SB2018121103 - Multiple vulnerabilities in Adobe Reader and Acrobat
Published: December 11, 2018 Updated: February 12, 2019
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 86 secuirty vulnerabilities.
1) Memory corruption (CVE-ID: CVE-2018-15998)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to a boundary error when processing PDF files. A remote attacker can create a specially crafted PDF document, trick the victim into opening it, trigger memory corruption and execute arbitrary code on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
2) Memory corruption (CVE-ID: CVE-2018-15987)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to a boundary error when processing PDF files. A remote attacker can create a specially crafted PDF document, trick the victim into opening it, trigger memory corruption and execute arbitrary code on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
3) Untrusted pointer dereference (CVE-ID: CVE-2018-16004)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to a boundary error when processing PDF files. A remote attacker can create a specially crafted PDF document, trick the victim into opening it, dereference untrusted pointer and execute arbitrary code on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
4) Untrusted pointer dereference (CVE-ID: CVE-2018-19720)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to a boundary error when processing PDF files. A remote attacker can create a specially crafted PDF document, trick the victim into opening it, dereference untrusted pointer and execute arbitrary code on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
5) Privilege escalation (CVE-ID: CVE-2018-16045)
The vulnerability allows a remote attacker to gain elevated privileges on the target system.The weakness exists due to improper privileges and access controls. A remote attacker can trick the victim into opening a specially crafted .pdf file, bypass security restrictions and gain elevated privileges to conduct further attacks.
6) Privilege escalation (CVE-ID: CVE-2018-16044)
The vulnerability allows a remote attacker to gain elevated privileges on the target system.The weakness exists due to improper privileges and access controls. A remote attacker can trick the victim into opening a specially crafted .pdf file, bypass security restrictions and gain elevated privileges to conduct further attacks.
7) Use-after-free error (CVE-ID: CVE-2018-19715)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to a boundary error when processing PDF files. A remote attacker can create a specially crafted PDF document, trick the victim into opening it, trigger use-after-free error and execute arbitrary code on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
8) Use-after-free error (CVE-ID: CVE-2018-19713)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to a boundary error when processing PDF files. A remote attacker can create a specially crafted PDF document, trick the victim into opening it, trigger use-after-free error and execute arbitrary code on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
9) Use-after-free error (CVE-ID: CVE-2018-19708)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to a boundary error when processing PDF files. A remote attacker can create a specially crafted PDF document, trick the victim into opening it, trigger use-after-free error and execute arbitrary code on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
10) Use-after-free error (CVE-ID: CVE-2018-19707)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to a boundary error when processing PDF files. A remote attacker can create a specially crafted PDF document, trick the victim into opening it, trigger use-after-free error and execute arbitrary code on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
11) Use-after-free error (CVE-ID: CVE-2018-19700)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to a boundary error when processing PDF files. A remote attacker can create a specially crafted PDF document, trick the victim into opening it, trigger use-after-free error and execute arbitrary code on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
12) Use-after-free error (CVE-ID: CVE-2018-19698)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to a boundary error when processing PDF files. A remote attacker can create a specially crafted PDF document, trick the victim into opening it, trigger use-after-free error and execute arbitrary code on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
13) Use-after-free error (CVE-ID: CVE-2018-16046)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to a boundary error when processing PDF files. A remote attacker can create a specially crafted PDF document, trick the victim into opening it, trigger use-after-free error and execute arbitrary code on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
14) Use-after-free error (CVE-ID: CVE-2018-16040)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to a boundary error when processing PDF files. A remote attacker can create a specially crafted PDF document, trick the victim into opening it, trigger use-after-free error and execute arbitrary code on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
15) Use-after-free error (CVE-ID: CVE-2018-16039)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to a boundary error when processing PDF files. A remote attacker can create a specially crafted PDF document, trick the victim into opening it, trigger use-after-free error and execute arbitrary code on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
16) Use-after-free error (CVE-ID: CVE-2018-16037)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to a boundary error when processing PDF files. A remote attacker can create a specially crafted PDF document, trick the victim into opening it, trigger use-after-free error and execute arbitrary code on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
17) Use-after-free error (CVE-ID: CVE-2018-16036)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to a boundary error when processing PDF files. A remote attacker can create a specially crafted PDF document, trick the victim into opening it, trigger use-after-free error and execute arbitrary code on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
18) Use-after-free error (CVE-ID: CVE-2018-16029)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to a boundary error when processing PDF files. A remote attacker can create a specially crafted PDF document, trick the victim into opening it, trigger use-after-free error and execute arbitrary code on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
19) Use-after-free error (CVE-ID: CVE-2018-16027)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to a boundary error when processing PDF files. A remote attacker can create a specially crafted PDF document, trick the victim into opening it, trigger use-after-free error and execute arbitrary code on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
