based buffer overflow vulnerability. An unauthenticated attacker could leverage this vulnerability to achieve arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
adobe acrobat |
||
adobe acrobat_reader |
||
adobe acrobat_reader_dc |
||
adobe acrobat_dc |
That aside, enjoy the light load of 56 vulns in Windows and other code Rubbish software security patches responsible for a quarter of zero-days last year
Patch Tuesday For its February Patch Day, Microsoft released security advisories covering 56 CVE-assigned vulnerabilities, 11 of them rated critical. In doing so, the Windows giant managed to publish a misspelled URL on the landing page for its February updates that instead of taking visitors to the intended Microsoft Security Response Center post about API changes, pointed to msrc-blog.microosft.com, which turns out to be a typo-bait domain. It redirects visitors to a findanswersnow.net search ...