Adobe Acrobat Reader 20.6.2 for Android

CPE Details

Adobe Acrobat Reader 20.6.2 for Android
20.6.2
2020-12-09
17h14 +00:00
2020-12-09
17h14 +00:00
Alerte pour un CPE
Stay informed of any changes for a specific CPE.
Notifications manage

CPE Name: cpe:2.3:a:adobe:acrobat_reader:20.6.2:*:*:*:*:android:*:*

Informations

Vendor

adobe

Product

acrobat_reader

Version

20.6.2

Target Software

android

Related CVE

Open and find in CVE List

CVE ID Published Description Score Severity
CVE-2024-34130 2024-06-13 11h28 +00:00 Acrobat Mobile Sign Android versions 24.4.2.33155 and earlier are affected by an Incorrect Authorization vulnerability that could result in a Security feature bypass. An attacker could exploit this vulnerability to access confidential information. Exploitation of this issue does not require user interaction.
5.5
Medium
CVE-2024-34129 2024-06-13 11h28 +00:00 Acrobat Mobile Sign Android versions 24.4.2.33155 and earlier are affected by an Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability that could result in a security feature bypass. An attacker could exploit this vulnerability to access files and directories that are outside the restricted directory and also to overwrite arbitrary files. Exploitation of this issue does not requires user interaction and attack complexity is high.
7.5
High
CVE-2021-40724 2021-10-15 14h22 +00:00 Acrobat Reader for Android versions 21.8.0 (and earlier) are affected by a Path traversal vulnerability. An unauthenticated attacker could leverage this vulnerability to achieve arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
7.8
High
CVE-2020-24441 2020-11-12 14h34 +00:00 Adobe Acrobat Reader for Android version 20.6.2 (and earlier) does not properly restrict access to directories created by the application. This could result in disclosure of sensitive information stored in databases used by the application. Exploitation requires a victim to download and run a malicious application.
5.5
Medium