20) Use-after-free error (CVE-ID: CVE-2018-16026)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to a boundary error when processing PDF files. A remote attacker can create a specially crafted PDF document, trick the victim into opening it, trigger use-after-free error and execute arbitrary code on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
21) Use-after-free error (CVE-ID: CVE-2018-16025)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to a boundary error when processing PDF files. A remote attacker can create a specially crafted PDF document, trick the victim into opening it, trigger use-after-free error and execute arbitrary code on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
22) Use-after-free error (CVE-ID: CVE-2018-16014)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to a boundary error when processing PDF files. A remote attacker can create a specially crafted PDF document, trick the victim into opening it, trigger use-after-free error and execute arbitrary code on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
23) Use-after-free error (CVE-ID: CVE-2018-16011)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to a boundary error when processing PDF files. A remote attacker can create a specially crafted PDF document, trick the victim into opening it, trigger use-after-free error and execute arbitrary code on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
24) Use-after-free error (CVE-ID: CVE-2018-16008)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to a boundary error when processing PDF files. A remote attacker can create a specially crafted PDF document, trick the victim into opening it, trigger use-after-free error and execute arbitrary code on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
25) Use-after-free error (CVE-ID: CVE-2018-16003)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to a boundary error when processing PDF files. A remote attacker can create a specially crafted PDF document, trick the victim into opening it, trigger use-after-free error and execute arbitrary code on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
26) Use-after-free error (CVE-ID: CVE-2018-15994)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to a boundary error when processing PDF files. A remote attacker can create a specially crafted PDF document, trick the victim into opening it, trigger use-after-free error and execute arbitrary code on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
27) Use-after-free error (CVE-ID: CVE-2018-15993)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to a boundary error when processing PDF files. A remote attacker can create a specially crafted PDF document, trick the victim into opening it, trigger use-after-free error and execute arbitrary code on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
28) Use-after-free error (CVE-ID: CVE-2018-15992)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to a boundary error when processing PDF files. A remote attacker can create a specially crafted PDF document, trick the victim into opening it, trigger use-after-free error and execute arbitrary code on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
29) Use-after-free error (CVE-ID: CVE-2018-15991)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to a boundary error when processing PDF files. A remote attacker can create a specially crafted PDF document, trick the victim into opening it, trigger use-after-free error and execute arbitrary code on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
30) Use-after-free error (CVE-ID: CVE-2018-15990)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to a boundary error when processing PDF files. A remote attacker can create a specially crafted PDF document, trick the victim into opening it, trigger use-after-free error and execute arbitrary code on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
31) Out-of-bounds write (CVE-ID: CVE-2018-19702)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to a boundary error when processing PDF files. A remote attacker can create a specially crafted PDF document, trick the victim into opening it, trigger out-of-bounds write and execute arbitrary code on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
32) Out-of-bounds write (CVE-ID: CVE-2018-16016)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to a boundary error when processing PDF files. A remote attacker can create a specially crafted PDF document, trick the victim into opening it, trigger out-of-bounds write and execute arbitrary code on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
33) Out-of-bounds write (CVE-ID: CVE-2018-16000)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to a boundary error when processing PDF files. A remote attacker can create a specially crafted PDF document, trick the victim into opening it, trigger out-of-bounds write and execute arbitrary code on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
34) Out-of-bounds write (CVE-ID: CVE-2018-15999)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to a boundary error when processing PDF files. A remote attacker can create a specially crafted PDF document, trick the victim into opening it, trigger out-of-bounds write and execute arbitrary code on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
35) Out-of-bounds write (CVE-ID: CVE-2018-15988)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to a boundary error when processing PDF files. A remote attacker can create a specially crafted PDF document, trick the victim into opening it, trigger out-of-bounds write and execute arbitrary code on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
36) Heap-based buffer overflow (CVE-ID: CVE-2018-19716)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to heap-based buffer overflow when processing PDF files. A remote attacker can create a specially crafted PDF document, trick the victim into opening it, trigger memory corruption and execute arbitrary code on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
37) Heap-based buffer overflow (CVE-ID: CVE-2018-16021)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to heap-based buffer overflow when processing PDF files. A remote attacker can create a specially crafted PDF document, trick the victim into opening it, trigger memory corruption and execute arbitrary code on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
38) Heap-based buffer overflow (CVE-ID: CVE-2018-12830)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to heap-based buffer overflow when processing PDF files. A remote attacker can create a specially crafted PDF document, trick the victim into opening it, trigger memory corruption and execute arbitrary code on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
39) Out-of-bounds read (CVE-ID: CVE-2018-19717)
The vulnerability allows a remote attacker to obtain potentially sensitive information on the target system.
