Refine your search

92 vulnerabilities found for Acrobat by Adobe

CERTFR-2025-AVI-0770
Vulnerability from certfr_avis

De multiples vulnérabilités ont été découvertes dans les produits Adobe. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire, une atteinte à l'intégrité des données et un contournement de la politique de sécurité.

Solutions

Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).

Impacted products
Vendor Product Description
Adobe ColdFusion ColdFusion 2025 versions antérieures à Update 4
Adobe Acrobat Reader Acrobat Reader 2020 versions antérieures à 20.005.30791 pour Mac
Adobe Acrobat Reader Acrobat Reader 2020 versions antérieures à 20.005.30793 pour Windows
Adobe Acrobat Acrobat 2024 versions antérieures à 24.001.30264 pour Windows et macOS
Adobe Acrobat Reader Acrobat Reader DC versions antérieures à 25.001.20693 pour Windows et macOS
Adobe Acrobat Acrobat DC versions antérieures à 25.001.20693 pour Windows et macOS
Adobe Acrobat Acrobat 2020 versions antérieures à Win: 20.005.30793 Mac: 20.005.30791 pour Windows et macOS
Adobe ColdFusion ColdFusion 2021 versions antérieures à Update 22
Adobe ColdFusion ColdFusion 2023 versions antérieures à Update 16
References
Bulletin de sécurité Adobe APSB25-93 2025-09-09 vendor-advisory
Bulletin de sécurité Adobe APSB25-85 2025-09-09 vendor-advisory

Show details on source website


{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "ColdFusion 2025 versions ant\u00e9rieures \u00e0 Update 4",
      "product": {
        "name": "ColdFusion",
        "vendor": {
          "name": "Adobe",
          "scada": false
        }
      }
    },
    {
      "description": "Acrobat Reader 2020 versions ant\u00e9rieures \u00e0 20.005.30791 pour Mac",
      "product": {
        "name": "Acrobat Reader",
        "vendor": {
          "name": "Adobe",
          "scada": false
        }
      }
    },
    {
      "description": "Acrobat Reader 2020 versions ant\u00e9rieures \u00e0 20.005.30793 pour Windows",
      "product": {
        "name": "Acrobat Reader",
        "vendor": {
          "name": "Adobe",
          "scada": false
        }
      }
    },
    {
      "description": "Acrobat 2024 versions ant\u00e9rieures \u00e0 24.001.30264 pour Windows et macOS",
      "product": {
        "name": "Acrobat",
        "vendor": {
          "name": "Adobe",
          "scada": false
        }
      }
    },
    {
      "description": "Acrobat Reader DC versions ant\u00e9rieures \u00e0 25.001.20693 pour Windows et macOS",
      "product": {
        "name": "Acrobat Reader",
        "vendor": {
          "name": "Adobe",
          "scada": false
        }
      }
    },
    {
      "description": "Acrobat DC versions ant\u00e9rieures \u00e0 25.001.20693 pour Windows et macOS",
      "product": {
        "name": "Acrobat",
        "vendor": {
          "name": "Adobe",
          "scada": false
        }
      }
    },
    {
      "description": "Acrobat 2020 versions ant\u00e9rieures \u00e0 Win: 20.005.30793 Mac: 20.005.30791 pour Windows et macOS",
      "product": {
        "name": "Acrobat",
        "vendor": {
          "name": "Adobe",
          "scada": false
        }
      }
    },
    {
      "description": "ColdFusion 2021 versions ant\u00e9rieures \u00e0 Update 22",
      "product": {
        "name": "ColdFusion",
        "vendor": {
          "name": "Adobe",
          "scada": false
        }
      }
    },
    {
      "description": "ColdFusion 2023 versions ant\u00e9rieures \u00e0 Update 16",
      "product": {
        "name": "ColdFusion",
        "vendor": {
          "name": "Adobe",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": "",
  "content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
  "cves": [
    {
      "name": "CVE-2025-54255",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-54255"
    },
    {
      "name": "CVE-2025-54261",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-54261"
    },
    {
      "name": "CVE-2025-54257",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-54257"
    }
  ],
  "initial_release_date": "2025-09-10T00:00:00",
  "last_revision_date": "2025-09-10T00:00:00",
  "links": [],
  "reference": "CERTFR-2025-AVI-0770",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2025-09-10T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
    },
    {
      "description": "Ex\u00e9cution de code arbitraire"
    },
    {
      "description": "Contournement de la politique de s\u00e9curit\u00e9"
    }
  ],
  "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits Adobe. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire, une atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es et un contournement de la politique de s\u00e9curit\u00e9.",
  "title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Adobe",
  "vendor_advisories": [
    {
      "published_at": "2025-09-09",
      "title": "Bulletin de s\u00e9curit\u00e9 Adobe APSB25-93",
      "url": "https://helpx.adobe.com/security/products/coldfusion/apsb25-93.html"
    },
    {
      "published_at": "2025-09-09",
      "title": "Bulletin de s\u00e9curit\u00e9 Adobe APSB25-85",
      "url": "https://helpx.adobe.com/security/products/acrobat/apsb25-85.html"
    }
  ]
}

CERTFR-2025-AVI-0495
Vulnerability from certfr_avis

De multiples vulnérabilités ont été découvertes dans les produits Adobe. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire, une élévation de privilèges et un déni de service à distance.

Solutions

Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).

Impacted products
Vendor Product Description
Adobe Acrobat Acrobat 2024 versions antérieures à 24.001.30254 pour Windows et macOS
Adobe Magento Magento Open Source sans le dernier correctif de sécurité pour la vulnérabilité CVE-2025-47110
Adobe Magento Magento Open Source versions antérieures à 2.4.9-alpha1
Adobe Acrobat Acrobat DC versions antérieures à 25.001.20531 pour Windows
Adobe Commerce Commerce versions 2.4.5-x antérieures à 2.4.5-p13
Adobe Magento Magento Open Source versions 2.4.5-x antérieures à 2.4.5-p13
Adobe Commerce Commerce B2B versions 1.4.2-x antérieures à 1.4.2-p6
Adobe Commerce Commerce B2B versions 1.5.2-x antérieures à 1.5.2-p1
Adobe Commerce Commerce versions 2.4.8-x antérieures à 2.4.8-p1
Adobe Commerce Commerce B2B versions antérieures à 1.5.3-alpha1
Adobe Acrobat Reader Acrobat Reader DC versions antérieures à 25.001.20531 pour Windows
Adobe Magento Magento Open Source versions 2.4.6-x antérieures à 2.4.6-p11
Adobe Commerce Commerce B2B versions 1.3.4-x antérieures à 1.3.4-p13
Adobe Acrobat Acrobat DC versions antérieures à 25.001.20529 macOS
Adobe Commerce Commerce versions antérieures à 2.4.9-alpha1
Adobe Commerce Commerce versions 2.4.7-x antérieures à 2.4.7-p6
Adobe Acrobat Acrobat 2020 versions antérieures à 20.005.30774 pour Windows et macOS
Adobe Acrobat Reader Acrobat Reader DC versions antérieures à 25.001.20529 macOS
Adobe Magento Magento Open Source versions 2.4.8-x antérieures à 2.4.8-p1
Adobe Commerce Commerce sans le dernier correctif de sécurité pour la vulnérabilité CVE-2025-47110
Adobe Commerce Commerce versions 2.4.6-x antérieures à 2.4.6-p11
Adobe Acrobat Reader Acrobat Reader 2020 versions antérieures à 20.005.30774 pour Windows et macOS
Adobe Commerce Commerce B2B versions 1.3.3-x antérieures à 1.3.3-p14
Adobe Magento Magento Open Source versions 2.4.7-x antérieures à 2.4.7-p6
Adobe Commerce Commerce versions 2.4.4-x antérieures à 2.4.4-p14
References
Bulletin de sécurité Adobe APSB25-50 2025-06-10 vendor-advisory
Bulletin de sécurité Adobe APSB25-57 2025-06-10 vendor-advisory

Show details on source website


{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "Acrobat 2024 versions ant\u00e9rieures \u00e0 24.001.30254 pour Windows et macOS",
      "product": {
        "name": "Acrobat",
        "vendor": {
          "name": "Adobe",
          "scada": false
        }
      }
    },
    {
      "description": "Magento Open Source sans le dernier correctif de s\u00e9curit\u00e9 pour la vuln\u00e9rabilit\u00e9 CVE-2025-47110",
      "product": {
        "name": "Magento",
        "vendor": {
          "name": "Adobe",
          "scada": false
        }
      }
    },
    {
      "description": "Magento Open Source versions ant\u00e9rieures \u00e0 2.4.9-alpha1",
      "product": {
        "name": "Magento",
        "vendor": {
          "name": "Adobe",
          "scada": false
        }
      }
    },
    {
      "description": "Acrobat DC versions ant\u00e9rieures \u00e0 25.001.20531 pour Windows",
      "product": {
        "name": "Acrobat",
        "vendor": {
          "name": "Adobe",
          "scada": false
        }
      }
    },
    {
      "description": "Commerce versions 2.4.5-x ant\u00e9rieures \u00e0 2.4.5-p13",
      "product": {
        "name": "Commerce",
        "vendor": {
          "name": "Adobe",
          "scada": false
        }
      }
    },
    {
      "description": "Magento Open Source versions 2.4.5-x ant\u00e9rieures \u00e0 2.4.5-p13",
      "product": {
        "name": "Magento",
        "vendor": {
          "name": "Adobe",
          "scada": false
        }
      }
    },
    {
      "description": "Commerce B2B versions 1.4.2-x ant\u00e9rieures \u00e0 1.4.2-p6",
      "product": {
        "name": "Commerce",
        "vendor": {
          "name": "Adobe",
          "scada": false
        }
      }
    },
    {
      "description": "Commerce B2B versions 1.5.2-x ant\u00e9rieures \u00e0 1.5.2-p1",
      "product": {
        "name": "Commerce",
        "vendor": {
          "name": "Adobe",
          "scada": false
        }
      }
    },
    {
      "description": "Commerce versions 2.4.8-x ant\u00e9rieures \u00e0 2.4.8-p1",
      "product": {
        "name": "Commerce",
        "vendor": {
          "name": "Adobe",
          "scada": false
        }
      }
    },
    {
      "description": "Commerce B2B versions ant\u00e9rieures \u00e0 1.5.3-alpha1",
      "product": {
        "name": "Commerce",
        "vendor": {
          "name": "Adobe",
          "scada": false
        }
      }
    },
    {
      "description": "Acrobat Reader DC versions ant\u00e9rieures \u00e0 25.001.20531 pour Windows",
      "product": {
        "name": "Acrobat Reader",
        "vendor": {
          "name": "Adobe",
          "scada": false
        }
      }
    },
    {
      "description": "Magento Open Source versions 2.4.6-x ant\u00e9rieures \u00e0 2.4.6-p11",
      "product": {
        "name": "Magento",
        "vendor": {
          "name": "Adobe",
          "scada": false
        }
      }
    },
    {
      "description": "Commerce B2B versions 1.3.4-x ant\u00e9rieures \u00e0 1.3.4-p13",
      "product": {
        "name": "Commerce",
        "vendor": {
          "name": "Adobe",
          "scada": false
        }
      }
    },
    {
      "description": "Acrobat DC versions ant\u00e9rieures \u00e0 25.001.20529 macOS",
      "product": {
        "name": "Acrobat",
        "vendor": {
          "name": "Adobe",
          "scada": false
        }
      }
    },
    {
      "description": "Commerce versions ant\u00e9rieures \u00e0 2.4.9-alpha1",
      "product": {
        "name": "Commerce",
        "vendor": {
          "name": "Adobe",
          "scada": false
        }
      }
    },
    {
      "description": "Commerce versions 2.4.7-x ant\u00e9rieures \u00e0 2.4.7-p6",
      "product": {
        "name": "Commerce",
        "vendor": {
          "name": "Adobe",
          "scada": false
        }
      }
    },
    {
      "description": "Acrobat 2020 versions ant\u00e9rieures \u00e0 20.005.30774 pour Windows et macOS",
      "product": {
        "name": "Acrobat",
        "vendor": {
          "name": "Adobe",
          "scada": false
        }
      }
    },
    {
      "description": "Acrobat Reader DC versions ant\u00e9rieures \u00e0 25.001.20529 macOS",
      "product": {
        "name": "Acrobat Reader",
        "vendor": {
          "name": "Adobe",
          "scada": false
        }
      }
    },
    {
      "description": "Magento Open Source versions 2.4.8-x ant\u00e9rieures \u00e0 2.4.8-p1",
      "product": {
        "name": "Magento",
        "vendor": {
          "name": "Adobe",
          "scada": false
        }
      }
    },
    {
      "description": "Commerce sans le dernier correctif de s\u00e9curit\u00e9 pour la vuln\u00e9rabilit\u00e9 CVE-2025-47110",
      "product": {
        "name": "Commerce",
        "vendor": {
          "name": "Adobe",
          "scada": false
        }
      }
    },
    {
      "description": "Commerce versions 2.4.6-x ant\u00e9rieures \u00e0 2.4.6-p11",
      "product": {
        "name": "Commerce",
        "vendor": {
          "name": "Adobe",
          "scada": false
        }
      }
    },
    {
      "description": "Acrobat Reader 2020 versions ant\u00e9rieures \u00e0 20.005.30774 pour Windows et macOS",
      "product": {
        "name": "Acrobat Reader",
        "vendor": {
          "name": "Adobe",
          "scada": false
        }
      }
    },
    {
      "description": "Commerce B2B versions 1.3.3-x ant\u00e9rieures \u00e0 1.3.3-p14",
      "product": {
        "name": "Commerce",
        "vendor": {
          "name": "Adobe",
          "scada": false
        }
      }
    },
    {
      "description": "Magento Open Source versions 2.4.7-x ant\u00e9rieures \u00e0 2.4.7-p6",
      "product": {
        "name": "Magento",
        "vendor": {
          "name": "Adobe",
          "scada": false
        }
      }
    },
    {
      "description": "Commerce versions 2.4.4-x ant\u00e9rieures \u00e0 2.4.4-p14",
      "product": {
        "name": "Commerce",
        "vendor": {
          "name": "Adobe",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": "",
  "content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
  "cves": [
    {
      "name": "CVE-2025-43577",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-43577"
    },
    {
      "name": "CVE-2025-43573",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-43573"
    },
    {
      "name": "CVE-2025-43585",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-43585"
    },
    {
      "name": "CVE-2025-43578",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-43578"
    },
    {
      "name": "CVE-2025-43586",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-43586"
    },
    {
      "name": "CVE-2025-27206",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-27206"
    },
    {
      "name": "CVE-2025-43550",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-43550"
    },
    {
      "name": "CVE-2025-27207",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-27207"
    },
    {
      "name": "CVE-2025-43574",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-43574"
    },
    {
      "name": "CVE-2025-43575",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-43575"
    },
    {
      "name": "CVE-2025-47111",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-47111"
    },
    {
      "name": "CVE-2025-43576",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-43576"
    },
    {
      "name": "CVE-2025-43579",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-43579"
    },
    {
      "name": "CVE-2025-47110",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-47110"
    },
    {
      "name": "CVE-2025-47112",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-47112"
    }
  ],
  "initial_release_date": "2025-06-11T00:00:00",
  "last_revision_date": "2025-06-11T00:00:00",
  "links": [],
  "reference": "CERTFR-2025-AVI-0495",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2025-06-11T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "D\u00e9ni de service \u00e0 distance"
    },
    {
      "description": "Injection de code indirecte \u00e0 distance (XSS)"
    },
    {
      "description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
    },
    {
      "description": "Ex\u00e9cution de code arbitraire"
    },
    {
      "description": "Contournement de la politique de s\u00e9curit\u00e9"
    },
    {
      "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
    },
    {
      "description": "\u00c9l\u00e9vation de privil\u00e8ges"
    }
  ],
  "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits Adobe. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire, une \u00e9l\u00e9vation de privil\u00e8ges et un d\u00e9ni de service \u00e0 distance.",
  "title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Adobe",
  "vendor_advisories": [
    {
      "published_at": "2025-06-10",
      "title": "Bulletin de s\u00e9curit\u00e9 Adobe APSB25-50",
      "url": "https://helpx.adobe.com/security/products/magento/apsb25-50.html"
    },
    {
      "published_at": "2025-06-10",
      "title": "Bulletin de s\u00e9curit\u00e9 Adobe APSB25-57",
      "url": "https://helpx.adobe.com/security/products/acrobat/apsb25-57.html"
    }
  ]
}

CERTFR-2025-AVI-0201
Vulnerability from certfr_avis

De multiples vulnérabilités ont été découvertes dans les produits Adobe. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire, une atteinte à la confidentialité des données et un problème de sécurité non spécifié par l'éditeur.

Solutions

Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).

Impacted products
Vendor Product Description
Adobe Acrobat Acrobat DC versions antérieures à 25.001.20432 pour Windows et macOS
Adobe Acrobat Acrobat 2020 versions antérieures à 20.005.30763 pour Windows et macOS
Adobe Acrobat Reader Acrobat Reader DC versions antérieures à 25.001.20432 pour Windows et macOS
Adobe Acrobat Acrobat 2024 versions antérieures à 24.001.30235 pour Windows et macOS
Adobe Acrobat Reader Acrobat Reader 2020 versions antérieures à 20.005.30763 pour Windows et macOS
References
Bulletin de sécurité Adobe APSB25-14 2025-03-11 vendor-advisory

Show details on source website


{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "Acrobat DC versions ant\u00e9rieures \u00e0 25.001.20432 pour Windows et macOS",
      "product": {
        "name": "Acrobat",
        "vendor": {
          "name": "Adobe",
          "scada": false
        }
      }
    },
    {
      "description": "Acrobat 2020 versions ant\u00e9rieures \u00e0 20.005.30763 pour Windows et macOS",
      "product": {
        "name": "Acrobat",
        "vendor": {
          "name": "Adobe",
          "scada": false
        }
      }
    },
    {
      "description": "Acrobat Reader DC versions ant\u00e9rieures \u00e0 25.001.20432 pour Windows et macOS",
      "product": {
        "name": "Acrobat Reader",
        "vendor": {
          "name": "Adobe",
          "scada": false
        }
      }
    },
    {
      "description": "Acrobat 2024 versions ant\u00e9rieures \u00e0 24.001.30235 pour Windows et macOS",
      "product": {
        "name": "Acrobat",
        "vendor": {
          "name": "Adobe",
          "scada": false
        }
      }
    },
    {
      "description": "Acrobat Reader 2020 versions ant\u00e9rieures \u00e0 20.005.30763 pour Windows et macOS",
      "product": {
        "name": "Acrobat Reader",
        "vendor": {
          "name": "Adobe",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": "",
  "content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
  "cves": [
    {
      "name": "CVE-2025-27174",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-27174"
    },
    {
      "name": "CVE-2025-24431",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-24431"
    },
    {
      "name": "CVE-2025-27161",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-27161"
    },
    {
      "name": "CVE-2025-27159",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-27159"
    },
    {
      "name": "CVE-2025-27158",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-27158"
    },
    {
      "name": "CVE-2025-27163",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-27163"
    },
    {
      "name": "CVE-2025-27160",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-27160"
    },
    {
      "name": "CVE-2025-27162",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-27162"
    },
    {
      "name": "CVE-2025-27164",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-27164"
    }
  ],
  "initial_release_date": "2025-03-12T00:00:00",
  "last_revision_date": "2025-03-12T00:00:00",
  "links": [],
  "reference": "CERTFR-2025-AVI-0201",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2025-03-12T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "Ex\u00e9cution de code arbitraire"
    },
    {
      "description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
    },
    {
      "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
    }
  ],
  "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits Adobe. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire, une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es et un probl\u00e8me de s\u00e9curit\u00e9 non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur.",
  "title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Adobe",
  "vendor_advisories": [
    {
      "published_at": "2025-03-11",
      "title": "Bulletin de s\u00e9curit\u00e9 Adobe APSB25-14",
      "url": "https://helpx.adobe.com/security/products/acrobat/apsb25-14.html"
    }
  ]
}

CERTFR-2024-AVI-1056
Vulnerability from certfr_avis

De multiples vulnérabilités ont été découvertes dans les produits Adobe. Elles permettent à un attaquant de provoquer une exécution de code arbitraire, un déni de service et un contournement de la politique de sécurité.

Solutions

Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).

Impacted products
Vendor Product Description
Adobe Acrobat Acrobat 2020 versions antérieures à 20.005.30748
Adobe Acrobat DC Adobe DC versions antérieures à 24.005.20320
Adobe Acrobat Reader Acrobat Reader 2020 versions antérieures à 20.005.30748
Adobe Acrobat Reader DC Adobe Reader DC versions antérieures à 24.005.20320
Adobe Acrobat Acrobat 2024 versions antérieures à 24.001.30225
References
Bulletin de sécurité Adobe apsb24-92 2024-12-10 vendor-advisory

Show details on source website


{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "Acrobat 2020 versions ant\u00e9rieures \u00e0 20.005.30748",
      "product": {
        "name": "Acrobat",
        "vendor": {
          "name": "Adobe",
          "scada": false
        }
      }
    },
    {
      "description": "Adobe DC versions ant\u00e9rieures \u00e0 24.005.20320",
      "product": {
        "name": "Acrobat DC",
        "vendor": {
          "name": "Adobe",
          "scada": false
        }
      }
    },
    {
      "description": "Acrobat Reader 2020 versions ant\u00e9rieures \u00e0 20.005.30748",
      "product": {
        "name": "Acrobat Reader",
        "vendor": {
          "name": "Adobe",
          "scada": false
        }
      }
    },
    {
      "description": "Adobe Reader DC versions ant\u00e9rieures \u00e0 24.005.20320",
      "product": {
        "name": "Acrobat Reader DC",
        "vendor": {
          "name": "Adobe",
          "scada": false
        }
      }
    },
    {
      "description": "Acrobat 2024 versions ant\u00e9rieures \u00e0 24.001.30225",
      "product": {
        "name": "Acrobat",
        "vendor": {
          "name": "Adobe",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": "",
  "content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
  "cves": [
    {
      "name": "CVE-2024-49532",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-49532"
    },
    {
      "name": "CVE-2024-49530",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-49530"
    },
    {
      "name": "CVE-2024-49531",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-49531"
    },
    {
      "name": "CVE-2024-49535",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-49535"
    },
    {
      "name": "CVE-2024-49534",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-49534"
    },
    {
      "name": "CVE-2024-49533",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-49533"
    }
  ],
  "initial_release_date": "2024-12-11T00:00:00",
  "last_revision_date": "2024-12-11T00:00:00",
  "links": [],
  "reference": "CERTFR-2024-AVI-1056",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2024-12-11T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "Ex\u00e9cution de code arbitraire"
    },
    {
      "description": "D\u00e9ni de service"
    },
    {
      "description": "Contournement de la politique de s\u00e9curit\u00e9"
    }
  ],
  "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits Adobe. Elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire, un d\u00e9ni de service et un contournement de la politique de s\u00e9curit\u00e9.",
  "title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Adobe",
  "vendor_advisories": [
    {
      "published_at": "2024-12-10",
      "title": "Bulletin de s\u00e9curit\u00e9 Adobe apsb24-92",
      "url": "https://helpx.adobe.com/security/products/acrobat/apsb24-92.html"
    }
  ]
}

CERTFR-2024-AVI-0764
Vulnerability from certfr_avis

De multiples vulnérabilités ont été découvertes dans les produits Adobe. Elles permettent à un attaquant de provoquer une exécution de code arbitraire et un contournement de la politique de sécurité.

