The host is installed with Adobe Reader or Acrobat 11.0.0, 10.x before 10.1.5 or 9.x before 9.5.3 and is prone to use-after-free vulnerability. A flaw is present in the applications, which fail to properly handle certain unspecified vectors. Successful exploitation allows attackers to execute arbitrary code or cause a denial of service.