| CVE |
Vendors |
Products |
Updated |
CVSS v3.1 |
| Acrobat Reader DC versions versions 2021.001.20150 (and earlier), 2020.001.30020 (and earlier) and 2017.011.30194 (and earlier) are affected by an Use After Free vulnerability. An unauthenticated attacker could leverage this vulnerability to achieve arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. |
| Acrobat Reader DC versions versions 2021.001.20155 (and earlier), 2020.001.30025 (and earlier) and 2017.011.30196 (and earlier) are affected by an Use After Free vulnerability. An unauthenticated attacker could leverage this vulnerability to achieve arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. |
| Acrobat Reader DC versions versions 2021.001.20155 (and earlier), 2020.001.30025 (and earlier) and 2017.011.30196 (and earlier) are affected by an Out-of-bounds read vulnerability. An unauthenticated attacker could leverage this vulnerability to achieve arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. |
| Acrobat Reader DC versions versions 2020.013.20074 (and earlier), 2020.001.30018 (and earlier) and 2017.011.30188 (and earlier) are missing support for an integrity check. An unauthenticated attacker could leverage this vulnerability to modify content in a certified PDF without invalidating the certification. Exploitation of this issue requires user interaction in that a victim must open the tampered file. |
| Acrobat Reader DC versions versions 2020.013.20074 (and earlier), 2020.001.30018 (and earlier) and 2017.011.30188 (and earlier) are missing support for an integrity check. An unauthenticated attacker would have the ability to completely manipulate data in a certified PDF without invalidating the original certification. Exploitation of this issue requires user interaction in that a victim must open the tampered file. |
| Windows CSC Service Information Disclosure Vulnerability |
| Windows Hyper-V Remote Code Execution Vulnerability |
| Microsoft Jet Red Database Engine and Access Connectivity Engine Remote Code Execution Vulnerability |
| Windows Early Launch Antimalware Driver Security Feature Bypass Vulnerability |
| Windows Network File System Remote Code Execution Vulnerability |
| Windows Hyper-V Security Feature Bypass Vulnerability |
| Windows Console Driver Denial of Service Vulnerability |
| Windows TCP/IP Information Disclosure Vulnerability |
| Windows Hyper-V Information Disclosure Vulnerability |
| Windows Installer Elevation of Privilege Vulnerability |
| Windows TCP/IP Driver Denial of Service Vulnerability |
| Windows Console Driver Denial of Service Vulnerability |
| Windows Installer Information Disclosure Vulnerability |
| Windows Speech Runtime Elevation of Privilege Vulnerability |
| Windows Event Tracing Information Disclosure Vulnerability |