Metrics
Affected Vendors & Products
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2024-43861 | Acrobat Reader versions 24.005.20307, 24.001.30213, 24.001.30193, 20.005.30730, 20.005.30710 and earlier are affected by a Use After Free vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. |
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Fri, 17 Jan 2025 02:45:00 +0900
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Acrobat Reader versions 24.005.20307, 24.001.30213, 24.001.30193, 20.005.30730, 20.005.30710 and earlier are affected by a Use After Free vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file and be tricked in to interacting with it in a specific manner, increasing the attack complexity. | Acrobat Reader versions 24.005.20307, 24.001.30213, 24.001.30193, 20.005.30730, 20.005.30710 and earlier are affected by a Use After Free vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. |
| Metrics |
cvssV3_1
|
cvssV3_1
|
Wed, 15 Jan 2025 07:00:00 +0900
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Acrobat Reader versions 24.005.20307, 24.001.30213, 24.001.30193, 20.005.30730, 20.005.30710 and earlier are affected by a Use After Free vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. | Acrobat Reader versions 24.005.20307, 24.001.30213, 24.001.30193, 20.005.30730, 20.005.30710 and earlier are affected by a Use After Free vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file and be tricked in to interacting with it in a specific manner, increasing the attack complexity. |
Sat, 11 Jan 2025 02:30:00 +0900
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Adobe
Adobe acrobat Adobe acrobat Dc Adobe acrobat Reader Adobe acrobat Reader Dc |
|
| CPEs | cpe:2.3:a:adobe:acrobat:*:*:*:*:classic:*:*:* cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:continuous:*:*:* cpe:2.3:a:adobe:acrobat_reader:*:*:*:*:classic:*:*:* cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:continuous:*:*:* |
|
| Vendors & Products |
Adobe
Adobe acrobat Adobe acrobat Dc Adobe acrobat Reader Adobe acrobat Reader Dc |
Wed, 11 Dec 2024 07:15:00 +0900
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 11 Dec 2024 05:00:00 +0900
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Acrobat Reader versions 24.005.20307, 24.001.30213, 24.001.30193, 20.005.30730, 20.005.30710 and earlier are affected by a Use After Free vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. | |
| Title | Acrobat Reader | Use After Free (CWE-416) | |
| Weaknesses | CWE-416 | |
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: adobe
Published:
Updated: 2025-01-16T17:34:53.959Z
Reserved: 2024-10-15T15:35:47.030Z
Link: CVE-2024-49530
Updated: 2024-12-10T20:41:59.434Z
Status : Analyzed
Published: 2024-12-10T20:15:18.107
Modified: 2025-01-21T17:07:34.653
Link: CVE-2024-49530
No data.
OpenCVE Enrichment
No data.
EUVD