Solutions

Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).

Impacted products
Vendor Product Description
Adobe ColdFusion ColdFusion 2021 versions antérieures à Update 16
Adobe Acrobat DC Acrobat DC versions antérieures à 24.003.20112
Adobe Acrobat Reader DC Acrobat Reader DC versions antérieures à 24.003.20112
Adobe Acrobat Acrobat 2024 versions antérieures à 24.001.30187
Adobe Acrobat Acrobat 2020 versions antérieures à 20.005.30680
Adobe ColdFusion ColdFusion 2023 versions antérieures à Update 10
Adobe Acrobat Reader Acrobat Reader 2020 versions antérieures à 20.005.30680
References
Bulletin de sécurité Adobe apsb24-70 2024-09-10 vendor-advisory
Bulletin de sécurité Adobe apsb24-71 2024-09-10 vendor-advisory

Show details on source website


{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "ColdFusion 2021 versions ant\u00e9rieures \u00e0 Update 16",
      "product": {
        "name": "ColdFusion",
        "vendor": {
          "name": "Adobe",
          "scada": false
        }
      }
    },
    {
      "description": "Acrobat DC versions ant\u00e9rieures \u00e0 24.003.20112",
      "product": {
        "name": "Acrobat DC",
        "vendor": {
          "name": "Adobe",
          "scada": false
        }
      }
    },
    {
      "description": "Acrobat Reader DC versions ant\u00e9rieures \u00e0 24.003.20112",
      "product": {
        "name": "Acrobat Reader DC",
        "vendor": {
          "name": "Adobe",
          "scada": false
        }
      }
    },
    {
      "description": "Acrobat 2024 versions ant\u00e9rieures \u00e0 24.001.30187",
      "product": {
        "name": "Acrobat",
        "vendor": {
          "name": "Adobe",
          "scada": false
        }
      }
    },
    {
      "description": "Acrobat 2020 versions ant\u00e9rieures \u00e0 20.005.30680",
      "product": {
        "name": "Acrobat",
        "vendor": {
          "name": "Adobe",
          "scada": false
        }
      }
    },
    {
      "description": "ColdFusion 2023 versions ant\u00e9rieures \u00e0 Update 10",
      "product": {
        "name": "ColdFusion",
        "vendor": {
          "name": "Adobe",
          "scada": false
        }
      }
    },
    {
      "description": "Acrobat Reader 2020 versions ant\u00e9rieures \u00e0 20.005.30680",
      "product": {
        "name": "Acrobat Reader",
        "vendor": {
          "name": "Adobe",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": "",
  "content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
  "cves": [
    {
      "name": "CVE-2024-45112",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-45112"
    },
    {
      "name": "CVE-2024-41874",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-41874"
    },
    {
      "name": "CVE-2024-41869",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-41869"
    }
  ],
  "initial_release_date": "2024-09-11T00:00:00",
  "last_revision_date": "2024-09-11T00:00:00",
  "links": [],
  "reference": "CERTFR-2024-AVI-0764",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2024-09-11T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "Ex\u00e9cution de code arbitraire"
    }
  ],
  "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits Adobe. Elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire et un contournement de la politique de s\u00e9curit\u00e9.",
  "title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Adobe",
  "vendor_advisories": [
    {
      "published_at": "2024-09-10",
      "title": "Bulletin de s\u00e9curit\u00e9 Adobe apsb24-70",
      "url": "https://helpx.adobe.com/security/products/acrobat/apsb24-70.html"
    },
    {
      "published_at": "2024-09-10",
      "title": "Bulletin de s\u00e9curit\u00e9 Adobe apsb24-71",
      "url": "https://helpx.adobe.com/security/products/coldfusion/apsb24-71.html"
    }
  ]
}

CERTFR-2024-AVI-0678
Vulnerability from certfr_avis

De multiples vulnérabilités ont été découvertes dans les produits Adobe. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire, une élévation de privilèges et une atteinte à la confidentialité des données.

Solutions

Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).

Impacted products
Vendor Product Description
Adobe Acrobat Acrobat 2020 versions antérieures à 20.005.30655
Adobe Magento Magento Open Source versions 2.4.5.x antérieures à 2.4.5-p9
Adobe Acrobat Acrobat DC versions antérieures à 24.002.21005
Adobe Commerce Commerce versions antérieures à 2.4.4-p10
Adobe Commerce Commerce versions 2.4.7.x antérieures à 2.4.7-p2
Adobe Commerce Commerce versions 2.4.6.x antérieures à 2.4.6-p7
Adobe Commerce Commerce versions 2.4.5.x antérieures à 2.4.5-p9
Adobe Magento Magento Open Source versions 2.4.6.x antérieures à 2.4.6-p7
Adobe Acrobat Acrobat 2024 versions antérieures à 24.001.30159
Adobe Magento Magento Open Source versions 2.4.7.x antérieures à 2.4.7-p2
Adobe Magento Magento Open Source versions antérieures à 2.4.4-p10
Adobe Acrobat Reader Acrobat Reader DC versions antérieures à 24.002.21005
Adobe Acrobat Reader Acrobat Reader 2020 versions antérieures à 20.005.30655
References
Bulletin de sécurité Adobe apsb24-61 2024-08-13 vendor-advisory
Bulletin de sécurité Adobe apsb24-57 2024-08-13 vendor-advisory

Show details on source website


{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "Acrobat 2020 versions ant\u00e9rieures \u00e0 20.005.30655",
      "product": {
        "name": "Acrobat",
        "vendor": {
          "name": "Adobe",
          "scada": false
        }
      }
    },
    {
      "description": "Magento Open Source versions 2.4.5.x ant\u00e9rieures \u00e0 2.4.5-p9",
      "product": {
        "name": "Magento",
        "vendor": {
          "name": "Adobe",
          "scada": false
        }
      }
    },
    {
      "description": "Acrobat DC versions ant\u00e9rieures \u00e0 24.002.21005",
      "product": {
        "name": "Acrobat",
        "vendor": {
          "name": "Adobe",
          "scada": false
        }
      }
    },
    {
      "description": "Commerce versions ant\u00e9rieures \u00e0 2.4.4-p10",
      "product": {
        "name": "Commerce",
        "vendor": {
          "name": "Adobe",
          "scada": false
        }
      }
    },
    {
      "description": "Commerce versions 2.4.7.x ant\u00e9rieures \u00e0 2.4.7-p2",
      "product": {
        "name": "Commerce",
        "vendor": {
          "name": "Adobe",
          "scada": false
        }
      }
    },
    {
      "description": "Commerce versions 2.4.6.x ant\u00e9rieures \u00e0 2.4.6-p7",
      "product": {
        "name": "Commerce",
        "vendor": {
          "name": "Adobe",
          "scada": false
        }
      }
    },
    {
      "description": "Commerce versions 2.4.5.x ant\u00e9rieures \u00e0 2.4.5-p9",
      "product": {
        "name": "Commerce",
        "vendor": {
          "name": "Adobe",
          "scada": false
        }
      }
    },
    {
      "description": "Magento Open Source versions 2.4.6.x ant\u00e9rieures \u00e0 2.4.6-p7",
      "product": {
        "name": "Magento",
        "vendor": {
          "name": "Adobe",
          "scada": false
        }
      }
    },
    {
      "description": "Acrobat 2024 versions ant\u00e9rieures \u00e0 24.001.30159",
      "product": {
        "name": "Acrobat",
        "vendor": {
          "name": "Adobe",
          "scada": false
        }
      }
    },
    {
      "description": "Magento Open Source versions 2.4.7.x ant\u00e9rieures \u00e0 2.4.7-p2",
      "product": {
        "name": "Magento",
        "vendor": {
          "name": "Adobe",
          "scada": false
        }
      }
    },
    {
      "description": "Magento Open Source versions ant\u00e9rieures \u00e0 2.4.4-p10",
      "product": {
        "name": "Magento",
        "vendor": {
          "name": "Adobe",
          "scada": false
        }
      }
    },
    {
      "description": "Acrobat Reader DC versions ant\u00e9rieures \u00e0 24.002.21005",
      "product": {
        "name": "Acrobat Reader",
        "vendor": {
          "name": "Adobe",
          "scada": false
        }
      }
    },
    {
      "description": "Acrobat Reader 2020 versions ant\u00e9rieures \u00e0 20.005.30655",
      "product": {
        "name": "Acrobat Reader",
        "vendor": {
          "name": "Adobe",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": "",
  "content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
  "cves": [
    {
      "name": "CVE-2024-41831",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-41831"
    },
    {
      "name": "CVE-2024-41832",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-41832"
    },
    {
      "name": "CVE-2024-39411",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-39411"
    },
    {
      "name": "CVE-2024-39413",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-39413"
    },
    {
      "name": "CVE-2024-39398",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-39398"
    },
    {
      "name": "CVE-2024-39412",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-39412"
    },
    {
      "name": "CVE-2024-39425",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-39425"
    },
    {
      "name": "CVE-2024-39424",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-39424"
    },
    {
      "name": "CVE-2024-39418",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-39418"
    },
    {
      "name": "CVE-2024-39403",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-39403"
    },
    {
      "name": "CVE-2024-39408",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-39408"
    },
    {
      "name": "CVE-2024-41835",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-41835"
    },
    {
      "name": "CVE-2024-39401",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-39401"
    },
    {
      "name": "CVE-2024-39415",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-39415"
    },
    {
      "name": "CVE-2024-39426",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-39426"
    },
    {
      "name": "CVE-2024-39416",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-39416"
    },
    {
      "name": "CVE-2024-39402",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-39402"
    },
    {
      "name": "CVE-2024-39383",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-39383"
    },
    {
      "name": "CVE-2024-41833",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-41833"
    },
    {
      "name": "CVE-2024-39404",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-39404"
    },
    {
      "name": "CVE-2024-39406",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-39406"
    },
    {
      "name": "CVE-2024-39423",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-39423"
    },
    {
      "name": "CVE-2024-39419",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-39419"
    },
    {
      "name": "CVE-2024-41830",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-41830"
    },
    {
      "name": "CVE-2024-39400",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-39400"
    },
    {
      "name": "CVE-2024-39410",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-39410"
    },
    {
      "name": "CVE-2024-39422",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-39422"
    },
    {
      "name": "CVE-2024-39414",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-39414"
    },
    {
      "name": "CVE-2024-39417",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-39417"
    },
    {
      "name": "CVE-2024-39405",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-39405"
    },
    {
      "name": "CVE-2024-39409",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-39409"
    },
    {
      "name": "CVE-2024-41834",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-41834"
    },
    {
      "name": "CVE-2024-39407",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-39407"
    },
    {
      "name": "CVE-2024-39397",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-39397"
    },
    {
      "name": "CVE-2024-39399",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-39399"
    }
  ],
  "initial_release_date": "2024-08-14T00:00:00",
  "last_revision_date": "2024-08-14T00:00:00",
  "links": [],
  "reference": "CERTFR-2024-AVI-0678",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2024-08-14T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "Injection de code indirecte \u00e0 distance (XSS)"
    },
    {
      "description": "Injection de requ\u00eates ill\u00e9gitimes par rebond (CSRF)"
    },
    {
      "description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
    },
    {
      "description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
    },
    {
      "description": "Contournement de la politique de s\u00e9curit\u00e9"
    },
    {
      "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
    },
    {
      "description": "\u00c9l\u00e9vation de privil\u00e8ges"
    }
  ],
  "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits Adobe. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire, une \u00e9l\u00e9vation de privil\u00e8ges et une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es.",
  "title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Adobe",
  "vendor_advisories": [
    {
      "published_at": "2024-08-13",
      "title": "Bulletin de s\u00e9curit\u00e9 Adobe apsb24-61",
      "url": "https://helpx.adobe.com/security/products/magento/apsb24-61.html"
    },
    {
      "published_at": "2024-08-13",
      "title": "Bulletin de s\u00e9curit\u00e9 Adobe apsb24-57",
      "url": "https://helpx.adobe.com/security/products/acrobat/apsb24-57.html"
    }
  ]
}

CERTFR-2024-AVI-0483
Vulnerability from certfr_avis

De multiples vulnérabilités ont été découvertes dans les produits Adobe. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, une élévation de privilèges et une injection de code indirecte à distance (XSS).

Solutions

Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).

Impacted products
Vendor Product Description
Adobe Magento Magento Open Source versions 2.4.5-px antérieures à 2.4.5-p8
Adobe Commerce Commerce versions 2.3.7-px-ext-x antérieures à 2.3.7-p4-ext-8
Adobe Commerce Commerce versions 2.4.5-px antérieures à 2.4.5-p8
Adobe ColdFusion ColdFusion 2023 sans le correctif de sécurité Update 8
Adobe Commerce Commerce versions 2.4.0-ext-x antérieures à 2.4.0-ext-8
Adobe Magento Magento Open Source versions 2.4.7-px antérieures à 2.4.7-p1
Adobe Magento Magento Open Source versions 2.4.6-px antérieures à 2.4.6-p6
Adobe Commerce Commerce Webhooks Plugin versions 1.2.0 à 1.4.0 antérieures à 1.5.0
Adobe ColdFusion ColdFusion 2021 sans le correctif de sécurité Update 14
Adobe Commerce Commerce versions 2.4.2-ext-x antérieures à 2.4.2-ext-8
Adobe Commerce Commerce versions 2.4.3-ext-x antérieures à 2.4.3-ext-8
Adobe Magento Magento Open Source versions 2.4.4-px antérieures à 2.4.4-p9
Adobe Commerce Commerce versions 2.4.7-px antérieures à 2.4.7-p1
Adobe Commerce Commerce versions 2.4.1-ext-x antérieures à 2.4.1-ext-8
Adobe Commerce Commerce versions 2.4.4-px antérieures à 2.4.4-p9
Adobe Commerce Commerce versions 2.4.6-px antérieures à 2.4.6-p6
Adobe Acrobat Acrobat Android versions antérieures à 24.5.0.33694
References
Bulletin de sécurité Adobe apsb24-50 2024-06-11 vendor-advisory
Bulletin de sécurité Adobe apsb24-41 2024-06-11 vendor-advisory
Bulletin de sécurité Adobe apsb24-40 2024-06-11 vendor-advisory

Show details on source website


{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "Magento Open Source versions 2.4.5-px ant\u00e9rieures \u00e0 2.4.5-p8",
      "product": {
        "name": "Magento",
        "vendor": {
          "name": "Adobe",
          "scada": false
        }
      }
    },
    {
      "description": "Commerce versions 2.3.7-px-ext-x ant\u00e9rieures \u00e0 2.3.7-p4-ext-8",
      "product": {
        "name": "Commerce",
        "vendor": {
          "name": "Adobe",
          "scada": false
        }
      }
    },
    {
      "description": "Commerce versions 2.4.5-px ant\u00e9rieures \u00e0 2.4.5-p8",
      "product": {
        "name": "Commerce",
        "vendor": {
          "name": "Adobe",
          "scada": false
        }
      }
    },
    {
      "description": "ColdFusion 2023 sans le correctif de s\u00e9curit\u00e9 Update 8",
      "product": {
        "name": "ColdFusion",
        "vendor": {
          "name": "Adobe",
          "scada": false
        }
      }
    },
    {
      "description": "Commerce versions 2.4.0-ext-x ant\u00e9rieures \u00e0 2.4.0-ext-8",
      "product": {
        "name": "Commerce",
        "vendor": {
          "name": "Adobe",
          "scada": false
        }
      }
    },
    {
      "description": "Magento Open Source versions 2.4.7-px ant\u00e9rieures \u00e0 2.4.7-p1",
      "product": {
        "name": "Magento",
        "vendor": {
          "name": "Adobe",
          "scada": false
        }
      }
    },
    {
      "description": "Magento Open Source versions 2.4.6-px ant\u00e9rieures \u00e0 2.4.6-p6",
      "product": {
        "name": "Magento",
        "vendor": {
          "name": "Adobe",
          "scada": false
        }
      }
    },
    {
      "description": "Commerce Webhooks Plugin versions 1.2.0 \u00e0 1.4.0 ant\u00e9rieures \u00e0 1.5.0",
      "product": {
        "name": "Commerce",
        "vendor": {
          "name": "Adobe",
          "scada": false
        }
      }
    },
    {
      "description": "ColdFusion 2021 sans le correctif de s\u00e9curit\u00e9 Update 14",
      "product": {
        "name": "ColdFusion",
        "vendor": {
          "name": "Adobe",
          "scada": false
        }
      }
    },
    {
      "description": "Commerce versions 2.4.2-ext-x ant\u00e9rieures \u00e0 2.4.2-ext-8",
      "product": {
        "name": "Commerce",
        "vendor": {
          "name": "Adobe",
          "scada": false
        }
      }
    },
    {
      "description": "Commerce versions 2.4.3-ext-x ant\u00e9rieures \u00e0 2.4.3-ext-8",
      "product": {
        "name": "Commerce",
        "vendor": {
          "name": "Adobe",
          "scada": false
        }
      }
    },
    {
      "description": "Magento Open Source versions 2.4.4-px ant\u00e9rieures \u00e0 2.4.4-p9",
      "product": {
        "name": "Magento",
        "vendor": {
          "name": "Adobe",
          "scada": false
        }
      }
    },
    {
      "description": "Commerce versions 2.4.7-px ant\u00e9rieures \u00e0 2.4.7-p1",
      "product": {
        "name": "Commerce",
        "vendor": {
          "name": "Adobe",
          "scada": false
        }
      }
    },
    {
      "description": "Commerce versions 2.4.1-ext-x ant\u00e9rieures \u00e0 2.4.1-ext-8",
      "product": {
        "name": "Commerce",
        "vendor": {
          "name": "Adobe",
          "scada": false
        }
      }
    },
    {
      "description": "Commerce versions 2.4.4-px ant\u00e9rieures \u00e0 2.4.4-p9",
      "product": {
        "name": "Commerce",
        "vendor": {
          "name": "Adobe",
          "scada": false
        }
      }
    },
    {
      "description": "Commerce versions 2.4.6-px ant\u00e9rieures \u00e0 2.4.6-p6",
      "product": {
        "name": "Commerce",
        "vendor": {
          "name": "Adobe",
          "scada": false
        }
      }
    },
    {
      "description": "Acrobat Android versions ant\u00e9rieures \u00e0 24.5.0.33694",
      "product": {
        "name": "Acrobat",
        "vendor": {
          "name": "Adobe",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": "",
  "content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
  "cves": [
    {
      "name": "CVE-2024-34106",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-34106"
    },
    {
      "name": "CVE-2024-34105",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-34105"
    },
    {
      "name": "CVE-2024-34103",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-34103"
    },
    {
      "name": "CVE-2024-34107",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-34107"
    },
    {
      "name": "CVE-2024-34109",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-34109"
    },
    {
      "name": "CVE-2024-34111",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-34111"
    },
    {
      "name": "CVE-2024-34112",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-34112"
    },
    {
      "name": "CVE-2024-34130",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-34130"
    },
    {
      "name": "CVE-2024-34110",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-34110"
    },
    {
      "name": "CVE-2024-34108",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-34108"
    },
    {
      "name": "CVE-2024-34129",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-34129"
    },
    {
      "name": "CVE-2024-34102",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-34102"
    },
    {
      "name": "CVE-2024-34113",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-34113"
    },
    {
      "name": "CVE-2024-34104",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-34104"
    }
  ],
  "initial_release_date": "2024-06-12T00:00:00",
  "last_revision_date": "2024-06-12T00:00:00",
  "links": [],
  "reference": "CERTFR-2024-AVI-0483",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2024-06-12T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "Injection de code indirecte \u00e0 distance (XSS)"
    },
    {
      "description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
    },
    {
      "description": "Contournement de la politique de s\u00e9curit\u00e9"
    },
    {
      "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
    },
    {
      "description": "\u00c9l\u00e9vation de privil\u00e8ges"
    }
  ],
  "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits Adobe. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance, une \u00e9l\u00e9vation de privil\u00e8ges et une injection de code indirecte \u00e0 distance (XSS).",
  "title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Adobe",
  "vendor_advisories": [
    {
      "published_at": "2024-06-11",
      "title": "Bulletin de s\u00e9curit\u00e9 Adobe apsb24-50",
      "url": "https://helpx.adobe.com/security/products/acrobat-android/apsb24-50.html"
    },
    {
      "published_at": "2024-06-11",
      "title": "Bulletin de s\u00e9curit\u00e9 Adobe apsb24-41",
      "url": "https://helpx.adobe.com/security/products/coldfusion/apsb24-41.html"
    },
    {
      "published_at": "2024-06-11",
      "title": "Bulletin de s\u00e9curit\u00e9 Adobe apsb24-40",
      "url": "https://helpx.adobe.com/security/products/magento/apsb24-40.html"
    }
  ]
}

CERTFR-2024-AVI-0406
Vulnerability from certfr_avis

De multiples vulnérabilités ont été découvertes dans les produits Adobe. Elles permettent à un attaquant de provoquer une exécution de code arbitraire et une atteinte à la confidentialité des données.

