Successful exploitation could lead to arbitrary code execution.Īn issue was discovered in Adobe Acrobat Reader 2018.009.20050 and earlier versions, 2017.011.30070 and earlier versions, 2015.006.30394 and earlier versions.
#Adobe reader 11.0.20 download + pdf
The vulnerability is triggered by crafted XFA script definitions in a PDF file. This vulnerability is an instance of a use after free vulnerability in the XFA engine, related to DOM manipulation. The attacker then needs to convince the victim to open the document.Īn issue was discovered in Adobe Acrobat Reader 2018.009.20050 and earlier versions, 2017.011.30070 and earlier versions, 2015.006.30394 and earlier versions.
![adobe reader 11.0.20 download + adobe reader 11.0.20 download +](https://www.laparks.org/sites/default/files/facility/pershing-square-park/images/pershing-square-playground-open-16.jpg)
To exploit this issue, an attacker must acquire and then modify a certified PDF document that is trusted by the victim. Exploitation of this issue requires user interaction in that a victim must open a malicious PDF file.Īcrobat Reader DC versions 2020.012.20048 (and earlier), 2020.001.30005 (and earlier) and 2017.011.30175 (and earlier) and Adobe Acrobat Pro DC 2017.011.30175 (and earlier) are affected by an improper input validation vulnerability that could result in arbitrary JavaScript execution in the context of the current user.
![adobe reader 11.0.20 download + adobe reader 11.0.20 download +](http://www.fullerton.edu/it/_resources/images/CSUF_Background.png)
An attacker could leverage this vulnerability to bypass mitigations such as ASLR.
![adobe reader 11.0.20 download + adobe reader 11.0.20 download +](https://img.etsystatic.com/il/4b3827/622492303/il_570xN.622492303_qu26.jpg)
Adobe Acrobat Reader DC version 21.007.20095 (and earlier), 21.007.20096 (and earlier), 20.004.30015 (and earlier), and 17.011.30202 (and earlier) is affected by a out-of-bounds read vulnerability that could lead to disclosure of sensitive memory.