Search criteria
301 vulnerabilities found for Acrobat DC by Adobe
VAR-201512-0436
Vulnerability from variot - Updated: 2025-04-13 23:32Heap-based buffer overflow in AGM.dll in Adobe Reader and Acrobat 10.x before 10.1.16 and 11.x before 11.0.13, Acrobat and Acrobat Reader DC Classic before 2015.006.30094, and Acrobat and Acrobat Reader DC Continuous before 2015.009.20069 on Windows and OS X allows attackers to execute arbitrary code via a multiple-layer PDF document, a different vulnerability than CVE-2015-6696 and CVE-2015-6698. This vulnerability CVE-2015-6696 and CVE-2015-6698 Is a different vulnerability.By attackers, multiple layers PDF Arbitrary code may be executed through the documentation. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within AGM.dll. Failed exploit attempts will likely cause a denial-of-service condition. Adobe Acrobat DC, etc. are all products of Adobe (Adobe) in the United States. Acrobat DC is a desktop PDF solution; Acrobat Reader DC is a set of tools for viewing, printing and annotating PDF. 15 and earlier versions
Show details on source website{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"configurations": {
"@id": "https://www.variotdbs.pl/ref/configurations"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-201512-0436",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "acrobat reader dc",
"scope": "gte",
"trust": 1.0,
"vendor": "adobe",
"version": "15.008.20082"
},
{
"model": "acrobat dc",
"scope": "gte",
"trust": 1.0,
"vendor": "adobe",
"version": "15.008.20082"
},
{
"model": "acrobat dc",
"scope": "gte",
"trust": 1.0,
"vendor": "adobe",
"version": "15.006.30060"
},
{
"model": "acrobat reader dc",
"scope": "lt",
"trust": 1.0,
"vendor": "adobe",
"version": "15.009.20069"
},
{
"model": "acrobat dc",
"scope": "lt",
"trust": 1.0,
"vendor": "adobe",
"version": "15.006.30094"
},
{
"model": "acrobat",
"scope": "gte",
"trust": 1.0,
"vendor": "adobe",
"version": "10.0"
},
{
"model": "acrobat reader",
"scope": "lte",
"trust": 1.0,
"vendor": "adobe",
"version": "10.1.15"
},
{
"model": "acrobat reader",
"scope": "gte",
"trust": 1.0,
"vendor": "adobe",
"version": "10.0"
},
{
"model": "acrobat reader",
"scope": "lte",
"trust": 1.0,
"vendor": "adobe",
"version": "11.0.12"
},
{
"model": "acrobat",
"scope": "lte",
"trust": 1.0,
"vendor": "adobe",
"version": "10.1.15"
},
{
"model": "acrobat",
"scope": "lte",
"trust": 1.0,
"vendor": "adobe",
"version": "11.0.12"
},
{
"model": "acrobat reader dc",
"scope": "lt",
"trust": 1.0,
"vendor": "adobe",
"version": "15.006.30094"
},
{
"model": "acrobat",
"scope": "gte",
"trust": 1.0,
"vendor": "adobe",
"version": "11.0.0"
},
{
"model": "acrobat dc",
"scope": "lt",
"trust": 1.0,
"vendor": "adobe",
"version": "15.009.20069"
},
{
"model": "acrobat reader",
"scope": "gte",
"trust": 1.0,
"vendor": "adobe",
"version": "11.0.0"
},
{
"model": "acrobat reader dc",
"scope": "gte",
"trust": 1.0,
"vendor": "adobe",
"version": "15.006.30060"
},
{
"model": "acrobat dc",
"scope": "lt",
"trust": 0.8,
"vendor": "adobe",
"version": "(windows/macintosh)"
},
{
"model": "acrobat reader dc",
"scope": "lt",
"trust": 0.8,
"vendor": "adobe",
"version": "(windows/macintosh)"
},
{
"model": "acrobat reader dc",
"scope": "eq",
"trust": 0.8,
"vendor": "adobe",
"version": "classic 2015.006.30094"
},
{
"model": "acrobat",
"scope": "lt",
"trust": 0.8,
"vendor": "adobe",
"version": "11.x (windows/macintosh)"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.8,
"vendor": "adobe",
"version": "xi desktop 11.0.13"
},
{
"model": "reader",
"scope": "lt",
"trust": 0.8,
"vendor": "adobe",
"version": "11.x (windows/macintosh)"
},
{
"model": "acrobat dc",
"scope": "eq",
"trust": 0.8,
"vendor": "adobe",
"version": "continuous 2015.009.20069"
},
{
"model": "acrobat",
"scope": "lt",
"trust": 0.8,
"vendor": "adobe",
"version": "10.x (windows/macintosh)"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.8,
"vendor": "adobe",
"version": "xi desktop 11.0.13"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.8,
"vendor": "adobe",
"version": "x desktop 10.1.16"
},
{
"model": "acrobat dc",
"scope": "eq",
"trust": 0.8,
"vendor": "adobe",
"version": "classic 2015.006.30094"
},
{
"model": "reader",
"scope": "lt",
"trust": 0.8,
"vendor": "adobe",
"version": "10.x (windows/macintosh)"
},
{
"model": "acrobat reader dc",
"scope": "eq",
"trust": 0.8,
"vendor": "adobe",
"version": "continuous 2015.009.20069"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.8,
"vendor": "adobe",
"version": "x desktop 10.1.16"
},
{
"model": "acrobat reader dc",
"scope": null,
"trust": 0.7,
"vendor": "adobe",
"version": null
},
{
"model": "acrobat reader",
"scope": "eq",
"trust": 0.6,
"vendor": "adobe",
"version": "11.0.10"
},
{
"model": "acrobat reader",
"scope": "eq",
"trust": 0.6,
"vendor": "adobe",
"version": "11.0.11"
},
{
"model": "acrobat reader",
"scope": "eq",
"trust": 0.6,
"vendor": "adobe",
"version": "10.1.14"
},
{
"model": "acrobat reader",
"scope": "eq",
"trust": 0.6,
"vendor": "adobe",
"version": "10.1.12"
},
{
"model": "acrobat reader",
"scope": "eq",
"trust": 0.6,
"vendor": "adobe",
"version": "10.1.10"
},
{
"model": "acrobat reader",
"scope": "eq",
"trust": 0.6,
"vendor": "adobe",
"version": "10.1.11"
},
{
"model": "acrobat reader",
"scope": "eq",
"trust": 0.6,
"vendor": "adobe",
"version": "10.1.13"
},
{
"model": "acrobat reader",
"scope": "eq",
"trust": 0.6,
"vendor": "adobe",
"version": "11.0.9"
},
{
"model": "acrobat reader",
"scope": "eq",
"trust": 0.6,
"vendor": "adobe",
"version": "11.0.12"
},
{
"model": "acrobat reader",
"scope": "eq",
"trust": 0.6,
"vendor": "adobe",
"version": "10.1.15"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1.14"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1.9"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1.1"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1.13"
},
{
"model": "acrobat reader dc",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "2015.8.20082"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.10"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.0"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1.2"
},
{
"model": "acrobat dc",
"scope": "ne",
"trust": 0.3,
"vendor": "adobe",
"version": "2015.006.30094"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1.15"
},
{
"model": "acrobat reader dc",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "2015.6.30060"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.0.3"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1.10"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.3"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.0.13"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.6"
},
{
"model": "acrobat",
"scope": "ne",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.13"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0"
},
{
"model": "acrobat reader dc",
"scope": "ne",
"trust": 0.3,
"vendor": "adobe",
"version": "2015.006.30094"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.10"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.4"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1.3"
},
{
"model": "acrobat",
"scope": "ne",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1.16"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.0.2"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.0.1"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.11"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1.4"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1.6"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1.11"
},
{
"model": "reader",
"scope": "ne",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.13"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.7"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1.14"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1.3"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1.1"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1"
},
{
"model": "reader",
"scope": "ne",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1.16"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.0.2"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1.5"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.0"
},
{
"model": "acrobat dc",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "2015.007.20033"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1.12"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.1"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1.2"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1.13"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1.4"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1.8"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1.11"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.0.3"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.2"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.12"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.08"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.9"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.7"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.6"
},
{
"model": "acrobat dc",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "2015.006.30060"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.05"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1.10"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.3"
},
{
"model": "acrobat dc",
"scope": "ne",
"trust": 0.3,
"vendor": "adobe",
"version": "2015.009.20069"
},
{
"model": "acrobat dc",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "2015.006.30033"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1.12"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.1"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.4"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1.9"
},
{
"model": "acrobat reader dc",
"scope": "ne",
"trust": 0.3,
"vendor": "adobe",
"version": "2015.009.20069"
},
{
"model": "acrobat reader dc",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "2015.006.30033"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.12"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.08"
},
{
"model": "acrobat dc",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "2015.008.20082"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1.7"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.0.1"
},
{
"model": "acrobat reader dc",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "2015.007.20033"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.09"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.11"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1.15"
}
],
"sources": [
{
"db": "ZDI",
"id": "ZDI-15-637"
},
{
"db": "BID",
"id": "79208"
},
{
"db": "JVNDB",
"id": "JVNDB-2015-006484"
},
{
"db": "CNNVD",
"id": "CNNVD-201512-458"
},
{
"db": "NVD",
"id": "CVE-2015-8458"
}
]
},
"configurations": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/configurations#",
"children": {
"@container": "@list"
},
"cpe_match": {
"@container": "@list"
},
"data": {
"@container": "@list"
},
"nodes": {
"@container": "@list"
}
},
"data": [
{
"CVE_data_version": "4.0",
"nodes": [
{
"cpe_match": [
{
"cpe22Uri": "cpe:/a:adobe:acrobat",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/a:adobe:acrobat_dc",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/a:adobe:acrobat_reader_dc",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/a:adobe:acrobat_reader",
"vulnerable": true
}
],
"operator": "OR"
}
]
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2015-006484"
}
]
},
"credits": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/credits#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Fritz Sands of the Zero Day Initiative.",
"sources": [
{
"db": "BID",
"id": "79208"
},
{
"db": "CNNVD",
"id": "CNNVD-201512-458"
}
],
"trust": 0.9
},
"cve": "CVE-2015-8458",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [
{
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "nvd@nist.gov",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 8.6,
"id": "CVE-2015-8458",
"impactScore": 6.4,
"integrityImpact": "PARTIAL",
"severity": "MEDIUM",
"trust": 2.5,
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
{
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "VULHUB",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 8.6,
"id": "VHN-86419",
"impactScore": 6.4,
"integrityImpact": "PARTIAL",
"severity": "MEDIUM",
"trust": 0.1,
"vectorString": "AV:N/AC:M/AU:N/C:P/I:P/A:P",
"version": "2.0"
}
],
"cvssV3": [],
"severity": [
{
"author": "nvd@nist.gov",
"id": "CVE-2015-8458",
"trust": 1.0,
"value": "MEDIUM"
},
{
"author": "NVD",
"id": "CVE-2015-8458",
"trust": 0.8,
"value": "Medium"
},
{
"author": "ZDI",
"id": "CVE-2015-8458",
"trust": 0.7,
"value": "MEDIUM"
},
{
"author": "CNNVD",
"id": "CNNVD-201512-458",
"trust": 0.6,
"value": "MEDIUM"
},
{
"author": "VULHUB",
"id": "VHN-86419",
"trust": 0.1,
"value": "MEDIUM"
}
]
}
],
"sources": [
{
"db": "ZDI",
"id": "ZDI-15-637"
},
{
"db": "VULHUB",
"id": "VHN-86419"
},
{
"db": "JVNDB",
"id": "JVNDB-2015-006484"
},
{
"db": "CNNVD",
"id": "CNNVD-201512-458"
},
{
"db": "NVD",
"id": "CVE-2015-8458"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Heap-based buffer overflow in AGM.dll in Adobe Reader and Acrobat 10.x before 10.1.16 and 11.x before 11.0.13, Acrobat and Acrobat Reader DC Classic before 2015.006.30094, and Acrobat and Acrobat Reader DC Continuous before 2015.009.20069 on Windows and OS X allows attackers to execute arbitrary code via a multiple-layer PDF document, a different vulnerability than CVE-2015-6696 and CVE-2015-6698. This vulnerability CVE-2015-6696 and CVE-2015-6698 Is a different vulnerability.By attackers, multiple layers PDF Arbitrary code may be executed through the documentation. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within AGM.dll. Failed exploit attempts will likely cause a denial-of-service condition. Adobe Acrobat DC, etc. are all products of Adobe (Adobe) in the United States. Acrobat DC is a desktop PDF solution; Acrobat Reader DC is a set of tools for viewing, printing and annotating PDF. 15 and earlier versions",
"sources": [
{
"db": "NVD",
"id": "CVE-2015-8458"
},
{
"db": "JVNDB",
"id": "JVNDB-2015-006484"
},
{
"db": "ZDI",
"id": "ZDI-15-637"
},
{
"db": "BID",
"id": "79208"
},
{
"db": "VULHUB",
"id": "VHN-86419"
}
],
"trust": 2.61
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "NVD",
"id": "CVE-2015-8458",
"trust": 3.5
},
{
"db": "ZDI",
"id": "ZDI-15-637",
"trust": 2.7
},
{
"db": "BID",
"id": "79208",
"trust": 2.0
},
{
"db": "JVNDB",
"id": "JVNDB-2015-006484",
"trust": 0.8
},
{
"db": "ZDI_CAN",
"id": "ZDI-CAN-3019",
"trust": 0.7
},
{
"db": "CNNVD",
"id": "CNNVD-201512-458",
"trust": 0.7
},
{
"db": "VULHUB",
"id": "VHN-86419",
"trust": 0.1
}
],
"sources": [
{
"db": "ZDI",
"id": "ZDI-15-637"
},
{
"db": "VULHUB",
"id": "VHN-86419"
},
{
"db": "BID",
"id": "79208"
},
{
"db": "JVNDB",
"id": "JVNDB-2015-006484"
},
{
"db": "CNNVD",
"id": "CNNVD-201512-458"
},
{
"db": "NVD",
"id": "CVE-2015-8458"
}
]
},
"id": "VAR-201512-0436",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "VULHUB",
"id": "VHN-86419"
}
],
"trust": 0.01
},
"last_update_date": "2025-04-13T23:32:40.094000Z",
"patch": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/patch#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"title": "APSB15-24",
"trust": 1.5,
"url": "https://helpx.adobe.com/security/products/acrobat/apsb15-24.html"
},
{
"title": "APSB15-24",
"trust": 0.8,
"url": "https://helpx.adobe.com/jp/security/products/reader/apsb15-24.html"
},
{
"title": "\u30a2\u30c9\u30d3 \u30b7\u30b9\u30c6\u30e0\u30ba\u793e Adobe Reader \u306e\u8106\u5f31\u6027\u306b\u95a2\u3059\u308b\u304a\u77e5\u3089\u305b",
"trust": 0.8,
"url": "http://www.fmworld.net/biz/common/adobe/20151015.html"
},
{
"title": "Multiple Adobe Product-based patch-based buffer overflow vulnerability fixes",
"trust": 0.6,
"url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=59245"
}
],
"sources": [
{
"db": "ZDI",
"id": "ZDI-15-637"
},
{
"db": "JVNDB",
"id": "JVNDB-2015-006484"
},
{
"db": "CNNVD",
"id": "CNNVD-201512-458"
}
]
},
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "CWE-787",
"trust": 1.1
},
{
"problemtype": "CWE-119",
"trust": 0.9
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-86419"
},
{
"db": "JVNDB",
"id": "JVNDB-2015-006484"
},
{
"db": "NVD",
"id": "CVE-2015-8458"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 2.7,
"url": "https://helpx.adobe.com/security/products/acrobat/apsb15-24.html"
},
{
"trust": 1.7,
"url": "http://www.securityfocus.com/bid/79208"
},
{
"trust": 1.7,
"url": "http://www.zerodayinitiative.com/advisories/zdi-15-637"
},
{
"trust": 0.8,
"url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-8458"
},
{
"trust": 0.8,
"url": "http://www.ipa.go.jp/security/ciadr/vul/20151014-adobereader.html"
},
{
"trust": 0.8,
"url": "http://www.jpcert.or.jp/at/2015/at150035.html"
},
{
"trust": 0.8,
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2015-8458"
},
{
"trust": 0.8,
"url": "http://www.npa.go.jp/cyberpolice/topics/?seq=17022"
},
{
"trust": 0.3,
"url": "http://www.adobe.com"
},
{
"trust": 0.3,
"url": "http://www.zerodayinitiative.com/advisories/zdi-15-637/"
}
],
"sources": [
{
"db": "ZDI",
"id": "ZDI-15-637"
},
{
"db": "VULHUB",
"id": "VHN-86419"
},
{
"db": "BID",
"id": "79208"
},
{
"db": "JVNDB",
"id": "JVNDB-2015-006484"
},
{
"db": "CNNVD",
"id": "CNNVD-201512-458"
},
{
"db": "NVD",
"id": "CVE-2015-8458"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "ZDI",
"id": "ZDI-15-637"
},
{
"db": "VULHUB",
"id": "VHN-86419"
},
{
"db": "BID",
"id": "79208"
},
{
"db": "JVNDB",
"id": "JVNDB-2015-006484"
},
{
"db": "CNNVD",
"id": "CNNVD-201512-458"
},
{
"db": "NVD",
"id": "CVE-2015-8458"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2015-12-14T00:00:00",
"db": "ZDI",
"id": "ZDI-15-637"
},
{
"date": "2015-12-21T00:00:00",
"db": "VULHUB",
"id": "VHN-86419"
},
{
"date": "2015-12-14T00:00:00",
"db": "BID",
"id": "79208"
},
{
"date": "2015-12-22T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2015-006484"
},
{
"date": "2015-12-16T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201512-458"
},
{
"date": "2015-12-21T11:59:13.080000",
"db": "NVD",
"id": "CVE-2015-8458"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2015-12-14T00:00:00",
"db": "ZDI",
"id": "ZDI-15-637"
},
{
"date": "2020-05-19T00:00:00",
"db": "VULHUB",
"id": "VHN-86419"
},
{
"date": "2015-12-14T00:00:00",
"db": "BID",
"id": "79208"
},
{
"date": "2015-12-22T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2015-006484"
},
{
"date": "2020-05-20T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201512-458"
},
{
"date": "2025-04-12T10:46:40.837000",
"db": "NVD",
"id": "CVE-2015-8458"
}
]
},
"threat_type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/threat_type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "remote",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201512-458"
}
],
"trust": 0.6
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Windows and Mac OS X Run on Adobe Reader and Acrobat of AGM.dll Heap-based buffer overflow vulnerability",
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2015-006484"
}
],
"trust": 0.8
},
"type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "buffer error",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201512-458"
}
],
"trust": 0.6
}
}
VAR-201608-0299
Vulnerability from variot - Updated: 2025-04-13 23:29Adobe Reader and Acrobat before 11.0.17, Acrobat and Acrobat Reader DC Classic before 15.006.30198, and Acrobat and Acrobat Reader DC Continuous before 15.017.20050 on Windows and OS X allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-4191, CVE-2016-4192, CVE-2016-4193, CVE-2016-4194, CVE-2016-4195, CVE-2016-4196, CVE-2016-4197, CVE-2016-4198, CVE-2016-4199, CVE-2016-4200, CVE-2016-4201, CVE-2016-4202, CVE-2016-4203, CVE-2016-4204, CVE-2016-4205, CVE-2016-4206, CVE-2016-4207, CVE-2016-4208, CVE-2016-4211, CVE-2016-4212, CVE-2016-4213, CVE-2016-4214, CVE-2016-4250, CVE-2016-4251, CVE-2016-4252, CVE-2016-4254, CVE-2016-4265, CVE-2016-4266, CVE-2016-4267, CVE-2016-4268, and CVE-2016-4269. This vulnerability CVE-2016-4191 , CVE-2016-4192 , CVE-2016-4193 , CVE-2016-4194 , CVE-2016-4195 , CVE-2016-4196 , CVE-2016-4197 , CVE-2016-4198 , CVE-2016-4199 , CVE-2016-4200 , CVE-2016-4201 , CVE-2016-4202 , CVE-2016-4203 , CVE-2016-4204 , CVE-2016-4205 , CVE-2016-4206 , CVE-2016-4207 , CVE-2016-4208 , CVE-2016-4211 , CVE-2016-4212 , CVE-2016-4213 , CVE-2016-4214 , CVE-2016-4250 , CVE-2016-4251 , CVE-2016-4252 , CVE-2016-4254 , CVE-2016-4265 , CVE-2016-4266 , CVE-2016-4267 , CVE-2016-4268 ,and CVE-2016-4269 Is a different vulnerability.An attacker could execute arbitrary code or cause a denial of service ( Memory corruption ) There is a possibility of being put into a state. This vulnerability allows remote attackers to disclose sensitive information on vulnerable installations of Adobe Reader DC. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the handling of Font streams. A crafted Font stream can trigger a read past the end of an allocated buffer. Adobe Reader and Acrobat are prone to an memory-corruption vulnerability. Failed exploit attempts will likely result in denial-of-service conditions. are all products of Adobe (Adobe) in the United States. Adobe Reader is a free PDF file reader; Acrobat is a PDF file editing and conversion tool; Acrobat Reader DC is a set of tools for viewing, printing and annotating PDF. Security flaws exist in several Adobe products
Show details on source website{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"configurations": {
"@id": "https://www.variotdbs.pl/ref/configurations"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-201608-0299",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "acrobat dc",
"scope": "lte",
"trust": 1.0,
"vendor": "adobe",
"version": "15.006.30174"
},
{
"model": "acrobat dc",
"scope": "lte",
"trust": 1.0,
"vendor": "adobe",
"version": "15.016.20045"
},
{
"model": "acrobat reader dc",
"scope": "lte",
"trust": 1.0,
"vendor": "adobe",
"version": "15.016.20045"
},
{
"model": "acrobat reader dc",
"scope": "lte",
"trust": 1.0,
"vendor": "adobe",
"version": "15.006.30174"
},
{
"model": "acrobat",
"scope": "lte",
"trust": 1.0,
"vendor": "adobe",
"version": "11.0.16"
},
{
"model": "reader",
"scope": "lte",
"trust": 1.0,
"vendor": "adobe",
"version": "11.0.16"
},
{
"model": "acrobat",
"scope": "lt",
"trust": 0.8,
"vendor": "adobe",
"version": "xi desktop 11.0.17 (windows/macintosh)"
},
{
"model": "acrobat dc",
"scope": "lt",
"trust": 0.8,
"vendor": "adobe",
"version": "classic 15.006.30198 (windows/macintosh)"
},
{
"model": "acrobat dc",
"scope": "lt",
"trust": 0.8,
"vendor": "adobe",
"version": "continuous track 15.017.20050 (windows/macintosh)"
},
{
"model": "acrobat reader dc",
"scope": "lt",
"trust": 0.8,
"vendor": "adobe",
"version": "classic 15.006.30198 (windows/macintosh)"
},
{
"model": "acrobat reader dc",
"scope": "lt",
"trust": 0.8,
"vendor": "adobe",
"version": "continuous track 15.017.20050 (windows/macintosh)"
},
{
"model": "reader",
"scope": "lt",
"trust": 0.8,
"vendor": "adobe",
"version": "xi desktop 11.0.17 (windows/macintosh)"
},
{
"model": "acrobat reader dc",
"scope": null,
"trust": 0.7,
"vendor": "adobe",
"version": null
},
{
"model": "mac os x",
"scope": null,
"trust": 0.6,
"vendor": "apple",
"version": null
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "7.0.1"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "9.5.2"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "7.0.6"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "8"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "8.0"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "9.5.4"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "5.0.10"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "4.05"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1.14"
},
{
"model": "acrobat reader dc",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "15.6.30172"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1.9"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "9.2"
},
{
"model": "acrobat reader dc",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "15.6.30121"
},
{
"model": "acrobat reader dc",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "15.006.30119"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "9.4.2"
},
{
"model": "acrobat reader dc",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "15.16.20039"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1.1"
},
{
"model": "acrobat reader dc",
"scope": "ne",
"trust": 0.3,
"vendor": "adobe",
"version": "15.17.20050"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "9.3.3"
},
{
"model": "acrobat reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "7.1.3"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1.13"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.14"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.10"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.0"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "3.02"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "9.4.1"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "9.3.4"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "6.0.2"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.16"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "8.2.3"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "9.4.3"
},
{
"model": "acrobat reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1.1"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "4.0"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "7.0"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "8.3"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1.2"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "8.2.4"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1.15"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "7.0.1"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.0.3"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1.10"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "8"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "8.0"
},
{
"model": "acrobat dc",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "15.9.20077"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "5.0.11"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "9.1.2"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.3"
},
{
"model": "acrobat dc",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "15.6.30097"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "6.0"
},
{
"model": "acrobat reader dc",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "15.6.30174"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.0.13"
},
{
"model": "acrobat reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1.2"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.6"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "7.0.3"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "8.1.5"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "9"
},
{
"model": "acrobat dc",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "15.10.20059"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "8.2.5"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "8.2.2"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.10"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.4"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.14"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "8.2.6"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1.3"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "3.0"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "9.0"
},
{
"model": "acrobat reader dc",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "15.6.30097"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.16"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "8.2.3"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "9.4.3"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "7.0.8"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "9.3"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "9.4.6"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.0.2"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "9.4.4"
},
{
"model": "acrobat reader dc",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "15.10.20059"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "8.2.4"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.0.1"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "5.0.5"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "8.2"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "9.5"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "3.1"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "8.1.8"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "9.3.2"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "8.1.2"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "9.4.5"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "9.5.1"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "5.0"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "9.4"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "7.0.2"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.11"
},
{
