CVE-2015-3067

CVSS V2 High 10 CVSS V3 None
Description
Adobe Reader and Acrobat 10.x before 10.1.14 and 11.x before 11.0.11 on Windows and OS X allow attackers to bypass intended restrictions on JavaScript API execution via unspecified vectors, a different vulnerability than CVE-2015-3060, CVE-2015-3061, CVE-2015-3062, CVE-2015-3063, CVE-2015-3064, CVE-2015-3065, CVE-2015-3066, CVE-2015-3068, CVE-2015-3069, CVE-2015-3071, CVE-2015-3072, CVE-2015-3073, and CVE-2015-3074.
Overview
  • CVE ID
  • CVE-2015-3067
  • Assigner
  • psirt@adobe.com
  • Vulnerability Status
  • Analyzed
  • Published Version
  • 2015-05-13T11:00:02
  • Last Modified Date
  • 2017-01-05T19:48:53
CPE Configuration (Product)
CPE Vulnerable Operator Version Start Version End
AND
cpe:2.3:a:adobe:acrobat:10.1.0:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:adobe:acrobat:10.1.1:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:adobe:acrobat:10.1.2:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:adobe:acrobat:10.1.3:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:adobe:acrobat:10.1.4:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:adobe:acrobat:10.1.5:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:adobe:acrobat:10.1.6:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:adobe:acrobat:10.1.7:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:adobe:acrobat:10.1.8:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:adobe:acrobat:10.1.9:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:adobe:acrobat:10.1.10:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:adobe:acrobat:10.1.11:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:adobe:acrobat:10.1.12:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:adobe:acrobat:10.1.13:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:adobe:acrobat:11.0.0:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:adobe:acrobat:11.0.1:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:adobe:acrobat:11.0.2:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:adobe:acrobat:11.0.3:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:adobe:acrobat:11.0.4:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:adobe:acrobat:11.0.5:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:adobe:acrobat:11.0.6:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:adobe:acrobat:11.0.7:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:adobe:acrobat:11.0.8:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:adobe:acrobat:11.0.9:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:adobe:acrobat:11.0.10:*:*:*:*:*:*:* 1 OR
cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:* 1 OR
cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:* 1 OR
AND
cpe:2.3:a:adobe:acrobat_reader:10.1.0:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:adobe:acrobat_reader:10.1.1:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:adobe:acrobat_reader:10.1.2:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:adobe:acrobat_reader:10.1.3:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:adobe:acrobat_reader:10.1.4:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:adobe:acrobat_reader:10.1.5:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:adobe:acrobat_reader:10.1.6:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:adobe:acrobat_reader:10.1.7:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:adobe:acrobat_reader:10.1.8:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:adobe:acrobat_reader:10.1.9:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:adobe:acrobat_reader:10.1.10:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:adobe:acrobat_reader:10.1.11:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:adobe:acrobat_reader:10.1.12:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:adobe:acrobat_reader:10.1.13:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:adobe:acrobat_reader:11.0.0:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:adobe:acrobat_reader:11.0.1:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:adobe:acrobat_reader:11.0.2:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:adobe:acrobat_reader:11.0.3:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:adobe:acrobat_reader:11.0.4:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:adobe:acrobat_reader:11.0.5:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:adobe:acrobat_reader:11.0.6:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:adobe:acrobat_reader:11.0.7:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:adobe:acrobat_reader:11.0.8:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:adobe:acrobat_reader:11.0.9:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:adobe:acrobat_reader:11.0.10:*:*:*:*:*:*:* 1 OR
cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:* 1 OR
cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:* 1 OR
CVSS Version 2
  • Version
  • 2.0
  • Vector String
  • AV:N/AC:L/Au:N/C:C/I:C/A:C
  • Access Vector
  • NETWORK
  • Access Compatibility
  • LOW
  • Authentication
  • NONE
  • Confidentiality Impact
  • COMPLETE
  • Integrity Impact
  • COMPLETE
  • Availability Impact
  • COMPLETE
  • Base Score
  • 10
  • Severity
  • HIGH
  • Exploitability Score
  • 10
  • Impact Score
  • 10
References
Reference URL Reference Tags
https://helpx.adobe.com/security/products/reader/apsb15-10.html Patch Vendor Advisory
http://www.zerodayinitiative.com/advisories/ZDI-15-201 Third Party Advisory VDB Entry
http://www.securitytracker.com/id/1032284 Third Party Advisory VDB Entry
http://www.securityfocus.com/bid/74604 Third Party Advisory VDB Entry
History
Created Old Value New Value Data Type Notes
2022-05-10 09:51:46 Added to TrackCVE
2022-12-02 04:38:47 2015-05-13T11:00Z 2015-05-13T11:00:02 CVE Published Date updated
2022-12-02 04:38:47 2017-01-05T19:48:53 CVE Modified Date updated
2022-12-02 04:38:47 Analyzed Vulnerability Status updated