Use-after-free vulnerability in Adobe Reader and Acrobat before 11.0.16, Acrobat and Acrobat Reader DC Classic before 15.006.30172, and Acrobat and Acrobat Reader DC Continuous before 15.016.20039 on Windows and OS X allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2016-1045, CVE-2016-1046, CVE-2016-1047, CVE-2016-1048, CVE-2016-1049, CVE-2016-1050, CVE-2016-1051, CVE-2016-1052, CVE-2016-1053, CVE-2016-1054, CVE-2016-1055, CVE-2016-1056, CVE-2016-1057, CVE-2016-1058, CVE-2016-1059, CVE-2016-1060, CVE-2016-1061, CVE-2016-1065, CVE-2016-1066, CVE-2016-1067, CVE-2016-1068, CVE-2016-1069, CVE-2016-1070, CVE-2016-1075, CVE-2016-1094, CVE-2016-1121, CVE-2016-1122, and CVE-2016-4107.
References
Link | Resource |
---|---|
http://www.securityfocus.com/bid/90512 | Third Party Advisory VDB Entry |
http://www.securitytracker.com/id/1035828 | Third Party Advisory VDB Entry |
https://helpx.adobe.com/security/products/acrobat/apsb16-14.html | Patch Vendor Advisory |
http://www.securityfocus.com/bid/90512 | Third Party Advisory VDB Entry |
http://www.securitytracker.com/id/1035828 | Third Party Advisory VDB Entry |
https://helpx.adobe.com/security/products/acrobat/apsb16-14.html | Patch Vendor Advisory |
Configurations
Configuration 1 (hide)
AND |
|
History
21 Nov 2024, 02:51
Type | Values Removed | Values Added |
---|---|---|
References | () http://www.securityfocus.com/bid/90512 - Third Party Advisory, VDB Entry | |
References | () http://www.securitytracker.com/id/1035828 - Third Party Advisory, VDB Entry | |
References | () https://helpx.adobe.com/security/products/acrobat/apsb16-14.html - Patch, Vendor Advisory |
Information
Published : 2016-05-11 11:00
Updated : 2024-11-21 02:51
NVD link : CVE-2016-4102
Mitre link : CVE-2016-4102
CVE.ORG link : CVE-2016-4102
JSON object : View
Products Affected
apple
- mac_os_x
adobe
- acrobat
- acrobat_reader_dc
- reader
- acrobat_dc
microsoft
- windows
CWE