"model": "acrobat dc",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "15.16.20045"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "6.0.3"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1.4"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1.6"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "8.1.3"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "7.0.3"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "9.5.5"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "9.1.1"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1.11"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "8.2.5"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1.14"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.7"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "6.0.4"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "7.1.4"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.13"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "8.2.2"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "5.0.9"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1.3"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "3.0"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "9.4.2"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "9.5.3"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1.1"
},
{
"model": "acrobat reader dc",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "15.16.20045"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "4.5"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "7.1.2"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1.16"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.0.2"
},
{
"model": "acrobat reader dc",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "15.9.20077"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1.5"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "9.4.4"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.0"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "9.5"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "5.0.6"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "6.0.5"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1.12"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.1"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "9.4.5"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "7.0.4"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "5.0"
},
{
"model": "acrobat reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "9.4"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1.2"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "8.1.4"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1.13"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "6.0.3"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "5.1"
},
{
"model": "acrobat dc",
"scope": "ne",
"trust": 0.3,
"vendor": "adobe",
"version": "15.6.30198"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1.4"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "8.1"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1.8"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "9.1.1"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "9.4.1"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1.11"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.0.3"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.2"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.15"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.12"
},
{
"model": "acrobat dc",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "15.010.20056"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.9"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.7"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "6.0.4"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "8.3.1"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.13"
},
{
"model": "acrobat reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1.12"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "7.0"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.08"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "6.0"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "9.1"
},
{
"model": "acrobat dc",
"scope": "ne",
"trust": 0.3,
"vendor": "adobe",
"version": "15.17.20050"
},
{
"model": "acrobat reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1.13"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.6"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.05"
},
{
"model": "acrobat reader dc",
"scope": "ne",
"trust": 0.3,
"vendor": "adobe",
"version": "15.6.30198"
},
{
"model": "acrobat",
"scope": "ne",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.17"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1.10"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "7.0.7"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.09"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "7.1.2"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "6.0.1"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "8.2.1"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "8.1.7"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1.16"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.3"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "7.0.9"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "8.2.6"
},
{
"model": "acrobat reader dc",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "15.010.20056"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "9.5.2"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "9.4.7"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1.12"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "6.0.5"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "5.0.10"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "9.3.1"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.1"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "9.3"
},
{
"model": "acrobat reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1.10"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "4.05"
},
{
"model": "acrobat dc",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "15.10.20060"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "5.1"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.4"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1.9"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "9.2"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "3.01"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "9.1.3"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "8.1.6"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "7.1.1"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.12"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.15"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.08"
},
{
"model": "acrobat dc",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "15.6.30174"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "9.3.3"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "7.0.5"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "7.1"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "9.4.6"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1.7"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.0.1"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "8.1.1"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "5.0.5"
},
{
"model": "acrobat dc",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "15.6.30172"
},
{
"model": "acrobat reader dc",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "15.10.20060"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "6.0.2"
},
{
"model": "reader",
"scope": "ne",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.17"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "9.3.2"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "4.0"
},
{
"model": "acrobat dc",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "15.6.30121"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "5.0.7"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.09"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "6.0.1"
},
{
"model": "acrobat dc",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "15.006.30119"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "9.5.1"
},
{
"model": "acrobat dc",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "15.16.20039"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "7.0.2"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.11"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "8.3"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "7.0.9"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1.15"
}
],
"sources": [
{
"db": "ZDI",
"id": "ZDI-16-493"
},
{
"db": "BID",
"id": "92635"
},
{
"db": "JVNDB",
"id": "JVNDB-2016-004469"
},
{
"db": "CNNVD",
"id": "CNNVD-201608-477"
},
{
"db": "NVD",
"id": "CVE-2016-4270"
}
]
},
"configurations": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/configurations#",
"children": {
"@container": "@list"
},
"cpe_match": {
"@container": "@list"
},
"data": {
"@container": "@list"
},
"nodes": {
"@container": "@list"
}
},
"data": [
{
"CVE_data_version": "4.0",
"nodes": [
{
"cpe_match": [
{
"cpe22Uri": "cpe:/a:adobe:acrobat",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/a:adobe:acrobat_dc",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/a:adobe:acrobat_reader_dc",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/a:adobe:acrobat_reader",
"vulnerable": true
}
],
"operator": "OR"
}
]
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2016-004469"
}
]
},
"credits": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/credits#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "kdot",
"sources": [
{
"db": "ZDI",
"id": "ZDI-16-493"
},
{
"db": "BID",
"id": "92635"
},
{
"db": "CNNVD",
"id": "CNNVD-201608-477"
}
],
"trust": 1.6
},
"cve": "CVE-2016-4270",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "nvd@nist.gov",
"availabilityImpact": "COMPLETE",
"baseScore": 10.0,
"confidentialityImpact": "COMPLETE",
"exploitabilityScore": 10.0,
"id": "CVE-2016-4270",
"impactScore": 10.0,
"integrityImpact": "COMPLETE",
"severity": "HIGH",
"trust": 1.8,
"vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
{
"acInsufInfo": null,
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "ZDI",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 8.6,
"id": "CVE-2016-4270",
"impactScore": 2.9,
"integrityImpact": "NONE",
"obtainAllPrivilege": null,
"obtainOtherPrivilege": null,
"obtainUserPrivilege": null,
"severity": "MEDIUM",
"trust": 0.7,
"userInteractionRequired": null,
"vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "VULHUB",
"availabilityImpact": "COMPLETE",
"baseScore": 10.0,
"confidentialityImpact": "COMPLETE",
"exploitabilityScore": 10.0,
"id": "VHN-93089",
"impactScore": 10.0,
"integrityImpact": "COMPLETE",
"severity": "HIGH",
"trust": 0.1,
"vectorString": "AV:N/AC:L/AU:N/C:C/I:C/A:C",
"version": "2.0"
}
],
"cvssV3": [
{
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"author": "nvd@nist.gov",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"exploitabilityScore": 3.9,
"id": "CVE-2016-4270",
"impactScore": 5.9,
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"trust": 1.8,
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
}
],
"severity": [
{
"author": "nvd@nist.gov",
"id": "CVE-2016-4270",
"trust": 1.0,
"value": "CRITICAL"
},
{
"author": "NVD",
"id": "CVE-2016-4270",
"trust": 0.8,
"value": "Critical"
},
{
"author": "ZDI",
"id": "CVE-2016-4270",
"trust": 0.7,
"value": "MEDIUM"
},
{
"author": "CNNVD",
"id": "CNNVD-201608-477",
"trust": 0.6,
"value": "CRITICAL"
},
{
"author": "VULHUB",
"id": "VHN-93089",
"trust": 0.1,
"value": "HIGH"
}
]
}
],
"sources": [
{
"db": "ZDI",
"id": "ZDI-16-493"
},
{
"db": "VULHUB",
"id": "VHN-93089"
},
{
"db": "JVNDB",
"id": "JVNDB-2016-004469"
},
{
"db": "CNNVD",
"id": "CNNVD-201608-477"
},
{
"db": "NVD",
"id": "CVE-2016-4270"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Adobe Reader and Acrobat before 11.0.17, Acrobat and Acrobat Reader DC Classic before 15.006.30198, and Acrobat and Acrobat Reader DC Continuous before 15.017.20050 on Windows and OS X allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-4191, CVE-2016-4192, CVE-2016-4193, CVE-2016-4194, CVE-2016-4195, CVE-2016-4196, CVE-2016-4197, CVE-2016-4198, CVE-2016-4199, CVE-2016-4200, CVE-2016-4201, CVE-2016-4202, CVE-2016-4203, CVE-2016-4204, CVE-2016-4205, CVE-2016-4206, CVE-2016-4207, CVE-2016-4208, CVE-2016-4211, CVE-2016-4212, CVE-2016-4213, CVE-2016-4214, CVE-2016-4250, CVE-2016-4251, CVE-2016-4252, CVE-2016-4254, CVE-2016-4265, CVE-2016-4266, CVE-2016-4267, CVE-2016-4268, and CVE-2016-4269. This vulnerability CVE-2016-4191 , CVE-2016-4192 , CVE-2016-4193 , CVE-2016-4194 , CVE-2016-4195 , CVE-2016-4196 , CVE-2016-4197 , CVE-2016-4198 , CVE-2016-4199 , CVE-2016-4200 , CVE-2016-4201 , CVE-2016-4202 , CVE-2016-4203 , CVE-2016-4204 , CVE-2016-4205 , CVE-2016-4206 , CVE-2016-4207 , CVE-2016-4208 , CVE-2016-4211 , CVE-2016-4212 , CVE-2016-4213 , CVE-2016-4214 , CVE-2016-4250 , CVE-2016-4251 , CVE-2016-4252 , CVE-2016-4254 , CVE-2016-4265 , CVE-2016-4266 , CVE-2016-4267 , CVE-2016-4268 ,and CVE-2016-4269 Is a different vulnerability.An attacker could execute arbitrary code or cause a denial of service ( Memory corruption ) There is a possibility of being put into a state. This vulnerability allows remote attackers to disclose sensitive information on vulnerable installations of Adobe Reader DC. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the handling of Font streams. A crafted Font stream can trigger a read past the end of an allocated buffer. Adobe Reader and Acrobat are prone to an memory-corruption vulnerability. Failed exploit attempts will likely result in denial-of-service conditions. are all products of Adobe (Adobe) in the United States. Adobe Reader is a free PDF file reader; Acrobat is a PDF file editing and conversion tool; Acrobat Reader DC is a set of tools for viewing, printing and annotating PDF. Security flaws exist in several Adobe products",
"sources": [
{
"db": "NVD",
"id": "CVE-2016-4270"
},
{
"db": "JVNDB",
"id": "JVNDB-2016-004469"
},
{
"db": "ZDI",
"id": "ZDI-16-493"
},
{
"db": "BID",
"id": "92635"
},
{
"db": "VULHUB",
"id": "VHN-93089"
}
],
"trust": 2.61
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "NVD",
"id": "CVE-2016-4270",
"trust": 3.5
},
{
"db": "ZDI",
"id": "ZDI-16-493",
"trust": 2.1
},
{
"db": "BID",
"id": "92635",
"trust": 2.0
},
{
"db": "JVNDB",
"id": "JVNDB-2016-004469",
"trust": 0.8
},
{
"db": "ZDI_CAN",
"id": "ZDI-CAN-3817",
"trust": 0.7
},
{
"db": "CNNVD",
"id": "CNNVD-201608-477",
"trust": 0.7
},
{
"db": "VULHUB",
"id": "VHN-93089",
"trust": 0.1
}
],
"sources": [
{
"db": "ZDI",
"id": "ZDI-16-493"
},
{
"db": "VULHUB",
"id": "VHN-93089"
},
{
"db": "BID",
"id": "92635"
},
{
"db": "JVNDB",
"id": "JVNDB-2016-004469"
},
{
"db": "CNNVD",
"id": "CNNVD-201608-477"
},
{
"db": "NVD",
"id": "CVE-2016-4270"
}
]
},
"id": "VAR-201608-0299",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "VULHUB",
"id": "VHN-93089"
}
],
"trust": 0.01
},
"last_update_date": "2025-04-13T23:29:28.368000Z",
"patch": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/patch#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"title": "APSB16-26",
"trust": 1.5,
"url": "https://helpx.adobe.com/security/products/acrobat/apsb16-26.html"
},
{
"title": "APSB16-26",
"trust": 0.8,
"url": "https://helpx.adobe.com/jp/security/products/acrobat/apsb16-26.html"
},
{
"title": "\u30a2\u30c9\u30d3 \u30b7\u30b9\u30c6\u30e0\u30ba\u793e Adobe Reader \u306e\u8106\u5f31\u6027\u306b\u95a2\u3059\u308b\u304a\u77e5\u3089\u305b",
"trust": 0.8,
"url": "http://www.fmworld.net/biz/common/adobe/20160714.html"
},
{
"title": "Multiple Adobe Product security vulnerabilities",
"trust": 0.6,
"url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=63796"
}
],
"sources": [
{
"db": "ZDI",
"id": "ZDI-16-493"
},
{
"db": "JVNDB",
"id": "JVNDB-2016-004469"
},
{
"db": "CNNVD",
"id": "CNNVD-201608-477"
}
]
},
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "CWE-119",
"trust": 1.9
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-93089"
},
{
"db": "JVNDB",
"id": "JVNDB-2016-004469"
},
{
"db": "NVD",
"id": "CVE-2016-4270"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 2.7,
"url": "https://helpx.adobe.com/security/products/acrobat/apsb16-26.html"
},
{
"trust": 1.7,
"url": "http://www.securityfocus.com/bid/92635"
},
{
"trust": 1.1,
"url": "http://www.zerodayinitiative.com/advisories/zdi-16-493"
},
{
"trust": 0.8,
"url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2016-4270"
},
{
"trust": 0.8,
"url": "http://www.ipa.go.jp/security/ciadr/vul/20160713-adobereader.html"
},
{
"trust": 0.8,
"url": "http://www.jpcert.or.jp/at/2016/at160030.html"
},
{
"trust": 0.8,
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2016-4270"
},
{
"trust": 0.8,
"url": "http://www.npa.go.jp/cyberpolice/topics/?seq=18716"
},
{
"trust": 0.3,
"url": "http://www.adobe.com/products/acrobat/"
},
{
"trust": 0.3,
"url": "http://www.adobe.com/products/reader/"
},
{
"trust": 0.3,
"url": "http://www.zerodayinitiative.com/advisories/zdi-16-493/"
}
],
"sources": [
{
"db": "ZDI",
"id": "ZDI-16-493"
},
{
"db": "VULHUB",
"id": "VHN-93089"
},
{
"db": "BID",
"id": "92635"
},
{
"db": "JVNDB",
"id": "JVNDB-2016-004469"
},
{
"db": "CNNVD",
"id": "CNNVD-201608-477"
},
{
"db": "NVD",
"id": "CVE-2016-4270"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "ZDI",
"id": "ZDI-16-493"
},
{
"db": "VULHUB",
"id": "VHN-93089"
},
{
"db": "BID",
"id": "92635"
},
{
"db": "JVNDB",
"id": "JVNDB-2016-004469"
},
{
"db": "CNNVD",
"id": "CNNVD-201608-477"
},
{
"db": "NVD",
"id": "CVE-2016-4270"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2016-08-24T00:00:00",
"db": "ZDI",
"id": "ZDI-16-493"
},
{
"date": "2016-08-26T00:00:00",
"db": "VULHUB",
"id": "VHN-93089"
},
{
"date": "2016-08-23T00:00:00",
"db": "BID",
"id": "92635"
},
{
"date": "2016-08-30T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2016-004469"
},
{
"date": "2016-08-26T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201608-477"
},
{
"date": "2016-08-26T19:59:06.867000",
"db": "NVD",
"id": "CVE-2016-4270"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2016-08-24T00:00:00",
"db": "ZDI",
"id": "ZDI-16-493"
},
{
"date": "2016-11-28T00:00:00",
"db": "VULHUB",
"id": "VHN-93089"
},
{
"date": "2016-08-23T00:00:00",
"db": "BID",
"id": "92635"
},
{
"date": "2016-08-30T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2016-004469"
},
{
"date": "2016-08-29T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201608-477"
},
{
"date": "2025-04-12T10:46:40.837000",
"db": "NVD",
"id": "CVE-2016-4270"
}
]
},
"threat_type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/threat_type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "remote",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201608-477"
}
],
"trust": 0.6
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Windows and Mac OS X Run on Adobe Reader and Acrobat Vulnerable to arbitrary code execution",
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2016-004469"
}
],
"trust": 0.8
},
"type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "buffer overflow",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201608-477"
}
],
"trust": 0.6
}
}
VAR-201511-0276
Vulnerability from variot - Updated: 2025-04-13 23:26Adobe Reader and Acrobat 10.x before 10.1.16 and 11.x before 11.0.13, Acrobat and Acrobat Reader DC Classic before 2015.006.30094, and Acrobat and Acrobat Reader DC Continuous before 2015.009.20069 on Windows and OS X allow attackers to execute arbitrary code or cause a denial of service (out-of-bounds read and memory corruption) via a crafted CMAP table in a PDF document, a different vulnerability than CVE-2015-6685, CVE-2015-6686, CVE-2015-6693, CVE-2015-6694, CVE-2015-6695, and CVE-2015-7622. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the way CMAP tables are parsed. A specially crafted CMAP table embedded in a PDF file can force Adobe Acrobat Reader to read memory past the end of an allocated object. An attacker could leverage this vulnerability to execute arbitrary code under the context of the current process. Failed exploit attempts will likely cause a denial-of-service condition. Adobe Reader, etc. are all products of Adobe (Adobe) in the United States. Adobe Reader is a free PDF file reader; Acrobat is a PDF file editing and conversion tool; Acrobat Reader DC is a set of tools for viewing, printing and annotating PDF. Classic and Continuous are two update mechanisms provided by Acrobat Reader DC Product Download Center. Security flaws exist in several Adobe products. 30060 and earlier, Acrobat XI Desktop 11.0.12 and earlier, Reader XI Desktop 11.0.12 and earlier, Acrobat X Desktop 10.1.15 and earlier, Reader X Desktop 10.1.15 and earlier
Show details on source website{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"configurations": {
"@id": "https://www.variotdbs.pl/ref/configurations"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-201511-0276",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "acrobat reader dc",
"scope": "gte",
"trust": 1.0,
"vendor": "adobe",
"version": "15.008.20082"
},
{
"model": "acrobat dc",
"scope": "gte",
"trust": 1.0,
"vendor": "adobe",
"version": "15.008.20082"
},
{
"model": "acrobat dc",
"scope": "gte",
"trust": 1.0,
"vendor": "adobe",
"version": "15.006.30060"
},
{
"model": "acrobat reader dc",
"scope": "lt",
"trust": 1.0,
"vendor": "adobe",
"version": "15.009.20069"
},
{
"model": "acrobat dc",
"scope": "lt",
"trust": 1.0,
"vendor": "adobe",
"version": "15.006.30094"
},
{
"model": "acrobat",
"scope": "gte",
"trust": 1.0,
"vendor": "adobe",
"version": "10.0"
},
{
"model": "acrobat reader",
"scope": "lte",
"trust": 1.0,
"vendor": "adobe",
"version": "10.1.15"
},
{
"model": "acrobat reader",
"scope": "gte",
"trust": 1.0,
"vendor": "adobe",
"version": "10.0"
},
{
"model": "acrobat reader",
"scope": "lte",
"trust": 1.0,
"vendor": "adobe",
"version": "11.0.12"
},
{
"model": "acrobat",
"scope": "lte",
"trust": 1.0,
"vendor": "adobe",
"version": "10.1.15"
},
{
"model": "acrobat",
"scope": "lte",
"trust": 1.0,
"vendor": "adobe",
"version": "11.0.12"
},
{
"model": "acrobat reader dc",
"scope": "lt",
"trust": 1.0,
"vendor": "adobe",
"version": "15.006.30094"
},
{
"model": "acrobat",
"scope": "gte",
"trust": 1.0,
"vendor": "adobe",
"version": "11.0.0"
},
{
"model": "acrobat dc",
"scope": "lt",
"trust": 1.0,
"vendor": "adobe",
"version": "15.009.20069"
},
{
"model": "acrobat reader",
"scope": "gte",
"trust": 1.0,
"vendor": "adobe",
"version": "11.0.0"
},
{
"model": "acrobat reader dc",
"scope": "gte",
"trust": 1.0,
"vendor": "adobe",
"version": "15.006.30060"
},
{
"model": "acrobat dc",
"scope": "lt",
"trust": 0.8,
"vendor": "adobe",
"version": "(windows/macintosh)"
},
{
"model": "acrobat reader dc",
"scope": "lt",
"trust": 0.8,
"vendor": "adobe",
"version": "(windows/macintosh)"
},
{
"model": "acrobat reader dc",
"scope": "eq",
"trust": 0.8,
"vendor": "adobe",
"version": "classic 2015.006.30094"
},
{
"model": "acrobat",
"scope": "lt",
"trust": 0.8,
"vendor": "adobe",
"version": "11.x (windows/macintosh)"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.8,
"vendor": "adobe",
"version": "xi desktop 11.0.13"
},
{
"model": "reader",
"scope": "lt",
"trust": 0.8,
"vendor": "adobe",
"version": "11.x (windows/macintosh)"
},
{
"model": "acrobat dc",
"scope": "eq",
"trust": 0.8,
"vendor": "adobe",
"version": "continuous 2015.009.20069"
},
{
"model": "acrobat",
"scope": "lt",
"trust": 0.8,
"vendor": "adobe",
"version": "10.x (windows/macintosh)"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.8,
"vendor": "adobe",
"version": "xi desktop 11.0.13"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.8,
"vendor": "adobe",
"version": "x desktop 10.1.16"
},
{
"model": "acrobat dc",
"scope": "eq",
"trust": 0.8,
"vendor": "adobe",
"version": "classic 2015.006.30094"
},
{
"model": "reader",
"scope": "lt",
"trust": 0.8,
"vendor": "adobe",
"version": "10.x (windows/macintosh)"
},
{
"model": "acrobat reader dc",
"scope": "eq",
"trust": 0.8,
"vendor": "adobe",
"version": "continuous 2015.009.20069"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.8,
"vendor": "adobe",
"version": "x desktop 10.1.16"
},
{
"model": "acrobat reader dc",
"scope": null,
"trust": 0.7,
"vendor": "adobe",
"version": null
},
{
"model": "acrobat reader",
"scope": "eq",
"trust": 0.6,
"vendor": "adobe",
"version": "11.0.8"
},
{
"model": "acrobat reader",
"scope": "eq",
"trust": 0.6,
"vendor": "adobe",
"version": "11.0.10"
},
{
"model": "acrobat reader",
"scope": "eq",
"trust": 0.6,
"vendor": "adobe",
"version": "11.0.11"
},
{
"model": "acrobat reader",
"scope": "eq",
"trust": 0.6,
"vendor": "adobe",
"version": "10.1.14"
},
{
"model": "acrobat reader",
"scope": "eq",
"trust": 0.6,
"vendor": "adobe",
"version": "11.0.7"
},
{
"model": "acrobat reader",
"scope": "eq",
"trust": 0.6,
"vendor": "adobe",
"version": "10.1.12"
},
{
"model": "acrobat reader",
"scope": "eq",
"trust": 0.6,
"vendor": "adobe",
"version": "10.1.10"
},
{
"model": "acrobat reader",
"scope": "eq",
"trust": 0.6,
"vendor": "adobe",
"version": "10.1.11"
},
{
"model": "acrobat reader",
"scope": "eq",
"trust": 0.6,
"vendor": "adobe",
"version": "10.1.13"
},
{
"model": "acrobat reader",
"scope": "eq",
"trust": 0.6,
"vendor": "adobe",
"version": "11.0.12"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1.14"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1.9"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1.1"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1.13"
},
{
"model": "acrobat reader dc",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "2015.8.20082"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.10"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.0"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1.2"
},
{
"model": "acrobat dc",
"scope": "ne",
"trust": 0.3,
"vendor": "adobe",
"version": "2015.006.30094"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1.15"
},
{
"model": "acrobat reader dc",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "2015.6.30060"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.0.3"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1.10"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.3"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.0.13"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.6"
},
{
"model": "acrobat",
"scope": "ne",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.13"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0"
},
{
"model": "acrobat reader dc",
"scope": "ne",
"trust": 0.3,
"vendor": "adobe",
"version": "2015.006.30094"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.10"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.4"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1.3"
},
{
"model": "acrobat",
"scope": "ne",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1.16"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.0.2"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.0.1"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.11"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1.4"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1.6"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1.11"
},
{
"model": "reader",
"scope": "ne",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.13"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.7"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1.14"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1.3"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1.1"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1"
},
{
"model": "reader",
"scope": "ne",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1.16"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.0.2"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1.5"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.0"
},
{
"model": "acrobat dc",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "2015.007.20033"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1.12"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.1"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1.2"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1.13"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1.4"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1.8"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1.11"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.0.3"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.2"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.12"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.08"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.9"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.7"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.6"
},
{
"model": "acrobat dc",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "2015.006.30060"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.05"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1.10"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.3"
},
{
"model": "acrobat dc",
"scope": "ne",
"trust": 0.3,
"vendor": "adobe",
"version": "2015.009.20069"
},
{
"model": "acrobat dc",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "2015.006.30033"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1.12"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.1"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.4"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1.9"
},
{
"model": "acrobat reader dc",
"scope": "ne",
"trust": 0.3,
"vendor": "adobe",
"version": "2015.009.20069"
},
{
