Adobe Reader and Acrobat 10.x before 10.1.14 and 11.x before 11.0.11 on Windows and OS X allow attackers to bypass intended restrictions on JavaScript API execution via unspecified vectors, a different vulnerability than CVE-2015-3060, CVE-2015-3061, CVE-2015-3062, CVE-2015-3063, CVE-2015-3064, CVE-2015-3065, CVE-2015-3066, CVE-2015-3067, CVE-2015-3068, CVE-2015-3069, CVE-2015-3071, CVE-2015-3073, and CVE-2015-3074.
References
Link | Resource |
---|---|
http://www.securityfocus.com/bid/74604 | Third Party Advisory VDB Entry |
http://www.securitytracker.com/id/1032284 | Third Party Advisory VDB Entry |
http://www.zerodayinitiative.com/advisories/ZDI-15-196 | Third Party Advisory VDB Entry |
https://helpx.adobe.com/security/products/reader/apsb15-10.html | Patch Vendor Advisory |
http://www.securityfocus.com/bid/74604 | Third Party Advisory VDB Entry |
http://www.securitytracker.com/id/1032284 | Third Party Advisory VDB Entry |
http://www.zerodayinitiative.com/advisories/ZDI-15-196 | Third Party Advisory VDB Entry |
https://helpx.adobe.com/security/products/reader/apsb15-10.html | Patch Vendor Advisory |
Configurations
Configuration 1 (hide)
AND |
|
Configuration 2 (hide)
AND |
|
History
21 Nov 2024, 02:28
Type | Values Removed | Values Added |
---|---|---|
References | () http://www.securityfocus.com/bid/74604 - Third Party Advisory, VDB Entry | |
References | () http://www.securitytracker.com/id/1032284 - Third Party Advisory, VDB Entry | |
References | () http://www.zerodayinitiative.com/advisories/ZDI-15-196 - Third Party Advisory, VDB Entry | |
References | () https://helpx.adobe.com/security/products/reader/apsb15-10.html - Patch, Vendor Advisory |
Information
Published : 2015-05-13 11:00
Updated : 2024-11-21 02:28
NVD link : CVE-2015-3072
Mitre link : CVE-2015-3072
CVE.ORG link : CVE-2015-3072
JSON object : View
Products Affected
adobe
- acrobat_reader
- acrobat
apple
- mac_os_x
microsoft
- windows
CWE
CWE-284
Improper Access Control