Public exploit available
Public proof-of-concept or exploit code exists (ExploitDB / Metasploit / Nuclei).

CVE-2019-8024Use After Free in Adobe Acrobat DC

CWE-416Use After Free6 documents5 sources
Severity
9.8CRITICALNVD
EPSS
35.3%
top 2.95%
CISA KEV
Not in KEV
Exploit
PoC available
Public exploit / PoC exists
Timeline
PublishedAug 20
Latest updateMay 24

Description

Adobe Acrobat and Reader versions 2019.012.20035 and earlier, 2019.012.20035 and earlier, 2017.011.30142 and earlier, 2017.011.30143 and earlier, 2015.006.30497 and earlier, and 2015.006.30498 and earlier have an use after free vulnerability. Successful exploitation could lead to arbitrary code execution .

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:HExploitability: 3.9 | Impact: 5.9

Affected Packages3 packages

NVDadobe/acrobat_reader_dc15.006.3006015.006.30499+2
CVEListV5adobe/adobe_acrobat_and_reader2019.012.20035 and earlier, 2019.012.20035 and earlier, 2017.011.30142 and earlier, 2017.011.30143 and earlier, 2015.006.30497 and earlier, and 2015.006.30498 and earlier versions
NVDadobe/acrobat_dc15.006.3006015.006.30499+2

Patches

🔴Vulnerability Details

2
GHSA
GHSA-q98w-pvcr-q4mw: Adobe Acrobat and Reader versions, 20192022-05-24
CVEList
CVE-2019-8024: Adobe Acrobat and Reader versions 20192019-08-20

💥Exploits & PoCs

2
Exploit-DB
Adobe Acrobat Reader DC for Windows - Use-After-Free due to Malformed JP2 Stream2019-08-15
Exploit-DB
OpenSource ERP 6.3.1. - SQL Injection2019-01-10

💬Community

1
Bugzilla
CVE-2016-10750 hazelcast: java deserialization in join cluster procedure leading to remote code execution2019-05-23
CVE-2019-8024 — Use After Free in Adobe Acrobat DC | cvebase