Solution

Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).

None
Impacted products
Vendor Product Description
Adobe Acrobat DC Acrobat DC versions antérieures à 24.002.20759
Adobe Acrobat Reader DC Acrobat Reader DC versions antérieures à 24.002.20759
Adobe Acrobat Reader Acrobat Reader 2020 versions antérieures à 20.005.30635 pour macOS
Adobe Acrobat Acrobat 2020 versions antérieures à 20.005.30636 pour Windows
Adobe Acrobat Reader Acrobat Reader 2020 versions antérieures à 20.005.30636 pour Windows
Adobe Acrobat Acrobat 2020 versions antérieures à 20.005.30635 pour macOS
References

Show details on source website


{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "Acrobat DC versions ant\u00e9rieures \u00e0 24.002.20759",
      "product": {
        "name": "Acrobat DC",
        "vendor": {
          "name": "Adobe",
          "scada": false
        }
      }
    },
    {
      "description": "Acrobat Reader DC versions ant\u00e9rieures \u00e0 24.002.20759",
      "product": {
        "name": "Acrobat Reader DC",
        "vendor": {
          "name": "Adobe",
          "scada": false
        }
      }
    },
    {
      "description": "Acrobat Reader 2020 versions ant\u00e9rieures \u00e0 20.005.30635 pour macOS",
      "product": {
        "name": "Acrobat Reader",
        "vendor": {
          "name": "Adobe",
          "scada": false
        }
      }
    },
    {
      "description": "Acrobat 2020 versions ant\u00e9rieures \u00e0 20.005.30636 pour Windows",
      "product": {
        "name": "Acrobat",
        "vendor": {
          "name": "Adobe",
          "scada": false
        }
      }
    },
    {
      "description": "Acrobat Reader 2020 versions ant\u00e9rieures \u00e0 20.005.30636 pour Windows",
      "product": {
        "name": "Acrobat Reader",
        "vendor": {
          "name": "Adobe",
          "scada": false
        }
      }
    },
    {
      "description": "Acrobat 2020 versions ant\u00e9rieures \u00e0 20.005.30635 pour macOS",
      "product": {
        "name": "Acrobat",
        "vendor": {
          "name": "Adobe",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": null,
  "content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
  "cves": [
    {
      "name": "CVE-2024-34094",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-34094"
    },
    {
      "name": "CVE-2024-34099",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-34099"
    },
    {
      "name": "CVE-2024-34096",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-34096"
    },
    {
      "name": "CVE-2024-34098",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-34098"
    },
    {
      "name": "CVE-2024-30312",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-30312"
    },
    {
      "name": "CVE-2024-30310",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-30310"
    },
    {
      "name": "CVE-2024-30311",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-30311"
    },
    {
      "name": "CVE-2024-30284",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-30284"
    },
    {
      "name": "CVE-2024-34100",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-34100"
    },
    {
      "name": "CVE-2024-34101",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-34101"
    },
    {
      "name": "CVE-2024-34097",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-34097"
    },
    {
      "name": "CVE-2024-34095",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-34095"
    }
  ],
  "initial_release_date": "2024-05-15T00:00:00",
  "last_revision_date": "2024-05-15T00:00:00",
  "links": [],
  "reference": "CERTFR-2024-AVI-0406",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2024-05-15T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "Ex\u00e9cution de code arbitraire"
    },
    {
      "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
    }
  ],
  "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits Adobe.\nElles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code\narbitraire et une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es.\n",
  "title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Adobe",
  "vendor_advisories": [
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Adobe apsb24-29 du 14 mai 2024",
      "url": "https://helpx.adobe.com/security/products/acrobat/apsb24-29.html"
    }
  ]
}

CERTFR-2024-AVI-0123
Vulnerability from certfr_avis

De multiples vulnérabilités ont été découvertes dans les produits Adobe. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service à distance et injection de code indirecte à distance.

Solution

Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).

None
Impacted products
Vendor Product Description
Adobe Commerce Adobe Commerce version 2.4.4-x antérieures à 2.4.4-p7
Adobe Magento Magento Open Source versions 2.4.6-x antérieures à 2.4.6-p4
Adobe Commerce Adobe Commerce version 2.4.3-x antérieures à 2.4.3-ext-6
Adobe Acrobat Acrobat 2020 versions antérieures à 20.005.30574 sur Windows et macOS
Adobe Acrobat Reader Acrobat Reader 2020 versions antérieures à 20.005.30574 sur Windows et macOS
Adobe Acrobat Reader DC Acrobat Reader DC versions antérieures à 23.008.20533 sur Windows et macOS
Adobe Acrobat DC Acrobat DC versions antérieures à 23.008.20533 sur Windows et macOS
Adobe Commerce Adobe Commerce version 2.4.1-x antérieures à 2.4.1-ext-6
Adobe Commerce Adobe Commerce version 2.4.0-x antérieures à 2.4.0-ext-6
Adobe Commerce Adobe Commerce version 2.4.5-x antérieures à 2.4.5-p6
Adobe Magento Magento Open Source versions 2.4.5-x antérieures à 2.4.5-p6
Adobe Commerce Adobe Commerce version 2.3.7-x antérieures à 2.3.7-p4-ext-6
Adobe Magento Magento Open Source versions 2.4.4-x antérieures à 2.4.4-p7
Adobe Commerce Adobe Commerce version 2.4.6-x antérieures à 2.4.6-p4
Adobe Commerce Adobe Commerce version 2.4.2-x antérieures à 2.4.2-ext-6
References

Show details on source website


{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "Adobe Commerce version 2.4.4-x ant\u00e9rieures \u00e0 2.4.4-p7",
      "product": {
        "name": "Commerce",
        "vendor": {
          "name": "Adobe",
          "scada": false
        }
      }
    },
    {
      "description": "Magento Open Source versions 2.4.6-x ant\u00e9rieures \u00e0 2.4.6-p4",
      "product": {
        "name": "Magento",
        "vendor": {
          "name": "Adobe",
          "scada": false
        }
      }
    },
    {
      "description": "Adobe Commerce version 2.4.3-x ant\u00e9rieures \u00e0 2.4.3-ext-6",
      "product": {
        "name": "Commerce",
        "vendor": {
          "name": "Adobe",
          "scada": false
        }
      }
    },
    {
      "description": "Acrobat 2020 versions ant\u00e9rieures \u00e0 20.005.30574 sur Windows et macOS",
      "product": {
        "name": "Acrobat",
        "vendor": {
          "name": "Adobe",
          "scada": false
        }
      }
    },
    {
      "description": "Acrobat Reader 2020 versions ant\u00e9rieures \u00e0 20.005.30574 sur Windows et macOS",
      "product": {
        "name": "Acrobat Reader",
        "vendor": {
          "name": "Adobe",
          "scada": false
        }
      }
    },
    {
      "description": "Acrobat Reader DC versions ant\u00e9rieures \u00e0 23.008.20533 sur Windows et macOS",
      "product": {
        "name": "Acrobat Reader DC",
        "vendor": {
          "name": "Adobe",
          "scada": false
        }
      }
    },
    {
      "description": "Acrobat DC versions ant\u00e9rieures \u00e0 23.008.20533 sur Windows et macOS",
      "product": {
        "name": "Acrobat DC",
        "vendor": {
          "name": "Adobe",
          "scada": false
        }
      }
    },
    {
      "description": "Adobe Commerce version 2.4.1-x ant\u00e9rieures \u00e0 2.4.1-ext-6",
      "product": {
        "name": "Commerce",
        "vendor": {
          "name": "Adobe",
          "scada": false
        }
      }
    },
    {
      "description": "Adobe Commerce version 2.4.0-x ant\u00e9rieures \u00e0 2.4.0-ext-6",
      "product": {
        "name": "Commerce",
        "vendor": {
          "name": "Adobe",
          "scada": false
        }
      }
    },
    {
      "description": "Adobe Commerce version 2.4.5-x ant\u00e9rieures \u00e0 2.4.5-p6",
      "product": {
        "name": "Commerce",
        "vendor": {
          "name": "Adobe",
          "scada": false
        }
      }
    },
    {
      "description": "Magento Open Source versions 2.4.5-x ant\u00e9rieures \u00e0 2.4.5-p6",
      "product": {
        "name": "Magento",
        "vendor": {
          "name": "Adobe",
          "scada": false
        }
      }
    },
    {
      "description": "Adobe Commerce version 2.3.7-x ant\u00e9rieures \u00e0 2.3.7-p4-ext-6",
      "product": {
        "name": "Commerce",
        "vendor": {
          "name": "Adobe",
          "scada": false
        }
      }
    },
    {
      "description": "Magento Open Source versions 2.4.4-x ant\u00e9rieures \u00e0 2.4.4-p7",
      "product": {
        "name": "Magento",
        "vendor": {
          "name": "Adobe",
          "scada": false
        }
      }
    },
    {
      "description": "Adobe Commerce version 2.4.6-x ant\u00e9rieures \u00e0 2.4.6-p4",
      "product": {
        "name": "Commerce",
        "vendor": {
          "name": "Adobe",
          "scada": false
        }
      }
    },
    {
      "description": "Adobe Commerce version 2.4.2-x ant\u00e9rieures \u00e0 2.4.2-ext-6",
      "product": {
        "name": "Commerce",
        "vendor": {
          "name": "Adobe",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": null,
  "content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
  "cves": [
    {
      "name": "CVE-2024-20726",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-20726"
    },
    {
      "name": "CVE-2024-20730",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-20730"
    },
    {
      "name": "CVE-2024-20718",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-20718"
    },
    {
      "name": "CVE-2024-20719",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-20719"
    },
    {
      "name": "CVE-2024-20717",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-20717"
    },
    {
      "name": "CVE-2024-20736",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-20736"
    },
    {
      "name": "CVE-2024-20747",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-20747"
    },
    {
      "name": "CVE-2024-20734",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-20734"
    },
    {
      "name": "CVE-2024-20720",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-20720"
    },
    {
      "name": "CVE-2024-20748",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-20748"
    },
    {
      "name": "CVE-2024-20716",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-20716"
    },
    {
      "name": "CVE-2024-20735",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-20735"
    },
    {
      "name": "CVE-2024-20749",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-20749"
    },
    {
      "name": "CVE-2024-20728",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-20728"
    },
    {
      "name": "CVE-2024-20727",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-20727"
    },
    {
      "name": "CVE-2024-20733",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-20733"
    },
    {
      "name": "CVE-2024-20729",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-20729"
    },
    {
      "name": "CVE-2024-20731",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-20731"
    }
  ],
  "initial_release_date": "2024-02-14T00:00:00",
  "last_revision_date": "2024-02-14T00:00:00",
  "links": [],
  "reference": "CERTFR-2024-AVI-0123",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2024-02-14T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "D\u00e9ni de service \u00e0 distance"
    },
    {
      "description": "Injection de code indirecte \u00e0 distance (XSS)"
    },
    {
      "description": "Injection de requ\u00eates ill\u00e9gitimes par rebond (CSRF)"
    },
    {
      "description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
    }
  ],
  "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans \u003cspan\nclass=\"textit\"\u003eles produits Adobe\u003c/span\u003e. Certaines d\u0027entre elles\npermettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire\n\u00e0 distance, un d\u00e9ni de service \u00e0 distance et injection de code indirecte\n\u00e0 distance.\n",
  "title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Adobe",
  "vendor_advisories": [
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Adobe apsb24-07 du 13 f\u00e9vrier 2024",
      "url": "https://helpx.adobe.com/security/products/acrobat/apsb24-07.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Adobe apsb24-03 du 13 f\u00e9vrier 2024",
      "url": "https://helpx.adobe.com/security/products/magento/apsb24-03.html"
    }
  ]
}

CERTFR-2023-AVI-0939
Vulnerability from certfr_avis

De multiples vulnérabilités ont été découvertes dans les produits Adobe. Certaines d'entre elles permettent à un attaquant de provoquer une atteinte à la confidentialité des données, un contournement de la politique de sécurité et une exécution de code arbitraire à distance.

Solution

Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).

None
Impacted products
Vendor Product Description
Adobe Acrobat DC Acrobat DC versions antérieures à 23.006.20380
Adobe N/A AdobeColdFusion versions 2021 sans le correctif de sécurité Update 12
Adobe Acrobat Reader Acrobat Reader 2020 versions antérieures à 20.005.30539
Adobe N/A AdobeColdFusion versions 2023 sans le correctif de sécurité Update 6
Adobe Acrobat Acrobat 2020 versions antérieures à 20.005.30539
Adobe Acrobat Reader DC Acrobat Reader DC versions antérieures à 23.006.20380

Show details on source website


{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "Acrobat DC versions ant\u00e9rieures \u00e0 23.006.20380",
      "product": {
        "name": "Acrobat DC",
        "vendor": {
          "name": "Adobe",
          "scada": false
        }
      }
    },
    {
      "description": "AdobeColdFusion versions 2021 sans le correctif de s\u00e9curit\u00e9 Update 12",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Adobe",
          "scada": false
        }
      }
    },
    {
      "description": "Acrobat Reader 2020 versions ant\u00e9rieures \u00e0 20.005.30539",
      "product": {
        "name": "Acrobat Reader",
        "vendor": {
          "name": "Adobe",
          "scada": false
        }
      }
    },
    {
      "description": "AdobeColdFusion versions 2023 sans le correctif de s\u00e9curit\u00e9 Update 6",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Adobe",
          "scada": false
        }
      }
    },
    {
      "description": "Acrobat 2020 versions ant\u00e9rieures \u00e0 20.005.30539",
      "product": {
        "name": "Acrobat",
        "vendor": {
          "name": "Adobe",
          "scada": false
        }
      }
    },
    {
      "description": "Acrobat Reader DC versions ant\u00e9rieures \u00e0 23.006.20380",
      "product": {
        "name": "Acrobat Reader DC",
        "vendor": {
          "name": "Adobe",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": null,
  "content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
  "cves": [
    {
      "name": "CVE-2023-44372",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-44372"
    },
    {
      "name": "CVE-2023-44360",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-44360"
    },
    {
      "name": "CVE-2023-44365",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-44365"
    },
    {
      "name": "CVE-2023-44353",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-44353"
    },
    {
      "name": "CVE-2023-44337",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-44337"
    },
    {
      "name": "CVE-2023-26347",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-26347"
    },
    {
      "name": "CVE-2023-44336",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-44336"
    },
    {
      "name": "CVE-2023-44356",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-44356"
    },
    {
      "name": "CVE-2023-44367",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-44367"
    },
    {
      "name": "CVE-2023-44339",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-44339"
    },
    {
      "name": "CVE-2023-44350",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-44350"
    },
    {
      "name": "CVE-2023-44338",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-44338"
    },
    {
      "name": "CVE-2023-44351",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-44351"
    },
    {
      "name": "CVE-2023-44348",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-44348"
    },
    {
      "name": "CVE-2023-44352",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-44352"
    },
    {
      "name": "CVE-2023-44359",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-44359"
    },
    {
      "name": "CVE-2023-44355",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-44355"
    },
    {
      "name": "CVE-2023-44361",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-44361"
    },
    {
      "name": "CVE-2023-44357",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-44357"
    },
    {
      "name": "CVE-2023-44340",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-44340"
    },
    {
      "name": "CVE-2023-44371",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-44371"
    },
    {
      "name": "CVE-2023-44358",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-44358"
    },
    {
      "name": "CVE-2023-44366",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-44366"
    }
  ],
  "initial_release_date": "2023-11-15T00:00:00",
  "last_revision_date": "2023-11-15T00:00:00",
  "links": [
    {
      "title": "Bulletin de s\u00e9curit\u00e9 Adobe\u00a0apsb23-54 du 14 novembre 2023",
      "url": "https://helpx.adobe.com/security/products/acrobat/apsb23-54.html"
    },
    {
      "title": "Bulletin de s\u00e9curit\u00e9 Adobe\u00a0apsb23-52 du 14 novembre 2023",
      "url": "https://helpx.adobe.com/security/products/coldfusion/apsb23-52.html"
    }
  ],
  "reference": "CERTFR-2023-AVI-0939",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2023-11-15T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
    },
    {
      "description": "Contournement de la politique de s\u00e9curit\u00e9"
    },
    {
      "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
    }
  ],
  "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans \u003cspan\nclass=\"textit\"\u003eles produits Adobe\u003c/span\u003e. Certaines d\u0027entre elles\npermettent \u00e0 un attaquant de provoquer une atteinte \u00e0 la confidentialit\u00e9\ndes donn\u00e9es, un contournement de la politique de s\u00e9curit\u00e9 et une\nex\u00e9cution de code arbitraire \u00e0 distance.\n",
  "title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Adobe",
  "vendor_advisories": [
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Adobe apsb23-52 du 14 novembre 2023",
      "url": null
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Adobe apsb23-54 du 14 novembre 2023",
      "url": null
    }
  ]
}

CERTFR-2023-AVI-0736
Vulnerability from certfr_avis

Une vulnérabilité a été découverte dans les produits Adobe. Elle permet à un attaquant de provoquer une exécution de code arbitraire.

Solution

Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).

None
Impacted products
Vendor Product Description
Adobe Acrobat DC Acrobat DC (Continuous) versions 23.x antérieures à 23.006.20320
Adobe Acrobat Acrobat 2020 (Classic 2020) versions 20.x antérieures à 20.005.30524
Adobe Acrobat Reader Acrobat Reader 2020 (Classic 2020) versions 20.x antérieures à 20.005.30524
Adobe Acrobat Reader DC Acrobat Reader DC (Continuous) versions 23.x antérieures à 23.006.20320
References

Show details on source website


{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "Acrobat DC (Continuous) versions 23.x ant\u00e9rieures \u00e0 23.006.20320",
      "product": {
        "name": "Acrobat DC",
        "vendor": {
          "name": "Adobe",
          "scada": false
        }
      }
    },
    {
      "description": "Acrobat 2020 (Classic 2020) versions 20.x ant\u00e9rieures \u00e0 20.005.30524",
      "product": {
        "name": "Acrobat",
        "vendor": {
          "name": "Adobe",
          "scada": false
        }
      }
    },
    {
      "description": "Acrobat Reader 2020 (Classic 2020) versions 20.x ant\u00e9rieures \u00e0 20.005.30524",
      "product": {
        "name": "Acrobat Reader",
        "vendor": {
          "name": "Adobe",
          "scada": false
        }
      }
    },
    {
      "description": "Acrobat Reader DC (Continuous) versions 23.x ant\u00e9rieures \u00e0 23.006.20320",
      "product": {
        "name": "Acrobat Reader DC",
        "vendor": {
          "name": "Adobe",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": null,
  "content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
  "cves": [
    {
      "name": "CVE-2023-26369",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-26369"
    }
  ],
  "initial_release_date": "2023-09-13T00:00:00",
  "last_revision_date": "2023-09-13T00:00:00",
  "links": [],
  "reference": "CERTFR-2023-AVI-0736",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2023-09-13T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "Ex\u00e9cution de code arbitraire"
    }
  ],
  "summary": "Une vuln\u00e9rabilit\u00e9 a \u00e9t\u00e9 d\u00e9couverte dans \u003cspan class=\"textit\"\u003eles\nproduits Adobe\u003c/span\u003e. Elle permet \u00e0 un attaquant de provoquer une\nex\u00e9cution de code arbitraire.\n",
  "title": "Vuln\u00e9rabilit\u00e9 dans les produits Adobe",
  "vendor_advisories": [
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Adobe apsb23-34 du 12 septembre 2023",
      "url": "https://helpx.adobe.com/security/products/acrobat/apsb23-34.html"
    }
  ]
}

CERTFR-2023-AVI-0636
Vulnerability from certfr_avis

De multiples vulnérabilités ont été découvertes dans les produits Adobe. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service et un contournement de la politique de sécurité.

Solution

Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).