"model": "acrobat reader dc",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "2015.006.30033"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.12"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.08"
},
{
"model": "acrobat dc",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "2015.008.20082"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1.7"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.0.1"
},
{
"model": "acrobat reader dc",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "2015.007.20033"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.09"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.11"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1.15"
}
],
"sources": [
{
"db": "ZDI",
"id": "ZDI-15-534"
},
{
"db": "BID",
"id": "77404"
},
{
"db": "JVNDB",
"id": "JVNDB-2015-005722"
},
{
"db": "CNNVD",
"id": "CNNVD-201511-009"
},
{
"db": "NVD",
"id": "CVE-2015-7650"
}
]
},
"configurations": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/configurations#",
"children": {
"@container": "@list"
},
"cpe_match": {
"@container": "@list"
},
"data": {
"@container": "@list"
},
"nodes": {
"@container": "@list"
}
},
"data": [
{
"CVE_data_version": "4.0",
"nodes": [
{
"cpe_match": [
{
"cpe22Uri": "cpe:/a:adobe:acrobat",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/a:adobe:acrobat_dc",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/a:adobe:acrobat_reader_dc",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/a:adobe:acrobat_reader",
"vulnerable": true
}
],
"operator": "OR"
}
]
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2015-005722"
}
]
},
"credits": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/credits#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "kdot",
"sources": [
{
"db": "ZDI",
"id": "ZDI-15-534"
},
{
"db": "BID",
"id": "77404"
},
{
"db": "CNNVD",
"id": "CNNVD-201511-009"
}
],
"trust": 1.6
},
"cve": "CVE-2015-7650",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [
{
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "nvd@nist.gov",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 8.6,
"id": "CVE-2015-7650",
"impactScore": 6.4,
"integrityImpact": "PARTIAL",
"severity": "MEDIUM",
"trust": 1.7,
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
{
"acInsufInfo": null,
"accessComplexity": "Medium",
"accessVector": "Network",
"authentication": "None",
"author": "NVD",
"availabilityImpact": "Complete",
"baseScore": 9.3,
"confidentialityImpact": "Complete",
"exploitabilityScore": null,
"id": "CVE-2015-7650",
"impactScore": null,
"integrityImpact": "Complete",
"obtainAllPrivilege": null,
"obtainOtherPrivilege": null,
"obtainUserPrivilege": null,
"severity": "High",
"trust": 0.8,
"userInteractionRequired": null,
"vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
{
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "VULHUB",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 8.6,
"id": "VHN-85611",
"impactScore": 6.4,
"integrityImpact": "PARTIAL",
"severity": "MEDIUM",
"trust": 0.1,
"vectorString": "AV:N/AC:M/AU:N/C:P/I:P/A:P",
"version": "2.0"
}
],
"cvssV3": [],
"severity": [
{
"author": "nvd@nist.gov",
"id": "CVE-2015-7650",
"trust": 1.0,
"value": "MEDIUM"
},
{
"author": "NVD",
"id": "CVE-2015-7650",
"trust": 0.8,
"value": "High"
},
{
"author": "ZDI",
"id": "CVE-2015-7650",
"trust": 0.7,
"value": "MEDIUM"
},
{
"author": "CNNVD",
"id": "CNNVD-201511-009",
"trust": 0.6,
"value": "CRITICAL"
},
{
"author": "VULHUB",
"id": "VHN-85611",
"trust": 0.1,
"value": "MEDIUM"
}
]
}
],
"sources": [
{
"db": "ZDI",
"id": "ZDI-15-534"
},
{
"db": "VULHUB",
"id": "VHN-85611"
},
{
"db": "JVNDB",
"id": "JVNDB-2015-005722"
},
{
"db": "CNNVD",
"id": "CNNVD-201511-009"
},
{
"db": "NVD",
"id": "CVE-2015-7650"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Adobe Reader and Acrobat 10.x before 10.1.16 and 11.x before 11.0.13, Acrobat and Acrobat Reader DC Classic before 2015.006.30094, and Acrobat and Acrobat Reader DC Continuous before 2015.009.20069 on Windows and OS X allow attackers to execute arbitrary code or cause a denial of service (out-of-bounds read and memory corruption) via a crafted CMAP table in a PDF document, a different vulnerability than CVE-2015-6685, CVE-2015-6686, CVE-2015-6693, CVE-2015-6694, CVE-2015-6695, and CVE-2015-7622. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the way CMAP tables are parsed. A specially crafted CMAP table embedded in a PDF file can force Adobe Acrobat Reader to read memory past the end of an allocated object. An attacker could leverage this vulnerability to execute arbitrary code under the context of the current process. Failed exploit attempts will likely cause a denial-of-service condition. Adobe Reader, etc. are all products of Adobe (Adobe) in the United States. Adobe Reader is a free PDF file reader; Acrobat is a PDF file editing and conversion tool; Acrobat Reader DC is a set of tools for viewing, printing and annotating PDF. Classic and Continuous are two update mechanisms provided by Acrobat Reader DC Product Download Center. Security flaws exist in several Adobe products. 30060 and earlier, Acrobat XI Desktop 11.0.12 and earlier, Reader XI Desktop 11.0.12 and earlier, Acrobat X Desktop 10.1.15 and earlier, Reader X Desktop 10.1.15 and earlier",
"sources": [
{
"db": "NVD",
"id": "CVE-2015-7650"
},
{
"db": "JVNDB",
"id": "JVNDB-2015-005722"
},
{
"db": "ZDI",
"id": "ZDI-15-534"
},
{
"db": "BID",
"id": "77404"
},
{
"db": "VULHUB",
"id": "VHN-85611"
}
],
"trust": 2.61
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "NVD",
"id": "CVE-2015-7650",
"trust": 3.5
},
{
"db": "ZDI",
"id": "ZDI-15-534",
"trust": 2.7
},
{
"db": "JVNDB",
"id": "JVNDB-2015-005722",
"trust": 0.8
},
{
"db": "ZDI_CAN",
"id": "ZDI-CAN-3334",
"trust": 0.7
},
{
"db": "CNNVD",
"id": "CNNVD-201511-009",
"trust": 0.7
},
{
"db": "BID",
"id": "77404",
"trust": 0.4
},
{
"db": "VULHUB",
"id": "VHN-85611",
"trust": 0.1
}
],
"sources": [
{
"db": "ZDI",
"id": "ZDI-15-534"
},
{
"db": "VULHUB",
"id": "VHN-85611"
},
{
"db": "BID",
"id": "77404"
},
{
"db": "JVNDB",
"id": "JVNDB-2015-005722"
},
{
"db": "CNNVD",
"id": "CNNVD-201511-009"
},
{
"db": "NVD",
"id": "CVE-2015-7650"
}
]
},
"id": "VAR-201511-0276",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "VULHUB",
"id": "VHN-85611"
}
],
"trust": 0.01
},
"last_update_date": "2025-04-13T23:26:40.472000Z",
"patch": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/patch#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"title": "APSB15-24",
"trust": 1.5,
"url": "https://helpx.adobe.com/security/products/acrobat/apsb15-24.html"
},
{
"title": "APSB15-24",
"trust": 0.8,
"url": "https://helpx.adobe.com/jp/security/products/reader/apsb15-24.html"
},
{
"title": "\u30a2\u30c9\u30d3 \u30b7\u30b9\u30c6\u30e0\u30ba\u793e Adobe Reader \u306e\u8106\u5f31\u6027\u306b\u95a2\u3059\u308b\u304a\u77e5\u3089\u305b",
"trust": 0.8,
"url": "http://www.fmworld.net/biz/common/adobe/20151015.html"
},
{
"title": "Multiple Adobe Product Buffer Overflow Vulnerability Fix",
"trust": 0.6,
"url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=58541"
}
],
"sources": [
{
"db": "ZDI",
"id": "ZDI-15-534"
},
{
"db": "JVNDB",
"id": "JVNDB-2015-005722"
},
{
"db": "CNNVD",
"id": "CNNVD-201511-009"
}
]
},
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "CWE-119",
"trust": 1.9
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-85611"
},
{
"db": "JVNDB",
"id": "JVNDB-2015-005722"
},
{
"db": "NVD",
"id": "CVE-2015-7650"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 2.7,
"url": "https://helpx.adobe.com/security/products/acrobat/apsb15-24.html"
},
{
"trust": 1.7,
"url": "http://www.zerodayinitiative.com/advisories/zdi-15-534"
},
{
"trust": 0.8,
"url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-7650"
},
{
"trust": 0.8,
"url": "http://www.ipa.go.jp/security/ciadr/vul/20151014-adobereader.html"
},
{
"trust": 0.8,
"url": "http://www.jpcert.or.jp/at/2015/at150035.html"
},
{
"trust": 0.8,
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2015-7650"
},
{
"trust": 0.8,
"url": "http://www.npa.go.jp/cyberpolice/topics/?seq=17022"
},
{
"trust": 0.3,
"url": "http://www.adobe.com"
},
{
"trust": 0.3,
"url": "http://www.zerodayinitiative.com/advisories/zdi-15-534/"
}
],
"sources": [
{
"db": "ZDI",
"id": "ZDI-15-534"
},
{
"db": "VULHUB",
"id": "VHN-85611"
},
{
"db": "BID",
"id": "77404"
},
{
"db": "JVNDB",
"id": "JVNDB-2015-005722"
},
{
"db": "CNNVD",
"id": "CNNVD-201511-009"
},
{
"db": "NVD",
"id": "CVE-2015-7650"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "ZDI",
"id": "ZDI-15-534"
},
{
"db": "VULHUB",
"id": "VHN-85611"
},
{
"db": "BID",
"id": "77404"
},
{
"db": "JVNDB",
"id": "JVNDB-2015-005722"
},
{
"db": "CNNVD",
"id": "CNNVD-201511-009"
},
{
"db": "NVD",
"id": "CVE-2015-7650"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2015-11-02T00:00:00",
"db": "ZDI",
"id": "ZDI-15-534"
},
{
"date": "2015-11-04T00:00:00",
"db": "VULHUB",
"id": "VHN-85611"
},
{
"date": "2015-11-02T00:00:00",
"db": "BID",
"id": "77404"
},
{
"date": "2015-11-05T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2015-005722"
},
{
"date": "2015-11-03T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201511-009"
},
{
"date": "2015-11-04T03:59:17.517000",
"db": "NVD",
"id": "CVE-2015-7650"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2015-11-02T00:00:00",
"db": "ZDI",
"id": "ZDI-15-534"
},
{
"date": "2020-05-18T00:00:00",
"db": "VULHUB",
"id": "VHN-85611"
},
{
"date": "2015-11-02T00:00:00",
"db": "BID",
"id": "77404"
},
{
"date": "2015-11-05T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2015-005722"
},
{
"date": "2020-05-19T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201511-009"
},
{
"date": "2025-04-12T10:46:40.837000",
"db": "NVD",
"id": "CVE-2015-7650"
}
]
},
"threat_type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/threat_type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "remote",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201511-009"
}
],
"trust": 0.6
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Windows and Mac OS X Run on Adobe Reader and Acrobat Vulnerable to arbitrary code execution",
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2015-005722"
}
],
"trust": 0.8
},
"type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "buffer error",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201511-009"
}
],
"trust": 0.6
}
}
VAR-201608-0298
Vulnerability from variot - Updated: 2025-04-13 23:25Adobe Reader and Acrobat before 11.0.17, Acrobat and Acrobat Reader DC Classic before 15.006.30198, and Acrobat and Acrobat Reader DC Continuous before 15.017.20050 on Windows and OS X allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-4191, CVE-2016-4192, CVE-2016-4193, CVE-2016-4194, CVE-2016-4195, CVE-2016-4196, CVE-2016-4197, CVE-2016-4198, CVE-2016-4199, CVE-2016-4200, CVE-2016-4201, CVE-2016-4202, CVE-2016-4203, CVE-2016-4204, CVE-2016-4205, CVE-2016-4206, CVE-2016-4207, CVE-2016-4208, CVE-2016-4211, CVE-2016-4212, CVE-2016-4213, CVE-2016-4214, CVE-2016-4250, CVE-2016-4251, CVE-2016-4252, CVE-2016-4254, CVE-2016-4265, CVE-2016-4266, CVE-2016-4267, CVE-2016-4268, and CVE-2016-4270. This vulnerability CVE-2016-4191 , CVE-2016-4192 , CVE-2016-4193 , CVE-2016-4194 , CVE-2016-4195 , CVE-2016-4196 , CVE-2016-4197 , CVE-2016-4198 , CVE-2016-4199 , CVE-2016-4200 , CVE-2016-4201 , CVE-2016-4202 , CVE-2016-4203 , CVE-2016-4204 , CVE-2016-4205 , CVE-2016-4206 , CVE-2016-4207 , CVE-2016-4208 , CVE-2016-4211 , CVE-2016-4212 , CVE-2016-4213 , CVE-2016-4214 , CVE-2016-4250 , CVE-2016-4251 , CVE-2016-4252 , CVE-2016-4254 , CVE-2016-4265 , CVE-2016-4266 , CVE-2016-4267 , CVE-2016-4268 ,and CVE-2016-4270 Is a different vulnerability.An attacker could execute arbitrary code or cause a denial of service ( Memory corruption ) There is a possibility of being put into a state. This vulnerability allows remote attackers to disclose sensitive information on vulnerable installations of Adobe Reader DC. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the handling of FlateDecode streams. A crafted FlateDecode stream can trigger a read past the end of an allocated buffer. Failed exploit attempts will likely cause a denial-of-service condition. Adobe Reader, etc. are all products of Adobe (Adobe) in the United States. Adobe Reader is a free PDF file reader; Acrobat is a PDF file editing and conversion tool; Acrobat Reader DC is a set of tools for viewing, printing and annotating PDF. Security flaws exist in several Adobe products
Show details on source website{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"configurations": {
"@id": "https://www.variotdbs.pl/ref/configurations"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-201608-0298",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "acrobat dc",
"scope": "lte",
"trust": 1.0,
"vendor": "adobe",
"version": "15.006.30174"
},
{
"model": "acrobat dc",
"scope": "lte",
"trust": 1.0,
"vendor": "adobe",
"version": "15.016.20045"
},
{
"model": "acrobat reader dc",
"scope": "lte",
"trust": 1.0,
"vendor": "adobe",
"version": "15.016.20045"
},
{
"model": "acrobat reader dc",
"scope": "lte",
"trust": 1.0,
"vendor": "adobe",
"version": "15.006.30174"
},
{
"model": "acrobat",
"scope": "lte",
"trust": 1.0,
"vendor": "adobe",
"version": "11.0.16"
},
{
"model": "reader",
"scope": "lte",
"trust": 1.0,
"vendor": "adobe",
"version": "11.0.16"
},
{
"model": "acrobat",
"scope": "lt",
"trust": 0.8,
"vendor": "adobe",
"version": "xi desktop 11.0.17 (windows/macintosh)"
},
{
"model": "acrobat dc",
"scope": "lt",
"trust": 0.8,
"vendor": "adobe",
"version": "classic 15.006.30198 (windows/macintosh)"
},
{
"model": "acrobat dc",
"scope": "lt",
"trust": 0.8,
"vendor": "adobe",
"version": "continuous track 15.017.20050 (windows/macintosh)"
},
{
"model": "acrobat reader dc",
"scope": "lt",
"trust": 0.8,
"vendor": "adobe",
"version": "classic 15.006.30198 (windows/macintosh)"
},
{
"model": "acrobat reader dc",
"scope": "lt",
"trust": 0.8,
"vendor": "adobe",
"version": "continuous track 15.017.20050 (windows/macintosh)"
},
{
"model": "reader",
"scope": "lt",
"trust": 0.8,
"vendor": "adobe",
"version": "xi desktop 11.0.17 (windows/macintosh)"
},
{
"model": "acrobat reader dc",
"scope": null,
"trust": 0.7,
"vendor": "adobe",
"version": null
},
{
"model": "mac os x",
"scope": null,
"trust": 0.6,
"vendor": "apple",
"version": null
},
{
"model": "acrobat reader dc",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "15.6.30174"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.13"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.6"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.09"
},
{
"model": "acrobat dc",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "15.6.30097"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.3"
},
{
"model": "acrobat reader dc",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "15.6.30172"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0"
},
{
"model": "acrobat reader dc",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "15.16.20045"
},
{
"model": "acrobat reader dc",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "15.010.20056"
},
{
"model": "acrobat dc",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "15.10.20059"
},
{
"model": "reader",
"scope": "ne",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.17"
},
{
"model": "acrobat reader dc",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "15.6.30121"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.10"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.4"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.14"
},
{
"model": "acrobat reader dc",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "15.006.30119"
},
{
"model": "acrobat reader dc",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "15.16.20039"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.1"
},
{
"model": "acrobat reader dc",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "15.9.20077"
},
{
"model": "acrobat reader dc",
"scope": "ne",
"trust": 0.3,
"vendor": "adobe",
"version": "15.17.20050"
},
{
"model": "acrobat dc",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "15.10.20060"
},
{
"model": "acrobat reader dc",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "15.6.30097"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.16"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.4"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.10"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.14"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.1"
},
{
"model": "acrobat reader dc",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "15.10.20059"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.12"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.15"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.08"
},
{
"model": "acrobat dc",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "15.6.30174"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.16"
},
{
"model": "acrobat dc",
"scope": "ne",
"trust": 0.3,
"vendor": "adobe",
"version": "15.6.30198"
},
{
"model": "acrobat dc",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "15.6.30172"
},
{
"model": "acrobat reader dc",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "15.10.20060"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.2"
},
{
"model": "acrobat dc",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "15.16.20045"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.11"
},
{
"model": "acrobat dc",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "15.010.20056"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.7"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.9"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.13"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.15"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.12"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.08"
},
{
"model": "acrobat dc",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "15.6.30121"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.09"
},
{
"model": "acrobat dc",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "15.9.20077"
},
{
"model": "acrobat dc",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "15.006.30119"
},
{
"model": "acrobat dc",
"scope": "ne",
"trust": 0.3,
"vendor": "adobe",
"version": "15.17.20050"
},
{
"model": "acrobat dc",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "15.16.20039"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.6"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.11"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.05"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0"
},
{
"model": "acrobat reader dc",
"scope": "ne",
"trust": 0.3,
"vendor": "adobe",
"version": "15.6.30198"
},
{
"model": "acrobat",
"scope": "ne",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.17"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.3"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.7"
}
],
"sources": [
{
"db": "ZDI",
"id": "ZDI-16-491"
},
{
"db": "BID",
"id": "92641"
},
{
"db": "JVNDB",
"id": "JVNDB-2016-004468"
},
{
"db": "CNNVD",
"id": "CNNVD-201608-479"
},
{
"db": "NVD",
"id": "CVE-2016-4269"
}
]
},
"configurations": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/configurations#",
"children": {
"@container": "@list"
},
"cpe_match": {
"@container": "@list"
},
"data": {
"@container": "@list"
},
"nodes": {
"@container": "@list"
}
},
"data": [
{
"CVE_data_version": "4.0",
"nodes": [
{
"cpe_match": [
{
"cpe22Uri": "cpe:/a:adobe:acrobat",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/a:adobe:acrobat_dc",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/a:adobe:acrobat_reader_dc",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/a:adobe:acrobat_reader",
"vulnerable": true
}
],
"operator": "OR"
}
]
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2016-004468"
}
]
},
"credits": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/credits#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Steven Seeley of Source Incite.",
"sources": [
{
"db": "BID",
"id": "92641"
},
{
"db": "CNNVD",
"id": "CNNVD-201608-479"
}
],
"trust": 0.9
},
"cve": "CVE-2016-4269",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "nvd@nist.gov",
"availabilityImpact": "COMPLETE",
"baseScore": 10.0,
"confidentialityImpact": "COMPLETE",
"exploitabilityScore": 10.0,
"id": "CVE-2016-4269",
"impactScore": 10.0,
"integrityImpact": "COMPLETE",
"severity": "HIGH",
"trust": 1.8,
"vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
{
"acInsufInfo": null,
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "ZDI",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 8.6,
"id": "CVE-2016-4269",
"impactScore": 2.9,
"integrityImpact": "NONE",
"obtainAllPrivilege": null,
"obtainOtherPrivilege": null,
"obtainUserPrivilege": null,
"severity": "MEDIUM",
"trust": 0.7,
"userInteractionRequired": null,
"vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "VULHUB",
"availabilityImpact": "COMPLETE",
"baseScore": 10.0,
"confidentialityImpact": "COMPLETE",
"exploitabilityScore": 10.0,
"id": "VHN-93088",
"impactScore": 10.0,
"integrityImpact": "COMPLETE",
"severity": "HIGH",
"trust": 0.1,
"vectorString": "AV:N/AC:L/AU:N/C:C/I:C/A:C",
"version": "2.0"
}
],
"cvssV3": [
{
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"author": "nvd@nist.gov",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"exploitabilityScore": 3.9,
"id": "CVE-2016-4269",
"impactScore": 5.9,
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"trust": 1.8,
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
}
],
"severity": [
{
"author": "nvd@nist.gov",
"id": "CVE-2016-4269",
"trust": 1.0,
"value": "CRITICAL"
},
{
"author": "NVD",
"id": "CVE-2016-4269",
"trust": 0.8,
"value": "Critical"
},
{
"author": "ZDI",
"id": "CVE-2016-4269",
"trust": 0.7,
"value": "MEDIUM"
},
{
"author": "CNNVD",
"id": "CNNVD-201608-479",
"trust": 0.6,
"value": "CRITICAL"
},
{
"author": "VULHUB",
"id": "VHN-93088",
"trust": 0.1,
"value": "HIGH"
}
]
}
],
"sources": [
{
"db": "ZDI",
"id": "ZDI-16-491"
},
{
"db": "VULHUB",
"id": "VHN-93088"
},
{
"db": "JVNDB",
"id": "JVNDB-2016-004468"
},
{
"db": "CNNVD",
"id": "CNNVD-201608-479"
},
{
"db": "NVD",
"id": "CVE-2016-4269"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Adobe Reader and Acrobat before 11.0.17, Acrobat and Acrobat Reader DC Classic before 15.006.30198, and Acrobat and Acrobat Reader DC Continuous before 15.017.20050 on Windows and OS X allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-4191, CVE-2016-4192, CVE-2016-4193, CVE-2016-4194, CVE-2016-4195, CVE-2016-4196, CVE-2016-4197, CVE-2016-4198, CVE-2016-4199, CVE-2016-4200, CVE-2016-4201, CVE-2016-4202, CVE-2016-4203, CVE-2016-4204, CVE-2016-4205, CVE-2016-4206, CVE-2016-4207, CVE-2016-4208, CVE-2016-4211, CVE-2016-4212, CVE-2016-4213, CVE-2016-4214, CVE-2016-4250, CVE-2016-4251, CVE-2016-4252, CVE-2016-4254, CVE-2016-4265, CVE-2016-4266, CVE-2016-4267, CVE-2016-4268, and CVE-2016-4270. This vulnerability CVE-2016-4191 , CVE-2016-4192 , CVE-2016-4193 , CVE-2016-4194 , CVE-2016-4195 , CVE-2016-4196 , CVE-2016-4197 , CVE-2016-4198 , CVE-2016-4199 , CVE-2016-4200 , CVE-2016-4201 , CVE-2016-4202 , CVE-2016-4203 , CVE-2016-4204 , CVE-2016-4205 , CVE-2016-4206 , CVE-2016-4207 , CVE-2016-4208 , CVE-2016-4211 , CVE-2016-4212 , CVE-2016-4213 , CVE-2016-4214 , CVE-2016-4250 , CVE-2016-4251 , CVE-2016-4252 , CVE-2016-4254 , CVE-2016-4265 , CVE-2016-4266 , CVE-2016-4267 , CVE-2016-4268 ,and CVE-2016-4270 Is a different vulnerability.An attacker could execute arbitrary code or cause a denial of service ( Memory corruption ) There is a possibility of being put into a state. This vulnerability allows remote attackers to disclose sensitive information on vulnerable installations of Adobe Reader DC. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the handling of FlateDecode streams. A crafted FlateDecode stream can trigger a read past the end of an allocated buffer. Failed exploit attempts will likely cause a denial-of-service condition. Adobe Reader, etc. are all products of Adobe (Adobe) in the United States. Adobe Reader is a free PDF file reader; Acrobat is a PDF file editing and conversion tool; Acrobat Reader DC is a set of tools for viewing, printing and annotating PDF. Security flaws exist in several Adobe products",
"sources": [
{
"db": "NVD",
"id": "CVE-2016-4269"
},
{
"db": "JVNDB",
"id": "JVNDB-2016-004468"
},
{
"db": "ZDI",
"id": "ZDI-16-491"
},
{
"db": "BID",
"id": "92641"
},
{
"db": "VULHUB",
"id": "VHN-93088"
}
],
"trust": 2.61
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "NVD",
"id": "CVE-2016-4269",
"trust": 3.5
},
{
"db": "ZDI",
"id": "ZDI-16-491",
"trust": 2.1
},
{
"db": "BID",
"id": "92641",
"trust": 2.0
},
{
"db": "JVNDB",
"id": "JVNDB-2016-004468",
"trust": 0.8
},
{
"db": "ZDI_CAN",
"id": "ZDI-CAN-3830",
"trust": 0.7
},
{
"db": "CNNVD",
"id": "CNNVD-201608-479",
"trust": 0.7
},
{
"db": "VULHUB",
"id": "VHN-93088",
"trust": 0.1
}
],
"sources": [
{
"db": "ZDI",
"id": "ZDI-16-491"
},
{
"db": "VULHUB",
"id": "VHN-93088"
},
{
"db": "BID",
"id": "92641"
},
{
"db": "JVNDB",
"id": "JVNDB-2016-004468"
},
{
"db": "CNNVD",
"id": "CNNVD-201608-479"
},
{
"db": "NVD",
"id": "CVE-2016-4269"
}
]
},
"id": "VAR-201608-0298",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "VULHUB",
"id": "VHN-93088"
}
],
"trust": 0.01
},
"last_update_date": "2025-04-13T23:25:08.971000Z",
"patch": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/patch#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"title": "APSB16-26",
"trust": 1.5,
"url": "https://helpx.adobe.com/security/products/acrobat/apsb16-26.html"
},
{
"title": "APSB16-26",
"trust": 0.8,
"url": "https://helpx.adobe.com/jp/security/products/acrobat/apsb16-26.html"
},
{
"title": "\u30a2\u30c9\u30d3 \u30b7\u30b9\u30c6\u30e0\u30ba\u793e Adobe Reader \u306e\u8106\u5f31\u6027\u306b\u95a2\u3059\u308b\u304a\u77e5\u3089\u305b",
"trust": 0.8,
"url": "http://www.fmworld.net/biz/common/adobe/20160714.html"
},
{
"title": "Multiple Adobe Product security vulnerabilities",
"trust": 0.6,
"url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=63798"
}
],
"sources": [
{
"db": "ZDI",
"id": "ZDI-16-491"
},
{
"db": "JVNDB",
"id": "JVNDB-2016-004468"
},
{
"db": "CNNVD",
"id": "CNNVD-201608-479"
}
]
},
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "CWE-119",
"trust": 1.9
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-93088"
},
{
"db": "JVNDB",
"id": "JVNDB-2016-004468"
},
{
"db": "NVD",
"id": "CVE-2016-4269"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 2.7,
"url": "https://helpx.adobe.com/security/products/acrobat/apsb16-26.html"
},
{
"trust": 1.7,
"url": "http://www.securityfocus.com/bid/92641"
},
{
"trust": 1.1,
"url": "http://www.zerodayinitiative.com/advisories/zdi-16-491"
},
{
"trust": 0.8,
"url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2016-4269"
},
{
"trust": 0.8,
"url": "http://www.ipa.go.jp/security/ciadr/vul/20160713-adobereader.html"
},
{
"trust": 0.8,
"url": "http://www.jpcert.or.jp/at/2016/at160030.html"
},
{
"trust": 0.8,
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2016-4269"
},
{
"trust": 0.8,
"url": "http://www.npa.go.jp/cyberpolice/topics/?seq=18716"
},
{
"trust": 0.3,
"url": "http://www.adobe.com/products/acrobat/"
},
{
"trust": 0.3,
"url": "http://www.adobe.com"
},
{
"trust": 0.3,
"url": "http://www.adobe.com/products/reader/"
},
{
"trust": 0.3,
"url": "http://www.zerodayinitiative.com/advisories/zdi-16-491/"
}
],
"sources": [
{
"db": "ZDI",
"id": "ZDI-16-491"
},
{
"db": "VULHUB",
"id": "VHN-93088"
},
{
"db": "BID",
"id": "92641"
},
{
"db": "JVNDB",
"id": "JVNDB-2016-004468"
},
{
"db": "CNNVD",
"id": "CNNVD-201608-479"
},
{
"db": "NVD",
"id": "CVE-2016-4269"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "ZDI",
"id": "ZDI-16-491"
},
{
"db": "VULHUB",
"id": "VHN-93088"
},
{
"db": "BID",
"id": "92641"
},
{
"db": "JVNDB",
"id": "JVNDB-2016-004468"
},
{
"db": "CNNVD",
"id": "CNNVD-201608-479"
},
{
"db": "NVD",
"id": "CVE-2016-4269"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2016-08-24T00:00:00",
"db": "ZDI",
"id": "ZDI-16-491"
},
{
"date": "2016-08-26T00:00:00",
"db": "VULHUB",
"id": "VHN-93088"
},
{
"date": "2016-08-23T00:00:00",
"db": "BID",
"id": "92641"
},
{
"date": "2016-08-30T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2016-004468"
},
{
"date": "2016-08-26T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201608-479"
},
{
"date": "2016-08-26T19:59:05.837000",
"db": "NVD",
"id": "CVE-2016-4269"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2016-08-24T00:00:00",
"db": "ZDI",
"id": "ZDI-16-491"
},
{
"date": "2016-11-28T00:00:00",
"db": "VULHUB",
"id": "VHN-93088"
},
{
"date": "2016-08-23T00:00:00",
"db": "BID",
"id": "92641"
},
{
"date": "2016-08-30T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2016-004468"
},
{
"date": "2016-08-29T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201608-479"
},
{
"date": "2025-04-12T10:46:40.837000",
"db": "NVD",
"id": "CVE-2016-4269"
}
]
},
"threat_type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/threat_type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "remote",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201608-479"
}
],
"trust": 0.6
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Windows and Mac OS X Run on Adobe Reader and Acrobat Vulnerable to arbitrary code execution",
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2016-004468"
}
],
"trust": 0.8