The vulnerability exists due to a boundary error when processing PDF files. A remote attacker can create a specially crafted PDF document, trick the victim into opening it, trigger out-of-bounds read and gain access to important data.
40) Out-of-bounds read (CVE-ID: CVE-2018-19714)
The vulnerability allows a remote attacker to obtain potentially sensitive information on the target system.
The vulnerability exists due to a boundary error when processing PDF files. A remote attacker can create a specially crafted PDF document, trick the victim into opening it, trigger out-of-bounds read and gain access to important data.
41) Out-of-bounds read (CVE-ID: CVE-2018-19712)
The vulnerability allows a remote attacker to obtain potentially sensitive information on the target system.
The vulnerability exists due to a boundary error when processing PDF files. A remote attacker can create a specially crafted PDF document, trick the victim into opening it, trigger out-of-bounds read and gain access to important data.
42) Out-of-bounds read (CVE-ID: CVE-2018-19711)
The vulnerability allows a remote attacker to obtain potentially sensitive information on the target system.
The vulnerability exists due to a boundary error when processing PDF files. A remote attacker can create a specially crafted PDF document, trick the victim into opening it, trigger out-of-bounds read and gain access to important data.
43) Out-of-bounds read (CVE-ID: CVE-2018-19710)
The vulnerability allows a remote attacker to obtain potentially sensitive information on the target system.
The vulnerability exists due to a boundary error when processing PDF files. A remote attacker can create a specially crafted PDF document, trick the victim into opening it, trigger out-of-bounds read and gain access to important data.
44) Out-of-bounds read (CVE-ID: CVE-2018-19709)
The vulnerability allows a remote attacker to obtain potentially sensitive information on the target system.
The vulnerability exists due to a boundary error when processing PDF files. A remote attacker can create a specially crafted PDF document, trick the victim into opening it, trigger out-of-bounds read and gain access to important data.
45) Out-of-bounds read (CVE-ID: CVE-2018-19706)
The vulnerability allows a remote attacker to obtain potentially sensitive information on the target system.
The vulnerability exists due to a boundary error when processing PDF files. A remote attacker can create a specially crafted PDF document, trick the victim into opening it, trigger out-of-bounds read and gain access to important data.
46) Out-of-bounds read (CVE-ID: CVE-2018-19705)
The vulnerability allows a remote attacker to obtain potentially sensitive information on the target system.
The vulnerability exists due to a boundary error when processing PDF files. A remote attacker can create a specially crafted PDF document, trick the victim into opening it, trigger out-of-bounds read and gain access to important data.
47) Out-of-bounds read (CVE-ID: CVE-2018-19704)
The vulnerability allows a remote attacker to obtain potentially sensitive information on the target system.
The vulnerability exists due to a boundary error when processing PDF files. A remote attacker can create a specially crafted PDF document, trick the victim into opening it, trigger out-of-bounds read and gain access to important data.
48) Out-of-bounds read (CVE-ID: CVE-2018-19703)
The vulnerability allows a remote attacker to obtain potentially sensitive information on the target system.
The vulnerability exists due to a boundary error when processing PDF files. A remote attacker can create a specially crafted PDF document, trick the victim into opening it, trigger out-of-bounds read and gain access to important data.