None
Impacted products
Vendor Product Description
Adobe Acrobat Reader Acrobat Reader 2020 versions antérieures à 20.005.30516.10516 sur macOS
Adobe Magento Magento Open Source versions 2.4.4-x antérieures à 2.4.4-p5
Adobe Commerce Adobe Commerce versions 2.4.6-x antérieures à 2.4.6-p2
Adobe Acrobat Reader Acrobat Reader 2020 versions antérieures à 20.005.30514.10514 sur Windows
Adobe Commerce Adobe Commerce versions 2.4.2-x antérieures à 2.4.2-ext-4
Adobe Commerce Adobe Commerce versions 2.4.1-x antérieures à 2.4.1-ext-4
Adobe Commerce Adobe Commerce versions 2.4.4-x antérieures à 2.4.4-p5
Adobe Magento Magento Open Source versions 2.4.5-x antérieures à 2.4.5-p4
Adobe Commerce Adobe Commerce versions 2.4.3-x antérieures à 2.4.3-ext-4
Adobe Acrobat Acrobat 2020 versions antérieures à 20.005.30516.10516 sur macOS
Adobe Magento Magento Open Source versions 2.4.6-x antérieures à 2.4.6-p2
Adobe Commerce Adobe Commerce versions 2.3.7-x antérieures à 2.3.7-p4-ext-4
Adobe Commerce Adobe Commerce versions 2.4.5-x antérieures à 2.4.5-p4
Adobe Commerce Adobe Commerce versions 2.4.0-x antérieures à 2.4.0-ext-4
Adobe Acrobat Acrobat 2020 versions antérieures à 20.005.30514.10514 sur Windows
Adobe Acrobat Reader DC Acrobat Reader DC versions antérieures à 23.003.20269 sur Windows et macOS
Adobe Acrobat DC Acrobat DC versions antérieures à 23.003.20269 sur Windows et macOS
References

Show details on source website


{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "Acrobat Reader 2020 versions ant\u00e9rieures \u00e0 20.005.30516.10516 sur macOS",
      "product": {
        "name": "Acrobat Reader",
        "vendor": {
          "name": "Adobe",
          "scada": false
        }
      }
    },
    {
      "description": "Magento Open Source versions 2.4.4-x ant\u00e9rieures \u00e0 2.4.4-p5",
      "product": {
        "name": "Magento",
        "vendor": {
          "name": "Adobe",
          "scada": false
        }
      }
    },
    {
      "description": "Adobe Commerce versions 2.4.6-x ant\u00e9rieures \u00e0 2.4.6-p2",
      "product": {
        "name": "Commerce",
        "vendor": {
          "name": "Adobe",
          "scada": false
        }
      }
    },
    {
      "description": "Acrobat Reader 2020 versions ant\u00e9rieures \u00e0 20.005.30514.10514 sur Windows",
      "product": {
        "name": "Acrobat Reader",
        "vendor": {
          "name": "Adobe",
          "scada": false
        }
      }
    },
    {
      "description": "Adobe Commerce versions 2.4.2-x ant\u00e9rieures \u00e0 2.4.2-ext-4",
      "product": {
        "name": "Commerce",
        "vendor": {
          "name": "Adobe",
          "scada": false
        }
      }
    },
    {
      "description": "Adobe Commerce versions 2.4.1-x ant\u00e9rieures \u00e0 2.4.1-ext-4",
      "product": {
        "name": "Commerce",
        "vendor": {
          "name": "Adobe",
          "scada": false
        }
      }
    },
    {
      "description": "Adobe Commerce versions 2.4.4-x ant\u00e9rieures \u00e0 2.4.4-p5",
      "product": {
        "name": "Commerce",
        "vendor": {
          "name": "Adobe",
          "scada": false
        }
      }
    },
    {
      "description": "Magento Open Source versions 2.4.5-x ant\u00e9rieures \u00e0 2.4.5-p4",
      "product": {
        "name": "Magento",
        "vendor": {
          "name": "Adobe",
          "scada": false
        }
      }
    },
    {
      "description": "Adobe Commerce versions 2.4.3-x ant\u00e9rieures \u00e0 2.4.3-ext-4",
      "product": {
        "name": "Commerce",
        "vendor": {
          "name": "Adobe",
          "scada": false
        }
      }
    },
    {
      "description": "Acrobat 2020 versions ant\u00e9rieures \u00e0 20.005.30516.10516 sur macOS",
      "product": {
        "name": "Acrobat",
        "vendor": {
          "name": "Adobe",
          "scada": false
        }
      }
    },
    {
      "description": "Magento Open Source versions 2.4.6-x ant\u00e9rieures \u00e0 2.4.6-p2",
      "product": {
        "name": "Magento",
        "vendor": {
          "name": "Adobe",
          "scada": false
        }
      }
    },
    {
      "description": "Adobe Commerce versions 2.3.7-x ant\u00e9rieures \u00e0 2.3.7-p4-ext-4",
      "product": {
        "name": "Commerce",
        "vendor": {
          "name": "Adobe",
          "scada": false
        }
      }
    },
    {
      "description": "Adobe Commerce versions 2.4.5-x ant\u00e9rieures \u00e0 2.4.5-p4",
      "product": {
        "name": "Commerce",
        "vendor": {
          "name": "Adobe",
          "scada": false
        }
      }
    },
    {
      "description": "Adobe Commerce versions 2.4.0-x ant\u00e9rieures \u00e0 2.4.0-ext-4",
      "product": {
        "name": "Commerce",
        "vendor": {
          "name": "Adobe",
          "scada": false
        }
      }
    },
    {
      "description": "Acrobat 2020 versions ant\u00e9rieures \u00e0 20.005.30514.10514 sur Windows",
      "product": {
        "name": "Acrobat",
        "vendor": {
          "name": "Adobe",
          "scada": false
        }
      }
    },
    {
      "description": "Acrobat Reader DC versions ant\u00e9rieures \u00e0 23.003.20269 sur Windows et macOS",
      "product": {
        "name": "Acrobat Reader DC",
        "vendor": {
          "name": "Adobe",
          "scada": false
        }
      }
    },
    {
      "description": "Acrobat DC versions ant\u00e9rieures \u00e0 23.003.20269 sur Windows et macOS",
      "product": {
        "name": "Acrobat DC",
        "vendor": {
          "name": "Adobe",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": null,
  "content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
  "cves": [
    {
      "name": "CVE-2023-38243",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-38243"
    },
    {
      "name": "CVE-2023-38207",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-38207"
    },
    {
      "name": "CVE-2023-38241",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-38241"
    },
    {
      "name": "CVE-2023-38235",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-38235"
    },
    {
      "name": "CVE-2023-38227",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-38227"
    },
    {
      "name": "CVE-2023-38239",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-38239"
    },
    {
      "name": "CVE-2023-29303",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-29303"
    },
    {
      "name": "CVE-2023-38245",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-38245"
    },
    {
      "name": "CVE-2023-38228",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-38228"
    },
    {
      "name": "CVE-2023-38222",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-38222"
    },
    {
      "name": "CVE-2023-29320",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-29320"
    },
    {
      "name": "CVE-2023-38234",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-38234"
    },
    {
      "name": "CVE-2023-38225",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-38225"
    },
    {
      "name": "CVE-2023-38232",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-38232"
    },
    {
      "name": "CVE-2023-38240",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-38240"
    },
    {
      "name": "CVE-2023-38224",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-38224"
    },
    {
      "name": "CVE-2023-38230",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-38230"
    },
    {
      "name": "CVE-2023-38247",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-38247"
    },
    {
      "name": "CVE-2023-38223",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-38223"
    },
    {
      "name": "CVE-2023-38237",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-38237"
    },
    {
      "name": "CVE-2023-29299",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-29299"
    },
    {
      "name": "CVE-2023-38226",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-38226"
    },
    {
      "name": "CVE-2023-38238",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-38238"
    },
    {
      "name": "CVE-2023-38242",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-38242"
    },
    {
      "name": "CVE-2023-38236",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-38236"
    },
    {
      "name": "CVE-2023-38246",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-38246"
    },
    {
      "name": "CVE-2023-38208",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-38208"
    },
    {
      "name": "CVE-2023-38229",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-38229"
    },
    {
      "name": "CVE-2023-38209",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-38209"
    },
    {
      "name": "CVE-2023-38244",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-38244"
    },
    {
      "name": "CVE-2023-38248",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-38248"
    },
    {
      "name": "CVE-2023-38231",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-38231"
    },
    {
      "name": "CVE-2023-38233",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-38233"
    }
  ],
  "initial_release_date": "2023-08-09T00:00:00",
  "last_revision_date": "2023-08-09T00:00:00",
  "links": [],
  "reference": "CERTFR-2023-AVI-0636",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2023-08-09T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
    },
    {
      "description": "D\u00e9ni de service"
    },
    {
      "description": "Contournement de la politique de s\u00e9curit\u00e9"
    },
    {
      "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
    },
    {
      "description": "\u00c9l\u00e9vation de privil\u00e8ges"
    }
  ],
  "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits Adobe.\nCertaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une\nex\u00e9cution de code arbitraire \u00e0 distance, un d\u00e9ni de service et un\ncontournement de la politique de s\u00e9curit\u00e9.\n",
  "title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Adobe",
  "vendor_advisories": [
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Adobe apsb23-42 du 08 ao\u00fbt 2023",
      "url": "https://helpx.adobe.com/security/products/magento/apsb23-42.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Adobe apsb23-30 du 08 ao\u00fbt 2023",
      "url": "https://helpx.adobe.com/security/products/acrobat/apsb23-30.html"
    }
  ]
}

CERTFR-2023-AVI-0302
Vulnerability from certfr_avis

De multiples vulnérabilités ont été découvertes dans Adobe Acrobat. Elles permettent à un attaquant de provoquer une exécution de code arbitraire, une élévation de privilèges et un contournement de la politique de sécurité.

Solution

Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).

None
Impacted products
Vendor Product Description
Adobe Acrobat Acrobat 2020 versions antérieures à 20.005.30467 sur Windows et macOS
Adobe Acrobat Acrobat DC versions antérieures à 23.001.20143 sur Windows et macOS
Adobe Acrobat Acrobat Reader DC versions antérieures à 23.001.20143 sur Windows et macOS
Adobe Acrobat Acrobat Reader 2020 versions antérieures à 20.005.30467 sur Windows et macOS

Show details on source website


{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "Acrobat 2020 versions ant\u00e9rieures \u00e0 20.005.30467 sur Windows et macOS",
      "product": {
        "name": "Acrobat",
        "vendor": {
          "name": "Adobe",
          "scada": false
        }
      }
    },
    {
      "description": "Acrobat DC versions ant\u00e9rieures \u00e0 23.001.20143 sur Windows et macOS",
      "product": {
        "name": "Acrobat",
        "vendor": {
          "name": "Adobe",
          "scada": false
        }
      }
    },
    {
      "description": "Acrobat Reader DC versions ant\u00e9rieures \u00e0 23.001.20143 sur Windows et macOS",
      "product": {
        "name": "Acrobat",
        "vendor": {
          "name": "Adobe",
          "scada": false
        }
      }
    },
    {
      "description": "Acrobat Reader 2020 versions ant\u00e9rieures \u00e0 20.005.30467 sur Windows et macOS",
      "product": {
        "name": "Acrobat",
        "vendor": {
          "name": "Adobe",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": null,
  "content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
  "cves": [
    {
      "name": "CVE-2023-26419",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-26419"
    },
    {
      "name": "CVE-2023-26407",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-26407"
    },
    {
      "name": "CVE-2023-26417",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-26417"
    },
    {
      "name": "CVE-2023-26423",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-26423"
    },
    {
      "name": "CVE-2023-26405",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-26405"
    },
    {
      "name": "CVE-2023-26395",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-26395"
    },
    {
      "name": "CVE-2023-26418",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-26418"
    },
    {
      "name": "CVE-2023-26408",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-26408"
    },
    {
      "name": "CVE-2023-26420",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-26420"
    },
    {
      "name": "CVE-2023-26396",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-26396"
    },
    {
      "name": "CVE-2023-26406",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-26406"
    },
    {
      "name": "CVE-2023-26397",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-26397"
    },
    {
      "name": "CVE-2023-26421",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-26421"
    },
    {
      "name": "CVE-2023-26425",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-26425"
    },
    {
      "name": "CVE-2023-26422",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-26422"
    },
    {
      "name": "CVE-2023-26424",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-26424"
    }
  ],
  "initial_release_date": "2023-04-12T00:00:00",
  "last_revision_date": "2023-04-12T00:00:00",
  "links": [
    {
      "title": "Bulletin de s\u00e9curit\u00e9 Adobe\u00a0apsb23-24 du 11 avril 2023",
      "url": "https://helpx.adobe.com/security/products/acrobat/apsb23-24.html"
    }
  ],
  "reference": "CERTFR-2023-AVI-0302",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2023-04-12T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "Ex\u00e9cution de code arbitraire"
    },
    {
      "description": "Contournement de la politique de s\u00e9curit\u00e9"
    },
    {
      "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
    },
    {
      "description": "\u00c9l\u00e9vation de privil\u00e8ges"
    }
  ],
  "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans \u003cspan\nclass=\"textit\"\u003eAdobe Acrobat\u003c/span\u003e. Elles permettent \u00e0 un attaquant de\nprovoquer une ex\u00e9cution de code arbitraire, une \u00e9l\u00e9vation de privil\u00e8ges\net un contournement de la politique de s\u00e9curit\u00e9.\n",
  "title": "Multiples vuln\u00e9rabilit\u00e9s dans Adobe Acrobat",
  "vendor_advisories": [
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Adobe apsb23-24 du 11 avril 2023",
      "url": null
    }
  ]
}

CERTFR-2023-AVI-0016
Vulnerability from certfr_avis

De multiples vulnérabilités ont été découvertes dans Adobe Reader et Acrobat. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service et une atteinte à l'intégrité des données.

Solution

Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).

None
Impacted products
Vendor Product Description
Adobe Acrobat Acrobat Reader DC versions antérieures à 22.003.20310 pour Windows et macOS
Adobe Acrobat Acrobat Reader 2020 versions antérieures à 20.005.30436 pour Windows et macOS
Adobe Acrobat Acrobat 2020 versions antérieures à 20.005.30436 pour Windows et macOS
Adobe Acrobat Acrobat DC versions antérieures à 22.003.20310 pour Windows et macOS
References

Show details on source website


{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "Acrobat Reader DC versions ant\u00e9rieures \u00e0 22.003.20310 pour Windows et macOS",
      "product": {
        "name": "Acrobat",
        "vendor": {
          "name": "Adobe",
          "scada": false
        }
      }
    },
    {
      "description": "Acrobat Reader 2020 versions ant\u00e9rieures \u00e0 20.005.30436 pour Windows et macOS",
      "product": {
        "name": "Acrobat",
        "vendor": {
          "name": "Adobe",
          "scada": false
        }
      }
    },
    {
      "description": "Acrobat 2020 versions ant\u00e9rieures \u00e0 20.005.30436 pour Windows et macOS",
      "product": {
        "name": "Acrobat",
        "vendor": {
          "name": "Adobe",
          "scada": false
        }
      }
    },
    {
      "description": "Acrobat DC versions ant\u00e9rieures \u00e0 22.003.20310 pour Windows et macOS",
      "product": {
        "name": "Acrobat",
        "vendor": {
          "name": "Adobe",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": null,
  "content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
  "cves": [
    {
      "name": "CVE-2023-21614",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-21614"
    },
    {
      "name": "CVE-2023-21613",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-21613"
    },
    {
      "name": "CVE-2023-21611",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-21611"
    },
    {
      "name": "CVE-2023-21605",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-21605"
    },
    {
      "name": "CVE-2023-21607",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-21607"
    },
    {
      "name": "CVE-2023-21604",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-21604"
    },
    {
      "name": "CVE-2023-21609",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-21609"
    },
    {
      "name": "CVE-2023-21610",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-21610"
    },
    {
      "name": "CVE-2023-21579",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-21579"
    },
    {
      "name": "CVE-2023-21585",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-21585"
    },
    {
      "name": "CVE-2023-21606",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-21606"
    },
    {
      "name": "CVE-2023-21612",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-21612"
    },
    {
      "name": "CVE-2023-21581",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-21581"
    },
    {
      "name": "CVE-2023-21608",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-21608"
    },
    {
      "name": "CVE-2023-21586",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-21586"
    }
  ],
  "initial_release_date": "2023-01-11T00:00:00",
  "last_revision_date": "2023-01-11T00:00:00",
  "links": [],
  "reference": "CERTFR-2023-AVI-0016",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2023-01-11T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
    },
    {
      "description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
    },
    {
      "description": "D\u00e9ni de service"
    },
    {
      "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
    },
    {
      "description": "\u00c9l\u00e9vation de privil\u00e8ges"
    }
  ],
  "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans Adobe Reader et\nAcrobat. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer\nune ex\u00e9cution de code arbitraire \u00e0 distance, un d\u00e9ni de service et une\natteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es.\n",
  "title": "Multiples vuln\u00e9rabilit\u00e9s dans Adobe Reader et Acrobat",
  "vendor_advisories": [
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Adobe apsb23-01 du 10 janvier 2023",
      "url": "https://helpx.adobe.com/security/products/acrobat/apsb23-01.html"
    }
  ]
}

CERTFR-2022-AVI-920
Vulnerability from certfr_avis

De multiples vulnérabilités ont été découvertes dans les produits Adobe. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service et un contournement de la politique de sécurité.

Solution

Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).

None
Impacted products
Vendor Product Description
Adobe ColdFusion ColdFusion 2021 versions antérieures à Update 5
Adobe Commerce Adobe Commerce versions 2.4.4x antérieures à 2.4.4-p2
Adobe Magento Magento Open Source versions 2.4.5x antérieures à 2.4.5-p1
Adobe Magento Magento Open Source versions 2.4.4x antérieures à 2.4.4-p2
Adobe Acrobat Reader DC Acrobat Reader DC versions antérieures à 22.003.20258
Adobe Acrobat DC Acrobat DC versions antérieures à 22.003.20258
Adobe Acrobat Acrobat 2020 versions antérieures à 20.005.30407
Adobe ColdFusion ColdFusion 2018 versions antérieures à Update 15
Adobe Commerce Adobe Commerce versions 2.4.5x antérieures à 2.4.5-p1
Adobe Acrobat Reader Acrobat Reader 2020 versions antérieures à 20.005.30407

Show details on source website


{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "ColdFusion 2021 versions ant\u00e9rieures \u00e0 Update 5",
      "product": {
        "name": "ColdFusion",
        "vendor": {
          "name": "Adobe",
          "scada": false
        }
      }
    },
    {
      "description": "Adobe Commerce versions 2.4.4x ant\u00e9rieures \u00e0 2.4.4-p2",
      "product": {
        "name": "Commerce",
        "vendor": {
          "name": "Adobe",
          "scada": false
        }
      }
    },
    {
      "description": "Magento Open Source versions 2.4.5x ant\u00e9rieures \u00e0 2.4.5-p1",
      "product": {
        "name": "Magento",
        "vendor": {
          "name": "Adobe",
          "scada": false
        }
      }
    },
    {
      "description": "Magento Open Source versions 2.4.4x ant\u00e9rieures \u00e0 2.4.4-p2",
      "product": {
        "name": "Magento",
        "vendor": {
          "name": "Adobe",
          "scada": false
        }
      }
    },
    {
      "description": "Acrobat Reader DC versions ant\u00e9rieures \u00e0 22.003.20258",
      "product": {
        "name": "Acrobat Reader DC",
        "vendor": {
          "name": "Adobe",
          "scada": false
        }
      }
    },
    {
      "description": "Acrobat DC versions ant\u00e9rieures \u00e0 22.003.20258",
      "product": {
        "name": "Acrobat DC",
        "vendor": {
          "name": "Adobe",
          "scada": false
        }
      }
    },
    {
      "description": "Acrobat 2020 versions ant\u00e9rieures \u00e0 20.005.30407",
      "product": {
        "name": "Acrobat",
        "vendor": {
          "name": "Adobe",
          "scada": false
        }
      }
    },
    {
      "description": "ColdFusion 2018 versions ant\u00e9rieures \u00e0 Update 15",
      "product": {
        "name": "ColdFusion",
        "vendor": {
          "name": "Adobe",
          "scada": false
        }
      }
    },
    {
      "description": "Adobe Commerce versions 2.4.5x ant\u00e9rieures \u00e0 2.4.5-p1",
      "product": {
        "name": "Commerce",
        "vendor": {
          "name": "Adobe",
          "scada": false
        }
      }
    },
    {
      "description": "Acrobat Reader 2020 versions ant\u00e9rieures \u00e0 20.005.30407",
      "product": {
        "name": "Acrobat Reader",
        "vendor": {
          "name": "Adobe",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": null,
  "content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
  "cves": [
    {
      "name": "CVE-2022-42342",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-42342"
    },
    {
      "name": "CVE-2022-42339",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-42339"
    },
    {
      "name": "CVE-2022-35712",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-35712"
    },
    {
      "name": "CVE-2022-35711",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-35711"
    },
    {
      "name": "CVE-2022-35690",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-35690"
    },
    {
      "name": "CVE-2022-35689",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-35689"
    },
    {
      "name": "CVE-2022-35710",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-35710"
    },
    {
      "name": "CVE-2022-38422",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-38422"
    },
    {
      "name": "CVE-2022-42340",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-42340"
    },
    {
      "name": "CVE-2022-38420",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-38420"
    },
    {
      "name": "CVE-2022-35691",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-35691"
    },
    {
      "name": "CVE-2022-38424",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-38424"
    },
    {
      "name": "CVE-2022-38423",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-38423"
    },
    {
      "name": "CVE-2022-38421",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-38421"
    },
    {
      "name": "CVE-2022-38449",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-38449"
    },
    {
      "name": "CVE-2022-38419",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-38419"
    },
    {
      "name": "CVE-2022-38437",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-38437"
    },
    {
      "name": "CVE-2022-35698",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-35698"
    },
    {
      "name": "CVE-2022-38450",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-38450"
    },
    {
      "name": "CVE-2022-38418",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-38418"
    },
    {
      "name": "CVE-2022-42341",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-42341"
    }
  ],
  "initial_release_date": "2022-10-17T00:00:00",
  "last_revision_date": "2022-10-17T00:00:00",
  "links": [],
  "reference": "CERTFR-2022-AVI-920",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2022-10-17T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
    },
    {
      "description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
    },
    {
      "description": "D\u00e9ni de service"
    },
    {
      "description": "Contournement de la politique de s\u00e9curit\u00e9"
    },
    {
      "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
    },
    {
      "description": "\u00c9l\u00e9vation de privil\u00e8ges"
    }
  ],
  "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits Adobe.\nCertaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une\nex\u00e9cution de code arbitraire \u00e0 distance, un d\u00e9ni de service et un\ncontournement de la politique de s\u00e9curit\u00e9.\n",
  "title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Adobe",
  "vendor_advisories": [
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Adobe apsb22-44 du 11 octobre 2022",
      "url": "https://helpx.adobe.com/security/products/coldfusion/apsb22-44.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Adobe apsb22-48 du 12 octobre 2022",
      "url": "https://helpx.adobe.com/security/products/magento/apsb22-48.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Adobe apsb22-46 du 11 octobre 2022",
      "url": "https://helpx.adobe.com/security/products/acrobat/apsb22-46.html"
    }
  ]
}

CERTFR-2022-AVI-726
Vulnerability from certfr_avis

De multiples vulnérabilités ont été découvertes dans les produits Adobe. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un contournement de la politique de sécurité et une atteinte à l'intégrité des données.

Solution

Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).

