Show filters
26 Total Results
Displaying 21-26 of 26
Sort by:
Attacker Value
Unknown
CVE-2020-9703
Disclosure Date: August 19, 2020 (last updated February 22, 2025)
Adobe Acrobat and Reader versions 2020.009.20074 and earlier, 2020.001.30002, 2017.011.30171 and earlier, and 2015.006.30523 and earlier have a stack exhaustion vulnerability. Successful exploitation could lead to application denial-of-service.
0
Attacker Value
Unknown
CVE-2020-9702
Disclosure Date: August 19, 2020 (last updated February 22, 2025)
Adobe Acrobat and Reader versions 2020.009.20074 and earlier, 2020.001.30002, 2017.011.30171 and earlier, and 2015.006.30523 and earlier have a stack exhaustion vulnerability. Successful exploitation could lead to application denial-of-service.
0
Attacker Value
Unknown
CVE-2020-9698
Disclosure Date: August 19, 2020 (last updated February 22, 2025)
Adobe Acrobat and Reader versions 2020.009.20074 and earlier, 2020.001.30002, 2017.011.30171 and earlier, and 2015.006.30523 and earlier have a buffer error vulnerability. Successful exploitation could lead to arbitrary code execution .
0
Attacker Value
Unknown
CVE-2020-9700
Disclosure Date: August 19, 2020 (last updated February 22, 2025)
Adobe Acrobat and Reader versions 2020.009.20074 and earlier, 2020.001.30002, 2017.011.30171 and earlier, and 2015.006.30523 and earlier have a buffer error vulnerability. Successful exploitation could lead to arbitrary code execution .
0
Attacker Value
Unknown
CVE-2020-9699
Disclosure Date: August 19, 2020 (last updated February 22, 2025)
Adobe Acrobat and Reader versions 2020.009.20074 and earlier, 2020.001.30002, 2017.011.30171 and earlier, and 2015.006.30523 and earlier have a buffer error vulnerability. Successful exploitation could lead to arbitrary code execution .
0
Attacker Value
Unknown
CVE-2020-9701
Disclosure Date: August 19, 2020 (last updated February 22, 2025)
Adobe Acrobat and Reader versions 2020.009.20074 and earlier, 2020.001.30002, 2017.011.30171 and earlier, and 2015.006.30523 and earlier have a buffer error vulnerability. Successful exploitation could lead to arbitrary code execution .
0