49) Out-of-bounds read (CVE-ID: CVE-2018-19701)
The vulnerability allows a remote attacker to obtain potentially sensitive information on the target system.
The vulnerability exists due to a boundary error when processing PDF files. A remote attacker can create a specially crafted PDF document, trick the victim into opening it, trigger out-of-bounds read and gain access to important data.
50) Out-of-bounds read (CVE-ID: CVE-2018-19699)
The vulnerability allows a remote attacker to obtain potentially sensitive information on the target system.
The vulnerability exists due to a boundary error when processing PDF files. A remote attacker can create a specially crafted PDF document, trick the victim into opening it, trigger out-of-bounds read and gain access to important data.
51) Out-of-bounds read (CVE-ID: CVE-2018-16047)
The vulnerability allows a remote attacker to obtain potentially sensitive information on the target system.
The vulnerability exists due to a boundary error when processing PDF files. A remote attacker can create a specially crafted PDF document, trick the victim into opening it, trigger out-of-bounds read and gain access to important data.
52) Out-of-bounds read (CVE-ID: CVE-2018-16043)
The vulnerability allows a remote attacker to obtain potentially sensitive information on the target system.
The vulnerability exists due to a boundary error when processing PDF files. A remote attacker can create a specially crafted PDF document, trick the victim into opening it, trigger out-of-bounds read and gain access to important data.
53) Out-of-bounds read (CVE-ID: CVE-2018-16041)
The vulnerability allows a remote attacker to obtain potentially sensitive information on the target system.
The vulnerability exists due to a boundary error when processing PDF files. A remote attacker can create a specially crafted PDF document, trick the victim into opening it, trigger out-of-bounds read and gain access to important data.
54) Out-of-bounds read (CVE-ID: CVE-2018-16038)
The vulnerability allows a remote attacker to obtain potentially sensitive information on the target system.
The vulnerability exists due to a boundary error when processing PDF files. A remote attacker can create a specially crafted PDF document, trick the victim into opening it, trigger out-of-bounds read and gain access to important data.
55) Out-of-bounds read (CVE-ID: CVE-2018-16035)
The vulnerability allows a remote attacker to obtain potentially sensitive information on the target system.
The vulnerability exists due to a boundary error when processing PDF files. A remote attacker can create a specially crafted PDF document, trick the victim into opening it, trigger out-of-bounds read and gain access to important data.
56) Out-of-bounds read (CVE-ID: CVE-2018-16034)
The vulnerability allows a remote attacker to obtain potentially sensitive information on the target system.
The vulnerability exists due to a boundary error when processing PDF files. A remote attacker can create a specially crafted PDF document, trick the victim into opening it, trigger out-of-bounds read and gain access to important data.
57) Out-of-bounds read (CVE-ID: CVE-2018-16033)
The vulnerability allows a remote attacker to obtain potentially sensitive information on the target system.
The vulnerability exists due to a boundary error when processing PDF files. A remote attacker can create a specially crafted PDF document, trick the victim into opening it, trigger out-of-bounds read and gain access to important data.
58) Out-of-bounds read (CVE-ID: CVE-2018-16032)
The vulnerability allows a remote attacker to obtain potentially sensitive information on the target system.
The vulnerability exists due to a boundary error when processing PDF files. A remote attacker can create a specially crafted PDF document, trick the victim into opening it, trigger out-of-bounds read and gain access to important data.
59) Out-of-bounds read (CVE-ID: CVE-2018-16031)
The vulnerability allows a remote attacker to obtain potentially sensitive information on the target system.
The vulnerability exists due to a boundary error when processing PDF files. A remote attacker can create a specially crafted PDF document, trick the victim into opening it, trigger out-of-bounds read and gain access to important data.
60) Out-of-bounds read (CVE-ID: CVE-2018-16030)
The vulnerability allows a remote attacker to obtain potentially sensitive information on the target system.
The vulnerability exists due to a boundary error when processing PDF files. A remote attacker can create a specially crafted PDF document, trick the victim into opening it, trigger out-of-bounds read and gain access to important data.
61) Out-of-bounds read (CVE-ID: CVE-2018-16028)
The vulnerability allows a remote attacker to obtain potentially sensitive information on the target system.
The vulnerability exists due to a boundary error when processing PDF files. A remote attacker can create a specially crafted PDF document, trick the victim into opening it, trigger out-of-bounds read and gain access to important data.