None
Impacted products
Vendor Product Description
Adobe Acrobat Reader Acrobat Reader 2017 versions antérieures à 17.012.30262
Adobe Commerce Adobe Commerce versions 2.3.x antérieures à 2.3.7-p4
Adobe Acrobat DC Acrobat DC versions antérieures à 22.002.20191
Adobe Magento Magento Open Source versions 2.3.x antérieures à 2.3.7-p4
Adobe Acrobat Reader DC Acrobat Reader DC versions antérieures à 22.002.20191
Adobe Magento Magento Open Source versions 2.3.x antérieures à 2.4.3-p3, 2.4.4-p1 ou 2.4.5
Adobe Commerce Adobe Commerce versions 2.4.x antérieures à 2.4.3-p3, 2.4.4-p1 ou 2.4.5
Adobe Acrobat Acrobat 2017 versions antérieures à 17.012.30262
Adobe Acrobat Reader Acrobat Reader versions antérieures à 2020 20.005.30381
Adobe Acrobat Acrobat 2020 versions antérieures à 20.005.30381
References

Show details on source website


{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "Acrobat Reader 2017 versions ant\u00e9rieures \u00e0 17.012.30262",
      "product": {
        "name": "Acrobat Reader",
        "vendor": {
          "name": "Adobe",
          "scada": false
        }
      }
    },
    {
      "description": "Adobe Commerce versions 2.3.x ant\u00e9rieures \u00e0 2.3.7-p4",
      "product": {
        "name": "Commerce",
        "vendor": {
          "name": "Adobe",
          "scada": false
        }
      }
    },
    {
      "description": "Acrobat DC versions ant\u00e9rieures \u00e0 22.002.20191",
      "product": {
        "name": "Acrobat DC",
        "vendor": {
          "name": "Adobe",
          "scada": false
        }
      }
    },
    {
      "description": "Magento Open Source versions 2.3.x ant\u00e9rieures \u00e0 2.3.7-p4",
      "product": {
        "name": "Magento",
        "vendor": {
          "name": "Adobe",
          "scada": false
        }
      }
    },
    {
      "description": "Acrobat Reader DC versions ant\u00e9rieures \u00e0 22.002.20191",
      "product": {
        "name": "Acrobat Reader DC",
        "vendor": {
          "name": "Adobe",
          "scada": false
        }
      }
    },
    {
      "description": "Magento Open Source versions 2.3.x ant\u00e9rieures \u00e0 2.4.3-p3, 2.4.4-p1 ou 2.4.5",
      "product": {
        "name": "Magento",
        "vendor": {
          "name": "Adobe",
          "scada": false
        }
      }
    },
    {
      "description": "Adobe Commerce versions 2.4.x ant\u00e9rieures \u00e0 2.4.3-p3, 2.4.4-p1 ou 2.4.5",
      "product": {
        "name": "Commerce",
        "vendor": {
          "name": "Adobe",
          "scada": false
        }
      }
    },
    {
      "description": "Acrobat 2017 versions ant\u00e9rieures \u00e0 17.012.30262",
      "product": {
        "name": "Acrobat",
        "vendor": {
          "name": "Adobe",
          "scada": false
        }
      }
    },
    {
      "description": "Acrobat Reader versions ant\u00e9rieures \u00e0 2020 20.005.30381",
      "product": {
        "name": "Acrobat Reader",
        "vendor": {
          "name": "Adobe",
          "scada": false
        }
      }
    },
    {
      "description": "Acrobat 2020 versions ant\u00e9rieures \u00e0 20.005.30381",
      "product": {
        "name": "Acrobat",
        "vendor": {
          "name": "Adobe",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": null,
  "content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
  "cves": [
    {
      "name": "CVE-2022-35667",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-35667"
    },
    {
      "name": "CVE-2022-34258",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-34258"
    },
    {
      "name": "CVE-2022-34253",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-34253"
    },
    {
      "name": "CVE-2022-34256",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-34256"
    },
    {
      "name": "CVE-2022-34257",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-34257"
    },
    {
      "name": "CVE-2022-35670",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-35670"
    },
    {
      "name": "CVE-2022-35678",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-35678"
    },
    {
      "name": "CVE-2022-35666",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-35666"
    },
    {
      "name": "CVE-2022-35671",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-35671"
    },
    {
      "name": "CVE-2022-34254",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-34254"
    },
    {
      "name": "CVE-2022-35665",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-35665"
    },
    {
      "name": "CVE-2022-34259",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-34259"
    },
    {
      "name": "CVE-2022-34255",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-34255"
    },
    {
      "name": "CVE-2022-35668",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-35668"
    }
  ],
  "initial_release_date": "2022-08-10T00:00:00",
  "last_revision_date": "2022-08-10T00:00:00",
  "links": [],
  "reference": "CERTFR-2022-AVI-726",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2022-08-10T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
    },
    {
      "description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
    },
    {
      "description": "Contournement de la politique de s\u00e9curit\u00e9"
    },
    {
      "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
    },
    {
      "description": "\u00c9l\u00e9vation de privil\u00e8ges"
    }
  ],
  "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits Adobe.\nCertaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une\nex\u00e9cution de code arbitraire \u00e0 distance, un contournement de la\npolitique de s\u00e9curit\u00e9 et une atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es.\n",
  "title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Adobe",
  "vendor_advisories": [
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Adobe apsb22-39 du 09 ao\u00fbt 2022",
      "url": "https://helpx.adobe.com/security/products/acrobat/apsb22-39.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Adobe apsb22-38 du 09 ao\u00fbt 2022",
      "url": "https://helpx.adobe.com/security/products/magento/apsb22-38.html"
    }
  ]
}

CERTFR-2022-AVI-676
Vulnerability from certfr_avis

De multiples vulnérabilités ont été découvertes dans Adobe Acrobat et Reader. Elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance et une atteinte à la confidentialité des données.

Solution

Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).

None
Impacted products
Vendor Product Description
Adobe Acrobat Acrobat Reader 2020 versions antérieures à 20.005.30362
Adobe Acrobat Acrobat 2020 versions antérieures à 20.005.30362
Adobe Acrobat Acrobat Reader 2017 versions antérieures à 17.012.30249
Adobe Acrobat Acrobat Reader DC versions antérieures à 22.001.20169
Adobe Acrobat Acrobat 2017 versions antérieures à 17.012.30249
Adobe Acrobat Acrobat DC versions antérieures à 22.001.20169
References

Show details on source website


{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "Acrobat Reader 2020 versions ant\u00e9rieures \u00e0 20.005.30362",
      "product": {
        "name": "Acrobat",
        "vendor": {
          "name": "Adobe",
          "scada": false
        }
      }
    },
    {
      "description": "Acrobat 2020 versions ant\u00e9rieures \u00e0 20.005.30362",
      "product": {
        "name": "Acrobat",
        "vendor": {
          "name": "Adobe",
          "scada": false
        }
      }
    },
    {
      "description": "Acrobat Reader 2017 versions ant\u00e9rieures \u00e0 17.012.30249",
      "product": {
        "name": "Acrobat",
        "vendor": {
          "name": "Adobe",
          "scada": false
        }
      }
    },
    {
      "description": "Acrobat Reader DC versions ant\u00e9rieures \u00e0 22.001.20169",
      "product": {
        "name": "Acrobat",
        "vendor": {
          "name": "Adobe",
          "scada": false
        }
      }
    },
    {
      "description": "Acrobat 2017 versions ant\u00e9rieures \u00e0 17.012.30249",
      "product": {
        "name": "Acrobat",
        "vendor": {
          "name": "Adobe",
          "scada": false
        }
      }
    },
    {
      "description": "Acrobat DC versions ant\u00e9rieures \u00e0 22.001.20169",
      "product": {
        "name": "Acrobat",
        "vendor": {
          "name": "Adobe",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": null,
  "content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
  "cves": [
    {
      "name": "CVE-2022-34232",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-34232"
    },
    {
      "name": "CVE-2022-34227",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-34227"
    },
    {
      "name": "CVE-2022-34226",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-34226"
    },
    {
      "name": "CVE-2022-34239",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-34239"
    },
    {
      "name": "CVE-2022-34229",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-34229"
    },
    {
      "name": "CVE-2022-34234",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-34234"
    },
    {
      "name": "CVE-2022-34221",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-34221"
    },
    {
      "name": "CVE-2022-34217",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-34217"
    },
    {
      "name": "CVE-2022-34225",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-34225"
    },
    {
      "name": "CVE-2022-34216",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-34216"
    },
    {
      "name": "CVE-2022-34233",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-34233"
    },
    {
      "name": "CVE-2022-34238",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-34238"
    },
    {
      "name": "CVE-2022-34215",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-34215"
    },
    {
      "name": "CVE-2022-34236",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-34236"
    },
    {
      "name": "CVE-2022-34220",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-34220"
    },
    {
      "name": "CVE-2022-34237",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-34237"
    },
    {
      "name": "CVE-2022-34219",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-34219"
    },
    {
      "name": "CVE-2022-34230",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-34230"
    },
    {
      "name": "CVE-2022-34222",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-34222"
    },
    {
      "name": "CVE-2022-34223",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-34223"
    },
    {
      "name": "CVE-2022-34228",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-34228"
    },
    {
      "name": "CVE-2022-34224",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-34224"
    }
  ],
  "initial_release_date": "2022-07-25T00:00:00",
  "last_revision_date": "2022-07-25T00:00:00",
  "links": [],
  "reference": "CERTFR-2022-AVI-676",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2022-07-25T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
    },
    {
      "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
    }
  ],
  "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans Adobe Acrobat et\nReader. Elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de\ncode arbitraire \u00e0 distance et une atteinte \u00e0 la confidentialit\u00e9 des\ndonn\u00e9es.\n",
  "title": "Multiples vuln\u00e9rabilit\u00e9s dans Adobe Acrobat et Reader",
  "vendor_advisories": [
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Adobe apsb22-32 du 12 juillet 2022",
      "url": "https://helpx.adobe.com/security/products/acrobat/apsb22-32.html"
    }
  ]
}

CERTFR-2022-AVI-333
Vulnerability from certfr_avis

De multiples vulnérabilités ont été découvertes dans les produits Adobe. Elles permettent à un attaquant de provoquer une exécution de code arbitraire, une atteinte à la confidentialité des données et une élévation de privilèges.

Solution

Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).

None
Impacted products
Vendor Product Description
Adobe Acrobat DC Acrobat DC pour Windows versions antérieures à 22.001.20117
Adobe Acrobat Reader Acrobat Reader 2020 pour Mac versions antérieures à 20.005.30331
Adobe Acrobat Reader Acrobat Reader 2020 pour Windows versions antérieures à 20.005.30334
Adobe Acrobat Acrobat 2017 pour Mac versions antérieures à 17.012.30227
Adobe Commerce Adobe Commerce versions 2.4.x antérieures à 2.4.3-p2, 2.4.4
Adobe Acrobat Reader DC Acrobat Reader DC pour Mac versions antérieures à 22.001.20112
Adobe Acrobat Reader Acrobat Reader 2017 pour Windows versions antérieures à 17.012.30229
Adobe Commerce Adobe Commerce versions 2.3.x antérieures à 2.3.7-p3
Adobe Magento Magento Open Source versions 2.4.x antérieures 2.4.3-p2, 2.4.4
Adobe Acrobat Reader DC Acrobat Reader DC pour Windows versions antérieures à 22.001.20117
Adobe Acrobat Acrobat 2020 pour Mac versions antérieures à 20.005.30331
Adobe Magento Magento Open Source versions 2.3.x antérieures à 2.3.7-p3
Adobe Acrobat Acrobat 2017 pour Windows versions antérieures à 17.012.30229
Adobe Acrobat Reader Acrobat Reader 2017 pour Mac versions antérieures à 17.012.30227
Adobe Acrobat Acrobat 2020 pour Windows versions antérieures à 20.005.30334
Adobe Acrobat DC Acrobat DC pour Mac versions antérieures à 22.001.20112
References

Show details on source website


{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "Acrobat DC pour Windows versions ant\u00e9rieures \u00e0 22.001.20117",
      "product": {
        "name": "Acrobat DC",
        "vendor": {
          "name": "Adobe",
          "scada": false
        }
      }
    },
    {
      "description": "Acrobat Reader 2020 pour Mac versions ant\u00e9rieures \u00e0 20.005.30331",
      "product": {
        "name": "Acrobat Reader",
        "vendor": {
          "name": "Adobe",
          "scada": false
        }
      }
    },
    {
      "description": "Acrobat Reader 2020 pour Windows versions ant\u00e9rieures \u00e0 20.005.30334",
      "product": {
        "name": "Acrobat Reader",
        "vendor": {
          "name": "Adobe",
          "scada": false
        }
      }
    },
    {
      "description": "Acrobat 2017 pour Mac versions ant\u00e9rieures \u00e0 17.012.30227",
      "product": {
        "name": "Acrobat",
        "vendor": {
          "name": "Adobe",
          "scada": false
        }
      }
    },
    {
      "description": "Adobe Commerce versions 2.4.x ant\u00e9rieures \u00e0 2.4.3-p2, 2.4.4",
      "product": {
        "name": "Commerce",
        "vendor": {
          "name": "Adobe",
          "scada": false
        }
      }
    },
    {
      "description": "Acrobat Reader DC pour Mac versions ant\u00e9rieures \u00e0 22.001.20112",
      "product": {
        "name": "Acrobat Reader DC",
        "vendor": {
          "name": "Adobe",
          "scada": false
        }
      }
    },
    {
      "description": "Acrobat Reader 2017 pour Windows versions ant\u00e9rieures \u00e0 17.012.30229",
      "product": {
        "name": "Acrobat Reader",
        "vendor": {
          "name": "Adobe",
          "scada": false
        }
      }
    },
    {
      "description": "Adobe Commerce versions 2.3.x ant\u00e9rieures \u00e0 2.3.7-p3",
      "product": {
        "name": "Commerce",
        "vendor": {
          "name": "Adobe",
          "scada": false
        }
      }
    },
    {
      "description": "Magento Open Source versions 2.4.x ant\u00e9rieures 2.4.3-p2, 2.4.4",
      "product": {
        "name": "Magento",
        "vendor": {
          "name": "Adobe",
          "scada": false
        }
      }
    },
    {
      "description": "Acrobat Reader DC pour Windows versions ant\u00e9rieures \u00e0 22.001.20117",
      "product": {
        "name": "Acrobat Reader DC",
        "vendor": {
          "name": "Adobe",
          "scada": false
        }
      }
    },
    {
      "description": "Acrobat 2020 pour Mac versions ant\u00e9rieures \u00e0 20.005.30331",
      "product": {
        "name": "Acrobat",
        "vendor": {
          "name": "Adobe",
          "scada": false
        }
      }
    },
    {
      "description": "Magento Open Source versions 2.3.x ant\u00e9rieures \u00e0 2.3.7-p3",
      "product": {
        "name": "Magento",
        "vendor": {
          "name": "Adobe",
          "scada": false
        }
      }
    },
    {
      "description": "Acrobat 2017 pour Windows versions ant\u00e9rieures \u00e0 17.012.30229",
      "product": {
        "name": "Acrobat",
        "vendor": {
          "name": "Adobe",
          "scada": false
        }
      }
    },
    {
      "description": "Acrobat Reader 2017 pour Mac versions ant\u00e9rieures \u00e0 17.012.30227",
      "product": {
        "name": "Acrobat Reader",
        "vendor": {
          "name": "Adobe",
          "scada": false
        }
      }
    },
    {
      "description": "Acrobat 2020 pour Windows versions ant\u00e9rieures \u00e0 20.005.30334",
      "product": {
        "name": "Acrobat",
        "vendor": {
          "name": "Adobe",
          "scada": false
        }
      }
    },
    {
      "description": "Acrobat DC pour Mac versions ant\u00e9rieures \u00e0 22.001.20112",
      "product": {
        "name": "Acrobat DC",
        "vendor": {
          "name": "Adobe",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": null,
  "content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
  "cves": [
    {
      "name": "CVE-2022-28242",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-28242"
    },
    {
      "name": "CVE-2022-27798",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-27798"
    },
    {
      "name": "CVE-2022-28236",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-28236"
    },
    {
      "name": "CVE-2022-27791",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-27791"
    },
    {
      "name": "CVE-2022-28263",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-28263"
    },
    {
      "name": "CVE-2022-28269",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-28269"
    },
    {
      "name": "CVE-2022-28259",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-28259"
    },
    {
      "name": "CVE-2022-27790",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-27790"
    },
    {
      "name": "CVE-2022-28235",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-28235"
    },
    {
      "name": "CVE-2022-24101",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-24101"
    },
    {
      "name": "CVE-2022-28241",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-28241"
    },
    {
      "name": "CVE-2022-27787",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-27787"
    },
    {
      "name": "CVE-2022-28257",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-28257"
    },
    {
      "name": "CVE-2022-27786",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-27786"
    },
    {
      "name": "CVE-2022-28248",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-28248"
    },
    {
      "name": "CVE-2022-28264",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-28264"
    },
    {
      "name": "CVE-2022-28237",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-28237"
    },
    {
      "name": "CVE-2022-28249",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-28249"
    },
    {
      "name": "CVE-2022-28254",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-28254"
    },
    {
      "name": "CVE-2022-28262",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-28262"
    },
    {
      "name": "CVE-2022-27800",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-27800"
    },
    {
      "name": "CVE-2022-27797",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-27797"
    },
    {
      "name": "CVE-2022-28230",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-28230"
    },
    {
      "name": "CVE-2022-27789",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-27789"
    },
    {
      "name": "CVE-2022-28245",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-28245"
    },
    {
      "name": "CVE-2022-24104",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-24104"
    },
    {
      "name": "CVE-2022-24103",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-24103"
    },
    {
      "name": "CVE-2022-24093",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-24093"
    },
    {
      "name": "CVE-2022-27795",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-27795"
    },
    {
      "name": "CVE-2022-28238",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-28238"
    },
    {
      "name": "CVE-2022-27793",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-27793"
    },
    {
      "name": "CVE-2022-27799",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-27799"
    },
    {
      "name": "CVE-2022-28260",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-28260"
    },
    {
      "name": "CVE-2022-28244",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-28244"
    },
    {
      "name": "CVE-2022-24102",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-24102"
    },
    {
      "name": "CVE-2022-28250",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-28250"
    },
    {
      "name": "CVE-2022-28253",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-28253"
    },
    {
      "name": "CVE-2022-28265",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-28265"
    },
    {
      "name": "CVE-2022-28239",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-28239"
    },
    {
      "name": "CVE-2022-28243",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-28243"
    },
    {
      "name": "CVE-2022-28255",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-28255"
    },
    {
      "name": "CVE-2022-28246",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-28246"
    },
    {
      "name": "CVE-2022-28252",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-28252"
    },
    {
      "name": "CVE-2022-28267",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-28267"
    },
    {
      "name": "CVE-2022-28261",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-28261"
    },
    {
      "name": "CVE-2022-28231",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-28231"
    },
    {
      "name": "CVE-2022-28232",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-28232"
    },
    {
      "name": "CVE-2022-28266",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-28266"
    },
    {
      "name": "CVE-2022-28247",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-28247"
    },
    {
      "name": "CVE-2022-28251",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-28251"
    },
    {
      "name": "CVE-2022-27802",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-27802"
    },
    {
      "name": "CVE-2022-27801",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-27801"
    },
    {
      "name": "CVE-2022-27785",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-27785"
    },
    {
      "name": "CVE-2022-28240",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-28240"
    },
    {
      "name": "CVE-2022-28256",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-28256"
    },
    {
      "name": "CVE-2022-27796",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-27796"
    },
    {
      "name": "CVE-2022-28268",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-28268"
    },
    {
      "name": "CVE-2022-27792",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-27792"
    },
    {
      "name": "CVE-2022-28258",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-28258"
    },
    {
      "name": "CVE-2022-28233",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-28233"
    },
    {
      "name": "CVE-2022-27788",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-27788"
    },
    {
      "name": "CVE-2022-27794",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-27794"
    },
    {
      "name": "CVE-2022-28234",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-28234"
    }
  ],
  "initial_release_date": "2022-04-13T00:00:00",
  "last_revision_date": "2022-04-13T00:00:00",
  "links": [],
  "reference": "CERTFR-2022-AVI-333",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2022-04-13T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "Ex\u00e9cution de code arbitraire"
    },
    {
      "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
    },
    {
      "description": "\u00c9l\u00e9vation de privil\u00e8ges"
    }
  ],
  "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits Adobe.\nElles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code\narbitraire, une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es et une\n\u00e9l\u00e9vation de privil\u00e8ges.\n",
  "title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Adobe",
  "vendor_advisories": [
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Adobe apsb22-16 du 12 avril 2022",
      "url": "https://helpx.adobe.com/security/products/acrobat/apsb22-16.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Adobe apsb22-13 du 12 avril 2022",
      "url": "https://helpx.adobe.com/security/products/magento/apsb22-13.html"
    }
  ]
}

CERTFR-2021-AVI-765
Vulnerability from certfr_avis

De multiples vulnérabilités ont été découvertes dans les produits Adobe. Elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur.

Solution

Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).

