Adobe Reader 10

Adobe Reader 10

Adobe Systems Inc.  ❘ 36.1MB  ❘ Freeware
Android iOS Windows Mac Linux
out of 3777 votes
Rank 1 among competitors

Get from Adobe Systems Inc.

Below you can a history of notable security vulnerabilities and breaches related to Adobe Reader.

Table of Contents

  1. CVE-2024-41896: Use-After-Free Vulnerability
  2. CVE-2024-49530: Arbitrary Code Execution
  3. CVE-2024-49535: XML External Entity (XXE) Vulnerability
  4. CVE-2024-49531: Null Pointer Dereference
  5. CVE-2024-39383: Proof-of-Concept Crash
  6. 2013 Adobe Data Breach
  7. Operation Aurora: 2010 Targeted Attacks
  8. JavaScript Vulnerabilities in PDFs
  9. Shadow Attacks on Signed PDFs

CVE-2024-41896: Use-After-Free Vulnerability

CVE-2024-41896 is a critical "use-after-free" vulnerability identified in Adobe Acrobat Reader. This flaw occurs when the program attempts to access memory that has already been freed, potentially allowing attackers to execute arbitrary code on the affected system. Adobe addressed this issue in a security update released in September 2024. More Information

CVE-2024-49530: Arbitrary Code Execution

CVE-2024-49530 is a critical vulnerability allowing arbitrary code execution due to a "use-after-free" condition. An attacker could execute malicious code with the privileges of the current user, potentially compromising the entire system. Adobe released a patch in December 2024. Adobe Security Bulletin

CVE-2024-49535: XML External Entity (XXE) Vulnerability

CVE-2024-49535 involves improper restriction of XML external entity references. Exploitation could lead to unauthorized access to sensitive information or denial of service. Adobe provided a security update in December 2024. Adobe Security Bulletin

CVE-2024-49531: Null Pointer Dereference

CVE-2024-49531 results from a null pointer dereference causing application crashes or denial of service, disrupting normal software operation. Adobe fixed this issue in December 2024. Adobe Security Bulletin

CVE-2024-39383: Proof-of-Concept Crash

CVE-2024-39383 can cause Adobe Acrobat and Reader to crash, but there were no reported active exploits as of August 2024. Adobe acknowledged the proof-of-concept existence. Adobe Security Bulletin

2013 Adobe Data Breach

In 2013, Adobe experienced a massive data breach impacting approximately 38 million users. Compromised data included encrypted passwords, credit card details, and product source code, raising significant concerns about infrastructure security. Details on Twingate

Operation Aurora: 2010 Targeted Attacks

Operation Aurora involved cyberattacks targeting companies including Adobe and Google through a zero-day vulnerability in Adobe Reader. Malicious PDF files installed malware, underscoring risks with unpatched software. More on Wired

JavaScript Vulnerabilities in PDFs

JavaScript within Adobe Reader PDFs enhances interactivity but has historically been exploited to execute malicious scripts, causing security breaches. Users frequently disable JavaScript to mitigate this risk. Adobe Acrobat on Wikipedia

Shadow Attacks on Signed PDFs

Shadow attacks exploit weaknesses in digital signatures allowing alteration of visible content without invalidating signatures, posing significant authenticity challenges for signed PDFs. PDF Vulnerabilities on Wikipedia


For up-to-date security information, always consult Adobe’s official Security Bulletins and Advisories.

Installations

34,903 users of UpdateStar had Adobe Reader installed last month.

Alternatives


PDFCreator

PDFCreator: Create and convert PDF files with ease!

FlexiPDF

FlexiPDF: The Ultimate PDF Editing Tool

Foxit PDF Reader

Efficient PDF viewing with Foxit Reader

FoxitReader

Efficient PDF Viewer with User-Friendly Interface

soft Xpansion Perfect PDF Premium

Create and edit PDFs effortlessly with Soft Xpansion Perfect PDF Premium

PDF-Creator

Effortlessly create professional PDF documents with PDF-Creator.
Secure and free downloads checked by UpdateStar

Stay up-to-date
with UpdateStar freeware.

Latest Reviews

Lost Lost
A Stunning Journey Through a Surreal World
Creaks Creaks
A Whimsical Adventure Awaits in Creaks
S Sid Meier's Alpha Centauri
A Timeless Sci-Fi Strategy Classic
Huawei Drivers Huawei Drivers
Essential Drivers for Huawei Devices
W Wolfenstein 3D: Spear of Destiny
Classic FPS Legend: A Nostalgic Journey Through Wolfenstein 3D
W Weeny Free Video Cutter
Trim your videos effortlessly with Weeny Free Video Cutter
UpdateStar Premium Edition UpdateStar Premium Edition
Keeping Your Software Updated Has Never Been Easier with UpdateStar Premium Edition!
Microsoft Visual C++ 2015 Redistributable Package Microsoft Visual C++ 2015 Redistributable Package
Boost your system performance with Microsoft Visual C++ 2015 Redistributable Package!
Microsoft Edge Microsoft Edge
A New Standard in Web Browsing
Google Chrome Google Chrome
Fast and Versatile Web Browser
Microsoft Visual C++ 2010 Redistributable Microsoft Visual C++ 2010 Redistributable
Essential Component for Running Visual C++ Applications
Microsoft Update Health Tools Microsoft Update Health Tools
Microsoft Update Health Tools: Ensure Your System is Always Up-to-Date!

Latest Updates


oneAPI Level Zero 1.21.10

Introduction to oneAPI Level Zero oneAPI Level Zero is a low-level API designed to facilitate direct hardware access for developers working with diverse compute architectures.

Betterbird 128.12.0esr-bb30

Enhance Your Twitter Experience with Betterbird by Betterbird Project

KDE neon 20250629-0744

KDE Neon: A Premium Experience of Plasma Desktop

Gift card 42

Reasons to Consider Using Gift Codes: Our platform offers a straightforward game that provides opportunities to receive various gifts. How Can I Obtain the Gift Cards?

Gift card on Tbay 1.1.2

Discover a wealth of information about gift cards on Tbay! Explore our platform for up-to-the-minute rates on a wide variety of gift cards, as well as tools to calculate prices for different types of gift cards.