Free and open-source vulnerability scanner
Mageni eases for you the vulnerability scanning, assessment, and management process. It is free and open-source.
Install NowAvailable for macOS, Windows, and Linux
Adobe Reader DC (Classic Track) Security Updates(apsb17-11)-Windows
Information
Severity
Severity
Critical
Family
Family
General
CVSSv2 Base
CVSSv2 Base
10.0
CVSSv2 Vector
CVSSv2 Vector
AV:N/AC:L/Au:N/C:C/I:C/A:C
Solution Type
Solution Type
Vendor Patch
Created
Created
6 years ago
Modified
Modified
4 years ago
Summary
This host is installed with Adobe Reader DC (Classic Track) and is prone to multiple vulnerabilities.
Insight
Insight
Multiple flaws exists due to, - An use-after-free vulnerabilities. - The heap buffer overflow vulnerabilities. - A memory corruption vulnerabilities. - An integer overflow vulnerabilities.
Affected Software
Affected Software
Adobe Reader DC (Classic Track) 2015.006.30280 and earlier on Windows.
Detection Method
Detection Method
Checks if a vulnerable version is present on the target host.
Solution
Solution
Upgrade to Adobe Reader DC (Classic Track) version 2015.006.30306 or later.
Common Vulnerabilities and Exposures (CVE)
- CVE-2017-3011
- CVE-2017-3012
- CVE-2017-3013
- CVE-2017-3014
- CVE-2017-3015
- CVE-2017-3018
- CVE-2017-3019
- CVE-2017-3020
- CVE-2017-3021
- CVE-2017-3022
- CVE-2017-3024
- CVE-2017-3025
- CVE-2017-3026
- CVE-2017-3027
- CVE-2017-3028
- CVE-2017-3030
- CVE-2017-3031
- CVE-2017-3032
- CVE-2017-3033
- CVE-2017-3034
- CVE-2017-3036
- CVE-2017-3037
- CVE-2017-3038
- CVE-2017-3039
- CVE-2017-3040
- CVE-2017-3042
- CVE-2017-3043
- CVE-2017-3044
- CVE-2017-3045
- CVE-2017-3046
- CVE-2017-3048
- CVE-2017-3049
- CVE-2017-3050
- CVE-2017-3051
- CVE-2017-3052
- CVE-2017-3054
- CVE-2017-3055
- CVE-2017-3056
- CVE-2017-3057
- CVE-2017-3065
- CVE-2017-3035
- CVE-2017-3047
- CVE-2017-3017
- CVE-2017-3023
- CVE-2017-3041
- CVE-2017-3029
- CVE-2017-3053