None
Impacted products
Vendor Product Description
Adobe Acrobat Reader Acrobat Reader 2020 version 20.004.30015 et antérieures
Adobe Acrobat Reader DC Acrobat Reader DC (pour Windows) version 21.007.20095 et antérieures
Adobe Acrobat Reader Acrobat Reader 2017 version 17.011.30202 et antérieures
Adobe Acrobat DC Acrobat DC (pour macOS) version 21.007.20096 et antérieures
Adobe Acrobat DC Acrobat DC (pour Windows) version 21.007.20095 et antérieures
Adobe Acrobat Reader DC Acrobat Reader DC (pour macOS) version 21.007.20096 et antérieures
Adobe Acrobat Acrobat 2017 version 17.011.30202 et antérieures
Adobe Acrobat Acrobat 2020 version 20.004.30015 et antérieures
References

Show details on source website


{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "Acrobat Reader 2020 version 20.004.30015 et ant\u00e9rieures",
      "product": {
        "name": "Acrobat Reader",
        "vendor": {
          "name": "Adobe",
          "scada": false
        }
      }
    },
    {
      "description": "Acrobat Reader DC (pour Windows) version 21.007.20095 et ant\u00e9rieures",
      "product": {
        "name": "Acrobat Reader DC",
        "vendor": {
          "name": "Adobe",
          "scada": false
        }
      }
    },
    {
      "description": "Acrobat Reader 2017 version 17.011.30202 et ant\u00e9rieures",
      "product": {
        "name": "Acrobat Reader",
        "vendor": {
          "name": "Adobe",
          "scada": false
        }
      }
    },
    {
      "description": "Acrobat DC (pour macOS) version 21.007.20096 et ant\u00e9rieures",
      "product": {
        "name": "Acrobat DC",
        "vendor": {
          "name": "Adobe",
          "scada": false
        }
      }
    },
    {
      "description": "Acrobat DC (pour Windows) version 21.007.20095 et ant\u00e9rieures",
      "product": {
        "name": "Acrobat DC",
        "vendor": {
          "name": "Adobe",
          "scada": false
        }
      }
    },
    {
      "description": "Acrobat Reader DC (pour macOS) version 21.007.20096 et ant\u00e9rieures",
      "product": {
        "name": "Acrobat Reader DC",
        "vendor": {
          "name": "Adobe",
          "scada": false
        }
      }
    },
    {
      "description": "Acrobat 2017 version 17.011.30202 et ant\u00e9rieures",
      "product": {
        "name": "Acrobat",
        "vendor": {
          "name": "Adobe",
          "scada": false
        }
      }
    },
    {
      "description": "Acrobat 2020 version 20.004.30015 et ant\u00e9rieures",
      "product": {
        "name": "Acrobat",
        "vendor": {
          "name": "Adobe",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": null,
  "content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
  "cves": [],
  "initial_release_date": "2021-10-11T00:00:00",
  "last_revision_date": "2021-10-11T00:00:00",
  "links": [],
  "reference": "CERTFR-2021-AVI-765",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2021-10-11T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
    }
  ],
  "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits Adobe.\nElles permettent \u00e0 un attaquant de provoquer un probl\u00e8me de s\u00e9curit\u00e9 non\nsp\u00e9cifi\u00e9 par l\u0027\u00e9diteur.\n",
  "title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Adobe",
  "vendor_advisories": [
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Adobe apsb21-104 du 08 octobre 2021",
      "url": "https://helpx.adobe.com/security/products/acrobat/apsb21-104.html"
    }
  ]
}

CERTFR-2021-AVI-704
Vulnerability from certfr_avis

De multiples vulnérabilités ont été découvertes dans les produits Adobe. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service et un contournement de la politique de sécurité.

Solution

Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).

None
Impacted products
Vendor Product Description
Adobe ColdFusion ColdFusion 2021 versions antérieures à la version 2
Adobe Acrobat Reader Acrobat Reader 2020 Classic 2020 versions antérieures à 2020.004.30015
Adobe Acrobat Reader DC Acrobat Reader DC versions antérieures à 2021.007.20091
Adobe ColdFusion ColdFusion 2018 versions antérieures à la version 12
Adobe Acrobat Acrobat 2017 Classic 2017 versions antérieures à 2017.011.30202
Adobe Acrobat Reader Acrobat Reader 2017 Classic 2017 versions antérieures à 2017.011.30202
Adobe Acrobat DC Acrobat DC versions antérieures à 2021.007.20091
Adobe Acrobat Acrobat 2020 Classic 2020 versions antérieures à 2020.004.30015
References

Show details on source website


{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "ColdFusion 2021 versions ant\u00e9rieures \u00e0 la version 2",
      "product": {
        "name": "ColdFusion",
        "vendor": {
          "name": "Adobe",
          "scada": false
        }
      }
    },
    {
      "description": "Acrobat Reader 2020 Classic 2020 versions ant\u00e9rieures \u00e0 2020.004.30015",
      "product": {
        "name": "Acrobat Reader",
        "vendor": {
          "name": "Adobe",
          "scada": false
        }
      }
    },
    {
      "description": "Acrobat Reader DC versions ant\u00e9rieures \u00e0 2021.007.20091",
      "product": {
        "name": "Acrobat Reader DC",
        "vendor": {
          "name": "Adobe",
          "scada": false
        }
      }
    },
    {
      "description": "ColdFusion 2018 versions ant\u00e9rieures \u00e0 la version 12",
      "product": {
        "name": "ColdFusion",
        "vendor": {
          "name": "Adobe",
          "scada": false
        }
      }
    },
    {
      "description": "Acrobat 2017 Classic 2017 versions ant\u00e9rieures \u00e0 2017.011.30202",
      "product": {
        "name": "Acrobat",
        "vendor": {
          "name": "Adobe",
          "scada": false
        }
      }
    },
    {
      "description": "Acrobat Reader 2017 Classic 2017 versions ant\u00e9rieures \u00e0 2017.011.30202",
      "product": {
        "name": "Acrobat Reader",
        "vendor": {
          "name": "Adobe",
          "scada": false
        }
      }
    },
    {
      "description": "Acrobat DC versions ant\u00e9rieures \u00e0 2021.007.20091",
      "product": {
        "name": "Acrobat DC",
        "vendor": {
          "name": "Adobe",
          "scada": false
        }
      }
    },
    {
      "description": "Acrobat 2020 Classic 2020 versions ant\u00e9rieures \u00e0 2020.004.30015",
      "product": {
        "name": "Acrobat",
        "vendor": {
          "name": "Adobe",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": null,
  "content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
  "cves": [
    {
      "name": "CVE-2021-39852",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-39852"
    },
    {
      "name": "CVE-2021-39839",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-39839"
    },
    {
      "name": "CVE-2021-39838",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-39838"
    },
    {
      "name": "CVE-2021-35982",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-35982"
    },
    {
      "name": "CVE-2021-39859",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-39859"
    },
    {
      "name": "CVE-2021-39863",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-39863"
    },
    {
      "name": "CVE-2021-39850",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-39850"
    },
    {
      "name": "CVE-2021-39845",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-39845"
    },
    {
      "name": "CVE-2021-39855",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-39855"
    },
    {
      "name": "CVE-2021-39840",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-39840"
    },
    {
      "name": "CVE-2021-39837",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-39837"
    },
    {
      "name": "CVE-2021-40699",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-40699"
    },
    {
      "name": "CVE-2021-39843",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-39843"
    },
    {
      "name": "CVE-2021-40698",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-40698"
    },
    {
      "name": "CVE-2021-39853",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-39853"
    },
    {
      "name": "CVE-2021-39844",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-39844"
    },
    {
      "name": "CVE-2021-39856",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-39856"
    },
    {
      "name": "CVE-2021-39849",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-39849"
    },
    {
      "name": "CVE-2021-39846",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-39846"
    },
    {
      "name": "CVE-2021-39857",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-39857"
    },
    {
      "name": "CVE-2021-39858",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-39858"
    },
    {
      "name": "CVE-2021-39861",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-39861"
    },
    {
      "name": "CVE-2021-39841",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-39841"
    },
    {
      "name": "CVE-2021-39842",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-39842"
    },
    {
      "name": "CVE-2021-39860",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-39860"
    },
    {
      "name": "CVE-2021-39836",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-39836"
    },
    {
      "name": "CVE-2021-39854",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-39854"
    },
    {
      "name": "CVE-2021-39851",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-39851"
    }
  ],
  "initial_release_date": "2021-09-15T00:00:00",
  "last_revision_date": "2021-09-15T00:00:00",
  "links": [],
  "reference": "CERTFR-2021-AVI-704",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2021-09-15T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
    },
    {
      "description": "D\u00e9ni de service"
    },
    {
      "description": "Contournement de la politique de s\u00e9curit\u00e9"
    },
    {
      "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
    }
  ],
  "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits Adobe.\nCertaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une\nex\u00e9cution de code arbitraire \u00e0 distance, un d\u00e9ni de service et un\ncontournement de la politique de s\u00e9curit\u00e9.\n",
  "title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Adobe",
  "vendor_advisories": [
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Adobe apsb21-75 du 14 septembre 2021",
      "url": "https://helpx.adobe.com/security/products/coldfusion/apsb21-75.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Adobe apsb21-55 du 14 septembre 2021",
      "url": "https://helpx.adobe.com/security/products/acrobat/apsb21-55.html"
    }
  ]
}

CERTFR-2021-AVI-525
Vulnerability from certfr_avis

De multiples vulnérabilités ont été découvertes Adobe Acrobat. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire, un déni de service et une atteinte à la confidentialité des données.

Solution

Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).

None
Impacted products
Vendor Product Description
Adobe Acrobat Acrobat Reader DC versions antérieures à 2021.005.20058
Adobe Acrobat Acrobat 2017 versions antérieures à 2017.011.30199
Adobe Acrobat Acrobat Reader 2020 versions antérieures à 2020.004.30006
Adobe Acrobat Acrobat 2020 versions antérieures à 2020.004.30006
Adobe Acrobat Acrobat Reader 2017 versions antérieures à 2017.011.30199
Adobe Acrobat Acrobat DC versions antérieures à 2021.005.20058
References

Show details on source website


{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "Acrobat Reader DC versions ant\u00e9rieures \u00e0 2021.005.20058",
      "product": {
        "name": "Acrobat",
        "vendor": {
          "name": "Adobe",
          "scada": false
        }
      }
    },
    {
      "description": "Acrobat 2017 versions ant\u00e9rieures \u00e0 2017.011.30199",
      "product": {
        "name": "Acrobat",
        "vendor": {
          "name": "Adobe",
          "scada": false
        }
      }
    },
    {
      "description": "Acrobat Reader 2020 versions ant\u00e9rieures \u00e0 2020.004.30006",
      "product": {
        "name": "Acrobat",
        "vendor": {
          "name": "Adobe",
          "scada": false
        }
      }
    },
    {
      "description": "Acrobat 2020 versions ant\u00e9rieures \u00e0 2020.004.30006",
      "product": {
        "name": "Acrobat",
        "vendor": {
          "name": "Adobe",
          "scada": false
        }
      }
    },
    {
      "description": "Acrobat Reader 2017 versions ant\u00e9rieures \u00e0 2017.011.30199",
      "product": {
        "name": "Acrobat",
        "vendor": {
          "name": "Adobe",
          "scada": false
        }
      }
    },
    {
      "description": "Acrobat DC versions ant\u00e9rieures \u00e0 2021.005.20058",
      "product": {
        "name": "Acrobat",
        "vendor": {
          "name": "Adobe",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": null,
  "content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
  "cves": [
    {
      "name": "CVE-2021-28634",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-28634"
    },
    {
      "name": "CVE-2021-28638",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-28638"
    },
    {
      "name": "CVE-2021-35980",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-35980"
    },
    {
      "name": "CVE-2021-28636",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-28636"
    },
    {
      "name": "CVE-2021-28637",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-28637"
    },
    {
      "name": "CVE-2021-35987",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-35987"
    },
    {
      "name": "CVE-2021-35984",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-35984"
    },
    {
      "name": "CVE-2021-28642",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-28642"
    },
    {
      "name": "CVE-2021-35985",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-35985"
    },
    {
      "name": "CVE-2021-35988",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-35988"
    },
    {
      "name": "CVE-2021-35983",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-35983"
    },
    {
      "name": "CVE-2021-28640",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-28640"
    },
    {
      "name": "CVE-2021-28641",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-28641"
    },
    {
      "name": "CVE-2021-35981",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-35981"
    },
    {
      "name": "CVE-2021-28635",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-28635"
    },
    {
      "name": "CVE-2021-28644",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-28644"
    },
    {
      "name": "CVE-2021-28643",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-28643"
    },
    {
      "name": "CVE-2021-35986",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-35986"
    },
    {
      "name": "CVE-2021-28639",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-28639"
    }
  ],
  "initial_release_date": "2021-07-15T00:00:00",
  "last_revision_date": "2021-07-15T00:00:00",
  "links": [],
  "reference": "CERTFR-2021-AVI-525",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2021-07-15T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "Ex\u00e9cution de code arbitraire"
    },
    {
      "description": "D\u00e9ni de service"
    },
    {
      "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
    },
    {
      "description": "\u00c9l\u00e9vation de privil\u00e8ges"
    }
  ],
  "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes Adobe Acrobat. Certaines\nd\u0027entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de\ncode arbitraire, un d\u00e9ni de service et une atteinte \u00e0 la confidentialit\u00e9\ndes donn\u00e9es.\n",
  "title": "Multiples vuln\u00e9rabilit\u00e9s dans Adobe Acrobat",
  "vendor_advisories": [
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Adobe apsb21-51 du 13 juillet 2021",
      "url": "https://helpx.adobe.com/security/products/acrobat/apsb21-51.html"
    }
  ]
}

CERTFR-2021-AVI-444
Vulnerability from certfr_avis

De multiples vulnérabilités ont été découvertes dans Adobe Acrobat et Reader. Elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance.

Solution

Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).

None
Impacted products
Vendor Product Description
Adobe Acrobat Acrobat 2017 versions antérieures à 2017.011.30197 sur Windows et macOS
Adobe Acrobat Acrobat Reader 2020 versions antérieures à 2020.004.30005 sur Windows et macOS
Adobe Acrobat Acrobat DC versions antérieures à 2021.005.20148 sur Windows et macOS
Adobe Acrobat Acrobat Reader 2017 versions antérieures à 2017.011.30197 sur Windows et macOS
Adobe Acrobat Acrobat Reader DC versions antérieures à 2021.005.20148 sur Windows et macOS
Adobe Acrobat Acrobat 2020 versions antérieures à 2020.004.30005 sur Windows et macOS
References

Show details on source website


{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "Acrobat 2017 versions ant\u00e9rieures \u00e0 2017.011.30197 sur Windows et macOS",
      "product": {
        "name": "Acrobat",
        "vendor": {
          "name": "Adobe",
          "scada": false
        }
      }
    },
    {
      "description": "Acrobat Reader 2020 versions ant\u00e9rieures \u00e0 2020.004.30005 sur Windows et macOS",
      "product": {
        "name": "Acrobat",
        "vendor": {
          "name": "Adobe",
          "scada": false
        }
      }
    },
    {
      "description": "Acrobat DC versions ant\u00e9rieures \u00e0 2021.005.20148 sur Windows et macOS",
      "product": {
        "name": "Acrobat",
        "vendor": {
          "name": "Adobe",
          "scada": false
        }
      }
    },
    {
      "description": "Acrobat Reader 2017 versions ant\u00e9rieures \u00e0 2017.011.30197 sur Windows et macOS",
      "product": {
        "name": "Acrobat",
        "vendor": {
          "name": "Adobe",
          "scada": false
        }
      }
    },
    {
      "description": "Acrobat Reader DC versions ant\u00e9rieures \u00e0 2021.005.20148 sur Windows et macOS",
      "product": {
        "name": "Acrobat",
        "vendor": {
          "name": "Adobe",
          "scada": false
        }
      }
    },
    {
      "description": "Acrobat 2020 versions ant\u00e9rieures \u00e0 2020.004.30005 sur Windows et macOS",
      "product": {
        "name": "Acrobat",
        "vendor": {
          "name": "Adobe",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": null,
  "content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
  "cves": [
    {
      "name": "CVE-2021-28632",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-28632"
    },
    {
      "name": "CVE-2021-28552",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-28552"
    },
    {
      "name": "CVE-2021-28551",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-28551"
    },
    {
      "name": "CVE-2021-28631",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-28631"
    },
    {
      "name": "CVE-2021-28554",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-28554"
    }
  ],
  "initial_release_date": "2021-06-09T00:00:00",
  "last_revision_date": "2021-06-09T00:00:00",
  "links": [],
  "reference": "CERTFR-2021-AVI-444",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2021-06-09T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
    }
  ],
  "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans Adobe Acrobat et\nReader. Elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de\ncode arbitraire \u00e0 distance.\n",
  "title": "Multiples vuln\u00e9rabilit\u00e9s dans Adobe Acrobat et Reader",
  "vendor_advisories": [
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Adobe apsb21-37 du 08 juin 2021",
      "url": "https://helpx.adobe.com/security/products/acrobat/apsb21-37.html"
    }
  ]
}

CERTFR-2020-AVI-496
Vulnerability from certfr_avis

De multiples vulnérabilités ont été découvertes dans Adobe Reader et Acrobat. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service et un contournement de la politique de sécurité.

Solution

Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).

None
Impacted products
Vendor Product Description
Adobe Acrobat Acrobat Reader 2020 versions antérieures à 2020.001.30005 sur Windows et macOS
Adobe Acrobat Acrobat DC versions antérieures à 2020.012.20041 sur Windows et macOS
Adobe Acrobat Acrobat Reader DC versions antérieures à 2020.012.20041 sur Windows et macOS
Adobe Acrobat Acrobat Reader 2017 versions antérieures à 2017.011.30175 sur Windows et macOS
Adobe Acrobat Acrobat 2015 versions antérieures à 2015.006.30527 sur Windows et macOS
Adobe Acrobat Acrobat Reader 2015 versions antérieures à 2015.006.30527 sur Windows et macOS
Adobe Acrobat Acrobat 2020 versions antérieures à 2020.001.30005 sur Windows et macOS
Adobe Acrobat Acrobat 2017 versions antérieures à 2017.011.30175 sur Windows et macOS
References

Show details on source website


{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "Acrobat Reader 2020 versions ant\u00e9rieures \u00e0 2020.001.30005 sur Windows et macOS",
      "product": {
        "name": "Acrobat",
        "vendor": {
          "name": "Adobe",
          "scada": false
        }
      }
    },
    {
      "description": "Acrobat DC versions ant\u00e9rieures \u00e0 2020.012.20041 sur Windows et macOS",
      "product": {
        "name": "Acrobat",
        "vendor": {
          "name": "Adobe",
          "scada": false
        }
      }
    },
    {
      "description": "Acrobat Reader DC versions ant\u00e9rieures \u00e0 2020.012.20041 sur Windows et macOS",
      "product": {
        "name": "Acrobat",
        "vendor": {
          "name": "Adobe",
          "scada": false
        }
      }
    },
    {
      "description": "Acrobat Reader 2017 versions ant\u00e9rieures \u00e0 2017.011.30175 sur Windows et macOS",
      "product": {
        "name": "Acrobat",
        "vendor": {
          "name": "Adobe",
          "scada": false
        }
      }
    },
    {
      "description": "Acrobat 2015 versions ant\u00e9rieures \u00e0 2015.006.30527 sur Windows et macOS",
      "product": {
        "name": "Acrobat",
        "vendor": {
          "name": "Adobe",
          "scada": false
        }
      }
    },
    {
      "description": "Acrobat Reader 2015 versions ant\u00e9rieures \u00e0 2015.006.30527 sur Windows et macOS",
      "product": {
        "name": "Acrobat",
        "vendor": {
          "name": "Adobe",
          "scada": false
        }
      }
    },
    {
      "description": "Acrobat 2020 versions ant\u00e9rieures \u00e0 2020.001.30005 sur Windows et macOS",
      "product": {
        "name": "Acrobat",
        "vendor": {
          "name": "Adobe",
          "scada": false
        }
      }
    },
    {
      "description": "Acrobat 2017 versions ant\u00e9rieures \u00e0 2017.011.30175 sur Windows et macOS",
      "product": {
        "name": "Acrobat",
        "vendor": {
          "name": "Adobe",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": null,
  "content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
  "cves": [
    {
      "name": "CVE-2020-9703",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-9703"
    },
    {
      "name": "CVE-2020-9704",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-9704"
    },
    {
      "name": "CVE-2020-9700",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-9700"
    },
    {
      "name": "CVE-2020-9722",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-9722"
    },
    {
      "name": "CVE-2020-9721",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-9721"
    },
    {
      "name": "CVE-2020-9712",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-9712"
    },
    {
      "name": "CVE-2020-9696",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-9696"
    },
    {
      "name": "CVE-2020-9702",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-9702"
    },
    {
      "name": "CVE-2020-9707",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-9707"
    },
    {
      "name": "CVE-2020-9693",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-9693"
    },
    {
      "name": "CVE-2020-9720",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-9720"
    },
    {
      "name": "CVE-2020-9698",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-9698"
    },
    {
      "name": "CVE-2020-9706",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-9706"
    },
    {
      "name": "CVE-2020-9723",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-9723"
    },
    {
      "name": "CVE-2020-9710",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-9710"
    },
    {
      "name": "CVE-2020-9719",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-9719"
    },
    {
      "name": "CVE-2020-9699",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-9699"
    },
    {
      "name": "CVE-2020-9694",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-9694"
    },
    {
      "name": "CVE-2020-9701",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-9701"
    },
    {
      "name": "CVE-2020-9714",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-9714"
    },
    {
      "name": "CVE-2020-9715",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-9715"
    },
    {
      "name": "CVE-2020-9716",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-9716"
    },
    {
      "name": "CVE-2020-9705",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-9705"
    },
    {
      "name": "CVE-2020-9717",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-9717"
    },
    {
      "name": "CVE-2020-9697",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-9697"
    },
    {
      "name": "CVE-2020-9718",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-9718"
    }
  ],
  "initial_release_date": "2020-08-11T00:00:00",
  "last_revision_date": "2020-08-11T00:00:00",
  "links": [],
  "reference": "CERTFR-2020-AVI-496",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2020-08-11T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
    },
    {
      "description": "D\u00e9ni de service"
    },
    {
      "description": "Contournement de la politique de s\u00e9curit\u00e9"
    },
    {
      "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
    },
    {
      "description": "\u00c9l\u00e9vation de privil\u00e8ges"
    }
  ],
  "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans Adobe Reader et\nAcrobat. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer\nune ex\u00e9cution de code arbitraire \u00e0 distance, un d\u00e9ni de service et un\ncontournement de la politique de s\u00e9curit\u00e9.\n",
  "title": "Multiples vuln\u00e9rabilit\u00e9s dans Adobe Reader et Acrobat",
  "vendor_advisories": [
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Adobe apsb20-48 du 11 ao\u00fbt 2020",
      "url": "https://helpx.adobe.com/security/products/acrobat/apsb20-48.html"
    }
  ]
}

CERTFR-2020-AVI-282
Vulnerability from certfr_avis

De multiples vulnérabilités ont été découvertes dans Adobe Reader et Acrobat. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service à distance et un contournement de la politique de sécurité.

