NA

CVE-2023-26369

Published: 13/09/2023 Updated: 15/09/2023
CVSS v3 Base Score: 7.8 | Impact Score: 5.9 | Exploitability Score: 1.8
VMScore: 0

Vulnerability Summary

Acrobat Reader versions 23.003.20284 (and previous versions), 20.005.30516 (and previous versions) and 20.005.30514 (and previous versions) are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

adobe acrobat

adobe acrobat_dc

adobe acrobat_reader

adobe acrobat_reader_dc

Github Repositories

j4f

Tôi đã chiếm quyền điều hành cả một hệ thống mạng của một hệ thống như thế nào Lưu ý mọi nội dung dưới đây chỉ là hư cấu ! Bài viết sẽ đi xây dựng các lối tấn công thực tế các con đường khai thác APT Các kỹ thuật lỗ

archive of github.com/jonaslejon/malicious-pdf

Malicious PDF Generator ☠️ Generate ten different malicious pdf files with phone-home functionality Can be used with Burp Collaborator or Interactsh Used for penetration testing and/or red-teaming etc I created this tool because i needed a third party tool to generate a bunch of PDF files with various links Usage python3 malicious-pdfpy burp-collaborator-url Output wil

💀 Generate a bunch of malicious pdf files with phone-home functionality. Can be used with Burp Collaborator or Interact.sh

Malicious PDF Generator ☠️ Generate ten different malicious pdf files with phone-home functionality Can be used with Burp Collaborator or Interactsh Used for penetration testing and/or red-teaming etc I created this tool because i needed a third party tool to generate a bunch of PDF files with various links Usage python3 malicious-pdfpy burp-collaborator-url Output wil

Recent Articles

Grab those updates: Microsoft flings out fixes for already-exploited bugs
The Register

Topics Security Off-Prem On-Prem Software Offbeat Special Features Vendor Voice Vendor Voice Resources Plus: Adobe and Android also tackle abused-in-the-wild flaws

Patch Tuesday It's every Windows admin's favorite day of the month: Patch Tuesday. Microsoft emitted 59 patches for its September update batch, including two for bugs that have already been exploited. Five others are listed as critical. Let's start with the two currently under exploitation. First up: CVE-2023-36761, an information disclosure vulnerability in Word deemed "important" by Redmond with a 6.2 out of 10 CVSS severity rating. The preview pane is the attack vector for this bug, which cou...