62) Out-of-bounds read (CVE-ID: CVE-2018-16024)
The vulnerability allows a remote attacker to obtain potentially sensitive information on the target system.
The vulnerability exists due to a boundary error when processing PDF files. A remote attacker can create a specially crafted PDF document, trick the victim into opening it, trigger out-of-bounds read and gain access to important data.
63) Out-of-bounds read (CVE-ID: CVE-2018-16023)
The vulnerability allows a remote attacker to obtain potentially sensitive information on the target system.
The vulnerability exists due to a boundary error when processing PDF files. A remote attacker can create a specially crafted PDF document, trick the victim into opening it, trigger out-of-bounds read and gain access to important data.
64) Out-of-bounds read (CVE-ID: CVE-2018-16022)
The vulnerability allows a remote attacker to obtain potentially sensitive information on the target system.
The vulnerability exists due to a boundary error when processing PDF files. A remote attacker can create a specially crafted PDF document, trick the victim into opening it, trigger out-of-bounds read and gain access to important data.
65) Out-of-bounds read (CVE-ID: CVE-2018-16020)
The vulnerability allows a remote attacker to obtain potentially sensitive information on the target system.
The vulnerability exists due to a boundary error when processing PDF files. A remote attacker can create a specially crafted PDF document, trick the victim into opening it, trigger out-of-bounds read and gain access to important data.
66) Out-of-bounds read (CVE-ID: CVE-2018-16019)
The vulnerability allows a remote attacker to obtain potentially sensitive information on the target system.
The vulnerability exists due to a boundary error when processing PDF files. A remote attacker can create a specially crafted PDF document, trick the victim into opening it, trigger out-of-bounds read and gain access to important data.
67) Out-of-bounds read (CVE-ID: CVE-2018-16017)
The vulnerability allows a remote attacker to obtain potentially sensitive information on the target system.
The vulnerability exists due to a boundary error when processing PDF files. A remote attacker can create a specially crafted PDF document, trick the victim into opening it, trigger out-of-bounds read and gain access to important data.
68) Out-of-bounds read (CVE-ID: CVE-2018-16015)
The vulnerability allows a remote attacker to obtain potentially sensitive information on the target system.
The vulnerability exists due to a boundary error when processing PDF files. A remote attacker can create a specially crafted PDF document, trick the victim into opening it, trigger out-of-bounds read and gain access to important data.
69) Out-of-bounds read (CVE-ID: CVE-2018-16013)
The vulnerability allows a remote attacker to obtain potentially sensitive information on the target system.
The vulnerability exists due to a boundary error when processing PDF files. A remote attacker can create a specially crafted PDF document, trick the victim into opening it, trigger out-of-bounds read and gain access to important data.
70) Out-of-bounds read (CVE-ID: CVE-2018-16012)
The vulnerability allows a remote attacker to obtain potentially sensitive information on the target system.
The vulnerability exists due to a boundary error when processing PDF files. A remote attacker can create a specially crafted PDF document, trick the victim into opening it, trigger out-of-bounds read and gain access to important data.
71) Out-of-bounds read (CVE-ID: CVE-2018-16010)
The vulnerability allows a remote attacker to obtain potentially sensitive information on the target system.
The vulnerability exists due to a boundary error when processing PDF files. A remote attacker can create a specially crafted PDF document, trick the victim into opening it, trigger out-of-bounds read and gain access to important data.
72) Out-of-bounds read (CVE-ID: CVE-2018-16006)
The vulnerability allows a remote attacker to obtain potentially sensitive information on the target system.
The vulnerability exists due to a boundary error when processing PDF files. A remote attacker can create a specially crafted PDF document, trick the victim into opening it, trigger out-of-bounds read and gain access to important data.
73) Out-of-bounds read (CVE-ID: CVE-2018-16005)
The vulnerability allows a remote attacker to obtain potentially sensitive information on the target system.
The vulnerability exists due to a boundary error when processing PDF files. A remote attacker can create a specially crafted PDF document, trick the victim into opening it, trigger out-of-bounds read and gain access to important data.
74) Out-of-bounds read (CVE-ID: CVE-2018-16002)
The vulnerability allows a remote attacker to obtain potentially sensitive information on the target system.