Solution

Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).

None
Impacted products
Vendor Product Description
Adobe Acrobat Acrobat 2015 versions antérieures à 2015.006.30523 sur Windows et macOS
Adobe Acrobat Acrobat DC versions antérieures à 2020.009.20063 sur Windows et macOS
Adobe Acrobat Acrobat Reader DC versions antérieures à 2020.009.20063 sur Windows et macOS
Adobe Acrobat Acrobat Reader 2017 versions antérieures à 2017.011.30171 sur Windows et macOS
Adobe Acrobat Acrobat Reader 2015 versions antérieures à 2015.006.30523 sur Windows et macOS
Adobe Acrobat Acrobat 2017 versions antérieures à 2017.011.30171 sur Windows et macOS
References

Show details on source website


{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "Acrobat 2015 versions ant\u00e9rieures \u00e0 2015.006.30523 sur Windows et macOS",
      "product": {
        "name": "Acrobat",
        "vendor": {
          "name": "Adobe",
          "scada": false
        }
      }
    },
    {
      "description": "Acrobat DC versions ant\u00e9rieures \u00e0 2020.009.20063 sur Windows et macOS",
      "product": {
        "name": "Acrobat",
        "vendor": {
          "name": "Adobe",
          "scada": false
        }
      }
    },
    {
      "description": "Acrobat Reader DC versions ant\u00e9rieures \u00e0 2020.009.20063 sur Windows et macOS",
      "product": {
        "name": "Acrobat",
        "vendor": {
          "name": "Adobe",
          "scada": false
        }
      }
    },
    {
      "description": "Acrobat Reader 2017 versions ant\u00e9rieures \u00e0 2017.011.30171 sur Windows et macOS",
      "product": {
        "name": "Acrobat",
        "vendor": {
          "name": "Adobe",
          "scada": false
        }
      }
    },
    {
      "description": "Acrobat Reader 2015 versions ant\u00e9rieures \u00e0 2015.006.30523 sur Windows et macOS",
      "product": {
        "name": "Acrobat",
        "vendor": {
          "name": "Adobe",
          "scada": false
        }
      }
    },
    {
      "description": "Acrobat 2017 versions ant\u00e9rieures \u00e0 2017.011.30171 sur Windows et macOS",
      "product": {
        "name": "Acrobat",
        "vendor": {
          "name": "Adobe",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": null,
  "content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
  "cves": [
    {
      "name": "CVE-2020-9614",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-9614"
    },
    {
      "name": "CVE-2020-9600",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-9600"
    },
    {
      "name": "CVE-2020-9602",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-9602"
    },
    {
      "name": "CVE-2020-9592",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-9592"
    },
    {
      "name": "CVE-2020-9613",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-9613"
    },
    {
      "name": "CVE-2020-9595",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-9595"
    },
    {
      "name": "CVE-2020-9606",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-9606"
    },
    {
      "name": "CVE-2020-9594",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-9594"
    },
    {
      "name": "CVE-2020-9605",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-9605"
    },
    {
      "name": "CVE-2020-9607",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-9607"
    },
    {
      "name": "CVE-2020-9615",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-9615"
    },
    {
      "name": "CVE-2020-9612",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-9612"
    },
    {
      "name": "CVE-2020-9597",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-9597"
    },
    {
      "name": "CVE-2020-9603",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-9603"
    },
    {
      "name": "CVE-2020-9610",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-9610"
    },
    {
      "name": "CVE-2020-9608",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-9608"
    },
    {
      "name": "CVE-2020-9598",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-9598"
    },
    {
      "name": "CVE-2020-9599",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-9599"
    },
    {
      "name": "CVE-2020-9609",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-9609"
    },
    {
      "name": "CVE-2020-9604",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-9604"
    },
    {
      "name": "CVE-2020-9611",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-9611"
    },
    {
      "name": "CVE-2020-9601",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-9601"
    },
    {
      "name": "CVE-2020-9593",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-9593"
    },
    {
      "name": "CVE-2020-9596",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-9596"
    }
  ],
  "initial_release_date": "2020-05-13T00:00:00",
  "last_revision_date": "2020-05-13T00:00:00",
  "links": [],
  "reference": "CERTFR-2020-AVI-282",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2020-05-13T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "D\u00e9ni de service \u00e0 distance"
    },
    {
      "description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
    },
    {
      "description": "Contournement de la politique de s\u00e9curit\u00e9"
    },
    {
      "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
    }
  ],
  "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans Adobe Reader et\nAcrobat. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer\nune ex\u00e9cution de code arbitraire \u00e0 distance, un d\u00e9ni de service \u00e0\ndistance et un contournement de la politique de s\u00e9curit\u00e9.\n",
  "title": "Multiples vuln\u00e9rabilit\u00e9s dans Adobe Reader et Acrobat",
  "vendor_advisories": [
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Adobe apsb20-24 du 12 mai 2020",
      "url": "https://helpx.adobe.com/security/products/acrobat/apsb20-24.html"
    }
  ]
}

CERTFR-2020-AVI-076
Vulnerability from certfr_avis

De multiples vulnérabilités ont été découvertes dans Adobe Acrobat et Reader. Elles permettent à un attaquant de provoquer une exécution de code arbitraire, une atteinte à l'intégrité des données et une atteinte à la confidentialité des données.

Solution

Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).

None
Impacted products
Vendor Product Description
Adobe Acrobat Acrobat 2017 et Acrobat Reader 2017 versions antérieures à 2017.011.30158 sur Windows et macOS
Adobe Acrobat Acrobat 2015 et Acrobat Reader 2015 versions antérieures à 2015.006.30510 sur Windows et macOS
Adobe Acrobat Acrobat DC et Acrobat Reader DC versions antérieures à 2020.006.20034 sur Windows et macOS
References

Show details on source website


{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "Acrobat 2017 et Acrobat Reader 2017 versions ant\u00e9rieures \u00e0 2017.011.30158 sur Windows et macOS",
      "product": {
        "name": "Acrobat",
        "vendor": {
          "name": "Adobe",
          "scada": false
        }
      }
    },
    {
      "description": "Acrobat 2015 et Acrobat Reader 2015 versions ant\u00e9rieures \u00e0 2015.006.30510 sur Windows et macOS",
      "product": {
        "name": "Acrobat",
        "vendor": {
          "name": "Adobe",
          "scada": false
        }
      }
    },
    {
      "description": "Acrobat DC et Acrobat Reader DC versions ant\u00e9rieures \u00e0 2020.006.20034 sur Windows et macOS",
      "product": {
        "name": "Acrobat",
        "vendor": {
          "name": "Adobe",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": null,
  "content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
  "cves": [
    {
      "name": "CVE-2020-3750",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-3750"
    },
    {
      "name": "CVE-2020-3742",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-3742"
    },
    {
      "name": "CVE-2020-3748",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-3748"
    },
    {
      "name": "CVE-2020-3752",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-3752"
    },
    {
      "name": "CVE-2020-3755",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-3755"
    },
    {
      "name": "CVE-2020-3745",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-3745"
    },
    {
      "name": "CVE-2020-3749",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-3749"
    },
    {
      "name": "CVE-2020-3762",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-3762"
    },
    {
      "name": "CVE-2020-3753",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-3753"
    },
    {
      "name": "CVE-2020-3744",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-3744"
    },
    {
      "name": "CVE-2020-3746",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-3746"
    },
    {
      "name": "CVE-2020-3763",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-3763"
    },
    {
      "name": "CVE-2020-3756",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-3756"
    },
    {
      "name": "CVE-2020-3754",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-3754"
    },
    {
      "name": "CVE-2020-3747",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-3747"
    },
    {
      "name": "CVE-2020-3751",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-3751"
    },
    {
      "name": "CVE-2020-3743",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-3743"
    }
  ],
  "initial_release_date": "2020-02-11T00:00:00",
  "last_revision_date": "2020-02-11T00:00:00",
  "links": [],
  "reference": "CERTFR-2020-AVI-076",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2020-02-11T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
    },
    {
      "description": "Ex\u00e9cution de code arbitraire"
    },
    {
      "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
    }
  ],
  "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans Adobe Acrobat et\nReader. Elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de\ncode arbitraire, une atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es et une atteinte\n\u00e0 la confidentialit\u00e9 des donn\u00e9es.\n",
  "title": "Multiples vuln\u00e9rabilit\u00e9s dans Adobe Acrobat et Reader",
  "vendor_advisories": [
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Adobe apsb20-05 du 11 f\u00e9vrier 2020",
      "url": "https://helpx.adobe.com/security/products/acrobat/apsb20-05.html"
    }
  ]
}

CERTFR-2019-AVI-617
Vulnerability from certfr_avis

De multiples vulnérabilités ont été découvertes dans Adobe Acrobat et Reader. Elles permettent à un attaquant de provoquer une exécution de code arbitraire, une atteinte à la confidentialité des données et une élévation de privilèges.

Solution

Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).

None
Impacted products
Vendor Product Description
Adobe Acrobat Acrobat Reader 2017 Classic 2017 versions antérieures à 2019.011.30156 sur Windows et macOS
Adobe Acrobat Acrobat Reader DC Continuous versions antérieures à 2019.021.20058 sur Windows et macOS
Adobe Acrobat Acrobat Reader 2015 Classic 2015 versions antérieures à 2015.006.30508 sur Windows et macOS
Adobe Acrobat Acrobat DC Continuous versions antérieures à 2019.021.20058 sur Windows et macOS
Adobe Acrobat Acrobat 2017 Classic 2017 versions antérieures à 2019.011.30156 sur Windows et macOS
Adobe Acrobat Acrobat 2015 Classic 2015 versions antérieures à 2015.006.30508 sur Windows et macOS
References

Show details on source website


{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "Acrobat Reader 2017 Classic 2017 versions ant\u00e9rieures \u00e0 2019.011.30156 sur Windows et macOS",
      "product": {
        "name": "Acrobat",
        "vendor": {
          "name": "Adobe",
          "scada": false
        }
      }
    },
    {
      "description": "Acrobat Reader DC Continuous versions ant\u00e9rieures \u00e0 2019.021.20058 sur Windows et macOS",
      "product": {
        "name": "Acrobat",
        "vendor": {
          "name": "Adobe",
          "scada": false
        }
      }
    },
    {
      "description": "Acrobat Reader 2015 Classic 2015 versions ant\u00e9rieures \u00e0 2015.006.30508 sur Windows et macOS",
      "product": {
        "name": "Acrobat",
        "vendor": {
          "name": "Adobe",
          "scada": false
        }
      }
    },
    {
      "description": "Acrobat DC Continuous versions ant\u00e9rieures \u00e0 2019.021.20058 sur Windows et macOS",
      "product": {
        "name": "Acrobat",
        "vendor": {
          "name": "Adobe",
          "scada": false
        }
      }
    },
    {
      "description": "Acrobat 2017 Classic 2017 versions ant\u00e9rieures \u00e0 2019.011.30156 sur Windows et macOS",
      "product": {
        "name": "Acrobat",
        "vendor": {
          "name": "Adobe",
          "scada": false
        }
      }
    },
    {
      "description": "Acrobat 2015 Classic 2015 versions ant\u00e9rieures \u00e0 2015.006.30508 sur Windows et macOS",
      "product": {
        "name": "Acrobat",
        "vendor": {
          "name": "Adobe",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": null,
  "content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
  "cves": [
    {
      "name": "CVE-2019-16465",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-16465"
    },
    {
      "name": "CVE-2019-16450",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-16450"
    },
    {
      "name": "CVE-2019-16457",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-16457"
    },
    {
      "name": "CVE-2019-16446",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-16446"
    },
    {
      "name": "CVE-2019-16451",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-16451"
    },
    {
      "name": "CVE-2019-16448",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-16448"
    },
    {
      "name": "CVE-2019-16452",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-16452"
    },
    {
      "name": "CVE-2019-16444",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-16444"
    },
    {
      "name": "CVE-2019-16462",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-16462"
    },
    {
      "name": "CVE-2019-16445",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-16445"
    },
    {
      "name": "CVE-2019-16464",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-16464"
    },
    {
      "name": "CVE-2019-16455",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-16455"
    },
    {
      "name": "CVE-2019-16456",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-16456"
    },
    {
      "name": "CVE-2019-16449",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-16449"
    },
    {
      "name": "CVE-2019-16461",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-16461"
    },
    {
      "name": "CVE-2019-16459",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-16459"
    },
    {
      "name": "CVE-2019-16454",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-16454"
    },
    {
      "name": "CVE-2019-16460",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-16460"
    },
    {
      "name": "CVE-2019-16453",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-16453"
    },
    {
      "name": "CVE-2019-16463",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-16463"
    },
    {
      "name": "CVE-2019-16458",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-16458"
    }
  ],
  "initial_release_date": "2019-12-11T00:00:00",
  "last_revision_date": "2019-12-11T00:00:00",
  "links": [],
  "reference": "CERTFR-2019-AVI-617",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2019-12-11T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "Ex\u00e9cution de code arbitraire"
    },
    {
      "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
    },
    {
      "description": "\u00c9l\u00e9vation de privil\u00e8ges"
    }
  ],
  "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans Adobe Acrobat et\nReader. Elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de\ncode arbitraire, une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es et une\n\u00e9l\u00e9vation de privil\u00e8ges.\n",
  "title": "Multiples vuln\u00e9rabilit\u00e9s dans Adobe Acrobat et Reader",
  "vendor_advisories": [
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Adobe APSB19-55 du 10 d\u00e9cembre 2019",
      "url": "https://helpx.adobe.com/security/products/acrobat/apsb19-55.html"
    }
  ]
}

CERTFR-2019-AVI-505
Vulnerability from certfr_avis

De multiples vulnérabilités ont été découvertes dans Adobe Acrobat et Reader. Elles permettent à un attaquant de provoquer une exécution de code arbitraire et une atteinte à la confidentialité des données.

Solution

Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).

None
Impacted products
Vendor Product Description
Adobe Acrobat Acrobat Reader 2017 Classic 2017 versions 2017.011.30148 et versions antérieures sur Windows et macOS
Adobe Acrobat Acrobat Reader DC Continuous versions 2019.012.20040 et versions antérieures sur Windows et macOS
Adobe Acrobat Acrobat DC Continuous versions 2019.012.20040 et versions antérieures sur Windows et macOS
Adobe Acrobat Acrobat DC Classic 2015 versions 2015.006.30503 et versions antérieures sur Windows et macOS
Adobe Acrobat Acrobat Reader DC Classic 2015 versions 2015.006.30503 et versions antérieures sur Windows et macOS
Adobe Acrobat Acrobat 2017 Classic 2017 versions 2017.011.30148 et versions antérieures sur Windows et macOS
References

Show details on source website


{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "Acrobat Reader 2017 Classic 2017 versions 2017.011.30148 et versions ant\u00e9rieures sur Windows et macOS",
      "product": {
        "name": "Acrobat",
        "vendor": {
          "name": "Adobe",
          "scada": false
        }
      }
    },
    {
      "description": "Acrobat Reader DC Continuous versions 2019.012.20040 et versions ant\u00e9rieures sur Windows et macOS",
      "product": {
        "name": "Acrobat",
        "vendor": {
          "name": "Adobe",
          "scada": false
        }
      }
    },
    {
      "description": "Acrobat DC Continuous versions 2019.012.20040 et versions ant\u00e9rieures sur Windows et macOS",
      "product": {
        "name": "Acrobat",
        "vendor": {
          "name": "Adobe",
          "scada": false
        }
      }
    },
    {
      "description": "Acrobat DC Classic 2015 versions 2015.006.30503 et versions ant\u00e9rieures sur Windows et macOS",
      "product": {
        "name": "Acrobat",
        "vendor": {
          "name": "Adobe",
          "scada": false
        }
      }
    },
    {
      "description": "Acrobat Reader DC Classic 2015 versions 2015.006.30503 et versions ant\u00e9rieures sur Windows et macOS",
      "product": {
        "name": "Acrobat",
        "vendor": {
          "name": "Adobe",
          "scada": false
        }
      }
    },
    {
      "description": "Acrobat 2017 Classic 2017 versions 2017.011.30148 et versions ant\u00e9rieures sur Windows et macOS",
      "product": {
        "name": "Acrobat",
        "vendor": {
          "name": "Adobe",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": null,
  "content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
  "cves": [
    {
      "name": "CVE-2019-8160",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-8160"
    },
    {
      "name": "CVE-2019-8165",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-8165"
    },
    {
      "name": "CVE-2019-8186",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-8186"
    },
    {
      "name": "CVE-2019-8187",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-8187"
    },
    {
      "name": "CVE-2019-8215",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-8215"
    },
    {
      "name": "CVE-2019-8162",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-8162"
    },
    {
      "name": "CVE-2019-8207",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-8207"
    },
    {
      "name": "CVE-2019-8214",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-8214"
    },
    {
      "name": "CVE-2019-8188",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-8188"
    },
    {
      "name": "CVE-2019-8206",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-8206"
    },
    {
      "name": "CVE-2019-8205",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-8205"
    },
    {
      "name": "CVE-2019-8210",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-8210"
    },
    {
      "name": "CVE-2019-8201",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-8201"
    },
    {
      "name": "CVE-2019-8180",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-8180"
    },
    {
      "name": "CVE-2019-8179",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-8179"
    },
    {
      "name": "CVE-2019-8223",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-8223"
    },
    {
      "name": "CVE-2019-8169",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-8169"
    },
    {
      "name": "CVE-2019-8170",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-8170"
    },
    {
      "name": "CVE-2019-8164",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-8164"
    },
    {
      "name": "CVE-2019-8177",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-8177"
    },
    {
      "name": "CVE-2019-8199",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-8199"
    },
    {
      "name": "CVE-2019-8185",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-8185"
    },
    {
      "name": "CVE-2019-8192",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-8192"
    },
    {
      "name": "CVE-2019-8226",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-8226"
    },
    {
      "name": "CVE-2019-8198",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-8198"
    },
    {
      "name": "CVE-2019-8182",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-8182"
    },
    {
      "name": "CVE-2019-8191",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-8191"
    },
    {
      "name": "CVE-2019-8216",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-8216"
    },
    {
      "name": "CVE-2019-8172",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-8172"
    },
    {
      "name": "CVE-2019-8190",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-8190"
    },
    {
      "name": "CVE-2019-8196",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-8196"
    },
    {
      "name": "CVE-2019-8174",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-8174"
    },
    {
      "name": "CVE-2019-8183",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-8183"
    },
    {
      "name": "CVE-2019-8171",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-8171"
    },
    {
      "name": "CVE-2019-8225",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-8225"
    },
    {
      "name": "CVE-2019-8211",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-8211"
    },
    {
      "name": "CVE-2019-8163",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-8163"
    },
    {
      "name": "CVE-2019-8184",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-8184"
    },
    {
      "name": "CVE-2019-8166",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-8166"
    },
    {
      "name": "CVE-2019-8220",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-8220"
    },
    {
      "name": "CVE-2019-8064",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-8064"
    },
    {
      "name": "CVE-2019-8209",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-8209"
    },
    {
      "name": "CVE-2019-8195",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-8195"
    },
    {
      "name": "CVE-2019-8176",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-8176"
    },
    {
      "name": "CVE-2019-8194",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-8194"
    },
    {
      "name": "CVE-2019-8181",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-8181"
    },
    {
      "name": "CVE-2019-8204",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-8204"
    },
    {
      "name": "CVE-2019-8217",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-8217"
    },
    {
      "name": "CVE-2019-8197",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-8197"
    },
    {
      "name": "CVE-2019-8212",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-8212"
    },
    {
      "name": "CVE-2019-8200",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-8200"
    },
    {
      "name": "CVE-2019-8175",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-8175"
    },
    {
      "name": "CVE-2019-8224",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-8224"
    },
    {
      "name": "CVE-2019-8219",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-8219"
    },
    {
      "name": "CVE-2019-8193",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-8193"
    },
    {
      "name": "CVE-2019-8202",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-8202"
    },
    {
      "name": "CVE-2019-8168",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-8168"
    },
    {
      "name": "CVE-2019-8189",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-8189"
    },
    {
      "name": "CVE-2019-8222",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-8222"
    },
    {
      "name": "CVE-2019-8221",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-8221"
    },
    {
      "name": "CVE-2019-8203",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-8203"
    },
    {
      "name": "CVE-2019-8167",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-8167"
    },
    {
      "name": "CVE-2019-8208",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-8208"
    },
    {
      "name": "CVE-2019-8161",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-8161"
    },
    {
      "name": "CVE-2019-8178",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-8178"
    },
    {
      "name": "CVE-2019-8213",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-8213"
    },
    {
      "name": "CVE-2019-8218",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-8218"
    },
    {
      "name": "CVE-2019-8173",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-8173"
    }
  ],
  "initial_release_date": "2019-10-16T00:00:00",
  "last_revision_date": "2019-10-16T00:00:00",
  "links": [],
  "reference": "CERTFR-2019-AVI-505",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2019-10-16T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "Ex\u00e9cution de code arbitraire"
    },
    {
      "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
    }
  ],
  "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans Adobe Acrobat et\nReader. Elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de\ncode arbitraire et une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es.\n",
  "title": "Multiples vuln\u00e9rabilit\u00e9s dans Adobe Acrobat et Reader",
  "vendor_advisories": [
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Adobe APSB19-49 du 15 octobre 2019",
      "url": "https://helpx.adobe.com/security/products/acrobat/apsb19-49.html"
    }
  ]
}

CERTFR-2019-AVI-393
Vulnerability from certfr_avis

De multiples vulnérabilités ont été découvertes dans Adobe Acrobat et Reader. Elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance et une atteinte à la confidentialité des données.

Solution

Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).