},
"type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "buffer overflow",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201608-479"
}
],
"trust": 0.6
}
}
VAR-201609-0582
Vulnerability from variot - Updated: 2025-04-13 23:23Use-after-free vulnerability in Adobe Reader and Acrobat before 11.0.17, Acrobat and Acrobat Reader DC Classic before 15.006.30198, and Acrobat and Acrobat Reader DC Continuous before 15.017.20050 on Windows and OS X allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2016-4255. This vulnerability CVE-2016-4255 Is a different vulnerability. Supplementary information : CWE Vulnerability type by CWE-416: Use After Free ( Use of freed memory ) Has been identified. http://cwe.mitre.org/data/definitions/416.htmlAn attacker could execute arbitrary code. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the processing of XObject streams. The issue lies in the failure to properly validate the existence of an object prior to performing operations on it. Failed attacks may cause a denial-of-service condition. Adobe Reader, etc. are all products of Adobe (Adobe) in the United States. Adobe Reader is a free PDF file reader; Acrobat is a PDF file editing and conversion tool; Acrobat Reader DC is a set of tools for viewing, printing and annotating PDF
Show details on source website{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"configurations": {
"@id": "https://www.variotdbs.pl/ref/configurations"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-201609-0582",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "acrobat dc",
"scope": "lte",
"trust": 1.0,
"vendor": "adobe",
"version": "15.006.30174"
},
{
"model": "acrobat dc",
"scope": "lte",
"trust": 1.0,
"vendor": "adobe",
"version": "15.016.20045"
},
{
"model": "acrobat reader dc",
"scope": "lte",
"trust": 1.0,
"vendor": "adobe",
"version": "15.016.20045"
},
{
"model": "acrobat reader dc",
"scope": "lte",
"trust": 1.0,
"vendor": "adobe",
"version": "15.006.30174"
},
{
"model": "acrobat",
"scope": "lte",
"trust": 1.0,
"vendor": "adobe",
"version": "11.0.16"
},
{
"model": "reader",
"scope": "lte",
"trust": 1.0,
"vendor": "adobe",
"version": "11.0.16"
},
{
"model": "acrobat",
"scope": "lt",
"trust": 0.8,
"vendor": "adobe",
"version": "xi desktop 11.0.17 (windows/macintosh)"
},
{
"model": "acrobat dc",
"scope": "lt",
"trust": 0.8,
"vendor": "adobe",
"version": "classic 15.006.30198 (windows/macintosh)"
},
{
"model": "acrobat dc",
"scope": "lt",
"trust": 0.8,
"vendor": "adobe",
"version": "continuous track 15.017.20050 (windows/macintosh)"
},
{
"model": "acrobat reader dc",
"scope": "lt",
"trust": 0.8,
"vendor": "adobe",
"version": "classic 15.006.30198 (windows/macintosh)"
},
{
"model": "acrobat reader dc",
"scope": "lt",
"trust": 0.8,
"vendor": "adobe",
"version": "continuous track 15.017.20050 (windows/macintosh)"
},
{
"model": "reader",
"scope": "lt",
"trust": 0.8,
"vendor": "adobe",
"version": "xi desktop 11.0.17 (windows/macintosh)"
},
{
"model": "acrobat reader dc",
"scope": null,
"trust": 0.7,
"vendor": "adobe",
"version": null
},
{
"model": "mac os x",
"scope": null,
"trust": 0.6,
"vendor": "apple",
"version": null
},
{
"model": "acrobat reader dc",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "15.6.30174"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.13"
},
{
"model": "edge",
"scope": "eq",
"trust": 0.3,
"vendor": "microsoft",
"version": "0"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.6"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.09"
},
{
"model": "acrobat dc",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "15.6.30097"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.3"
},
{
"model": "acrobat reader dc",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "15.6.30172"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0"
},
{
"model": "acrobat reader dc",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "15.16.20045"
},
{
"model": "acrobat reader dc",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "15.010.20056"
},
{
"model": "acrobat dc",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "15.10.20059"
},
{
"model": "reader",
"scope": "ne",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.17"
},
{
"model": "acrobat reader dc",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "15.6.30121"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.10"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.4"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.14"
},
{
"model": "acrobat reader dc",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "15.006.30119"
},
{
"model": "acrobat reader dc",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "15.16.20039"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.1"
},
{
"model": "acrobat reader dc",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "15.9.20077"
},
{
"model": "acrobat reader dc",
"scope": "ne",
"trust": 0.3,
"vendor": "adobe",
"version": "15.17.20050"
},
{
"model": "acrobat dc",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "15.10.20060"
},
{
"model": "acrobat reader dc",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "15.6.30097"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.16"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.4"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.10"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.14"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.1"
},
{
"model": "internet explorer",
"scope": "eq",
"trust": 0.3,
"vendor": "microsoft",
"version": "11"
},
{
"model": "acrobat reader dc",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "15.10.20059"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.12"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.15"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.08"
},
{
"model": "acrobat dc",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "15.6.30174"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.16"
},
{
"model": "acrobat dc",
"scope": "ne",
"trust": 0.3,
"vendor": "adobe",
"version": "15.6.30198"
},
{
"model": "acrobat dc",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "15.6.30172"
},
{
"model": "acrobat reader dc",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "15.10.20060"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.2"
},
{
"model": "acrobat dc",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "15.16.20045"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.11"
},
{
"model": "acrobat dc",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "15.010.20056"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.7"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.9"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.13"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.15"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.12"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.08"
},
{
"model": "acrobat dc",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "15.6.30121"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.09"
},
{
"model": "acrobat dc",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "15.9.20077"
},
{
"model": "acrobat dc",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "15.006.30119"
},
{
"model": "acrobat dc",
"scope": "ne",
"trust": 0.3,
"vendor": "adobe",
"version": "15.17.20050"
},
{
"model": "acrobat dc",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "15.16.20039"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.6"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.11"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.05"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0"
},
{
"model": "acrobat reader dc",
"scope": "ne",
"trust": 0.3,
"vendor": "adobe",
"version": "15.6.30198"
},
{
"model": "acrobat",
"scope": "ne",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.17"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.3"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.7"
}
],
"sources": [
{
"db": "ZDI",
"id": "ZDI-16-591"
},
{
"db": "BID",
"id": "93016"
},
{
"db": "JVNDB",
"id": "JVNDB-2016-004767"
},
{
"db": "CNNVD",
"id": "CNNVD-201609-326"
},
{
"db": "NVD",
"id": "CVE-2016-6938"
}
]
},
"configurations": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/configurations#",
"children": {
"@container": "@list"
},
"cpe_match": {
"@container": "@list"
},
"data": {
"@container": "@list"
},
"nodes": {
"@container": "@list"
}
},
"data": [
{
"CVE_data_version": "4.0",
"nodes": [
{
"cpe_match": [
{
"cpe22Uri": "cpe:/a:adobe:acrobat",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/a:adobe:acrobat_dc",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/a:adobe:acrobat_reader_dc",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/a:adobe:acrobat_reader",
"vulnerable": true
}
],
"operator": "OR"
}
]
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2016-004767"
}
]
},
"credits": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/credits#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Steven Seeley of Source Incite",
"sources": [
{
"db": "ZDI",
"id": "ZDI-16-591"
}
],
"trust": 0.7
},
"cve": "CVE-2016-6938",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "nvd@nist.gov",
"availabilityImpact": "COMPLETE",
"baseScore": 10.0,
"confidentialityImpact": "COMPLETE",
"exploitabilityScore": 10.0,
"id": "CVE-2016-6938",
"impactScore": 10.0,
"integrityImpact": "COMPLETE",
"severity": "HIGH",
"trust": 1.9,
"vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
{
"acInsufInfo": null,
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "ZDI",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 8.6,
"id": "CVE-2016-6938",
"impactScore": 6.4,
"integrityImpact": "PARTIAL",
"obtainAllPrivilege": null,
"obtainOtherPrivilege": null,
"obtainUserPrivilege": null,
"severity": "MEDIUM",
"trust": 0.7,
"userInteractionRequired": null,
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "VULHUB",
"availabilityImpact": "COMPLETE",
"baseScore": 10.0,
"confidentialityImpact": "COMPLETE",
"exploitabilityScore": 10.0,
"id": "VHN-95758",
"impactScore": 10.0,
"integrityImpact": "COMPLETE",
"severity": "HIGH",
"trust": 0.1,
"vectorString": "AV:N/AC:L/AU:N/C:C/I:C/A:C",
"version": "2.0"
}
],
"cvssV3": [
{
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"author": "nvd@nist.gov",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"exploitabilityScore": 3.9,
"id": "CVE-2016-6938",
"impactScore": 5.9,
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"trust": 1.8,
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
}
],
"severity": [
{
"author": "nvd@nist.gov",
"id": "CVE-2016-6938",
"trust": 1.0,
"value": "CRITICAL"
},
{
"author": "NVD",
"id": "CVE-2016-6938",
"trust": 0.8,
"value": "Critical"
},
{
"author": "ZDI",
"id": "CVE-2016-6938",
"trust": 0.7,
"value": "MEDIUM"
},
{
"author": "CNNVD",
"id": "CNNVD-201609-326",
"trust": 0.6,
"value": "CRITICAL"
},
{
"author": "VULHUB",
"id": "VHN-95758",
"trust": 0.1,
"value": "HIGH"
},
{
"author": "VULMON",
"id": "CVE-2016-6938",
"trust": 0.1,
"value": "HIGH"
}
]
}
],
"sources": [
{
"db": "ZDI",
"id": "ZDI-16-591"
},
{
"db": "VULHUB",
"id": "VHN-95758"
},
{
"db": "VULMON",
"id": "CVE-2016-6938"
},
{
"db": "JVNDB",
"id": "JVNDB-2016-004767"
},
{
"db": "CNNVD",
"id": "CNNVD-201609-326"
},
{
"db": "NVD",
"id": "CVE-2016-6938"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Use-after-free vulnerability in Adobe Reader and Acrobat before 11.0.17, Acrobat and Acrobat Reader DC Classic before 15.006.30198, and Acrobat and Acrobat Reader DC Continuous before 15.017.20050 on Windows and OS X allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2016-4255. This vulnerability CVE-2016-4255 Is a different vulnerability. Supplementary information : CWE Vulnerability type by CWE-416: Use After Free ( Use of freed memory ) Has been identified. http://cwe.mitre.org/data/definitions/416.htmlAn attacker could execute arbitrary code. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the processing of XObject streams. The issue lies in the failure to properly validate the existence of an object prior to performing operations on it. Failed attacks may cause a denial-of-service condition. Adobe Reader, etc. are all products of Adobe (Adobe) in the United States. Adobe Reader is a free PDF file reader; Acrobat is a PDF file editing and conversion tool; Acrobat Reader DC is a set of tools for viewing, printing and annotating PDF",
"sources": [
{
"db": "NVD",
"id": "CVE-2016-6938"
},
{
"db": "JVNDB",
"id": "JVNDB-2016-004767"
},
{
"db": "ZDI",
"id": "ZDI-16-591"
},
{
"db": "BID",
"id": "93016"
},
{
"db": "VULHUB",
"id": "VHN-95758"
},
{
"db": "VULMON",
"id": "CVE-2016-6938"
}
],
"trust": 2.7
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "NVD",
"id": "CVE-2016-6938",
"trust": 3.6
},
{
"db": "ZDI",
"id": "ZDI-16-591",
"trust": 2.2
},
{
"db": "BID",
"id": "93016",
"trust": 1.5
},
{
"db": "JVNDB",
"id": "JVNDB-2016-004767",
"trust": 0.8
},
{
"db": "ZDI_CAN",
"id": "ZDI-CAN-3842",
"trust": 0.7
},
{
"db": "CNNVD",
"id": "CNNVD-201609-326",
"trust": 0.7
},
{
"db": "VULHUB",
"id": "VHN-95758",
"trust": 0.1
},
{
"db": "VULMON",
"id": "CVE-2016-6938",
"trust": 0.1
}
],
"sources": [
{
"db": "ZDI",
"id": "ZDI-16-591"
},
{
"db": "VULHUB",
"id": "VHN-95758"
},
{
"db": "VULMON",
"id": "CVE-2016-6938"
},
{
"db": "BID",
"id": "93016"
},
{
"db": "JVNDB",
"id": "JVNDB-2016-004767"
},
{
"db": "CNNVD",
"id": "CNNVD-201609-326"
},
{
"db": "NVD",
"id": "CVE-2016-6938"
}
]
},
"id": "VAR-201609-0582",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "VULHUB",
"id": "VHN-95758"
}
],
"trust": 0.01
},
"last_update_date": "2025-04-13T23:23:35.012000Z",
"patch": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/patch#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"title": "APSB16-26",
"trust": 1.5,
"url": "https://helpx.adobe.com/security/products/acrobat/apsb16-26.html"
},
{
"title": "APSB16-26",
"trust": 0.8,
"url": "https://helpx.adobe.com/jp/security/products/acrobat/apsb16-26.html"
},
{
"title": "\u30a2\u30c9\u30d3 \u30b7\u30b9\u30c6\u30e0\u30ba\u793e Adobe Reader \u306e\u8106\u5f31\u6027\u306b\u95a2\u3059\u308b\u304a\u77e5\u3089\u305b",
"trust": 0.8,
"url": "http://www.fmworld.net/biz/common/adobe/20160714.html"
},
{
"title": "Adobe Reader and Acrobat Remediation measures for reusing vulnerabilities after release",
"trust": 0.6,
"url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=64120"
}
],
"sources": [
{
"db": "ZDI",
"id": "ZDI-16-591"
},
{
"db": "JVNDB",
"id": "JVNDB-2016-004767"
},
{
"db": "CNNVD",
"id": "CNNVD-201609-326"
}
]
},
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "CWE-416",
"trust": 1.1
},
{
"problemtype": "CWE-Other",
"trust": 0.8
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-95758"
},
{
"db": "JVNDB",
"id": "JVNDB-2016-004767"
},
{
"db": "NVD",
"id": "CVE-2016-6938"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 2.8,
"url": "https://helpx.adobe.com/security/products/acrobat/apsb16-26.html"
},
{
"trust": 1.2,
"url": "http://www.securityfocus.com/bid/93016"
},
{
"trust": 1.2,
"url": "http://www.zerodayinitiative.com/advisories/zdi-16-591"
},
{
"trust": 0.8,
"url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2016-6938"
},
{
"trust": 0.8,
"url": "http://www.ipa.go.jp/security/ciadr/vul/20160713-adobereader.html"
},
{
"trust": 0.8,
"url": "http://www.jpcert.or.jp/at/2016/at160030.html"
},
{
"trust": 0.8,
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2016-6938"
},
{
"trust": 0.8,
"url": "http://www.npa.go.jp/cyberpolice/topics/?seq=18716"
},
{
"trust": 0.3,
"url": "http://www.adobe.com/products/acrobat/"
},
{
"trust": 0.3,
"url": "http://www.adobe.com"
},
{
"trust": 0.3,
"url": "http://get.adobe.com/reader/"
},
{
"trust": 0.3,
"url": "http://www.zerodayinitiative.com/advisories/zdi-16-591/"
},
{
"trust": 0.1,
"url": "https://cwe.mitre.org/data/definitions/416.html"
},
{
"trust": 0.1,
"url": "https://www.rapid7.com/db/vulnerabilities/acrobat-cve-2016-6938"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov"
}
],
"sources": [
{
"db": "ZDI",
"id": "ZDI-16-591"
},
{
"db": "VULHUB",
"id": "VHN-95758"
},
{
"db": "VULMON",
"id": "CVE-2016-6938"
},
{
"db": "BID",
"id": "93016"
},
{
"db": "JVNDB",
"id": "JVNDB-2016-004767"
},
{
"db": "CNNVD",
"id": "CNNVD-201609-326"
},
{
"db": "NVD",
"id": "CVE-2016-6938"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "ZDI",
"id": "ZDI-16-591"
},
{
"db": "VULHUB",
"id": "VHN-95758"
},
{
"db": "VULMON",
"id": "CVE-2016-6938"
},
{
"db": "BID",
"id": "93016"
},
{
"db": "JVNDB",
"id": "JVNDB-2016-004767"
},
{
"db": "CNNVD",
"id": "CNNVD-201609-326"
},
{
"db": "NVD",
"id": "CVE-2016-6938"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2016-11-04T00:00:00",
"db": "ZDI",
"id": "ZDI-16-591"
},
{
"date": "2016-09-17T00:00:00",
"db": "VULHUB",
"id": "VHN-95758"
},
{
"date": "2016-09-17T00:00:00",
"db": "VULMON",
"id": "CVE-2016-6938"
},
{
"date": "2016-09-12T00:00:00",
"db": "BID",
"id": "93016"
},
{
"date": "2016-09-20T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2016-004767"
},
{
"date": "2016-09-18T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201609-326"
},
{
"date": "2016-09-17T02:59:04.617000",
"db": "NVD",
"id": "CVE-2016-6938"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2016-11-04T00:00:00",
"db": "ZDI",
"id": "ZDI-16-591"
},
{
"date": "2016-12-23T00:00:00",
"db": "VULHUB",
"id": "VHN-95758"
},
{
"date": "2016-12-23T00:00:00",
"db": "VULMON",
"id": "CVE-2016-6938"
},
{
"date": "2016-11-24T01:08:00",
"db": "BID",
"id": "93016"
},
{
"date": "2016-09-20T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2016-004767"
},
{
"date": "2016-09-18T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201609-326"
},
{
"date": "2025-04-12T10:46:40.837000",
"db": "NVD",
"id": "CVE-2016-6938"
}
]
},
"threat_type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/threat_type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "remote",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201609-326"
}
],
"trust": 0.6
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Windows and Mac OS X Run on Adobe Reader and Acrobat Vulnerable to arbitrary code execution",
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2016-004767"
}
],
"trust": 0.8
},
"type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "other",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201609-326"
}
],
"trust": 0.6
}
}
VAR-201608-0297
Vulnerability from variot - Updated: 2025-04-13 23:22Adobe Reader and Acrobat before 11.0.17, Acrobat and Acrobat Reader DC Classic before 15.006.30198, and Acrobat and Acrobat Reader DC Continuous before 15.017.20050 on Windows and OS X allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-4191, CVE-2016-4192, CVE-2016-4193, CVE-2016-4194, CVE-2016-4195, CVE-2016-4196, CVE-2016-4197, CVE-2016-4198, CVE-2016-4199, CVE-2016-4200, CVE-2016-4201, CVE-2016-4202, CVE-2016-4203, CVE-2016-4204, CVE-2016-4205, CVE-2016-4206, CVE-2016-4207, CVE-2016-4208, CVE-2016-4211, CVE-2016-4212, CVE-2016-4213, CVE-2016-4214, CVE-2016-4250, CVE-2016-4251, CVE-2016-4252, CVE-2016-4254, CVE-2016-4265, CVE-2016-4266, CVE-2016-4267, CVE-2016-4269, and CVE-2016-4270. This vulnerability CVE-2016-4191 , CVE-2016-4192 , CVE-2016-4193 , CVE-2016-4194 , CVE-2016-4195 , CVE-2016-4196 , CVE-2016-4197 , CVE-2016-4198 , CVE-2016-4199 , CVE-2016-4200 , CVE-2016-4201 , CVE-2016-4202 , CVE-2016-4203 , CVE-2016-4204 , CVE-2016-4205 , CVE-2016-4206 , CVE-2016-4207 , CVE-2016-4208 , CVE-2016-4211 , CVE-2016-4212 , CVE-2016-4213 , CVE-2016-4214 , CVE-2016-4250 , CVE-2016-4251 , CVE-2016-4252 , CVE-2016-4254 , CVE-2016-4265 , CVE-2016-4266 , CVE-2016-4267 , CVE-2016-4269 ,and CVE-2016-4270 Is a different vulnerability.An attacker could execute arbitrary code or cause a denial of service ( Memory corruption ) There is a possibility of being put into a state. This vulnerability allows remote attackers to disclose sensitive information on vulnerable installations of Adobe Reader DC. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the handling of Font streams. A crafted Font stream can trigger a read past the end of an allocated buffer. Failed exploit attempts will likely cause a denial-of-service condition. Adobe Reader, etc. are all products of Adobe (Adobe) in the United States. Adobe Reader is a free PDF file reader; Acrobat is a PDF file editing and conversion tool; Acrobat Reader DC is a set of tools for viewing, printing and annotating PDF. Security flaws exist in several Adobe products
Show details on source website{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"configurations": {
"@id": "https://www.variotdbs.pl/ref/configurations"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-201608-0297",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "acrobat dc",
"scope": "lte",
"trust": 1.0,
"vendor": "adobe",
"version": "15.006.30174"
},
{
"model": "acrobat dc",
"scope": "lte",
"trust": 1.0,
"vendor": "adobe",
"version": "15.016.20045"
},
{
"model": "acrobat reader dc",
"scope": "lte",
"trust": 1.0,
"vendor": "adobe",
"version": "15.016.20045"
},
{
"model": "acrobat reader dc",
"scope": "lte",
"trust": 1.0,
"vendor": "adobe",
"version": "15.006.30174"
},
{
"model": "acrobat",
"scope": "lte",
"trust": 1.0,
"vendor": "adobe",
"version": "11.0.16"
},
{
"model": "reader",
"scope": "lte",
"trust": 1.0,
"vendor": "adobe",
"version": "11.0.16"
},
{
"model": "acrobat",
"scope": "lt",
"trust": 0.8,
"vendor": "adobe",
"version": "xi desktop 11.0.17 (windows/macintosh)"
},
{
"model": "acrobat dc",
"scope": "lt",
"trust": 0.8,
"vendor": "adobe",
"version": "classic 15.006.30198 (windows/macintosh)"
},
{
"model": "acrobat dc",
"scope": "lt",
"trust": 0.8,
"vendor": "adobe",
"version": "continuous track 15.017.20050 (windows/macintosh)"
},
{
"model": "acrobat reader dc",
"scope": "lt",
"trust": 0.8,
"vendor": "adobe",
"version": "classic 15.006.30198 (windows/macintosh)"
},
{
"model": "acrobat reader dc",
"scope": "lt",
"trust": 0.8,
"vendor": "adobe",
"version": "continuous track 15.017.20050 (windows/macintosh)"
},
{
"model": "reader",
"scope": "lt",
"trust": 0.8,
"vendor": "adobe",
"version": "xi desktop 11.0.17 (windows/macintosh)"
},
{
"model": "acrobat reader dc",
"scope": null,
"trust": 0.7,
"vendor": "adobe",
"version": null
},
{
"model": "mac os x",
"scope": null,
"trust": 0.6,
"vendor": "apple",
"version": null
},
{
"model": "acrobat reader dc",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "15.6.30174"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.13"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.6"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.09"
},
{
"model": "acrobat dc",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "15.6.30097"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.3"
},
{
"model": "acrobat reader dc",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "15.6.30172"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0"
},
{
"model": "acrobat reader dc",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "15.16.20045"
},
{
"model": "acrobat reader dc",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "15.010.20056"
},
{
"model": "acrobat dc",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "15.10.20059"
},
{
"model": "reader",
"scope": "ne",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.17"
},
{
"model": "acrobat reader dc",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "15.6.30121"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.10"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.4"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.14"
},
{
"model": "acrobat reader dc",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "15.006.30119"
},
{
"model": "acrobat dc",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "15.6.30198"
},
{
"model": "acrobat reader dc",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "15.16.20039"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.1"
},
{
"model": "acrobat reader dc",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "15.9.20077"
},
{
"model": "acrobat reader dc",
"scope": "ne",
"trust": 0.3,
"vendor": "adobe",
"version": "15.17.20050"
},
{
"model": "acrobat dc",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "15.10.20060"
},
{
"model": "acrobat reader dc",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "15.6.30097"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.16"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.4"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.10"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.14"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.1"
},
{
"model": "acrobat reader dc",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "15.10.20059"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.12"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.15"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.08"
},
{
"model": "acrobat dc",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "15.6.30174"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.16"
},
{
"model": "acrobat reader dc",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "15.6.30198"
},
{
"model": "acrobat dc",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "15.6.30172"
},
{
"model": "acrobat reader dc",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "15.10.20060"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.2"
},
{
"model": "acrobat dc",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "15.16.20045"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.11"
},
{
"model": "acrobat dc",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "15.010.20056"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.7"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.9"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.13"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.15"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.12"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.08"
},
{
"model": "acrobat dc",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "15.6.30121"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.09"
},
{
"model": "acrobat dc",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "15.9.20077"
},
{
"model": "acrobat dc",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "15.006.30119"
},
{
"model": "acrobat dc",
"scope": "ne",
"trust": 0.3,
"vendor": "adobe",
"version": "15.17.20050"
},
{
"model": "acrobat dc",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "15.16.20039"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.6"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.11"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.05"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0"
},
{
"model": "acrobat",
"scope": "ne",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.17"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.3"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.7"
}
],
"sources": [
{
"db": "ZDI",
"id": "ZDI-16-492"
},
{
"db": "BID",
"id": "92643"
},
{
"db": "JVNDB",
"id": "JVNDB-2016-004467"
},
{
"db": "CNNVD",
"id": "CNNVD-201608-480"
},
{
"db": "NVD",
"id": "CVE-2016-4268"
}
]
},
"configurations": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/configurations#",
"children": {
"@container": "@list"
},
"cpe_match": {
"@container": "@list"
},
"data": {
"@container": "@list"
},
"nodes": {
"@container": "@list"
}
},
"data": [
{
"CVE_data_version": "4.0",
"nodes": [
{
"cpe_match": [
{
"cpe22Uri": "cpe:/a:adobe:acrobat",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/a:adobe:acrobat_dc",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/a:adobe:acrobat_reader_dc",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/a:adobe:acrobat_reader",
"vulnerable": true
}
],
"operator": "OR"
}
]
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2016-004467"
}
]
},
"credits": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/credits#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "kdot working with Trend Micro\u0027s Zero Day Initiative.",
"sources": [
{
"db": "BID",
"id": "92643"
},
{
"db": "CNNVD",
"id": "CNNVD-201608-480"
}
],
"trust": 0.9
},
"cve": "CVE-2016-4268",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "nvd@nist.gov",
"availabilityImpact": "COMPLETE",
"baseScore": 10.0,
"confidentialityImpact": "COMPLETE",
"exploitabilityScore": 10.0,
"id": "CVE-2016-4268",
"impactScore": 10.0,
"integrityImpact": "COMPLETE",
"severity": "HIGH",
"trust": 1.9,
"vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
{
"acInsufInfo": null,
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "ZDI",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 8.6,
"id": "CVE-2016-4268",
"impactScore": 2.9,
"integrityImpact": "NONE",
"obtainAllPrivilege": null,
"obtainOtherPrivilege": null,
"obtainUserPrivilege": null,
"severity": "MEDIUM",
"trust": 0.7,
"userInteractionRequired": null,
"vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "VULHUB",
"availabilityImpact": "COMPLETE",
"baseScore": 10.0,
"confidentialityImpact": "COMPLETE",
"exploitabilityScore": 10.0,
"id": "VHN-93087",
"impactScore": 10.0,
"integrityImpact": "COMPLETE",
"severity": "HIGH",
"trust": 0.1,
"vectorString": "AV:N/AC:L/AU:N/C:C/I:C/A:C",
"version": "2.0"
}
],
"cvssV3": [
{
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"author": "nvd@nist.gov",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"exploitabilityScore": 3.9,
