Rewterz penetration testing services help organizations determine if a cyber attacker can gain access to their critical assets while giving them detailed insights of the overall business impact of a cyber attack.
Before Rewterz got its start, the market was in dire need of a specialized and dedicated information security company. It was nearly impossible for businesses to find a trustworthy provider that could truly cover all of their bases. We wanted to meet this need, giving companies across the globe a chance to get ahead while knowing that their data is in good hands.
Rewterz penetration testing services help organizations determine if a cyber attacker can gain access to their critical assets while giving them detailed insights of the overall business impact of a cyber attack.
Before Rewterz got its start, the market was in dire need of a specialized and dedicated information security company. It was nearly impossible for businesses to find a trustworthy provider that could truly cover all of their bases. We wanted to meet this need, giving companies across the globe a chance to get ahead while knowing that their data is in good hands.
High
Adobe Acrobat and Adobe Reader could allow a local attacker to gain elevated privileges on the system, caused by a race condition. By persuading a victim to open a specially-crafted document, an attacker could exploit this vulnerability to gain elevated privileges on the system.
Adobe Acrobat and Adobe Reader could allow a remote attacker to bypass security restrictions, caused by a dynamic library injection. By persuading a victim to open a specially-crafted document, a remote attacker could exploit this vulnerability to bypass access restrictions.
Adobe Acrobat and Adobe Reader could allow a local attacker to gain elevated privileges on the system, caused by a signature verification bypass. By persuading a victim to open a specially-crafted document, an attacker could exploit this vulnerability to gain elevated privileges on the system.
Adobe Acrobat and Adobe Reader could allow a remote attacker to obtain sensitive information, caused by improper input validation. By persuading a victim to open a specially-crafted document, a remote attacker could exploit this vulnerability to obtain sensitive information.
Adobe
Adobe Acrobat and Reader
Refer to vendor advisory for the complete list of affected products and their respective patches.