None
Impacted products
Vendor Product Description
Adobe Acrobat Adobe Acrobat DC Classic 2017 versions antérieures à 2017.011.30144 sur Windows et macOS
Adobe Acrobat Adobe Acrobat DC Classic 2015 versions antérieures à 2015.006.30499 sur Windows et macOS
Adobe Acrobat Adobe Acrobat DC versions antérieures à 2019.012.20036 sur Windows et macOS
Adobe Acrobat Adobe Acrobat Reader DC versions antérieures à 2019.012.20036 sur Windows et macOS
Adobe Acrobat Adobe Acrobat Reader DC Classic 2017 versions antérieures à 2017.011.30144 sur Windows et macOS
Adobe Acrobat Adobe Acrobat Reader DC Classic 2015 versions antérieures à 2015.006.30499 sur Windows et macOS
References

Show details on source website


{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "Adobe Acrobat DC Classic 2017 versions ant\u00e9rieures \u00e0 2017.011.30144 sur Windows et macOS",
      "product": {
        "name": "Acrobat",
        "vendor": {
          "name": "Adobe",
          "scada": false
        }
      }
    },
    {
      "description": "Adobe Acrobat DC Classic 2015 versions ant\u00e9rieures \u00e0 2015.006.30499 sur Windows et macOS",
      "product": {
        "name": "Acrobat",
        "vendor": {
          "name": "Adobe",
          "scada": false
        }
      }
    },
    {
      "description": "Adobe Acrobat DC versions ant\u00e9rieures \u00e0 2019.012.20036 sur Windows et macOS",
      "product": {
        "name": "Acrobat",
        "vendor": {
          "name": "Adobe",
          "scada": false
        }
      }
    },
    {
      "description": "Adobe Acrobat Reader DC versions ant\u00e9rieures \u00e0 2019.012.20036 sur Windows et macOS",
      "product": {
        "name": "Acrobat",
        "vendor": {
          "name": "Adobe",
          "scada": false
        }
      }
    },
    {
      "description": "Adobe Acrobat Reader DC Classic 2017 versions ant\u00e9rieures \u00e0 2017.011.30144 sur Windows et macOS",
      "product": {
        "name": "Acrobat",
        "vendor": {
          "name": "Adobe",
          "scada": false
        }
      }
    },
    {
      "description": "Adobe Acrobat Reader DC Classic 2015 versions ant\u00e9rieures \u00e0 2015.006.30499 sur Windows et macOS",
      "product": {
        "name": "Acrobat",
        "vendor": {
          "name": "Adobe",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": null,
  "content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
  "cves": [
    {
      "name": "CVE-2019-8096",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-8096"
    },
    {
      "name": "CVE-2019-8045",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-8045"
    },
    {
      "name": "CVE-2019-8025",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-8025"
    },
    {
      "name": "CVE-2019-8018",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-8018"
    },
    {
      "name": "CVE-2019-8034",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-8034"
    },
    {
      "name": "CVE-2019-8022",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-8022"
    },
    {
      "name": "CVE-2019-8023",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-8023"
    },
    {
      "name": "CVE-2019-8105",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-8105"
    },
    {
      "name": "CVE-2019-8003",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-8003"
    },
    {
      "name": "CVE-2019-8009",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-8009"
    },
    {
      "name": "CVE-2019-8056",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-8056"
    },
    {
      "name": "CVE-2019-8027",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-8027"
    },
    {
      "name": "CVE-2019-8014",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-8014"
    },
    {
      "name": "CVE-2019-8059",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-8059"
    },
    {
      "name": "CVE-2019-8101",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-8101"
    },
    {
      "name": "CVE-2019-8007",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-8007"
    },
    {
      "name": "CVE-2019-8050",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-8050"
    },
    {
      "name": "CVE-2019-7965",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-7965"
    },
    {
      "name": "CVE-2019-8013",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-8013"
    },
    {
      "name": "CVE-2019-8058",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-8058"
    },
    {
      "name": "CVE-2019-8094",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-8094"
    },
    {
      "name": "CVE-2019-8031",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-8031"
    },
    {
      "name": "CVE-2019-8002",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-8002"
    },
    {
      "name": "CVE-2019-8098",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-8098"
    },
    {
      "name": "CVE-2019-8032",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-8032"
    },
    {
      "name": "CVE-2019-8004",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-8004"
    },
    {
      "name": "CVE-2019-8028",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-8028"
    },
    {
      "name": "CVE-2019-8051",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-8051"
    },
    {
      "name": "CVE-2019-8055",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-8055"
    },
    {
      "name": "CVE-2019-8041",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-8041"
    },
    {
      "name": "CVE-2019-8026",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-8026"
    },
    {
      "name": "CVE-2019-8035",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-8035"
    },
    {
      "name": "CVE-2019-8054",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-8054"
    },
    {
      "name": "CVE-2019-8033",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-8033"
    },
    {
      "name": "CVE-2019-8017",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-8017"
    },
    {
      "name": "CVE-2019-8103",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-8103"
    },
    {
      "name": "CVE-2019-8011",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-8011"
    },
    {
      "name": "CVE-2019-8046",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-8046"
    },
    {
      "name": "CVE-2019-8016",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-8016"
    },
    {
      "name": "CVE-2019-8060",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-8060"
    },
    {
      "name": "CVE-2019-8024",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-8024"
    },
    {
      "name": "CVE-2019-8048",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-8048"
    },
    {
      "name": "CVE-2019-8010",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-8010"
    },
    {
      "name": "CVE-2019-8021",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-8021"
    },
    {
      "name": "CVE-2019-8020",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-8020"
    },
    {
      "name": "CVE-2019-8036",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-8036"
    },
    {
      "name": "CVE-2019-8019",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-8019"
    },
    {
      "name": "CVE-2019-8104",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-8104"
    },
    {
      "name": "CVE-2019-8006",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-8006"
    },
    {
      "name": "CVE-2019-8077",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-8077"
    },
    {
      "name": "CVE-2019-8037",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-8037"
    },
    {
      "name": "CVE-2019-8061",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-8061"
    },
    {
      "name": "CVE-2019-8106",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-8106"
    },
    {
      "name": "CVE-2019-8029",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-8029"
    },
    {
      "name": "CVE-2019-8008",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-8008"
    },
    {
      "name": "CVE-2019-8095",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-8095"
    },
    {
      "name": "CVE-2019-8053",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-8053"
    },
    {
      "name": "CVE-2019-8038",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-8038"
    },
    {
      "name": "CVE-2019-8057",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-8057"
    },
    {
      "name": "CVE-2019-8030",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-8030"
    },
    {
      "name": "CVE-2019-8044",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-8044"
    },
    {
      "name": "CVE-2019-8099",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-8099"
    },
    {
      "name": "CVE-2019-8039",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-8039"
    },
    {
      "name": "CVE-2019-8047",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-8047"
    },
    {
      "name": "CVE-2019-7832",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-7832"
    },
    {
      "name": "CVE-2019-8102",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-8102"
    },
    {
      "name": "CVE-2019-8097",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-8097"
    },
    {
      "name": "CVE-2019-8049",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-8049"
    },
    {
      "name": "CVE-2019-8005",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-8005"
    },
    {
      "name": "CVE-2019-8052",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-8052"
    },
    {
      "name": "CVE-2019-8100",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-8100"
    },
    {
      "name": "CVE-2019-8040",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-8040"
    },
    {
      "name": "CVE-2019-8043",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-8043"
    },
    {
      "name": "CVE-2019-8012",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-8012"
    },
    {
      "name": "CVE-2019-8015",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-8015"
    },
    {
      "name": "CVE-2019-8042",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-8042"
    }
  ],
  "initial_release_date": "2019-08-14T00:00:00",
  "last_revision_date": "2019-08-14T00:00:00",
  "links": [],
  "reference": "CERTFR-2019-AVI-393",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2019-08-14T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
    },
    {
      "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
    }
  ],
  "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans Adobe Acrobat et\nReader. Elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de\ncode arbitraire \u00e0 distance et une atteinte \u00e0 la confidentialit\u00e9 des\ndonn\u00e9es.\n",
  "title": "Multiples vuln\u00e9rabilit\u00e9s dans Adobe Acrobat et Reader",
  "vendor_advisories": [
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Adobe apsb19-41 du 13 ao\u00fbt 2019",
      "url": "https://helpx.adobe.com/security/products/acrobat/apsb19-41.html"
    }
  ]
}

CERTFR-2019-AVI-218
Vulnerability from certfr_avis

De multiples vulnérabilités ont été découvertes dans Adobe Acrobat et Reader. Elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance et une atteinte à la confidentialité des données.

Solution

Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).

None
Impacted products
Vendor Product Description
Adobe Acrobat Adobe Acrobat Reader DC versions antérieures à 2019.012.20034 sur Windows et macOS
Adobe Acrobat Adobe Acrobat 2017 versions antérieures à 2017.011.30142 sur Windows et macOS
Adobe Acrobat Adobe Acrobat DC Classic 2015 versions antérieures à 2015.006.30497 sur Windows et macOS
Adobe Acrobat Adobe Acrobat DC versions antérieures à 2019.012.20034 sur Windows et macOS
Adobe Acrobat Adobe Acrobat Reader DC 2017 versions antérieures à 2017.011.30142 sur Windows et macOS
Adobe Acrobat Adobe Acrobat Reader DC Classic 2015 versions antérieures à 2015.006.30497 sur Windows et macOS
References

Show details on source website


{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "Adobe Acrobat Reader DC versions ant\u00e9rieures \u00e0 2019.012.20034 sur Windows et macOS",
      "product": {
        "name": "Acrobat",
        "vendor": {
          "name": "Adobe",
          "scada": false
        }
      }
    },
    {
      "description": "Adobe Acrobat 2017 versions ant\u00e9rieures \u00e0 2017.011.30142 sur Windows et macOS",
      "product": {
        "name": "Acrobat",
        "vendor": {
          "name": "Adobe",
          "scada": false
        }
      }
    },
    {
      "description": "Adobe Acrobat DC Classic 2015 versions ant\u00e9rieures \u00e0 2015.006.30497 sur Windows et macOS",
      "product": {
        "name": "Acrobat",
        "vendor": {
          "name": "Adobe",
          "scada": false
        }
      }
    },
    {
      "description": "Adobe Acrobat DC versions ant\u00e9rieures \u00e0 2019.012.20034 sur Windows et macOS",
      "product": {
        "name": "Acrobat",
        "vendor": {
          "name": "Adobe",
          "scada": false
        }
      }
    },
    {
      "description": "Adobe Acrobat Reader DC 2017 versions ant\u00e9rieures \u00e0 2017.011.30142 sur Windows et macOS",
      "product": {
        "name": "Acrobat",
        "vendor": {
          "name": "Adobe",
          "scada": false
        }
      }
    },
    {
      "description": "Adobe Acrobat Reader DC Classic 2015 versions ant\u00e9rieures \u00e0 2015.006.30497 sur Windows et macOS",
      "product": {
        "name": "Acrobat",
        "vendor": {
          "name": "Adobe",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": null,
  "content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
  "cves": [
    {
      "name": "CVE-2019-7800",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-7800"
    },
    {
      "name": "CVE-2019-7820",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-7820"
    },
    {
      "name": "CVE-2019-7786",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-7786"
    },
    {
      "name": "CVE-2019-7834",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-7834"
    },
    {
      "name": "CVE-2019-7814",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-7814"
    },
    {
      "name": "CVE-2019-7823",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-7823"
    },
    {
      "name": "CVE-2019-7841",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-7841"
    },
    {
      "name": "CVE-2019-7769",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-7769"
    },
    {
      "name": "CVE-2019-7806",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-7806"
    },
    {
      "name": "CVE-2019-7808",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-7808"
    },
    {
      "name": "CVE-2019-7827",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-7827"
    },
    {
      "name": "CVE-2019-7817",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-7817"
    },
    {
      "name": "CVE-2019-7818",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-7818"
    },
    {
      "name": "CVE-2019-7764",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-7764"
    },
    {
      "name": "CVE-2019-7830",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-7830"
    },
    {
      "name": "CVE-2019-7758",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-7758"
    },
    {
      "name": "CVE-2019-7790",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-7790"
    },
    {
      "name": "CVE-2019-7821",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-7821"
    },
    {
      "name": "CVE-2019-7798",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-7798"
    },
    {
      "name": "CVE-2019-7759",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-7759"
    },
    {
      "name": "CVE-2019-7795",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-7795"
    },
    {
      "name": "CVE-2019-7797",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-7797"
    },
    {
      "name": "CVE-2019-7775",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-7775"
    },
    {
      "name": "CVE-2019-7807",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-7807"
    },
    {
      "name": "CVE-2019-7783",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-7783"
    },
    {
      "name": "CVE-2019-7826",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-7826"
    },
    {
      "name": "CVE-2019-7799",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-7799"
    },
    {
      "name": "CVE-2019-7794",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-7794"
    },
    {
      "name": "CVE-2019-7760",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-7760"
    },
    {
      "name": "CVE-2019-7788",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-7788"
    },
    {
      "name": "CVE-2019-7785",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-7785"
    },
    {
      "name": "CVE-2019-7145",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-7145"
    },
    {
      "name": "CVE-2019-7142",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-7142"
    },
    {
      "name": "CVE-2019-7802",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-7802"
    },
    {
      "name": "CVE-2019-7140",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-7140"
    },
    {
      "name": "CVE-2019-7776",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-7776"
    },
    {
      "name": "CVE-2019-7805",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-7805"
    },
    {
      "name": "CVE-2019-7819",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-7819"
    },
    {
      "name": "CVE-2019-7829",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-7829"
    },
    {
      "name": "CVE-2019-7784",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-7784"
    },
    {
      "name": "CVE-2019-7780",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-7780"
    },
    {
      "name": "CVE-2019-7787",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-7787"
    },
    {
      "name": "CVE-2019-7778",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-7778"
    },
    {
      "name": "CVE-2019-7811",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-7811"
    },
    {
      "name": "CVE-2019-7781",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-7781"
    },
    {
      "name": "CVE-2019-7774",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-7774"
    },
    {
      "name": "CVE-2019-7812",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-7812"
    },
    {
      "name": "CVE-2019-7809",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-7809"
    },
    {
      "name": "CVE-2019-7804",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-7804"
    },
    {
      "name": "CVE-2019-7144",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-7144"
    },
    {
      "name": "CVE-2019-7770",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-7770"
    },
    {
      "name": "CVE-2019-7831",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-7831"
    },
    {
      "name": "CVE-2019-7796",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-7796"
    },
    {
      "name": "CVE-2019-7771",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-7771"
    },
    {
      "name": "CVE-2019-7810",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-7810"
    },
    {
      "name": "CVE-2019-7773",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-7773"
    },
    {
      "name": "CVE-2019-7768",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-7768"
    },
    {
      "name": "CVE-2019-7833",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-7833"
    },
    {
      "name": "CVE-2019-7813",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-7813"
    },
    {
      "name": "CVE-2019-7779",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-7779"
    },
    {
      "name": "CVE-2019-7828",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-7828"
    },
    {
      "name": "CVE-2019-7822",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-7822"
    },
    {
      "name": "CVE-2019-7791",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-7791"
    },
    {
      "name": "CVE-2019-7763",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-7763"
    },
    {
      "name": "CVE-2019-7761",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-7761"
    },
    {
      "name": "CVE-2019-7762",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-7762"
    },
    {
      "name": "CVE-2019-7777",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-7777"
    },
    {
      "name": "CVE-2019-7803",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-7803"
    },
    {
      "name": "CVE-2019-7772",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-7772"
    },
    {
      "name": "CVE-2019-7143",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-7143"
    },
    {
      "name": "CVE-2019-7789",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-7789"
    },
    {
      "name": "CVE-2019-7832",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-7832"
    },
    {
      "name": "CVE-2019-7801",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-7801"
    },
    {
      "name": "CVE-2019-7765",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-7765"
    },
    {
      "name": "CVE-2019-7824",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-7824"
    },
    {
      "name": "CVE-2019-7835",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-7835"
    },
    {
      "name": "CVE-2019-7836",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-7836"
    },
    {
      "name": "CVE-2019-7793",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-7793"
    },
    {
      "name": "CVE-2019-7767",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-7767"
    },
    {
      "name": "CVE-2019-7792",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-7792"
    },
    {
      "name": "CVE-2019-7141",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-7141"
    },
    {
      "name": "CVE-2019-7782",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-7782"
    },
    {
      "name": "CVE-2019-7766",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-7766"
    },
    {
      "name": "CVE-2019-7825",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-7825"
    }
  ],
  "initial_release_date": "2019-05-15T00:00:00",
  "last_revision_date": "2019-05-15T00:00:00",
  "links": [],
  "reference": "CERTFR-2019-AVI-218",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2019-05-15T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
    },
    {
      "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
    }
  ],
  "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans Adobe Acrobat et\nReader. Elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de\ncode arbitraire \u00e0 distance et une atteinte \u00e0 la confidentialit\u00e9 des\ndonn\u00e9es.\n",
  "title": "Multiples vuln\u00e9rabilit\u00e9s dans Adobe Acrobat et Reader",
  "vendor_advisories": [
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Adobe apsb19-18 du 14 mai 2019",
      "url": "https://helpx.adobe.com/security/products/acrobat/apsb19-18.html"
    }
  ]
}

CERTFR-2019-AVI-166
Vulnerability from certfr_avis

De multiples vulnérabilités ont été découvertes dans Adobe Acrobat et Reader. Elles permettent à un attaquant de provoquer une exécution de code arbitraire et une atteinte à la confidentialité des données.

Solution

Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).

None
Impacted products
Vendor Product Description
Adobe Acrobat Acrobat DC Continuous versions 2019.010.20098 et versions antérieures sur Windows et macOS
Adobe Acrobat Acrobat Reader DC Classic 2015 versions 2015.006.30482 et versions antérieures sur Windows et macOS
Adobe Acrobat Acrobat Reader DC Continuous versions 2019.010.20098 et versions antérieures sur Windows et macOS
Adobe Acrobat Acrobat Reader 2017 Classic 2017 versions 2017.011.30127 et versions antérieures sur Windows et macOS
Adobe Acrobat Acrobat 2017 Classic 2017 versions 2017.011.30127 et versions antérieures sur Windows et macOS
Adobe Acrobat Acrobat DC Classic 2015 versions 2015.006.30482 et versions antérieures sur Windows et macOS
References

Show details on source website


{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "Acrobat DC Continuous versions 2019.010.20098 et versions ant\u00e9rieures sur Windows et macOS",
      "product": {
        "name": "Acrobat",
        "vendor": {
          "name": "Adobe",
          "scada": false
        }
      }
    },
    {
      "description": "Acrobat Reader DC Classic 2015 versions 2015.006.30482 et versions ant\u00e9rieures sur Windows et macOS",
      "product": {
        "name": "Acrobat",
        "vendor": {
          "name": "Adobe",
          "scada": false
        }
      }
    },
    {
      "description": "Acrobat Reader DC Continuous versions 2019.010.20098 et versions ant\u00e9rieures sur Windows et macOS",
      "product": {
        "name": "Acrobat",
        "vendor": {
          "name": "Adobe",
          "scada": false
        }
      }
    },
    {
      "description": "Acrobat Reader 2017 Classic 2017 versions 2017.011.30127 et versions ant\u00e9rieures sur Windows et macOS",
      "product": {
        "name": "Acrobat",
        "vendor": {
          "name": "Adobe",
          "scada": false
        }
      }
    },
    {
      "description": "Acrobat 2017 Classic 2017 versions 2017.011.30127 et versions ant\u00e9rieures sur Windows et macOS",
      "product": {
        "name": "Acrobat",
        "vendor": {
          "name": "Adobe",
          "scada": false
        }
      }
    },
    {
      "description": "Acrobat DC Classic 2015 versions 2015.006.30482 et versions ant\u00e9rieures sur Windows et macOS",
      "product": {
        "name": "Acrobat",
        "vendor": {
          "name": "Adobe",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": null,
  "content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
  "cves": [
    {
      "name": "CVE-2019-7109",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-7109"
    },
    {
      "name": "CVE-2019-7125",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-7125"
    },
    {
      "name": "CVE-2019-7115",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-7115"
    },
    {
      "name": "CVE-2019-7118",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-7118"
    },
    {
      "name": "CVE-2019-7120",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-7120"
    },
    {
      "name": "CVE-2019-7128",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-7128"
    },
    {
      "name": "CVE-2019-7113",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-7113"
    },
    {
      "name": "CVE-2019-7119",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-7119"
    },
    {
      "name": "CVE-2019-7061",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-7061"
    },
    {
      "name": "CVE-2019-7114",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-7114"
    },
    {
      "name": "CVE-2019-7116",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-7116"
    },
    {
      "name": "CVE-2019-7111",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-7111"
    },
    {
      "name": "CVE-2019-7122",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-7122"
    },
    {
      "name": "CVE-2019-7121",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-7121"
    },
    {
      "name": "CVE-2019-7123",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-7123"
    },
    {
      "name": "CVE-2019-7110",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-7110"
    },
    {
      "name": "CVE-2019-7124",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-7124"
    },
    {
      "name": "CVE-2019-7117",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-7117"
    },
    {
      "name": "CVE-2019-7127",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-7127"
    },
    {
      "name": "CVE-2019-7112",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-7112"
    },
    {
      "name": "CVE-2019-7088",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-7088"
    }
  ],
  "initial_release_date": "2019-04-11T00:00:00",
  "last_revision_date": "2019-04-11T00:00:00",
  "links": [],
  "reference": "CERTFR-2019-AVI-166",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2019-04-11T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "Ex\u00e9cution de code arbitraire"
    },
    {
      "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
    }
  ],
  "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans Adobe Acrobat et\nReader. Elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de\ncode arbitraire et une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es.\n",
  "title": "Multiples vuln\u00e9rabilit\u00e9s dans Adobe Acrobat et Reader",
  "vendor_advisories": [
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Adobe APSB19-17 du 09 avril 2019",
      "url": "https://helpx.adobe.com/security/products/acrobat/apsb19-17.html"
    }
  ]
}