"id": "CVE-2016-4268",
"impactScore": 5.9,
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"trust": 1.8,
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
}
],
"severity": [
{
"author": "nvd@nist.gov",
"id": "CVE-2016-4268",
"trust": 1.0,
"value": "CRITICAL"
},
{
"author": "NVD",
"id": "CVE-2016-4268",
"trust": 0.8,
"value": "Critical"
},
{
"author": "ZDI",
"id": "CVE-2016-4268",
"trust": 0.7,
"value": "MEDIUM"
},
{
"author": "CNNVD",
"id": "CNNVD-201608-480",
"trust": 0.6,
"value": "CRITICAL"
},
{
"author": "VULHUB",
"id": "VHN-93087",
"trust": 0.1,
"value": "HIGH"
},
{
"author": "VULMON",
"id": "CVE-2016-4268",
"trust": 0.1,
"value": "HIGH"
}
]
}
],
"sources": [
{
"db": "ZDI",
"id": "ZDI-16-492"
},
{
"db": "VULHUB",
"id": "VHN-93087"
},
{
"db": "VULMON",
"id": "CVE-2016-4268"
},
{
"db": "JVNDB",
"id": "JVNDB-2016-004467"
},
{
"db": "CNNVD",
"id": "CNNVD-201608-480"
},
{
"db": "NVD",
"id": "CVE-2016-4268"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Adobe Reader and Acrobat before 11.0.17, Acrobat and Acrobat Reader DC Classic before 15.006.30198, and Acrobat and Acrobat Reader DC Continuous before 15.017.20050 on Windows and OS X allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-4191, CVE-2016-4192, CVE-2016-4193, CVE-2016-4194, CVE-2016-4195, CVE-2016-4196, CVE-2016-4197, CVE-2016-4198, CVE-2016-4199, CVE-2016-4200, CVE-2016-4201, CVE-2016-4202, CVE-2016-4203, CVE-2016-4204, CVE-2016-4205, CVE-2016-4206, CVE-2016-4207, CVE-2016-4208, CVE-2016-4211, CVE-2016-4212, CVE-2016-4213, CVE-2016-4214, CVE-2016-4250, CVE-2016-4251, CVE-2016-4252, CVE-2016-4254, CVE-2016-4265, CVE-2016-4266, CVE-2016-4267, CVE-2016-4269, and CVE-2016-4270. This vulnerability CVE-2016-4191 , CVE-2016-4192 , CVE-2016-4193 , CVE-2016-4194 , CVE-2016-4195 , CVE-2016-4196 , CVE-2016-4197 , CVE-2016-4198 , CVE-2016-4199 , CVE-2016-4200 , CVE-2016-4201 , CVE-2016-4202 , CVE-2016-4203 , CVE-2016-4204 , CVE-2016-4205 , CVE-2016-4206 , CVE-2016-4207 , CVE-2016-4208 , CVE-2016-4211 , CVE-2016-4212 , CVE-2016-4213 , CVE-2016-4214 , CVE-2016-4250 , CVE-2016-4251 , CVE-2016-4252 , CVE-2016-4254 , CVE-2016-4265 , CVE-2016-4266 , CVE-2016-4267 , CVE-2016-4269 ,and CVE-2016-4270 Is a different vulnerability.An attacker could execute arbitrary code or cause a denial of service ( Memory corruption ) There is a possibility of being put into a state. This vulnerability allows remote attackers to disclose sensitive information on vulnerable installations of Adobe Reader DC. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the handling of Font streams. A crafted Font stream can trigger a read past the end of an allocated buffer. Failed exploit attempts will likely cause a denial-of-service condition. Adobe Reader, etc. are all products of Adobe (Adobe) in the United States. Adobe Reader is a free PDF file reader; Acrobat is a PDF file editing and conversion tool; Acrobat Reader DC is a set of tools for viewing, printing and annotating PDF. Security flaws exist in several Adobe products",
"sources": [
{
"db": "NVD",
"id": "CVE-2016-4268"
},
{
"db": "JVNDB",
"id": "JVNDB-2016-004467"
},
{
"db": "ZDI",
"id": "ZDI-16-492"
},
{
"db": "BID",
"id": "92643"
},
{
"db": "VULHUB",
"id": "VHN-93087"
},
{
"db": "VULMON",
"id": "CVE-2016-4268"
}
],
"trust": 2.7
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "NVD",
"id": "CVE-2016-4268",
"trust": 3.6
},
{
"db": "ZDI",
"id": "ZDI-16-492",
"trust": 2.2
},
{
"db": "BID",
"id": "92643",
"trust": 2.1
},
{
"db": "JVNDB",
"id": "JVNDB-2016-004467",
"trust": 0.8
},
{
"db": "ZDI_CAN",
"id": "ZDI-CAN-3789",
"trust": 0.7
},
{
"db": "CNNVD",
"id": "CNNVD-201608-480",
"trust": 0.7
},
{
"db": "VULHUB",
"id": "VHN-93087",
"trust": 0.1
},
{
"db": "VULMON",
"id": "CVE-2016-4268",
"trust": 0.1
}
],
"sources": [
{
"db": "ZDI",
"id": "ZDI-16-492"
},
{
"db": "VULHUB",
"id": "VHN-93087"
},
{
"db": "VULMON",
"id": "CVE-2016-4268"
},
{
"db": "BID",
"id": "92643"
},
{
"db": "JVNDB",
"id": "JVNDB-2016-004467"
},
{
"db": "CNNVD",
"id": "CNNVD-201608-480"
},
{
"db": "NVD",
"id": "CVE-2016-4268"
}
]
},
"id": "VAR-201608-0297",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "VULHUB",
"id": "VHN-93087"
}
],
"trust": 0.01
},
"last_update_date": "2025-04-13T23:22:20.405000Z",
"patch": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/patch#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"title": "APSB16-26",
"trust": 1.5,
"url": "https://helpx.adobe.com/security/products/acrobat/apsb16-26.html"
},
{
"title": "APSB16-26",
"trust": 0.8,
"url": "https://helpx.adobe.com/jp/security/products/acrobat/apsb16-26.html"
},
{
"title": "\u30a2\u30c9\u30d3 \u30b7\u30b9\u30c6\u30e0\u30ba\u793e Adobe Reader \u306e\u8106\u5f31\u6027\u306b\u95a2\u3059\u308b\u304a\u77e5\u3089\u305b",
"trust": 0.8,
"url": "http://www.fmworld.net/biz/common/adobe/20160714.html"
},
{
"title": "Multiple Adobe Product security vulnerabilities",
"trust": 0.6,
"url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=63799"
}
],
"sources": [
{
"db": "ZDI",
"id": "ZDI-16-492"
},
{
"db": "JVNDB",
"id": "JVNDB-2016-004467"
},
{
"db": "CNNVD",
"id": "CNNVD-201608-480"
}
]
},
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "CWE-119",
"trust": 1.9
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-93087"
},
{
"db": "JVNDB",
"id": "JVNDB-2016-004467"
},
{
"db": "NVD",
"id": "CVE-2016-4268"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 2.8,
"url": "https://helpx.adobe.com/security/products/acrobat/apsb16-26.html"
},
{
"trust": 1.9,
"url": "http://www.securityfocus.com/bid/92643"
},
{
"trust": 1.2,
"url": "http://www.zerodayinitiative.com/advisories/zdi-16-492"
},
{
"trust": 0.8,
"url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2016-4268"
},
{
"trust": 0.8,
"url": "http://www.ipa.go.jp/security/ciadr/vul/20160713-adobereader.html"
},
{
"trust": 0.8,
"url": "http://www.jpcert.or.jp/at/2016/at160030.html"
},
{
"trust": 0.8,
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2016-4268"
},
{
"trust": 0.8,
"url": "http://www.npa.go.jp/cyberpolice/topics/?seq=18716"
},
{
"trust": 0.3,
"url": "http://www.adobe.com"
},
{
"trust": 0.3,
"url": "http://www.zerodayinitiative.com/advisories/zdi-16-492/"
},
{
"trust": 0.1,
"url": "https://cwe.mitre.org/data/definitions/119.html"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov"
}
],
"sources": [
{
"db": "ZDI",
"id": "ZDI-16-492"
},
{
"db": "VULHUB",
"id": "VHN-93087"
},
{
"db": "VULMON",
"id": "CVE-2016-4268"
},
{
"db": "BID",
"id": "92643"
},
{
"db": "JVNDB",
"id": "JVNDB-2016-004467"
},
{
"db": "CNNVD",
"id": "CNNVD-201608-480"
},
{
"db": "NVD",
"id": "CVE-2016-4268"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "ZDI",
"id": "ZDI-16-492"
},
{
"db": "VULHUB",
"id": "VHN-93087"
},
{
"db": "VULMON",
"id": "CVE-2016-4268"
},
{
"db": "BID",
"id": "92643"
},
{
"db": "JVNDB",
"id": "JVNDB-2016-004467"
},
{
"db": "CNNVD",
"id": "CNNVD-201608-480"
},
{
"db": "NVD",
"id": "CVE-2016-4268"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2016-08-24T00:00:00",
"db": "ZDI",
"id": "ZDI-16-492"
},
{
"date": "2016-08-26T00:00:00",
"db": "VULHUB",
"id": "VHN-93087"
},
{
"date": "2016-08-26T00:00:00",
"db": "VULMON",
"id": "CVE-2016-4268"
},
{
"date": "2016-08-23T00:00:00",
"db": "BID",
"id": "92643"
},
{
"date": "2016-08-30T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2016-004467"
},
{
"date": "2016-08-26T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201608-480"
},
{
"date": "2016-08-26T19:59:04.930000",
"db": "NVD",
"id": "CVE-2016-4268"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2016-08-24T00:00:00",
"db": "ZDI",
"id": "ZDI-16-492"
},
{
"date": "2016-11-28T00:00:00",
"db": "VULHUB",
"id": "VHN-93087"
},
{
"date": "2016-11-28T00:00:00",
"db": "VULMON",
"id": "CVE-2016-4268"
},
{
"date": "2016-08-23T00:00:00",
"db": "BID",
"id": "92643"
},
{
"date": "2016-08-30T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2016-004467"
},
{
"date": "2016-08-29T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201608-480"
},
{
"date": "2025-04-12T10:46:40.837000",
"db": "NVD",
"id": "CVE-2016-4268"
}
]
},
"threat_type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/threat_type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "remote",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201608-480"
}
],
"trust": 0.6
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Windows and Mac OS X Run on Adobe Reader and Acrobat Vulnerable to arbitrary code execution",
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2016-004467"
}
],
"trust": 0.8
},
"type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "buffer overflow",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201608-480"
}
],
"trust": 0.6
}
}
VAR-201608-0294
Vulnerability from variot - Updated: 2025-04-13 23:21Adobe Reader and Acrobat before 11.0.17, Acrobat and Acrobat Reader DC Classic before 15.006.30198, and Acrobat and Acrobat Reader DC Continuous before 15.017.20050 on Windows and OS X allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-4191, CVE-2016-4192, CVE-2016-4193, CVE-2016-4194, CVE-2016-4195, CVE-2016-4196, CVE-2016-4197, CVE-2016-4198, CVE-2016-4199, CVE-2016-4200, CVE-2016-4201, CVE-2016-4202, CVE-2016-4203, CVE-2016-4204, CVE-2016-4205, CVE-2016-4206, CVE-2016-4207, CVE-2016-4208, CVE-2016-4211, CVE-2016-4212, CVE-2016-4213, CVE-2016-4214, CVE-2016-4250, CVE-2016-4251, CVE-2016-4252, CVE-2016-4254, CVE-2016-4266, CVE-2016-4267, CVE-2016-4268, CVE-2016-4269, and CVE-2016-4270. This vulnerability CVE-2016-4191 , CVE-2016-4192 , CVE-2016-4193 , CVE-2016-4194 , CVE-2016-4195 , CVE-2016-4196 , CVE-2016-4197 , CVE-2016-4198 , CVE-2016-4199 , CVE-2016-4200 , CVE-2016-4201 , CVE-2016-4202 , CVE-2016-4203 , CVE-2016-4204 , CVE-2016-4205 , CVE-2016-4206 , CVE-2016-4207 , CVE-2016-4208 , CVE-2016-4211 , CVE-2016-4212 , CVE-2016-4213 , CVE-2016-4214 , CVE-2016-4250 , CVE-2016-4251 , CVE-2016-4252 , CVE-2016-4254 , CVE-2016-4266 , CVE-2016-4267 , CVE-2016-4268 , CVE-2016-4269 ,and CVE-2016-4270 Is a different vulnerability.An attacker could execute arbitrary code or cause a denial of service ( Memory corruption ) There is a possibility of being put into a state. This vulnerability allows remote attackers to disclose sensitive information on vulnerable installations of Adobe Reader DC. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the handling of FlateDecode streams. A crafted FlateDecode stream can trigger a read past the end of an allocated buffer. Failed exploit attempts will likely cause a denial-of-service condition. Adobe Reader, etc. are all products of Adobe (Adobe) in the United States. Adobe Reader is a free PDF file reader; Acrobat is a PDF file editing and conversion tool; Acrobat Reader DC is a set of tools for viewing, printing and annotating PDF. Security flaws exist in several Adobe products
Show details on source website{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"configurations": {
"@id": "https://www.variotdbs.pl/ref/configurations"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-201608-0294",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "acrobat dc",
"scope": "lte",
"trust": 1.0,
"vendor": "adobe",
"version": "15.006.30174"
},
{
"model": "acrobat dc",
"scope": "lte",
"trust": 1.0,
"vendor": "adobe",
"version": "15.016.20045"
},
{
"model": "acrobat reader dc",
"scope": "lte",
"trust": 1.0,
"vendor": "adobe",
"version": "15.016.20045"
},
{
"model": "acrobat reader dc",
"scope": "lte",
"trust": 1.0,
"vendor": "adobe",
"version": "15.006.30174"
},
{
"model": "acrobat",
"scope": "lte",
"trust": 1.0,
"vendor": "adobe",
"version": "11.0.16"
},
{
"model": "reader",
"scope": "lte",
"trust": 1.0,
"vendor": "adobe",
"version": "11.0.16"
},
{
"model": "acrobat",
"scope": "lt",
"trust": 0.8,
"vendor": "adobe",
"version": "xi desktop 11.0.17 (windows/macintosh)"
},
{
"model": "acrobat dc",
"scope": "lt",
"trust": 0.8,
"vendor": "adobe",
"version": "classic 15.006.30198 (windows/macintosh)"
},
{
"model": "acrobat dc",
"scope": "lt",
"trust": 0.8,
"vendor": "adobe",
"version": "continuous track 15.017.20050 (windows/macintosh)"
},
{
"model": "acrobat reader dc",
"scope": "lt",
"trust": 0.8,
"vendor": "adobe",
"version": "classic 15.006.30198 (windows/macintosh)"
},
{
"model": "acrobat reader dc",
"scope": "lt",
"trust": 0.8,
"vendor": "adobe",
"version": "continuous track 15.017.20050 (windows/macintosh)"
},
{
"model": "reader",
"scope": "lt",
"trust": 0.8,
"vendor": "adobe",
"version": "xi desktop 11.0.17 (windows/macintosh)"
},
{
"model": "acrobat reader dc",
"scope": null,
"trust": 0.7,
"vendor": "adobe",
"version": null
},
{
"model": "mac os x",
"scope": null,
"trust": 0.6,
"vendor": "apple",
"version": null
},
{
"model": "acrobat reader dc",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "15.6.30174"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.13"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.6"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.09"
},
{
"model": "acrobat dc",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "15.6.30097"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.3"
},
{
"model": "acrobat reader dc",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "15.6.30172"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0"
},
{
"model": "acrobat reader dc",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "15.16.20045"
},
{
"model": "acrobat reader dc",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "15.010.20056"
},
{
"model": "acrobat dc",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "15.10.20059"
},
{
"model": "reader",
"scope": "ne",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.17"
},
{
"model": "acrobat reader dc",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "15.6.30121"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.10"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.4"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.14"
},
{
"model": "acrobat reader dc",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "15.006.30119"
},
{
"model": "acrobat dc",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "15.6.30198"
},
{
"model": "acrobat reader dc",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "15.16.20039"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.1"
},
{
"model": "acrobat reader dc",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "15.9.20077"
},
{
"model": "acrobat reader dc",
"scope": "ne",
"trust": 0.3,
"vendor": "adobe",
"version": "15.17.20050"
},
{
"model": "acrobat dc",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "15.10.20060"
},
{
"model": "acrobat reader dc",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "15.6.30097"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.16"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.4"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.10"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.14"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.1"
},
{
"model": "acrobat reader dc",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "15.10.20059"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.12"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.15"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.08"
},
{
"model": "acrobat dc",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "15.6.30174"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.16"
},
{
"model": "acrobat reader dc",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "15.6.30198"
},
{
"model": "acrobat dc",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "15.6.30172"
},
{
"model": "acrobat reader dc",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "15.10.20060"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.2"
},
{
"model": "acrobat dc",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "15.16.20045"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.11"
},
{
"model": "acrobat dc",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "15.010.20056"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.7"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.9"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.13"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.15"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.12"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.08"
},
{
"model": "acrobat dc",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "15.6.30121"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.09"
},
{
"model": "acrobat dc",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "15.9.20077"
},
{
"model": "acrobat dc",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "15.006.30119"
},
{
"model": "acrobat dc",
"scope": "ne",
"trust": 0.3,
"vendor": "adobe",
"version": "15.17.20050"
},
{
"model": "acrobat dc",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "15.16.20039"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.6"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.11"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.05"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0"
},
{
"model": "acrobat",
"scope": "ne",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.17"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.3"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.7"
}
],
"sources": [
{
"db": "ZDI",
"id": "ZDI-16-488"
},
{
"db": "BID",
"id": "92640"
},
{
"db": "JVNDB",
"id": "JVNDB-2016-004464"
},
{
"db": "CNNVD",
"id": "CNNVD-201608-474"
},
{
"db": "NVD",
"id": "CVE-2016-4265"
}
]
},
"configurations": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/configurations#",
"children": {
"@container": "@list"
},
"cpe_match": {
"@container": "@list"
},
"data": {
"@container": "@list"
},
"nodes": {
"@container": "@list"
}
},
"data": [
{
"CVE_data_version": "4.0",
"nodes": [
{
"cpe_match": [
{
"cpe22Uri": "cpe:/a:adobe:acrobat",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/a:adobe:acrobat_dc",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/a:adobe:acrobat_reader_dc",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/a:adobe:acrobat_reader",
"vulnerable": true
}
],
"operator": "OR"
}
]
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2016-004464"
}
]
},
"credits": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/credits#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Steven Seeley of Source Incite working with Trend Micro\u0027s Zero Day Initiative.",
"sources": [
{
"db": "BID",
"id": "92640"
},
{
"db": "CNNVD",
"id": "CNNVD-201608-474"
}
],
"trust": 0.9
},
"cve": "CVE-2016-4265",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "nvd@nist.gov",
"availabilityImpact": "COMPLETE",
"baseScore": 10.0,
"confidentialityImpact": "COMPLETE",
"exploitabilityScore": 10.0,
"id": "CVE-2016-4265",
"impactScore": 10.0,
"integrityImpact": "COMPLETE",
"severity": "HIGH",
"trust": 1.8,
"vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
{
"acInsufInfo": null,
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "ZDI",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 8.6,
"id": "CVE-2016-4265",
"impactScore": 2.9,
"integrityImpact": "NONE",
"obtainAllPrivilege": null,
"obtainOtherPrivilege": null,
"obtainUserPrivilege": null,
"severity": "MEDIUM",
"trust": 0.7,
"userInteractionRequired": null,
"vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "VULHUB",
"availabilityImpact": "COMPLETE",
"baseScore": 10.0,
"confidentialityImpact": "COMPLETE",
"exploitabilityScore": 10.0,
"id": "VHN-93084",
"impactScore": 10.0,
"integrityImpact": "COMPLETE",
"severity": "HIGH",
"trust": 0.1,
"vectorString": "AV:N/AC:L/AU:N/C:C/I:C/A:C",
"version": "2.0"
}
],
"cvssV3": [
{
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"author": "nvd@nist.gov",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"exploitabilityScore": 3.9,
"id": "CVE-2016-4265",
"impactScore": 5.9,
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"trust": 1.8,
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
}
],
"severity": [
{
"author": "nvd@nist.gov",
"id": "CVE-2016-4265",
"trust": 1.0,
"value": "CRITICAL"
},
{
"author": "NVD",
"id": "CVE-2016-4265",
"trust": 0.8,
"value": "Critical"
},
{
"author": "ZDI",
"id": "CVE-2016-4265",
"trust": 0.7,
"value": "MEDIUM"
},
{
"author": "CNNVD",
"id": "CNNVD-201608-474",
"trust": 0.6,
"value": "CRITICAL"
},
{
"author": "VULHUB",
"id": "VHN-93084",
"trust": 0.1,
"value": "HIGH"
}
]
}
],
"sources": [
{
"db": "ZDI",
"id": "ZDI-16-488"
},
{
"db": "VULHUB",
"id": "VHN-93084"
},
{
"db": "JVNDB",
"id": "JVNDB-2016-004464"
},
{
"db": "CNNVD",
"id": "CNNVD-201608-474"
},
{
"db": "NVD",
"id": "CVE-2016-4265"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Adobe Reader and Acrobat before 11.0.17, Acrobat and Acrobat Reader DC Classic before 15.006.30198, and Acrobat and Acrobat Reader DC Continuous before 15.017.20050 on Windows and OS X allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-4191, CVE-2016-4192, CVE-2016-4193, CVE-2016-4194, CVE-2016-4195, CVE-2016-4196, CVE-2016-4197, CVE-2016-4198, CVE-2016-4199, CVE-2016-4200, CVE-2016-4201, CVE-2016-4202, CVE-2016-4203, CVE-2016-4204, CVE-2016-4205, CVE-2016-4206, CVE-2016-4207, CVE-2016-4208, CVE-2016-4211, CVE-2016-4212, CVE-2016-4213, CVE-2016-4214, CVE-2016-4250, CVE-2016-4251, CVE-2016-4252, CVE-2016-4254, CVE-2016-4266, CVE-2016-4267, CVE-2016-4268, CVE-2016-4269, and CVE-2016-4270. This vulnerability CVE-2016-4191 , CVE-2016-4192 , CVE-2016-4193 , CVE-2016-4194 , CVE-2016-4195 , CVE-2016-4196 , CVE-2016-4197 , CVE-2016-4198 , CVE-2016-4199 , CVE-2016-4200 , CVE-2016-4201 , CVE-2016-4202 , CVE-2016-4203 , CVE-2016-4204 , CVE-2016-4205 , CVE-2016-4206 , CVE-2016-4207 , CVE-2016-4208 , CVE-2016-4211 , CVE-2016-4212 , CVE-2016-4213 , CVE-2016-4214 , CVE-2016-4250 , CVE-2016-4251 , CVE-2016-4252 , CVE-2016-4254 , CVE-2016-4266 , CVE-2016-4267 , CVE-2016-4268 , CVE-2016-4269 ,and CVE-2016-4270 Is a different vulnerability.An attacker could execute arbitrary code or cause a denial of service ( Memory corruption ) There is a possibility of being put into a state. This vulnerability allows remote attackers to disclose sensitive information on vulnerable installations of Adobe Reader DC. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the handling of FlateDecode streams. A crafted FlateDecode stream can trigger a read past the end of an allocated buffer. Failed exploit attempts will likely cause a denial-of-service condition. Adobe Reader, etc. are all products of Adobe (Adobe) in the United States. Adobe Reader is a free PDF file reader; Acrobat is a PDF file editing and conversion tool; Acrobat Reader DC is a set of tools for viewing, printing and annotating PDF. Security flaws exist in several Adobe products",
"sources": [
{
"db": "NVD",
"id": "CVE-2016-4265"
},
{
"db": "JVNDB",
"id": "JVNDB-2016-004464"
},
{
"db": "ZDI",
"id": "ZDI-16-488"
},
{
"db": "BID",
"id": "92640"
},
{
"db": "VULHUB",
"id": "VHN-93084"
}
],
"trust": 2.61
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "NVD",
"id": "CVE-2016-4265",
"trust": 3.5
},
{
"db": "ZDI",
"id": "ZDI-16-488",
"trust": 2.1
},
{
"db": "BID",
"id": "92640",
"trust": 2.0
},
{
"db": "JVNDB",
"id": "JVNDB-2016-004464",
"trust": 0.8
},
{
"db": "ZDI_CAN",
"id": "ZDI-CAN-3839",
"trust": 0.7
},
{
"db": "CNNVD",
"id": "CNNVD-201608-474",
"trust": 0.7
},
{
"db": "VULHUB",
"id": "VHN-93084",
"trust": 0.1
}
],
"sources": [
{
"db": "ZDI",
"id": "ZDI-16-488"
},
{
"db": "VULHUB",
"id": "VHN-93084"
},
{
"db": "BID",
"id": "92640"
},
{
"db": "JVNDB",
"id": "JVNDB-2016-004464"
},
{
"db": "CNNVD",
"id": "CNNVD-201608-474"
},
{
"db": "NVD",
"id": "CVE-2016-4265"
}
]
},
"id": "VAR-201608-0294",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "VULHUB",
"id": "VHN-93084"
}
],
"trust": 0.01
},
"last_update_date": "2025-04-13T23:21:06.359000Z",
"patch": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/patch#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"title": "APSB16-26",
"trust": 1.5,
"url": "https://helpx.adobe.com/security/products/acrobat/apsb16-26.html"
},
{
"title": "APSB16-26",
"trust": 0.8,
"url": "https://helpx.adobe.com/jp/security/products/acrobat/apsb16-26.html"
},
{
"title": "\u30a2\u30c9\u30d3 \u30b7\u30b9\u30c6\u30e0\u30ba\u793e Adobe Reader \u306e\u8106\u5f31\u6027\u306b\u95a2\u3059\u308b\u304a\u77e5\u3089\u305b",
"trust": 0.8,
"url": "http://www.fmworld.net/biz/common/adobe/20160714.html"
},
{
"title": "Multiple Adobe Product security vulnerabilities",
"trust": 0.6,
"url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=63793"
}
],
"sources": [
{
"db": "ZDI",
"id": "ZDI-16-488"
},
{
"db": "JVNDB",
"id": "JVNDB-2016-004464"
},
{
"db": "CNNVD",
"id": "CNNVD-201608-474"
}
]
},
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "CWE-119",
"trust": 1.9
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-93084"
},
{
"db": "JVNDB",
"id": "JVNDB-2016-004464"
},
{
"db": "NVD",
"id": "CVE-2016-4265"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 2.7,
"url": "https://helpx.adobe.com/security/products/acrobat/apsb16-26.html"
},
{
"trust": 1.7,
"url": "http://www.securityfocus.com/bid/92640"
},
{
"trust": 1.1,
"url": "http://www.zerodayinitiative.com/advisories/zdi-16-488"
},
{
"trust": 0.8,
"url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2016-4265"
},
{
"trust": 0.8,
"url": "http://www.ipa.go.jp/security/ciadr/vul/20160713-adobereader.html"
},
{
"trust": 0.8,
"url": "http://www.jpcert.or.jp/at/2016/at160030.html"
},
{
"trust": 0.8,
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2016-4265"
},
{
"trust": 0.8,
"url": "http://www.npa.go.jp/cyberpolice/topics/?seq=18716"
},
{
"trust": 0.3,
"url": "http://www.adobe.com"
},
{
"trust": 0.3,
"url": "http://www.zerodayinitiative.com/advisories/zdi-16-488/"
}
],
"sources": [
{
"db": "ZDI",
"id": "ZDI-16-488"
},
{
"db": "VULHUB",
"id": "VHN-93084"
},
{
"db": "BID",
"id": "92640"
},
{
"db": "JVNDB",
"id": "JVNDB-2016-004464"
},
{
"db": "CNNVD",
"id": "CNNVD-201608-474"
},
{
"db": "NVD",
"id": "CVE-2016-4265"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "ZDI",
"id": "ZDI-16-488"
},
{
"db": "VULHUB",
"id": "VHN-93084"
},
{
"db": "BID",
"id": "92640"
},
{
"db": "JVNDB",
"id": "JVNDB-2016-004464"
},
{
"db": "CNNVD",
"id": "CNNVD-201608-474"
},
{
"db": "NVD",
"id": "CVE-2016-4265"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2016-08-24T00:00:00",
"db": "ZDI",
"id": "ZDI-16-488"
},
{
"date": "2016-08-26T00:00:00",
"db": "VULHUB",
"id": "VHN-93084"
},
{
"date": "2016-08-23T00:00:00",
"db": "BID",
"id": "92640"
},
{
"date": "2016-08-30T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2016-004464"
},
{
"date": "2016-08-26T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201608-474"
},
{
"date": "2016-08-26T19:59:01.507000",
"db": "NVD",
"id": "CVE-2016-4265"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2016-08-24T00:00:00",
"db": "ZDI",
"id": "ZDI-16-488"
},
{
"date": "2016-11-28T00:00:00",
"db": "VULHUB",
"id": "VHN-93084"
},
{
"date": "2016-08-23T00:00:00",
"db": "BID",
"id": "92640"
},
{
"date": "2016-08-30T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2016-004464"
},
{
"date": "2016-08-29T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201608-474"
},
{
"date": "2025-04-12T10:46:40.837000",
"db": "NVD",
"id": "CVE-2016-4265"
}
]
},
"threat_type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/threat_type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "remote",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201608-474"
}
],
"trust": 0.6
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Windows and Mac OS X Run on Adobe Reader and Acrobat Vulnerable to arbitrary code execution",
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2016-004464"
}
],
"trust": 0.8
},
"type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "buffer overflow",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201608-474"
}
],
"trust": 0.6
}
}
VAR-201608-0295
Vulnerability from variot - Updated: 2025-04-13 23:17Adobe Reader and Acrobat before 11.0.17, Acrobat and Acrobat Reader DC Classic before 15.006.30198, and Acrobat and Acrobat Reader DC Continuous before 15.017.20050 on Windows and OS X allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-4191, CVE-2016-4192, CVE-2016-4193, CVE-2016-4194, CVE-2016-4195, CVE-2016-4196, CVE-2016-4197, CVE-2016-4198, CVE-2016-4199, CVE-2016-4200, CVE-2016-4201, CVE-2016-4202, CVE-2016-4203, CVE-2016-4204, CVE-2016-4205, CVE-2016-4206, CVE-2016-4207, CVE-2016-4208, CVE-2016-4211, CVE-2016-4212, CVE-2016-4213, CVE-2016-4214, CVE-2016-4250, CVE-2016-4251, CVE-2016-4252, CVE-2016-4254, CVE-2016-4265, CVE-2016-4267, CVE-2016-4268, CVE-2016-4269, and CVE-2016-4270. This vulnerability CVE-2016-4191 , CVE-2016-4192 , CVE-2016-4193 , CVE-2016-4194 , CVE-2016-4195 , CVE-2016-4196 , CVE-2016-4197 , CVE-2016-4198 , CVE-2016-4199 , CVE-2016-4200 , CVE-2016-4201 , CVE-2016-4202 , CVE-2016-4203 , CVE-2016-4204 , CVE-2016-4205 , CVE-2016-4206 , CVE-2016-4207 , CVE-2016-4208 , CVE-2016-4211 , CVE-2016-4212 , CVE-2016-4213 , CVE-2016-4214 , CVE-2016-4250 , CVE-2016-4251 , CVE-2016-4252 , CVE-2016-4254 , CVE-2016-4265 , CVE-2016-4267 , CVE-2016-4268 , CVE-2016-4269 ,and CVE-2016-4270 Is a different vulnerability.An attacker could execute arbitrary code or cause a denial of service ( Memory corruption ) There is a possibility of being put into a state. This vulnerability allows remote attackers to disclose sensitive information on vulnerable installations of Adobe Reader DC. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the handling of FlateDecode streams. A crafted FlateDecode stream can trigger a read past the end of an allocated buffer. Adobe Reader and Acrobat are prone to an memory-corruption vulnerability. Failed attacks may cause a denial-of-service condition. are all products of Adobe (Adobe) in the United States. Adobe Reader is a free PDF file reader; Acrobat is a PDF file editing and conversion tool; Acrobat Reader DC is a set of tools for viewing, printing and annotating PDF. Security flaws exist in several Adobe products
