6.8
CVSSv2

CVE-2021-28550

Published: 02/09/2021 Updated: 07/11/2023
CVSS v2 Base Score: 6.8 | Impact Score: 6.4 | Exploitability Score: 8.6
CVSS v3 Base Score: 8.8 | Impact Score: 5.9 | Exploitability Score: 2.8
VMScore: 607
Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P

Vulnerability Summary

Acrobat Reader DC versions versions 2021.001.20150 (and previous versions), 2020.001.30020 (and previous versions) and 2017.011.30194 (and previous versions) are affected by a Use After Free vulnerability. An unauthenticated attacker could leverage this vulnerability to achieve arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

adobe acrobat_dc

adobe acrobat_reader_dc

adobe acrobat

adobe acrobat_reader

Vendor Advisories

Check Point Reference: CPAI-2021-1759 Date Published: 25 Jun 2023 Severity: High ...

Recent Articles

Microsoft emits more fixes for Exchange Server plus patches for remote-code exec holes in HTTP stack, Visual Studio
The Register • Thomas Claburn in San Francisco • 11 May 2021

Plus: Grab your updates for Adobe, SAP, Android, Intel

Patch Tuesday Microsoft's May Patch Tuesday brought a lighter-than-usual load of 55 fixes for 32 of the Windows giant's applications and services, which is about half what was served up in April. The Redmond-based firm's Office and Windows flagships house many of the identified vulnerabilities, alongside Internet Explorer, Visual Studio, Visual Studio Code, Skype, and other software. Among the 55 CVEs identified by Microsoft, four are rated critical, 50 are rated important, and one is rated mode...