[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248149

 
 

909

 
 

194803

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

Privilege escalation vulnerability in Adobe Acrobat and Reader products via a crafted resource

ID: oval:org.secpod.oval:def:32622Date: (C)2016-01-21   (M)2023-01-06
Class: VULNERABILITYFamily: windows




The host is installed with Adobe Reader or Acrobat before 11.0.14, Acrobat or Acrobat Reader DC Classic before 15.006.30119 or Acrobat or Acrobat Reader DC Continuous before 15.010.20056 and is prone to a privilege escalation vulnerability. A flaw is present in the applications, which fail to handle a crafted resource. Successful exploitation allows local users to gain privilege in an unspecified directory.

Platform:
Microsoft Windows Server 2022
Microsoft Windows 11
Microsoft Windows Server 2019
Microsoft Windows Server 2016
Microsoft Windows 7
Microsoft Windows 8
Microsoft Windows Server 2003
Microsoft Windows Server 2008
Microsoft Windows Server 2008 R2
Microsoft Windows Server 2012
Microsoft Windows Vista
Microsoft Windows XP
Microsoft Windows 8.1
Microsoft Windows 10
Microsoft Windows Server 2012 R2
Product:
Adobe Acrobat
Adobe Acrobat DC Classic
Adobe Acrobat DC Continuous
Adobe Reader
Adobe Acrobat Reader DC Classic
Adobe Acrobat Reader DC Continuous
Reference:
CVE-2016-0947
CVE    1
CVE-2016-0947
CPE    20
cpe:/a:adobe:acrobat_dc_continuous
cpe:/a:adobe:acrobat_reader_dc_continuous
cpe:/a:adobe:acrobat:11.0.7
cpe:/a:adobe:acrobat:11.0.8
...

© SecPod Technologies