Show details on source website{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"configurations": {
"@id": "https://www.variotdbs.pl/ref/configurations"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-201608-0295",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "acrobat dc",
"scope": "lte",
"trust": 1.0,
"vendor": "adobe",
"version": "15.006.30174"
},
{
"model": "acrobat dc",
"scope": "lte",
"trust": 1.0,
"vendor": "adobe",
"version": "15.016.20045"
},
{
"model": "acrobat reader dc",
"scope": "lte",
"trust": 1.0,
"vendor": "adobe",
"version": "15.016.20045"
},
{
"model": "acrobat reader dc",
"scope": "lte",
"trust": 1.0,
"vendor": "adobe",
"version": "15.006.30174"
},
{
"model": "acrobat",
"scope": "lte",
"trust": 1.0,
"vendor": "adobe",
"version": "11.0.16"
},
{
"model": "reader",
"scope": "lte",
"trust": 1.0,
"vendor": "adobe",
"version": "11.0.16"
},
{
"model": "acrobat",
"scope": "lt",
"trust": 0.8,
"vendor": "adobe",
"version": "xi desktop 11.0.17 (windows/macintosh)"
},
{
"model": "acrobat dc",
"scope": "lt",
"trust": 0.8,
"vendor": "adobe",
"version": "classic 15.006.30198 (windows/macintosh)"
},
{
"model": "acrobat dc",
"scope": "lt",
"trust": 0.8,
"vendor": "adobe",
"version": "continuous track 15.017.20050 (windows/macintosh)"
},
{
"model": "acrobat reader dc",
"scope": "lt",
"trust": 0.8,
"vendor": "adobe",
"version": "classic 15.006.30198 (windows/macintosh)"
},
{
"model": "acrobat reader dc",
"scope": "lt",
"trust": 0.8,
"vendor": "adobe",
"version": "continuous track 15.017.20050 (windows/macintosh)"
},
{
"model": "reader",
"scope": "lt",
"trust": 0.8,
"vendor": "adobe",
"version": "xi desktop 11.0.17 (windows/macintosh)"
},
{
"model": "acrobat reader dc",
"scope": null,
"trust": 0.7,
"vendor": "adobe",
"version": null
},
{
"model": "mac os x",
"scope": null,
"trust": 0.6,
"vendor": "apple",
"version": null
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "7.0.1"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "9.5.2"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "7.0.6"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "8"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "8.0"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "9.5.4"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "5.0.10"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "4.05"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1.14"
},
{
"model": "acrobat reader dc",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "15.6.30172"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1.9"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "9.2"
},
{
"model": "acrobat reader dc",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "15.6.30121"
},
{
"model": "acrobat reader dc",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "15.006.30119"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "9.4.2"
},
{
"model": "acrobat reader dc",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "15.16.20039"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1.1"
},
{
"model": "acrobat reader dc",
"scope": "ne",
"trust": 0.3,
"vendor": "adobe",
"version": "15.17.20050"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "9.3.3"
},
{
"model": "acrobat reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "7.1.3"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1.13"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.14"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.10"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.0"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "3.02"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "9.4.1"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "9.3.4"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "6.0.2"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.16"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "8.2.3"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "9.4.3"
},
{
"model": "acrobat reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1.1"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "4.0"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "7.0"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "8.3"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1.2"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "8.2.4"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1.15"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "7.0.1"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.0.3"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1.10"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "8"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "8.0"
},
{
"model": "acrobat dc",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "15.9.20077"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "5.0.11"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "9.1.2"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.3"
},
{
"model": "acrobat dc",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "15.6.30097"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "6.0"
},
{
"model": "acrobat reader dc",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "15.6.30174"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.0.13"
},
{
"model": "acrobat reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1.2"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.6"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "7.0.3"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "8.1.5"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "9"
},
{
"model": "acrobat dc",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "15.10.20059"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "8.2.5"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "8.2.2"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.10"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.4"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.14"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "8.2.6"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1.3"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "3.0"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "9.0"
},
{
"model": "acrobat reader dc",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "15.6.30097"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.16"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "8.2.3"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "9.4.3"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "7.0.8"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "9.3"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "9.4.6"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.0.2"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "9.4.4"
},
{
"model": "acrobat reader dc",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "15.10.20059"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "8.2.4"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.0.1"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "5.0.5"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "8.2"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "9.5"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "3.1"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "8.1.8"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "9.3.2"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "8.1.2"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "9.4.5"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "9.5.1"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "5.0"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "9.4"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "7.0.2"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.11"
},
{
"model": "acrobat dc",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "15.16.20045"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "6.0.3"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1.4"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1.6"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "8.1.3"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "7.0.3"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "9.5.5"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "9.1.1"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1.11"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "8.2.5"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1.14"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.7"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "6.0.4"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "7.1.4"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.13"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "8.2.2"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "5.0.9"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1.3"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "3.0"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "9.4.2"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "9.5.3"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1.1"
},
{
"model": "acrobat reader dc",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "15.16.20045"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "4.5"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "7.1.2"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1.16"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.0.2"
},
{
"model": "acrobat reader dc",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "15.9.20077"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1.5"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "9.4.4"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.0"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "9.5"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "5.0.6"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "6.0.5"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1.12"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.1"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "9.4.5"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "7.0.4"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "5.0"
},
{
"model": "acrobat reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "9.4"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1.2"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "8.1.4"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1.13"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "6.0.3"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "5.1"
},
{
"model": "acrobat dc",
"scope": "ne",
"trust": 0.3,
"vendor": "adobe",
"version": "15.6.30198"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1.4"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "8.1"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1.8"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "9.1.1"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "9.4.1"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1.11"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.0.3"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.2"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.15"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.12"
},
{
"model": "acrobat dc",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "15.010.20056"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.9"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.7"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "6.0.4"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "8.3.1"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.13"
},
{
"model": "acrobat reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1.12"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "7.0"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.08"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "6.0"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "9.1"
},
{
"model": "acrobat dc",
"scope": "ne",
"trust": 0.3,
"vendor": "adobe",
"version": "15.17.20050"
},
{
"model": "acrobat reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1.13"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.6"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.05"
},
{
"model": "acrobat reader dc",
"scope": "ne",
"trust": 0.3,
"vendor": "adobe",
"version": "15.6.30198"
},
{
"model": "acrobat",
"scope": "ne",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.17"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1.10"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "7.0.7"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.09"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "7.1.2"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "6.0.1"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "8.2.1"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "8.1.7"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1.16"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.3"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "7.0.9"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "8.2.6"
},
{
"model": "acrobat reader dc",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "15.010.20056"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "9.5.2"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "9.4.7"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1.12"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "6.0.5"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "5.0.10"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "9.3.1"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.1"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "9.3"
},
{
"model": "acrobat reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1.10"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "4.05"
},
{
"model": "acrobat dc",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "15.10.20060"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "5.1"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.4"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1.9"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "9.2"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "3.01"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "9.1.3"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "8.1.6"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "7.1.1"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.12"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.15"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.08"
},
{
"model": "acrobat dc",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "15.6.30174"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "9.3.3"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "7.0.5"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "7.1"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "9.4.6"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1.7"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.0.1"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "8.1.1"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "5.0.5"
},
{
"model": "acrobat dc",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "15.6.30172"
},
{
"model": "acrobat reader dc",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "15.10.20060"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "6.0.2"
},
{
"model": "reader",
"scope": "ne",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.17"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "9.3.2"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "4.0"
},
{
"model": "acrobat dc",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "15.6.30121"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "5.0.7"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.09"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "6.0.1"
},
{
"model": "acrobat dc",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "15.006.30119"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "9.5.1"
},
{
"model": "acrobat dc",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "15.16.20039"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "7.0.2"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.11"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "8.3"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "7.0.9"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1.15"
}
],
"sources": [
{
"db": "ZDI",
"id": "ZDI-16-489"
},
{
"db": "BID",
"id": "92636"
},
{
"db": "JVNDB",
"id": "JVNDB-2016-004465"
},
{
"db": "CNNVD",
"id": "CNNVD-201608-476"
},
{
"db": "NVD",
"id": "CVE-2016-4266"
}
]
},
"configurations": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/configurations#",
"children": {
"@container": "@list"
},
"cpe_match": {
"@container": "@list"
},
"data": {
"@container": "@list"
},
"nodes": {
"@container": "@list"
}
},
"data": [
{
"CVE_data_version": "4.0",
"nodes": [
{
"cpe_match": [
{
"cpe22Uri": "cpe:/a:adobe:acrobat",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/a:adobe:acrobat_dc",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/a:adobe:acrobat_reader_dc",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/a:adobe:acrobat_reader",
"vulnerable": true
}
],
"operator": "OR"
}
]
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2016-004465"
}
]
},
"credits": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/credits#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Steven Seeley of Source Incite",
"sources": [
{
"db": "ZDI",
"id": "ZDI-16-489"
},
{
"db": "BID",
"id": "92636"
},
{
"db": "CNNVD",
"id": "CNNVD-201608-476"
}
],
"trust": 1.6
},
"cve": "CVE-2016-4266",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "nvd@nist.gov",
"availabilityImpact": "COMPLETE",
"baseScore": 10.0,
"confidentialityImpact": "COMPLETE",
"exploitabilityScore": 10.0,
"id": "CVE-2016-4266",
"impactScore": 10.0,
"integrityImpact": "COMPLETE",
"severity": "HIGH",
"trust": 1.8,
"vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
{
"acInsufInfo": null,
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "ZDI",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 8.6,
"id": "CVE-2016-4266",
"impactScore": 2.9,
"integrityImpact": "NONE",
"obtainAllPrivilege": null,
"obtainOtherPrivilege": null,
"obtainUserPrivilege": null,
"severity": "MEDIUM",
"trust": 0.7,
"userInteractionRequired": null,
"vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "VULHUB",
"availabilityImpact": "COMPLETE",
"baseScore": 10.0,
"confidentialityImpact": "COMPLETE",
"exploitabilityScore": 10.0,
"id": "VHN-93085",
"impactScore": 10.0,
"integrityImpact": "COMPLETE",
"severity": "HIGH",
"trust": 0.1,
"vectorString": "AV:N/AC:L/AU:N/C:C/I:C/A:C",
"version": "2.0"
}
],
"cvssV3": [
{
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"author": "nvd@nist.gov",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"exploitabilityScore": 3.9,
"id": "CVE-2016-4266",
"impactScore": 5.9,
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"trust": 1.8,
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
}
],
"severity": [
{
"author": "nvd@nist.gov",
"id": "CVE-2016-4266",
"trust": 1.0,
"value": "CRITICAL"
},
{
"author": "NVD",
"id": "CVE-2016-4266",
"trust": 0.8,
"value": "Critical"
},
{
"author": "ZDI",
"id": "CVE-2016-4266",
"trust": 0.7,
"value": "MEDIUM"
},
{
"author": "CNNVD",
"id": "CNNVD-201608-476",
"trust": 0.6,
"value": "CRITICAL"
},
{
"author": "VULHUB",
"id": "VHN-93085",
"trust": 0.1,
"value": "HIGH"
}
]
}
],
"sources": [
{
"db": "ZDI",
"id": "ZDI-16-489"
},
{
"db": "VULHUB",
"id": "VHN-93085"
},
{
"db": "JVNDB",
"id": "JVNDB-2016-004465"
},
{
"db": "CNNVD",
"id": "CNNVD-201608-476"
},
{
"db": "NVD",
"id": "CVE-2016-4266"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Adobe Reader and Acrobat before 11.0.17, Acrobat and Acrobat Reader DC Classic before 15.006.30198, and Acrobat and Acrobat Reader DC Continuous before 15.017.20050 on Windows and OS X allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-4191, CVE-2016-4192, CVE-2016-4193, CVE-2016-4194, CVE-2016-4195, CVE-2016-4196, CVE-2016-4197, CVE-2016-4198, CVE-2016-4199, CVE-2016-4200, CVE-2016-4201, CVE-2016-4202, CVE-2016-4203, CVE-2016-4204, CVE-2016-4205, CVE-2016-4206, CVE-2016-4207, CVE-2016-4208, CVE-2016-4211, CVE-2016-4212, CVE-2016-4213, CVE-2016-4214, CVE-2016-4250, CVE-2016-4251, CVE-2016-4252, CVE-2016-4254, CVE-2016-4265, CVE-2016-4267, CVE-2016-4268, CVE-2016-4269, and CVE-2016-4270. This vulnerability CVE-2016-4191 , CVE-2016-4192 , CVE-2016-4193 , CVE-2016-4194 , CVE-2016-4195 , CVE-2016-4196 , CVE-2016-4197 , CVE-2016-4198 , CVE-2016-4199 , CVE-2016-4200 , CVE-2016-4201 , CVE-2016-4202 , CVE-2016-4203 , CVE-2016-4204 , CVE-2016-4205 , CVE-2016-4206 , CVE-2016-4207 , CVE-2016-4208 , CVE-2016-4211 , CVE-2016-4212 , CVE-2016-4213 , CVE-2016-4214 , CVE-2016-4250 , CVE-2016-4251 , CVE-2016-4252 , CVE-2016-4254 , CVE-2016-4265 , CVE-2016-4267 , CVE-2016-4268 , CVE-2016-4269 ,and CVE-2016-4270 Is a different vulnerability.An attacker could execute arbitrary code or cause a denial of service ( Memory corruption ) There is a possibility of being put into a state. This vulnerability allows remote attackers to disclose sensitive information on vulnerable installations of Adobe Reader DC. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the handling of FlateDecode streams. A crafted FlateDecode stream can trigger a read past the end of an allocated buffer. Adobe Reader and Acrobat are prone to an memory-corruption vulnerability. Failed attacks may cause a denial-of-service condition. are all products of Adobe (Adobe) in the United States. Adobe Reader is a free PDF file reader; Acrobat is a PDF file editing and conversion tool; Acrobat Reader DC is a set of tools for viewing, printing and annotating PDF. Security flaws exist in several Adobe products",
"sources": [
{
"db": "NVD",
"id": "CVE-2016-4266"
},
{
"db": "JVNDB",
"id": "JVNDB-2016-004465"
},
{
"db": "ZDI",
"id": "ZDI-16-489"
},
{
"db": "BID",
"id": "92636"
},
{
"db": "VULHUB",
"id": "VHN-93085"
}
],
"trust": 2.61
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "NVD",
"id": "CVE-2016-4266",
"trust": 3.5
},
{
"db": "ZDI",
"id": "ZDI-16-489",
"trust": 2.1
},
{
"db": "BID",
"id": "92636",
"trust": 2.0
},
{
"db": "JVNDB",
"id": "JVNDB-2016-004465",
"trust": 0.8
},
{
"db": "ZDI_CAN",
"id": "ZDI-CAN-3835",
"trust": 0.7
},
{
"db": "CNNVD",
"id": "CNNVD-201608-476",
"trust": 0.7
},
{
"db": "VULHUB",
"id": "VHN-93085",
"trust": 0.1
}
],
"sources": [
{
"db": "ZDI",
"id": "ZDI-16-489"
},
{
"db": "VULHUB",
"id": "VHN-93085"
},
{
"db": "BID",
"id": "92636"
},
{
"db": "JVNDB",
"id": "JVNDB-2016-004465"
},
{
"db": "CNNVD",
"id": "CNNVD-201608-476"
},
{
"db": "NVD",
"id": "CVE-2016-4266"
}
]
},
"id": "VAR-201608-0295",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "VULHUB",
"id": "VHN-93085"
}
],
"trust": 0.01
},
"last_update_date": "2025-04-13T23:17:52.942000Z",
"patch": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/patch#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"title": "APSB16-26",
"trust": 1.5,
"url": "https://helpx.adobe.com/security/products/acrobat/apsb16-26.html"
},
{
"title": "APSB16-26",
"trust": 0.8,
"url": "https://helpx.adobe.com/jp/security/products/acrobat/apsb16-26.html"
},
{
"title": "\u30a2\u30c9\u30d3 \u30b7\u30b9\u30c6\u30e0\u30ba\u793e Adobe Reader \u306e\u8106\u5f31\u6027\u306b\u95a2\u3059\u308b\u304a\u77e5\u3089\u305b",
"trust": 0.8,
"url": "http://www.fmworld.net/biz/common/adobe/20160714.html"
},
{
"title": "Multiple Adobe Product security vulnerabilities",
"trust": 0.6,
"url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=63795"
}
],
"sources": [
{
"db": "ZDI",
"id": "ZDI-16-489"
},
{
"db": "JVNDB",
"id": "JVNDB-2016-004465"
},
{
"db": "CNNVD",
"id": "CNNVD-201608-476"
}
]
},
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "CWE-119",
"trust": 1.9
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-93085"
},
{
"db": "JVNDB",
"id": "JVNDB-2016-004465"
},
{
"db": "NVD",
"id": "CVE-2016-4266"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 2.7,
"url": "https://helpx.adobe.com/security/products/acrobat/apsb16-26.html"
},
{
"trust": 1.7,
"url": "http://www.securityfocus.com/bid/92636"
},
{
"trust": 1.1,
"url": "http://www.zerodayinitiative.com/advisories/zdi-16-489"
},
{
"trust": 0.8,
"url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2016-4266"
},
{
"trust": 0.8,
"url": "http://www.ipa.go.jp/security/ciadr/vul/20160713-adobereader.html"
},
{
"trust": 0.8,
"url": "http://www.jpcert.or.jp/at/2016/at160030.html"
},
{
"trust": 0.8,
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2016-4266"
},
{
"trust": 0.8,
"url": "http://www.npa.go.jp/cyberpolice/topics/?seq=18716"
},
{
"trust": 0.3,
"url": "http://www.adobe.com/products/acrobat/"
},
{
"trust": 0.3,
"url": "http://www.adobe.com/products/reader/"
},
{
"trust": 0.3,
"url": "http://www.zerodayinitiative.com/advisories/zdi-16-489/"
}
],
"sources": [
{
"db": "ZDI",
"id": "ZDI-16-489"
},
{
"db": "VULHUB",
"id": "VHN-93085"
},
{
"db": "BID",
"id": "92636"
},
{
"db": "JVNDB",
"id": "JVNDB-2016-004465"
},
{
"db": "CNNVD",
"id": "CNNVD-201608-476"
},
{
"db": "NVD",
"id": "CVE-2016-4266"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "ZDI",
"id": "ZDI-16-489"
},
{
"db": "VULHUB",
"id": "VHN-93085"
},
{
"db": "BID",
"id": "92636"
},
{
"db": "JVNDB",
"id": "JVNDB-2016-004465"
},
{
"db": "CNNVD",
"id": "CNNVD-201608-476"
},
{
"db": "NVD",
"id": "CVE-2016-4266"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2016-08-24T00:00:00",
"db": "ZDI",
"id": "ZDI-16-489"
},
{
"date": "2016-08-26T00:00:00",
"db": "VULHUB",
"id": "VHN-93085"
},
{
"date": "2016-08-23T00:00:00",
"db": "BID",
"id": "92636"
},
{
"date": "2016-08-30T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2016-004465"
},
{
"date": "2016-08-26T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201608-476"
},
{
"date": "2016-08-26T19:59:02.600000",
"db": "NVD",
"id": "CVE-2016-4266"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2016-08-24T00:00:00",
"db": "ZDI",
"id": "ZDI-16-489"
},
{
"date": "2016-11-28T00:00:00",
"db": "VULHUB",
"id": "VHN-93085"
},
{
"date": "2016-08-23T00:00:00",
"db": "BID",
"id": "92636"
},
{
"date": "2016-08-30T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2016-004465"
},
{
"date": "2016-08-29T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201608-476"
},
{
"date": "2025-04-12T10:46:40.837000",
"db": "NVD",
"id": "CVE-2016-4266"
}
]
},
"threat_type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/threat_type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "remote",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201608-476"
}
],
"trust": 0.6
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Windows and Mac OS X Run on Adobe Reader and Acrobat Vulnerable to arbitrary code execution",
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2016-004465"
}
],
"trust": 0.8
},
"type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "buffer overflow",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201608-476"
}
],
"trust": 0.6
}
}
VAR-201608-0065
Vulnerability from variot - Updated: 2025-04-13 23:09Adobe Reader and Acrobat before 11.0.16, Acrobat and Acrobat Reader DC Classic before 15.006.30172, and Acrobat and Acrobat Reader DC Continuous before 15.016.20039 on Windows and OS X allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-1037, CVE-2016-1063, CVE-2016-1064, CVE-2016-1071, CVE-2016-1072, CVE-2016-1073, CVE-2016-1074, CVE-2016-1076, CVE-2016-1077, CVE-2016-1078, CVE-2016-1080, CVE-2016-1081, CVE-2016-1082, CVE-2016-1083, CVE-2016-1084, CVE-2016-1085, CVE-2016-1086, CVE-2016-1088, CVE-2016-1093, CVE-2016-1095, CVE-2016-1116, CVE-2016-1118, CVE-2016-1119, CVE-2016-1120, CVE-2016-1123, CVE-2016-1124, CVE-2016-1125, CVE-2016-1126, CVE-2016-1127, CVE-2016-1128, CVE-2016-1129, CVE-2016-1130, CVE-2016-4088, CVE-2016-4089, CVE-2016-4090, CVE-2016-4093, CVE-2016-4094, CVE-2016-4096, CVE-2016-4097, CVE-2016-4098, CVE-2016-4099, CVE-2016-4100, CVE-2016-4101, CVE-2016-4103, CVE-2016-4104, and CVE-2016-4105. This vulnerability CVE-2016-1037 , CVE-2016-1063 , CVE-2016-1064 , CVE-2016-1071 , CVE-2016-1072 , CVE-2016-1073 , CVE-2016-1074 , CVE-2016-1076 , CVE-2016-1077 , CVE-2016-1078 , CVE-2016-1080 , CVE-2016-1081 , CVE-2016-1082 , CVE-2016-1083 , CVE-2016-1084 , CVE-2016-1085 , CVE-2016-1086 , CVE-2016-1088 , CVE-2016-1093 , CVE-2016-1095 , CVE-2016-1116 , CVE-2016-1118 , CVE-2016-1119 , CVE-2016-1120 , CVE-2016-1123 , CVE-2016-1124 , CVE-2016-1125 , CVE-2016-1126 , CVE-2016-1127 , CVE-2016-1128 , CVE-2016-1129 , CVE-2016-1130 , CVE-2016-4088 , CVE-2016-4089 , CVE-2016-4090 , CVE-2016-4093 , CVE-2016-4094 , CVE-2016-4096 , CVE-2016-4097 , CVE-2016-4098 , CVE-2016-4099 , CVE-2016-4100 , CVE-2016-4101 , CVE-2016-4103 , CVE-2016-4104 ,and CVE-2016-4105 Is a different vulnerability.An attacker could execute arbitrary code or cause a denial of service ( Memory corruption ) There is a possibility of being put into a state. Limited information is currently available regarding this issue. We will update this BID as more information emerges. Attackers can exploit this issue to execute arbitrary code in the context of the user running the affected applications. Failed exploit attempts will likely cause a denial-of-service condition. Adobe Reader, etc. are all products of Adobe (Adobe) in the United States. Adobe Reader is a free PDF file reader; Acrobat is a PDF file editing and conversion tool; Acrobat Reader DC is a set of tools for viewing, printing and annotating PDF. Security flaws exist in several Adobe products