The vulnerability exists due to a boundary error when processing PDF files. A remote attacker can create a specially crafted PDF document, trick the victim into opening it, trigger out-of-bounds read and gain access to important data.
75) Out-of-bounds read (CVE-ID: CVE-2018-16001)
The vulnerability allows a remote attacker to obtain potentially sensitive information on the target system.
The vulnerability exists due to a boundary error when processing PDF files. A remote attacker can create a specially crafted PDF document, trick the victim into opening it, trigger out-of-bounds read and gain access to important data.
76) Out-of-bounds read (CVE-ID: CVE-2018-15997)
The vulnerability allows a remote attacker to obtain potentially sensitive information on the target system.
The vulnerability exists due to a boundary error when processing PDF files. A remote attacker can create a specially crafted PDF document, trick the victim into opening it, trigger out-of-bounds read and gain access to important data.
77) Out-of-bounds read (CVE-ID: CVE-2018-15996)
The vulnerability allows a remote attacker to obtain potentially sensitive information on the target system.
The vulnerability exists due to a boundary error when processing PDF files. A remote attacker can create a specially crafted PDF document, trick the victim into opening it, trigger out-of-bounds read and gain access to important data.
78) Out-of-bounds read (CVE-ID: CVE-2018-15989)
The vulnerability allows a remote attacker to obtain potentially sensitive information on the target system.
The vulnerability exists due to a boundary error when processing PDF files. A remote attacker can create a specially crafted PDF document, trick the victim into opening it, trigger out-of-bounds read and gain access to important data.
79) Out-of-bounds read (CVE-ID: CVE-2018-15985)
The vulnerability allows a remote attacker to obtain potentially sensitive information on the target system.
The vulnerability exists due to a boundary error when processing PDF files. A remote attacker can create a specially crafted PDF document, trick the victim into opening it, trigger out-of-bounds read and gain access to important data.
80) Out-of-bounds read (CVE-ID: CVE-2018-15984)
The vulnerability allows a remote attacker to obtain potentially sensitive information on the target system.
The vulnerability exists due to a boundary error when processing PDF files. A remote attacker can create a specially crafted PDF document, trick the victim into opening it, trigger out-of-bounds read and gain access to important data.
81) Out-of-bounds read (CVE-ID: CVE-2018-19719)
The vulnerability allows a remote attacker to obtain potentially sensitive information on the target system.
The vulnerability exists due to a boundary error when processing PDF files. A remote attacker can create a specially crafted PDF document, trick the victim into opening it, trigger out-of-bounds read and gain access to important data.
82) Integer overflow (CVE-ID: CVE-2018-16009)
The vulnerability allows a remote attacker to obtain potentially sensitive information on the target system.
The vulnerability exists due to a boundary error when processing PDF files. A remote attacker can create a specially crafted PDF document, trick the victim into opening it, trigger integer overflow and gain access to arbitrary data.
83) Integer overflow (CVE-ID: CVE-2018-16007)
The vulnerability allows a remote attacker to obtain potentially sensitive information on the target system.
The vulnerability exists due to a boundary error when processing PDF files. A remote attacker can create a specially crafted PDF document, trick the victim into opening it, trigger integer overflow and gain access to arbitrary data.
84) Integer overflow (CVE-ID: CVE-2018-15995)
The vulnerability allows a remote attacker to obtain potentially sensitive information on the target system.
The vulnerability exists due to a boundary error when processing PDF files. A remote attacker can create a specially crafted PDF document, trick the victim into opening it, trigger integer overflow and gain access to arbitrary data.
85) Integer overflow (CVE-ID: CVE-2018-15986)
The vulnerability allows a remote attacker to obtain potentially sensitive information on the target system.
The vulnerability exists due to a boundary error when processing PDF files. A remote attacker can create a specially crafted PDF document, trick the victim into opening it, trigger integer overflow and gain access to arbitrary data.
86) Information disclosure (CVE-ID: CVE-2018-16042)
The vulnerability allows a remote attacker to obtain potentially sensitive information on the target system.The weakness exists due to improper privileges and access controls. A remote attacker can trick the victim into opening a specially crafted .pdf file, bypass security restrictions and gain access to arbitrary data.
Remediation
Install update from vendor's website.