Show details on source website{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"configurations": {
"@id": "https://www.variotdbs.pl/ref/configurations"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-201608-0065",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "acrobat dc",
"scope": "lte",
"trust": 1.0,
"vendor": "adobe",
"version": "15.006.30174"
},
{
"model": "acrobat dc",
"scope": "lte",
"trust": 1.0,
"vendor": "adobe",
"version": "15.016.20045"
},
{
"model": "acrobat reader dc",
"scope": "lte",
"trust": 1.0,
"vendor": "adobe",
"version": "15.016.20045"
},
{
"model": "acrobat reader dc",
"scope": "lte",
"trust": 1.0,
"vendor": "adobe",
"version": "15.006.30174"
},
{
"model": "acrobat",
"scope": "lte",
"trust": 1.0,
"vendor": "adobe",
"version": "11.0.16"
},
{
"model": "reader",
"scope": "lte",
"trust": 1.0,
"vendor": "adobe",
"version": "11.0.16"
},
{
"model": "acrobat",
"scope": "lt",
"trust": 0.8,
"vendor": "adobe",
"version": "xi desktop 11.0.16 (windows/macintosh)"
},
{
"model": "acrobat dc",
"scope": "lt",
"trust": 0.8,
"vendor": "adobe",
"version": "classic 15.006.30172 (windows/macintosh)"
},
{
"model": "acrobat dc",
"scope": "lt",
"trust": 0.8,
"vendor": "adobe",
"version": "continuous track 15.016.20039 (windows/macintosh)"
},
{
"model": "acrobat reader dc",
"scope": "lt",
"trust": 0.8,
"vendor": "adobe",
"version": "classic 15.006.30172 (windows/macintosh)"
},
{
"model": "acrobat reader dc",
"scope": "lt",
"trust": 0.8,
"vendor": "adobe",
"version": "continuous track 15.016.20039 (windows/macintosh)"
},
{
"model": "reader",
"scope": "lt",
"trust": 0.8,
"vendor": "adobe",
"version": "xi desktop 11.0.16 (windows/macintosh)"
},
{
"model": "mac os x",
"scope": null,
"trust": 0.6,
"vendor": "apple",
"version": null
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2016-004463"
},
{
"db": "CNNVD",
"id": "CNNVD-201607-472"
},
{
"db": "NVD",
"id": "CVE-2016-4119"
}
]
},
"configurations": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/configurations#",
"children": {
"@container": "@list"
},
"cpe_match": {
"@container": "@list"
},
"data": {
"@container": "@list"
},
"nodes": {
"@container": "@list"
}
},
"data": [
{
"CVE_data_version": "4.0",
"nodes": [
{
"cpe_match": [
{
"cpe22Uri": "cpe:/a:adobe:acrobat",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/a:adobe:acrobat_dc",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/a:adobe:acrobat_reader_dc",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/a:adobe:acrobat_reader",
"vulnerable": true
}
],
"operator": "OR"
}
]
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2016-004463"
}
]
},
"credits": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/credits#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Kushal Arvind Shah and Kai Lu of Fortinet\u0027s FortiGuard Labs.",
"sources": [
{
"db": "BID",
"id": "90800"
},
{
"db": "CNNVD",
"id": "CNNVD-201607-472"
}
],
"trust": 0.9
},
"cve": "CVE-2016-4119",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "nvd@nist.gov",
"availabilityImpact": "COMPLETE",
"baseScore": 10.0,
"confidentialityImpact": "COMPLETE",
"exploitabilityScore": 10.0,
"id": "CVE-2016-4119",
"impactScore": 10.0,
"integrityImpact": "COMPLETE",
"severity": "HIGH",
"trust": 1.8,
"vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "VULHUB",
"availabilityImpact": "COMPLETE",
"baseScore": 10.0,
"confidentialityImpact": "COMPLETE",
"exploitabilityScore": 10.0,
"id": "VHN-92938",
"impactScore": 10.0,
"integrityImpact": "COMPLETE",
"severity": "HIGH",
"trust": 0.1,
"vectorString": "AV:N/AC:L/AU:N/C:C/I:C/A:C",
"version": "2.0"
}
],
"cvssV3": [
{
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"author": "nvd@nist.gov",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"exploitabilityScore": 3.9,
"id": "CVE-2016-4119",
"impactScore": 5.9,
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"trust": 1.8,
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
}
],
"severity": [
{
"author": "nvd@nist.gov",
"id": "CVE-2016-4119",
"trust": 1.0,
"value": "CRITICAL"
},
{
"author": "NVD",
"id": "CVE-2016-4119",
"trust": 0.8,
"value": "Critical"
},
{
"author": "CNNVD",
"id": "CNNVD-201607-472",
"trust": 0.6,
"value": "CRITICAL"
},
{
"author": "VULHUB",
"id": "VHN-92938",
"trust": 0.1,
"value": "HIGH"
}
]
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-92938"
},
{
"db": "JVNDB",
"id": "JVNDB-2016-004463"
},
{
"db": "CNNVD",
"id": "CNNVD-201607-472"
},
{
"db": "NVD",
"id": "CVE-2016-4119"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Adobe Reader and Acrobat before 11.0.16, Acrobat and Acrobat Reader DC Classic before 15.006.30172, and Acrobat and Acrobat Reader DC Continuous before 15.016.20039 on Windows and OS X allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-1037, CVE-2016-1063, CVE-2016-1064, CVE-2016-1071, CVE-2016-1072, CVE-2016-1073, CVE-2016-1074, CVE-2016-1076, CVE-2016-1077, CVE-2016-1078, CVE-2016-1080, CVE-2016-1081, CVE-2016-1082, CVE-2016-1083, CVE-2016-1084, CVE-2016-1085, CVE-2016-1086, CVE-2016-1088, CVE-2016-1093, CVE-2016-1095, CVE-2016-1116, CVE-2016-1118, CVE-2016-1119, CVE-2016-1120, CVE-2016-1123, CVE-2016-1124, CVE-2016-1125, CVE-2016-1126, CVE-2016-1127, CVE-2016-1128, CVE-2016-1129, CVE-2016-1130, CVE-2016-4088, CVE-2016-4089, CVE-2016-4090, CVE-2016-4093, CVE-2016-4094, CVE-2016-4096, CVE-2016-4097, CVE-2016-4098, CVE-2016-4099, CVE-2016-4100, CVE-2016-4101, CVE-2016-4103, CVE-2016-4104, and CVE-2016-4105. This vulnerability CVE-2016-1037 , CVE-2016-1063 , CVE-2016-1064 , CVE-2016-1071 , CVE-2016-1072 , CVE-2016-1073 , CVE-2016-1074 , CVE-2016-1076 , CVE-2016-1077 , CVE-2016-1078 , CVE-2016-1080 , CVE-2016-1081 , CVE-2016-1082 , CVE-2016-1083 , CVE-2016-1084 , CVE-2016-1085 , CVE-2016-1086 , CVE-2016-1088 , CVE-2016-1093 , CVE-2016-1095 , CVE-2016-1116 , CVE-2016-1118 , CVE-2016-1119 , CVE-2016-1120 , CVE-2016-1123 , CVE-2016-1124 , CVE-2016-1125 , CVE-2016-1126 , CVE-2016-1127 , CVE-2016-1128 , CVE-2016-1129 , CVE-2016-1130 , CVE-2016-4088 , CVE-2016-4089 , CVE-2016-4090 , CVE-2016-4093 , CVE-2016-4094 , CVE-2016-4096 , CVE-2016-4097 , CVE-2016-4098 , CVE-2016-4099 , CVE-2016-4100 , CVE-2016-4101 , CVE-2016-4103 , CVE-2016-4104 ,and CVE-2016-4105 Is a different vulnerability.An attacker could execute arbitrary code or cause a denial of service ( Memory corruption ) There is a possibility of being put into a state. \nLimited information is currently available regarding this issue. We will update this BID as more information emerges. \nAttackers can exploit this issue to execute arbitrary code in the context of the user running the affected applications. Failed exploit attempts will likely cause a denial-of-service condition. Adobe Reader, etc. are all products of Adobe (Adobe) in the United States. Adobe Reader is a free PDF file reader; Acrobat is a PDF file editing and conversion tool; Acrobat Reader DC is a set of tools for viewing, printing and annotating PDF. Security flaws exist in several Adobe products",
"sources": [
{
"db": "NVD",
"id": "CVE-2016-4119"
},
{
"db": "JVNDB",
"id": "JVNDB-2016-004463"
},
{
"db": "BID",
"id": "90800"
},
{
"db": "VULHUB",
"id": "VHN-92938"
}
],
"trust": 1.98
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "NVD",
"id": "CVE-2016-4119",
"trust": 2.8
},
{
"db": "BID",
"id": "90800",
"trust": 0.9
},
{
"db": "JVNDB",
"id": "JVNDB-2016-004463",
"trust": 0.8
},
{
"db": "CNNVD",
"id": "CNNVD-201607-472",
"trust": 0.7
},
{
"db": "VULHUB",
"id": "VHN-92938",
"trust": 0.1
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-92938"
},
{
"db": "BID",
"id": "90800"
},
{
"db": "JVNDB",
"id": "JVNDB-2016-004463"
},
{
"db": "CNNVD",
"id": "CNNVD-201607-472"
},
{
"db": "NVD",
"id": "CVE-2016-4119"
}
]
},
"id": "VAR-201608-0065",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "VULHUB",
"id": "VHN-92938"
}
],
"trust": 0.01
},
"last_update_date": "2025-04-13T23:09:33.548000Z",
"patch": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/patch#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"title": "APSB16-14",
"trust": 0.8,
"url": "https://helpx.adobe.com/security/products/acrobat/apsb16-14.html"
},
{
"title": "APSB16-14",
"trust": 0.8,
"url": "https://helpx.adobe.com/jp/security/products/reader/apsb16-14.html"
},
{
"title": "\u30a2\u30c9\u30d3 \u30b7\u30b9\u30c6\u30e0\u30ba\u793e Adobe Reader \u306e\u8106\u5f31\u6027\u306b\u95a2\u3059\u308b\u304a\u77e5\u3089\u305b",
"trust": 0.8,
"url": "http://www.fmworld.net/biz/common/adobe/20160512.html"
},
{
"title": "Adobe Reader and Acrobat Repair measures for memory corruption vulnerabilities",
"trust": 0.6,
"url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=62989"
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2016-004463"
},
{
"db": "CNNVD",
"id": "CNNVD-201607-472"
}
]
},
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "CWE-119",
"trust": 1.9
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-92938"
},
{
"db": "JVNDB",
"id": "JVNDB-2016-004463"
},
{
"db": "NVD",
"id": "CVE-2016-4119"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 1.7,
"url": "https://helpx.adobe.com/security/products/acrobat/apsb16-14.html"
},
{
"trust": 1.1,
"url": "https://blog.fortinet.com/2016/06/06/analysis-of-use-after-free-vulnerability-cve-2016-4119-in-adobe-acrobat-and-reader"
},
{
"trust": 0.8,
"url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2016-4119"
},
{
"trust": 0.8,
"url": "https://www.ipa.go.jp/security/ciadr/vul/20160511-adobereader.html"
},
{
"trust": 0.8,
"url": "https://www.jpcert.or.jp/at/2016/at160023.html"
},
{
"trust": 0.8,
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2016-4119"
},
{
"trust": 0.8,
"url": "http://www.npa.go.jp/cyberpolice/topics/?seq=18377"
},
{
"trust": 0.6,
"url": "http://www.securityfocus.com/bid/90800"
},
{
"trust": 0.3,
"url": "http://www.adobe.com"
},
{
"trust": 0.3,
"url": "http://get.adobe.com/reader/"
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-92938"
},
{
"db": "BID",
"id": "90800"
},
{
"db": "JVNDB",
"id": "JVNDB-2016-004463"
},
{
"db": "CNNVD",
"id": "CNNVD-201607-472"
},
{
"db": "NVD",
"id": "CVE-2016-4119"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "VULHUB",
"id": "VHN-92938"
},
{
"db": "BID",
"id": "90800"
},
{
"db": "JVNDB",
"id": "JVNDB-2016-004463"
},
{
"db": "CNNVD",
"id": "CNNVD-201607-472"
},
{
"db": "NVD",
"id": "CVE-2016-4119"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2016-08-26T00:00:00",
"db": "VULHUB",
"id": "VHN-92938"
},
{
"date": "2016-05-19T00:00:00",
"db": "BID",
"id": "90800"
},
{
"date": "2016-08-30T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2016-004463"
},
{
"date": "2016-05-19T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201607-472"
},
{
"date": "2016-08-26T19:59:00.117000",
"db": "NVD",
"id": "CVE-2016-4119"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2017-04-05T00:00:00",
"db": "VULHUB",
"id": "VHN-92938"
},
{
"date": "2016-07-06T14:46:00",
"db": "BID",
"id": "90800"
},
{
"date": "2016-08-30T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2016-004463"
},
{
"date": "2016-08-29T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201607-472"
},
{
"date": "2025-04-12T10:46:40.837000",
"db": "NVD",
"id": "CVE-2016-4119"
}
]
},
"threat_type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/threat_type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "remote",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201607-472"
}
],
"trust": 0.6
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Windows and Mac OS X Run on Adobe Reader and Acrobat Vulnerable to arbitrary code execution",
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2016-004463"
}
],
"trust": 0.8
},
"type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "buffer overflow",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201607-472"
}
],
"trust": 0.6
}
}
VAR-201608-0296
Vulnerability from variot - Updated: 2025-04-13 23:09Adobe Reader and Acrobat before 11.0.17, Acrobat and Acrobat Reader DC Classic before 15.006.30198, and Acrobat and Acrobat Reader DC Continuous before 15.017.20050 on Windows and OS X allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-4191, CVE-2016-4192, CVE-2016-4193, CVE-2016-4194, CVE-2016-4195, CVE-2016-4196, CVE-2016-4197, CVE-2016-4198, CVE-2016-4199, CVE-2016-4200, CVE-2016-4201, CVE-2016-4202, CVE-2016-4203, CVE-2016-4204, CVE-2016-4205, CVE-2016-4206, CVE-2016-4207, CVE-2016-4208, CVE-2016-4211, CVE-2016-4212, CVE-2016-4213, CVE-2016-4214, CVE-2016-4250, CVE-2016-4251, CVE-2016-4252, CVE-2016-4254, CVE-2016-4265, CVE-2016-4266, CVE-2016-4268, CVE-2016-4269, and CVE-2016-4270. This vulnerability CVE-2016-4191 , CVE-2016-4192 , CVE-2016-4193 , CVE-2016-4194 , CVE-2016-4195 , CVE-2016-4196 , CVE-2016-4197 , CVE-2016-4198 , CVE-2016-4199 , CVE-2016-4200 , CVE-2016-4201 , CVE-2016-4202 , CVE-2016-4203 , CVE-2016-4204 , CVE-2016-4205 , CVE-2016-4206 , CVE-2016-4207 , CVE-2016-4208 , CVE-2016-4211 , CVE-2016-4212 , CVE-2016-4213 , CVE-2016-4214 , CVE-2016-4250 , CVE-2016-4251 , CVE-2016-4252 , CVE-2016-4254 , CVE-2016-4265 , CVE-2016-4266 , CVE-2016-4268 , CVE-2016-4269 ,and CVE-2016-4270 Is a different vulnerability.An attacker could execute arbitrary code or cause a denial of service ( Memory corruption ) There is a possibility of being put into a state. This vulnerability allows remote attackers to disclose sensitive information on vulnerable installations of Adobe Reader DC. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the handling of FlateDecode streams. A crafted FlateDecode stream can trigger a read past the end of an allocated buffer. Adobe Acrobat and Reader is prone to memory-corruption vulnerability. Failed exploit attempts will likely result in denial-of-service conditions. are all products of Adobe (Adobe) in the United States. Adobe Reader is a free PDF file reader; Acrobat is a PDF file editing and conversion tool; Acrobat Reader DC is a set of tools for viewing, printing and annotating PDF. Security flaws exist in several Adobe products
Show details on source website{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"configurations": {
"@id": "https://www.variotdbs.pl/ref/configurations"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-201608-0296",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "acrobat dc",
"scope": "lte",
"trust": 1.0,
"vendor": "adobe",
"version": "15.006.30174"
},
{
"model": "acrobat dc",
"scope": "lte",
"trust": 1.0,
"vendor": "adobe",
"version": "15.016.20045"
},
{
"model": "acrobat reader dc",
"scope": "lte",
"trust": 1.0,
"vendor": "adobe",
"version": "15.016.20045"
},
{
"model": "acrobat reader dc",
"scope": "lte",
"trust": 1.0,
"vendor": "adobe",
"version": "15.006.30174"
},
{
"model": "acrobat",
"scope": "lte",
"trust": 1.0,
"vendor": "adobe",
"version": "11.0.16"
},
{
"model": "reader",
"scope": "lte",
"trust": 1.0,
"vendor": "adobe",
"version": "11.0.16"
},
{
"model": "acrobat",
"scope": "lt",
"trust": 0.8,
"vendor": "adobe",
"version": "xi desktop 11.0.17 (windows/macintosh)"
},
{
"model": "acrobat dc",
"scope": "lt",
"trust": 0.8,
"vendor": "adobe",
"version": "classic 15.006.30198 (windows/macintosh)"
},
{
"model": "acrobat dc",
"scope": "lt",
"trust": 0.8,
"vendor": "adobe",
"version": "continuous track 15.017.20050 (windows/macintosh)"
},
{
"model": "acrobat reader dc",
"scope": "lt",
"trust": 0.8,
"vendor": "adobe",
"version": "classic 15.006.30198 (windows/macintosh)"
},
{
"model": "acrobat reader dc",
"scope": "lt",
"trust": 0.8,
"vendor": "adobe",
"version": "continuous track 15.017.20050 (windows/macintosh)"
},
{
"model": "reader",
"scope": "lt",
"trust": 0.8,
"vendor": "adobe",
"version": "xi desktop 11.0.17 (windows/macintosh)"
},
{
"model": "acrobat reader dc",
"scope": null,
"trust": 0.7,
"vendor": "adobe",
"version": null
},
{
"model": "mac os x",
"scope": null,
"trust": 0.6,
"vendor": "apple",
"version": null
},
{
"model": "acrobat reader dc",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "15.6.30174"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.13"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.6"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.09"
},
{
"model": "acrobat dc",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "15.6.30097"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.3"
},
{
"model": "acrobat reader dc",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "15.6.30172"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0"
},
{
"model": "acrobat reader dc",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "15.16.20045"
},
{
"model": "acrobat reader dc",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "15.010.20056"
},
{
"model": "acrobat dc",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "15.10.20059"
},
{
"model": "reader",
"scope": "ne",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.17"
},
{
"model": "acrobat reader dc",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "15.6.30121"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.10"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.4"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.14"
},
{
"model": "acrobat reader dc",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "15.006.30119"
},
{
"model": "acrobat reader dc",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "15.16.20039"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.1"
},
{
"model": "acrobat reader dc",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "15.9.20077"
},
{
"model": "acrobat reader dc",
"scope": "ne",
"trust": 0.3,
"vendor": "adobe",
"version": "15.17.20050"
},
{
"model": "acrobat dc",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "15.10.20060"
},
{
"model": "acrobat reader dc",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "15.6.30097"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.16"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.4"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.10"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.14"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.1"
},
{
"model": "acrobat reader dc",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "15.10.20059"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.12"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.15"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.08"
},
{
"model": "acrobat dc",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "15.6.30174"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.16"
},
{
"model": "acrobat dc",
"scope": "ne",
"trust": 0.3,
"vendor": "adobe",
"version": "15.6.30198"
},
{
"model": "acrobat dc",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "15.6.30172"
},
{
"model": "acrobat reader dc",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "15.10.20060"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.2"
},
{
"model": "acrobat dc",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "15.16.20045"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.11"
},
{
"model": "acrobat dc",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "15.010.20056"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.7"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.9"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.13"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.15"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.12"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.08"
},
{
"model": "acrobat dc",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "15.6.30121"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.09"
},
{
"model": "acrobat dc",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "15.9.20077"
},
{
"model": "acrobat dc",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "15.006.30119"
},
{
"model": "acrobat dc",
"scope": "ne",
"trust": 0.3,
"vendor": "adobe",
"version": "15.17.20050"
},
{
"model": "acrobat dc",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "15.16.20039"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.6"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.11"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.05"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0"
},
{
"model": "acrobat reader dc",
"scope": "ne",
"trust": 0.3,
"vendor": "adobe",
"version": "15.6.30198"
},
{
"model": "acrobat",
"scope": "ne",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.17"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.3"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.7"
}
],
"sources": [
{
"db": "ZDI",
"id": "ZDI-16-490"
},
{
"db": "BID",
"id": "92637"
},
{
"db": "JVNDB",
"id": "JVNDB-2016-004466"
},
{
"db": "CNNVD",
"id": "CNNVD-201608-475"
},
{
"db": "NVD",
"id": "CVE-2016-4267"
}
]
},
"configurations": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/configurations#",
"children": {
"@container": "@list"
},
"cpe_match": {
"@container": "@list"
},
"data": {
"@container": "@list"
},
"nodes": {
"@container": "@list"
}
},
"data": [
{
"CVE_data_version": "4.0",
"nodes": [
{
"cpe_match": [
{
"cpe22Uri": "cpe:/a:adobe:acrobat",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/a:adobe:acrobat_dc",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/a:adobe:acrobat_reader_dc",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/a:adobe:acrobat_reader",
"vulnerable": true
}
],
"operator": "OR"
}
]
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2016-004466"
}
]
},
"credits": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/credits#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Steven Seeley of Source Incite.",
"sources": [
{
"db": "BID",
"id": "92637"
},
{
"db": "CNNVD",
"id": "CNNVD-201608-475"
}
],
"trust": 0.9
},
"cve": "CVE-2016-4267",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "nvd@nist.gov",
"availabilityImpact": "COMPLETE",
"baseScore": 10.0,
"confidentialityImpact": "COMPLETE",
"exploitabilityScore": 10.0,
"id": "CVE-2016-4267",
"impactScore": 10.0,
"integrityImpact": "COMPLETE",
"severity": "HIGH",
"trust": 1.8,
"vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
{
"acInsufInfo": null,
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "ZDI",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 8.6,
"id": "CVE-2016-4267",
"impactScore": 2.9,
"integrityImpact": "NONE",
"obtainAllPrivilege": null,
"obtainOtherPrivilege": null,
"obtainUserPrivilege": null,
"severity": "MEDIUM",
"trust": 0.7,
"userInteractionRequired": null,
"vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "VULHUB",
"availabilityImpact": "COMPLETE",
"baseScore": 10.0,
"confidentialityImpact": "COMPLETE",
"exploitabilityScore": 10.0,
"id": "VHN-93086",
"impactScore": 10.0,
"integrityImpact": "COMPLETE",
"severity": "HIGH",
"trust": 0.1,
"vectorString": "AV:N/AC:L/AU:N/C:C/I:C/A:C",
"version": "2.0"
}
],
"cvssV3": [
{
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"author": "nvd@nist.gov",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"exploitabilityScore": 3.9,
"id": "CVE-2016-4267",
"impactScore": 5.9,
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"trust": 1.8,
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
}
],
"severity": [
{
"author": "nvd@nist.gov",
"id": "CVE-2016-4267",
"trust": 1.0,
"value": "CRITICAL"
},
{
"author": "NVD",
"id": "CVE-2016-4267",
"trust": 0.8,
"value": "Critical"
},
{
"author": "ZDI",
"id": "CVE-2016-4267",
"trust": 0.7,
"value": "MEDIUM"
},
{
"author": "CNNVD",
"id": "CNNVD-201608-475",
"trust": 0.6,
"value": "CRITICAL"
},
{
"author": "VULHUB",
"id": "VHN-93086",
"trust": 0.1,
"value": "HIGH"
}
]
}
],
"sources": [
{
"db": "ZDI",
"id": "ZDI-16-490"
},
{
"db": "VULHUB",
"id": "VHN-93086"
},
{
"db": "JVNDB",
"id": "JVNDB-2016-004466"
},
{
"db": "CNNVD",
"id": "CNNVD-201608-475"
},
{
"db": "NVD",
"id": "CVE-2016-4267"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Adobe Reader and Acrobat before 11.0.17, Acrobat and Acrobat Reader DC Classic before 15.006.30198, and Acrobat and Acrobat Reader DC Continuous before 15.017.20050 on Windows and OS X allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-4191, CVE-2016-4192, CVE-2016-4193, CVE-2016-4194, CVE-2016-4195, CVE-2016-4196, CVE-2016-4197, CVE-2016-4198, CVE-2016-4199, CVE-2016-4200, CVE-2016-4201, CVE-2016-4202, CVE-2016-4203, CVE-2016-4204, CVE-2016-4205, CVE-2016-4206, CVE-2016-4207, CVE-2016-4208, CVE-2016-4211, CVE-2016-4212, CVE-2016-4213, CVE-2016-4214, CVE-2016-4250, CVE-2016-4251, CVE-2016-4252, CVE-2016-4254, CVE-2016-4265, CVE-2016-4266, CVE-2016-4268, CVE-2016-4269, and CVE-2016-4270. This vulnerability CVE-2016-4191 , CVE-2016-4192 , CVE-2016-4193 , CVE-2016-4194 , CVE-2016-4195 , CVE-2016-4196 , CVE-2016-4197 , CVE-2016-4198 , CVE-2016-4199 , CVE-2016-4200 , CVE-2016-4201 , CVE-2016-4202 , CVE-2016-4203 , CVE-2016-4204 , CVE-2016-4205 , CVE-2016-4206 , CVE-2016-4207 , CVE-2016-4208 , CVE-2016-4211 , CVE-2016-4212 , CVE-2016-4213 , CVE-2016-4214 , CVE-2016-4250 , CVE-2016-4251 , CVE-2016-4252 , CVE-2016-4254 , CVE-2016-4265 , CVE-2016-4266 , CVE-2016-4268 , CVE-2016-4269 ,and CVE-2016-4270 Is a different vulnerability.An attacker could execute arbitrary code or cause a denial of service ( Memory corruption ) There is a possibility of being put into a state. This vulnerability allows remote attackers to disclose sensitive information on vulnerable installations of Adobe Reader DC. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the handling of FlateDecode streams. A crafted FlateDecode stream can trigger a read past the end of an allocated buffer. Adobe Acrobat and Reader is prone to memory-corruption vulnerability. Failed exploit attempts will likely result in denial-of-service conditions. are all products of Adobe (Adobe) in the United States. Adobe Reader is a free PDF file reader; Acrobat is a PDF file editing and conversion tool; Acrobat Reader DC is a set of tools for viewing, printing and annotating PDF. Security flaws exist in several Adobe products",
"sources": [
{
"db": "NVD",
"id": "CVE-2016-4267"
},
{
"db": "JVNDB",
"id": "JVNDB-2016-004466"
},
{
"db": "ZDI",
"id": "ZDI-16-490"
},
{
"db": "BID",
"id": "92637"
},
{
"db": "VULHUB",
"id": "VHN-93086"
}
],
"trust": 2.61
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "NVD",
"id": "CVE-2016-4267",
"trust": 3.5
},
{
"db": "ZDI",
"id": "ZDI-16-490",
"trust": 2.1
},
{
"db": "BID",
"id": "92637",
"trust": 2.0
},
{
"db": "JVNDB",
"id": "JVNDB-2016-004466",
"trust": 0.8
},
{
"db": "ZDI_CAN",
"id": "ZDI-CAN-3841",
"trust": 0.7
},
{
"db": "CNNVD",
"id": "CNNVD-201608-475",
"trust": 0.7
},
{
"db": "VULHUB",
"id": "VHN-93086",
"trust": 0.1
}
],
"sources": [
{
"db": "ZDI",
"id": "ZDI-16-490"
},
{
"db": "VULHUB",
"id": "VHN-93086"
},
{
"db": "BID",
"id": "92637"
},
{
"db": "JVNDB",
"id": "JVNDB-2016-004466"
},
{
"db": "CNNVD",
"id": "CNNVD-201608-475"
},
{
"db": "NVD",
"id": "CVE-2016-4267"
}
]
},
"id": "VAR-201608-0296",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "VULHUB",
"id": "VHN-93086"
}
],
"trust": 0.01
},
"last_update_date": "2025-04-13T23:09:29.835000Z",
"patch": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/patch#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"title": "APSB16-26",
"trust": 1.5,
"url": "https://helpx.adobe.com/security/products/acrobat/apsb16-26.html"
},
{
"title": "APSB16-26",
"trust": 0.8,
"url": "https://helpx.adobe.com/jp/security/products/acrobat/apsb16-26.html"
},
{
"title": "\u30a2\u30c9\u30d3 \u30b7\u30b9\u30c6\u30e0\u30ba\u793e Adobe Reader \u306e\u8106\u5f31\u6027\u306b\u95a2\u3059\u308b\u304a\u77e5\u3089\u305b",
"trust": 0.8,
"url": "http://www.fmworld.net/biz/common/adobe/20160714.html"
},
{
"title": "Multiple Adobe Product security vulnerabilities",
"trust": 0.6,
"url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=63794"
}
],
"sources": [
{
"db": "ZDI",
"id": "ZDI-16-490"
},
{
"db": "JVNDB",
"id": "JVNDB-2016-004466"
},
{
"db": "CNNVD",
"id": "CNNVD-201608-475"
}
]
},
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "CWE-119",
"trust": 1.9
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-93086"
},
{
"db": "JVNDB",
"id": "JVNDB-2016-004466"
},
{
"db": "NVD",
"id": "CVE-2016-4267"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 2.7,
"url": "https://helpx.adobe.com/security/products/acrobat/apsb16-26.html"
},
{
"trust": 1.7,
"url": "http://www.securityfocus.com/bid/92637"
},
{
"trust": 1.1,
"url": "http://www.zerodayinitiative.com/advisories/zdi-16-490"
},
{
"trust": 0.8,
"url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2016-4267"
},
{
"trust": 0.8,
"url": "http://www.ipa.go.jp/security/ciadr/vul/20160713-adobereader.html"
},
{
"trust": 0.8,
"url": "http://www.jpcert.or.jp/at/2016/at160030.html"
},
{
"trust": 0.8,
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2016-4267"
},
{
"trust": 0.8,
"url": "http://www.npa.go.jp/cyberpolice/topics/?seq=18716"
},
{
"trust": 0.3,
"url": "http://www.adobe.com/products/acrobat/"
},
{
"trust": 0.3,
"url": "http://www.adobe.com"
},
{
"trust": 0.3,
"url": "http://get.adobe.com/reader/"
},
{
"trust": 0.3,
"url": "http://www.zerodayinitiative.com/advisories/zdi-16-490/"
}
],
"sources": [
{
"db": "ZDI",
"id": "ZDI-16-490"
},
{
"db": "VULHUB",
"id": "VHN-93086"
},
{
"db": "BID",
"id": "92637"
},
{
"db": "JVNDB",
"id": "JVNDB-2016-004466"
},
{
"db": "CNNVD",
"id": "CNNVD-201608-475"
},
{
"db": "NVD",
"id": "CVE-2016-4267"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "ZDI",
"id": "ZDI-16-490"
},
{
"db": "VULHUB",
"id": "VHN-93086"
},
{
"db": "BID",
"id": "92637"
},
{
"db": "JVNDB",
"id": "JVNDB-2016-004466"
},
{
"db": "CNNVD",
"id": "CNNVD-201608-475"
},
{
"db": "NVD",
"id": "CVE-2016-4267"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2016-08-24T00:00:00",
"db": "ZDI",
"id": "ZDI-16-490"
},
{
"date": "2016-08-26T00:00:00",
"db": "VULHUB",
"id": "VHN-93086"
},
{
"date": "2016-08-23T00:00:00",
"db": "BID",
"id": "92637"
},
{
"date": "2016-08-30T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2016-004466"
},
{
"date": "2016-08-26T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201608-475"
},
{
"date": "2016-08-26T19:59:03.633000",
"db": "NVD",
"id": "CVE-2016-4267"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2016-08-24T00:00:00",
"db": "ZDI",
"id": "ZDI-16-490"
},
{
"date": "2016-11-28T00:00:00",
"db": "VULHUB",
"id": "VHN-93086"
},
{
"date": "2016-08-23T00:00:00",
"db": "BID",
"id": "92637"
},
{
"date": "2016-08-30T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2016-004466"
},
{
"date": "2016-08-29T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201608-475"
},
{
"date": "2025-04-12T10:46:40.837000",
"db": "NVD",
"id": "CVE-2016-4267"
}
]
},
"threat_type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/threat_type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "remote",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201608-475"
}
],
"trust": 0.6
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Windows and Mac OS X Run on Adobe Reader and Acrobat Vulnerable to arbitrary code execution",
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2016-004466"
}
],
"trust": 0.8
},
"type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "buffer overflow",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201608-475"
}
],
"trust": 0.6
}
}
VAR-201409-0421
Vulnerability from variot - Updated: 2025-04-13 23:04Adobe Reader and Acrobat 10.x before 10.1.12 and 11.x before 11.0.09 on Windows and OS X allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2014-0565. Adobe Reader and Acrobat are prone to an unspecified remote code-execution vulnerability. Failed exploit attempts likely result in denial-of-service conditions. The affected products are: Adobe Reader 11.x versions prior to 11.0.09 Adobe Reader 10.x versions prior to 10.1.12 Adobe Acrobat 11.x versions prior to 11.0.09 Adobe Acrobat 10.x versions prior to 10.1.12. Adobe Reader is a free PDF file reader, and Acrobat is a PDF file editing and conversion tool
Show details on source website{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"configurations": {
"@id": "https://www.variotdbs.pl/ref/configurations"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-201409-0421",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "acrobat reader dc",
"scope": "gte",
"trust": 1.0,
"vendor": "adobe",
"version": "15.006.30033"
},
{
"model": "acrobat dc",
"scope": "gte",
"trust": 1.0,
"vendor": "adobe",
"version": "15.007.20033"
},
{
"model": "acrobat",
"scope": "gte",
"trust": 1.0,
"vendor": "adobe",
"version": "10.0"
},
{
"model": "acrobat dc",
"scope": "lt",
"trust": 1.0,
"vendor": "adobe",
"version": "15.008.20082"
},
{
"model": "acrobat reader",
"scope": "gte",
"trust": 1.0,
"vendor": "adobe",
"version": "10.0"
},
{
"model": "acrobat reader",
"scope": "gte",
"trust": 1.0,
"vendor": "adobe",
"version": "11.0.0"
},
{
"model": "acrobat",
"scope": "gte",
"trust": 1.0,
"vendor": "adobe",
"version": "11.0.0"
},
{
"model": "acrobat dc",
"scope": "lt",
"trust": 1.0,
"vendor": "adobe",
"version": "15.006.30060"
},
{
"model": "acrobat dc",
"scope": "gte",
"trust": 1.0,
"vendor": "adobe",
"version": "15.006.30033"
},
{
"model": "acrobat reader dc",
"scope": "lt",
"trust": 1.0,
"vendor": "adobe",
"version": "15.006.30060"
},
{
"model": "acrobat reader dc",
"scope": "lt",
"trust": 1.0,
"vendor": "adobe",
"version": "15.008.20082"
},
{
"model": "acrobat reader dc",
"scope": "gte",
"trust": 1.0,
"vendor": "adobe",
"version": "15.007.20033"
},
{
"model": "acrobat reader",
"scope": "lt",
"trust": 1.0,
"vendor": "adobe",
"version": "10.1.15"
},
{
"model": "acrobat reader",
"scope": "lt",
"trust": 1.0,
"vendor": "adobe",
"version": "11.0.12"
},
{
"model": "acrobat",
"scope": "lt",
"trust": 1.0,
"vendor": "adobe",
"version": "10.1.15"
},
{
"model": "acrobat",
"scope": "lt",
"trust": 1.0,
"vendor": "adobe",
"version": "11.0.12"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.9,
"vendor": "adobe",
"version": "10.0"
},
{
"model": "acrobat dc",
"scope": "lt",
"trust": 0.8,
"vendor": "adobe",
"version": "(windows/macintosh)"
},
{
"model": "acrobat dc",
"scope": "eq",
"trust": 0.8,
"vendor": "adobe",
"version": "continuous 2015.008.20082"
},
{
"model": "acrobat reader dc",
"scope": "lt",
"trust": 0.8,
"vendor": "adobe",
"version": "(windows/macintosh)"
},
{
"model": "acrobat",
"scope": "lt",
"trust": 0.8,
"vendor": "adobe",
"version": "11.x (windows/macintosh)"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.8,
"vendor": "adobe",
"version": "xi (11.0.12)"
},
{
"model": "acrobat reader dc",
"scope": "eq",
"trust": 0.8,
"vendor": "adobe",
"version": "continuous 2015.008.20082"
},
{
"model": "reader",
"scope": "lt",
"trust": 0.8,
"vendor": "adobe",
"version": "11.x (windows/macintosh)"
},
{
"model": "acrobat dc",
"scope": "eq",
"trust": 0.8,
"vendor": "adobe",
"version": "classic 2015.006.30060"
},
{
"model": "acrobat",
"scope": "lt",
"trust": 0.8,
"vendor": "adobe",
"version": "10.x (windows/macintosh)"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.8,
"vendor": "adobe",
"version": "xi (11.0.12)"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.8,
"vendor": "adobe",
"version": "x (10.1.15)"
},
{
"model": "reader",
"scope": "lt",
"trust": 0.8,
"vendor": "adobe",
"version": "10.x (windows/macintosh)"
},
{
"model": "acrobat reader dc",
"scope": "eq",
"trust": 0.8,
"vendor": "adobe",
"version": "classic 2015.006.30060"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.8,
"vendor": "adobe",
"version": "x (10.1.15)"
},
{
"model": "acrobat reader",
"scope": "eq",
"trust": 0.6,
"vendor": "adobe",
"version": "11.0.8"
},
{
"model": "acrobat reader",
"scope": "eq",
"trust": 0.6,
"vendor": "adobe",
"version": "10.0.3"
},
{
"model": "acrobat reader",
"scope": "eq",
"trust": 0.6,
"vendor": "adobe",
"version": "10.0.2"
},
{
"model": "acrobat reader",
"scope": "eq",
"trust": 0.6,
"vendor": "adobe",
"version": "10.1"
},
{
"model": "acrobat reader",
"scope": "eq",
"trust": 0.6,
"vendor": "adobe",
"version": "10.1.11"
},
{
"model": "acrobat reader",
"scope": "eq",
"trust": 0.6,
"vendor": "adobe",
"version": "10.0.1"
},
{
"model": "acrobat reader",
"scope": "eq",
"trust": 0.6,
"vendor": "adobe",
"version": "10.0"
},
{
"model": "acrobat reader",
"scope": "eq",
"trust": 0.6,
"vendor": "adobe",
"version": "10.1.3"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1.3"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1.2"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1.1"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.0.3"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.0.2"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.0.1"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.0"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1.3"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1.2"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1.1"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.0.3"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.0.2"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.0.1"
}
],
"sources": [
{
"db": "BID",
"id": "69825"
},
{
"db": "JVNDB",
"id": "JVNDB-2014-004244"
},
{
"db": "CNNVD",
"id": "CNNVD-201409-584"
},
{
"db": "NVD",
"id": "CVE-2014-0566"
}
]
},
"configurations": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/configurations#",
"children": {
"@container": "@list"
},
"cpe_match": {
"@container": "@list"
},
"data": {
"@container": "@list"
},
"nodes": {
"@container": "@list"
}
},
"data": [
{
"CVE_data_version": "4.0",
"nodes": [
{
"cpe_match": [
{
"cpe22Uri": "cpe:/a:adobe:acrobat",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/a:adobe:acrobat_dc",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/a:adobe:acrobat_reader_dc",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/a:adobe:acrobat_reader",
"vulnerable": true
}
],
"operator": "OR"
}
]
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2014-004244"
}
]
},
"credits": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/credits#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Wei Lei and Wu Hongjun of Nanyang Technological University",
"sources": [
{
"db": "BID",
"id": "69825"
}
],
"trust": 0.3
},
"cve": "CVE-2014-0566",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "nvd@nist.gov",
"availabilityImpact": "COMPLETE",
"baseScore": 10.0,
"confidentialityImpact": "COMPLETE",
"exploitabilityScore": 10.0,
"id": "CVE-2014-0566",
"impactScore": 10.0,
"integrityImpact": "COMPLETE",
"severity": "HIGH",
"trust": 1.8,
"vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "VULHUB",
"availabilityImpact": "COMPLETE",
"baseScore": 10.0,
"confidentialityImpact": "COMPLETE",
"exploitabilityScore": 10.0,
"id": "VHN-68059",
"impactScore": 10.0,
"integrityImpact": "COMPLETE",
"severity": "HIGH",
"trust": 0.1,
"vectorString": "AV:N/AC:L/AU:N/C:C/I:C/A:C",
"version": "2.0"
}
],
"cvssV3": [],
"severity": [
{
"author": "nvd@nist.gov",
"id": "CVE-2014-0566",
"trust": 1.0,
"value": "HIGH"
},
{
"author": "NVD",
"id": "CVE-2014-0566",
"trust": 0.8,
"value": "High"
},
{
"author": "CNNVD",
"id": "CNNVD-201409-584",
"trust": 0.6,
"value": "CRITICAL"
},
{
"author": "VULHUB",
"id": "VHN-68059",
"trust": 0.1,
"value": "HIGH"
}
]
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-68059"
},
{
"db": "JVNDB",
"id": "JVNDB-2014-004244"
},
{
"db": "CNNVD",
"id": "CNNVD-201409-584"
},
{
"db": "NVD",
"id": "CVE-2014-0566"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Adobe Reader and Acrobat 10.x before 10.1.12 and 11.x before 11.0.09 on Windows and OS X allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2014-0565. Adobe Reader and Acrobat are prone to an unspecified remote code-execution vulnerability. Failed exploit attempts likely result in denial-of-service conditions. \nThe affected products are:\nAdobe Reader 11.x versions prior to 11.0.09\nAdobe Reader 10.x versions prior to 10.1.12\nAdobe Acrobat 11.x versions prior to 11.0.09\nAdobe Acrobat 10.x versions prior to 10.1.12. Adobe Reader is a free PDF file reader, and Acrobat is a PDF file editing and conversion tool",
"sources": [
{
"db": "NVD",
"id": "CVE-2014-0566"
},
{
"db": "JVNDB",
"id": "JVNDB-2014-004244"
},
{
"db": "BID",
"id": "69825"
},
{
"db": "VULHUB",
"id": "VHN-68059"
}
],
"trust": 1.98
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "NVD",
"id": "CVE-2014-0566",
"trust": 2.8
},
{
"db": "BID",
"id": "69825",
"trust": 2.0
},
{
"db": "SECTRACK",
"id": "1030853",
"trust": 1.7
},
{
"db": "SECTRACK",
"id": "1032892",
"trust": 1.7
},
{
"db": "JVNDB",
"id": "JVNDB-2014-004244",
"trust": 0.8
},
{
"db": "CNNVD",
"id": "CNNVD-201409-584",
"trust": 0.7
},
{
"db": "VULHUB",
"id": "VHN-68059",
"trust": 0.1
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-68059"
},
{
"db": "BID",
"id": "69825"
},
{
"db": "JVNDB",
"id": "JVNDB-2014-004244"
},
{
"db": "CNNVD",
"id": "CNNVD-201409-584"
},
{
"db": "NVD",
"id": "CVE-2014-0566"
}
]
},
"id": "VAR-201409-0421",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "VULHUB",
"id": "VHN-68059"
}
],
"trust": 0.01
},
"last_update_date": "2025-04-13T23:04:07.807000Z",
"patch": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/patch#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"title": "APSB15-15",
"trust": 0.8,
"url": "https://helpx.adobe.com/security/products/reader/apsb15-15.html"
},
{
"title": "APSB14-20",
"trust": 0.8,
"url": "http://helpx.adobe.com/security/products/reader/apsb14-20.html"
},
{
"title": "APSB14-20",
"trust": 0.8,
"url": "http://helpx.adobe.com/jp/security/products/reader/apsb14-20.html"
},
{
"title": "APSB15-15",
"trust": 0.8,
"url": "http://helpx.adobe.com/jp/security/products/reader/apsb15-15.html"
},
{
"title": "\u30a2\u30c9\u30d3 \u30b7\u30b9\u30c6\u30e0\u30ba\u793e Adobe Reader \u306e\u8106\u5f31\u6027\u306b\u95a2\u3059\u308b\u304a\u77e5\u3089\u305b (2014\u5e749\u670818\u65e5)",
"trust": 0.8,
"url": "http://www.fmworld.net/biz/common/adobe/20140918.html"
},
{
"title": "\u30a2\u30c9\u30d3 \u30b7\u30b9\u30c6\u30e0\u30ba\u793e Adobe Reader \u306e\u8106\u5f31\u6027\u306b\u95a2\u3059\u308b\u304a\u77e5\u3089\u305b (2015\u5e747\u670816\u65e5)",
"trust": 0.8,
"url": "http://www.fmworld.net/biz/common/adobe/20150716.html"
},
{
"title": "AdbeRdrUpd10112",
"trust": 0.6,
"url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=51673"
},
{
"title": "AcrobatUpd10112",
"trust": 0.6,
"url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=51677"
},
{
"title": "AdbeRdrUpd11009",
"trust": 0.6,
"url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=51676"
},
{
"title": "AcrobatUpd11009",
"trust": 0.6,
"url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=51680"
},
{
"title": "AdbeRdrUpd10112",
"trust": 0.6,
"url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=51675"
},
{
"title": "AcrobatUpd10112",
"trust": 0.6,
"url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=51679"
},
{
"title": "AdbeRdrUpd11009",
"trust": 0.6,
"url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=51674"
},
{
"title": "AcrobatUpd11009",
"trust": 0.6,
"url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=51678"
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2014-004244"
},
{
"db": "CNNVD",
"id": "CNNVD-201409-584"
}
]
},
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "CWE-119",
"trust": 1.1
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-68059"
},
{
"db": "NVD",
"id": "CVE-2014-0566"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 1.7,
"url": "http://www.securityfocus.com/bid/69825"
},
{
"trust": 1.7,
"url": "http://helpx.adobe.com/security/products/reader/apsb14-20.html"
},
{
"trust": 1.7,
"url": "https://helpx.adobe.com/security/products/reader/apsb15-15.html"
},
{
"trust": 1.7,
"url": "http://www.securitytracker.com/id/1030853"
},
{
"trust": 1.7,
"url": "http://www.securitytracker.com/id/1032892"
},
{
"trust": 1.7,
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/96003"
},
{
"trust": 0.8,
"url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-0566"
},
{
"trust": 0.8,
"url": "http://www.ipa.go.jp/security/ciadr/vul/20150715-adobereader.html"
},
{
"trust": 0.8,
"url": "http://www.ipa.go.jp/security/ciadr/vul/20140917-adobereader.html"
},
{
"trust": 0.8,
"url": "http://www.jpcert.or.jp/at/2014/at140036.html"
},
{
"trust": 0.8,
"url": "http://www.jpcert.or.jp/at/2015/at150023.html"
},
{
"trust": 0.8,
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2014-0566"
},
{
"trust": 0.8,
"url": "http://www.npa.go.jp/cyberpolice/topics/?seq=14605"
},
{
"trust": 0.8,
"url": "http://www.npa.go.jp/cyberpolice/topics/?seq=16619"
},
{
"trust": 0.3,
"url": "http://www.adobe.com/products/acrobat/"
},
{
"trust": 0.3,
"url": "http://www.adobe.com"
},
{
"trust": 0.3,
"url": "http://www.adobe.com/products/reader/"
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-68059"
},
{
"db": "BID",
"id": "69825"
},
{
"db": "JVNDB",
"id": "JVNDB-2014-004244"
},
{
"db": "CNNVD",
"id": "CNNVD-201409-584"
},
{
"db": "NVD",
"id": "CVE-2014-0566"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "VULHUB",
"id": "VHN-68059"
},
{
"db": "BID",
"id": "69825"
},
{
"db": "JVNDB",
"id": "JVNDB-2014-004244"
},
{
"db": "CNNVD",
"id": "CNNVD-201409-584"
},
{
"db": "NVD",
"id": "CVE-2014-0566"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2014-09-17T00:00:00",
"db": "VULHUB",
"id": "VHN-68059"
},
{
"date": "2014-09-16T00:00:00",
"db": "BID",
"id": "69825"
},
{
"date": "2014-09-18T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2014-004244"
},
{
"date": "2014-09-18T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201409-584"
},
{
"date": "2014-09-17T10:55:06.823000",
"db": "NVD",
"id": "CVE-2014-0566"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2020-05-13T00:00:00",
"db": "VULHUB",
"id": "VHN-68059"
},
{
"date": "2015-07-14T18:51:00",
"db": "BID",
"id": "69825"
},
{
"date": "2015-07-27T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2014-004244"
},
{
"date": "2020-05-14T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201409-584"
},
{
"date": "2025-04-12T10:46:40.837000",
"db": "NVD",
"id": "CVE-2014-0566"
}
]
},
"threat_type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/threat_type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "remote",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201409-584"
}
],
"trust": 0.6
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Windows and Mac OS X Run on Adobe Reader and Acrobat Vulnerable to arbitrary code execution",
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2014-004244"
}
],
"trust": 0.8
},
"type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "buffer error",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201409-584"
}
],
"trust": 0.6
}
}
VAR-201510-0357
Vulnerability from variot - Updated: 2025-04-13 23:03Adobe Reader and Acrobat 10.x before 10.1.16 and 11.x before 11.0.13, Acrobat and Acrobat Reader DC Classic before 2015.006.30094, and Acrobat and Acrobat Reader DC Continuous before 2015.009.20069 on Windows and OS X allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted set of fields, a different vulnerability than CVE-2015-6685, CVE-2015-6693, CVE-2015-6694, CVE-2015-6695, and CVE-2015-7622. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The flaw exists within the handling of specific fields. A specially crafted PDF file with a specific combination of fields can force a dangling pointer to be reused after it has been freed. An attacker can leverage this vulnerability to execute code under the context of the current process. Adobe Acrobat and Reader are prone to multiple memory-corruption vulnerabilities. Failed exploit attempts will likely cause a denial-of-service condition. Adobe Reader, etc. are all products of Adobe (Adobe) in the United States. Adobe Reader is a free PDF file reader; Acrobat is a PDF file editing and conversion tool; Acrobat Reader DC is a set of tools for viewing, printing and annotating PDF. Security flaws exist in several Adobe products. 30060 and earlier, Acrobat XI Desktop 11.0.12 and earlier, Reader XI Desktop 11.0.12 and earlier, Acrobat X Desktop 10.1.15 and earlier, Reader X Desktop 10.1.15 and earlier
Show details on source website{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"configurations": {
"@id": "https://www.variotdbs.pl/ref/configurations"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-201510-0357",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "acrobat reader dc",
"scope": "gte",
"trust": 1.0,
"vendor": "adobe",
"version": "15.008.20082"
},
{
"model": "acrobat dc",
"scope": "gte",
"trust": 1.0,
"vendor": "adobe",
"version": "15.008.20082"
},
{
"model": "acrobat dc",
"scope": "gte",
"trust": 1.0,
"vendor": "adobe",
"version": "15.006.30060"
},
{
"model": "acrobat reader dc",
"scope": "lt",
"trust": 1.0,
"vendor": "adobe",
"version": "15.009.20069"
},
{
"model": "acrobat dc",
"scope": "lt",
"trust": 1.0,
"vendor": "adobe",
"version": "15.006.30094"
},
{
"model": "acrobat",
"scope": "gte",
"trust": 1.0,
"vendor": "adobe",
"version": "10.0"
},
{
"model": "acrobat reader",
"scope": "lte",
"trust": 1.0,
"vendor": "adobe",
"version": "10.1.15"
},
{
"model": "acrobat reader",
"scope": "gte",
"trust": 1.0,
"vendor": "adobe",
"version": "10.0"
},
{
"model": "acrobat reader",
"scope": "lte",
"trust": 1.0,
"vendor": "adobe",
"version": "11.0.12"
},
{
"model": "acrobat",
"scope": "lte",
"trust": 1.0,
"vendor": "adobe",
"version": "10.1.15"
},
{
"model": "acrobat",
"scope": "lte",
"trust": 1.0,
"vendor": "adobe",
"version": "11.0.12"
},
{
"model": "acrobat reader dc",
"scope": "lt",
"trust": 1.0,
"vendor": "adobe",
"version": "15.006.30094"
},
{
"model": "acrobat",
"scope": "gte",
"trust": 1.0,
"vendor": "adobe",
"version": "11.0.0"
},
{
"model": "acrobat dc",
"scope": "lt",
"trust": 1.0,
"vendor": "adobe",
"version": "15.009.20069"
},
{
"model": "acrobat reader",
"scope": "gte",
"trust": 1.0,
"vendor": "adobe",
"version": "11.0.0"
},
{
"model": "acrobat reader dc",
"scope": "gte",
"trust": 1.0,
"vendor": "adobe",
"version": "15.006.30060"
},
{
"model": "acrobat dc",
"scope": "lt",
"trust": 0.8,
"vendor": "adobe",
"version": "(windows/macintosh)"
},
{
"model": "acrobat reader dc",
"scope": "lt",
"trust": 0.8,
"vendor": "adobe",
"version": "(windows/macintosh)"
},
{
"model": "acrobat reader dc",
"scope": "eq",
"trust": 0.8,
"vendor": "adobe",
"version": "classic 2015.006.30094"
},
{
"model": "acrobat",
"scope": "lt",
"trust": 0.8,
"vendor": "adobe",
"version": "11.x (windows/macintosh)"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.8,
"vendor": "adobe",
"version": "xi desktop 11.0.13"
},
{
"model": "reader",
"scope": "lt",
"trust": 0.8,
"vendor": "adobe",
"version": "11.x (windows/macintosh)"
},
{
"model": "acrobat dc",
"scope": "eq",
"trust": 0.8,
"vendor": "adobe",
"version": "continuous 2015.009.20069"
},
{
"model": "acrobat",
"scope": "lt",
"trust": 0.8,
"vendor": "adobe",
"version": "10.x (windows/macintosh)"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.8,
"vendor": "adobe",
"version": "xi desktop 11.0.13"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.8,
"vendor": "adobe",
"version": "x desktop 10.1.16"
},
{
"model": "acrobat dc",
"scope": "eq",
"trust": 0.8,
"vendor": "adobe",
"version": "classic 2015.006.30094"
},
{
"model": "reader",
"scope": "lt",
"trust": 0.8,
"vendor": "adobe",
"version": "10.x (windows/macintosh)"
},
{
"model": "acrobat reader dc",
"scope": "eq",
"trust": 0.8,
"vendor": "adobe",
"version": "continuous 2015.009.20069"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.8,
"vendor": "adobe",
"version": "x desktop 10.1.16"
},
{
"model": "acrobat reader dc",
"scope": null,
"trust": 0.7,
"vendor": "adobe",
"version": null
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.6,
"vendor": "adobe",
"version": "11.0.3"
},
{
"model": "acrobat reader",
"scope": "eq",
"trust": 0.6,
"vendor": "adobe",
"version": "11.0.2"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.6,
"vendor": "adobe",
"version": "11.0.6"
},
{
"model": "acrobat reader",
"scope": "eq",
"trust": 0.6,
"vendor": "adobe",
"version": "11.0.1"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.6,
"vendor": "adobe",
"version": "11.0.2"
},
{
"model": "acrobat dc",
"scope": "eq",
"trust": 0.6,
"vendor": "adobe",
"version": "2015.006.30060"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.6,
"vendor": "adobe",
"version": "11.0.5"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.6,
"vendor": "adobe",
"version": "11.0.1"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.6,
"vendor": "adobe",
"version": "11.0.4"
},
{
"model": "acrobat reader",
"scope": "eq",
"trust": 0.6,
"vendor": "adobe",
"version": "11.0.0"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1.3"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1.2"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1.1"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.0.3"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.0.2"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.0.1"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.0"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1.3"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1.2"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1.1"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.0.3"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.0.2"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.0.1"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.0"
}
],
"sources": [
{
"db": "ZDI",
"id": "ZDI-15-466"
},
{
"db": "BID",
"id": "77069"
},
{
"db": "JVNDB",
"id": "JVNDB-2015-005243"
},
{
"db": "CNNVD",
"id": "CNNVD-201510-199"
},
{
"db": "NVD",
"id": "CVE-2015-6686"
}
]
},
"configurations": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/configurations#",
"children": {
"@container": "@list"
},
"cpe_match": {
"@container": "@list"
},
"data": {
"@container": "@list"
},
"nodes": {
"@container": "@list"
}
},
"data": [
{
"CVE_data_version": "4.0",
"nodes": [
{
"cpe_match": [
{
"cpe22Uri": "cpe:/a:adobe:acrobat",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/a:adobe:acrobat_dc",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/a:adobe:acrobat_reader_dc",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/a:adobe:acrobat_reader",
"vulnerable": true
}
],
"operator": "OR"
}
]
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2015-005243"
}
]
},
"credits": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/credits#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Brian Gorenc - HP Zero Day Initiative",
"sources": [
{
"db": "ZDI",
"id": "ZDI-15-466"
}
],
"trust": 0.7
},
"cve": "CVE-2015-6686",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [
{
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "nvd@nist.gov",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 8.6,
"id": "CVE-2015-6686",
"impactScore": 6.4,
"integrityImpact": "PARTIAL",
"severity": "MEDIUM",
"trust": 1.7,
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
{
"acInsufInfo": null,
"accessComplexity": "Medium",
"accessVector": "Network",
"authentication": "None",
"author": "NVD",
"availabilityImpact": "Complete",
"baseScore": 9.3,
"confidentialityImpact": "Complete",
"exploitabilityScore": null,
"id": "CVE-2015-6686",
"impactScore": null,
"integrityImpact": "Complete",
"obtainAllPrivilege": null,
"obtainOtherPrivilege": null,
"obtainUserPrivilege": null,
"severity": "High",
"trust": 0.8,
"userInteractionRequired": null,
"vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
{
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "VULHUB",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 8.6,
"id": "VHN-84647",
"impactScore": 6.4,
"integrityImpact": "PARTIAL",
"severity": "MEDIUM",
"trust": 0.1,
"vectorString": "AV:N/AC:M/AU:N/C:P/I:P/A:P",
"version": "2.0"
}
],
"cvssV3": [],
"severity": [
{
"author": "nvd@nist.gov",
"id": "CVE-2015-6686",
"trust": 1.0,
"value": "MEDIUM"
},
{
"author": "NVD",
"id": "CVE-2015-6686",
"trust": 0.8,
"value": "High"
},
{
"author": "ZDI",
"id": "CVE-2015-6686",
"trust": 0.7,
"value": "MEDIUM"
},
{
"author": "CNNVD",
"id": "CNNVD-201510-199",
"trust": 0.6,
"value": "CRITICAL"
},
{
"author": "VULHUB",
"id": "VHN-84647",
"trust": 0.1,
"value": "MEDIUM"
}
]
}
],
"sources": [
{
"db": "ZDI",
"id": "ZDI-15-466"
},
{
"db": "VULHUB",
"id": "VHN-84647"
},
{
"db": "JVNDB",
"id": "JVNDB-2015-005243"
},
{
"db": "CNNVD",
"id": "CNNVD-201510-199"
},
{
"db": "NVD",
"id": "CVE-2015-6686"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Adobe Reader and Acrobat 10.x before 10.1.16 and 11.x before 11.0.13, Acrobat and Acrobat Reader DC Classic before 2015.006.30094, and Acrobat and Acrobat Reader DC Continuous before 2015.009.20069 on Windows and OS X allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted set of fields, a different vulnerability than CVE-2015-6685, CVE-2015-6693, CVE-2015-6694, CVE-2015-6695, and CVE-2015-7622. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The flaw exists within the handling of specific fields. A specially crafted PDF file with a specific combination of fields can force a dangling pointer to be reused after it has been freed. An attacker can leverage this vulnerability to execute code under the context of the current process. Adobe Acrobat and Reader are prone to multiple memory-corruption vulnerabilities. Failed exploit attempts will likely cause a denial-of-service condition. Adobe Reader, etc. are all products of Adobe (Adobe) in the United States. Adobe Reader is a free PDF file reader; Acrobat is a PDF file editing and conversion tool; Acrobat Reader DC is a set of tools for viewing, printing and annotating PDF. Security flaws exist in several Adobe products. 30060 and earlier, Acrobat XI Desktop 11.0.12 and earlier, Reader XI Desktop 11.0.12 and earlier, Acrobat X Desktop 10.1.15 and earlier, Reader X Desktop 10.1.15 and earlier",
"sources": [
{
"db": "NVD",
"id": "CVE-2015-6686"
},
{
"db": "JVNDB",
"id": "JVNDB-2015-005243"
},
{
"db": "ZDI",
"id": "ZDI-15-466"
},
{
"db": "BID",
"id": "77069"
},
{
"db": "VULHUB",
"id": "VHN-84647"
}
],
"trust": 2.61
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "NVD",
"id": "CVE-2015-6686",
"trust": 3.5
},
{
"db": "ZDI",
"id": "ZDI-15-466",
"trust": 2.7
},
{
"db": "SECTRACK",
"id": "1033796",
"trust": 1.7
},
{
"db": "JVNDB",
"id": "JVNDB-2015-005243",
"trust": 0.8
},
{
"db": "ZDI_CAN",
"id": "ZDI-CAN-2958",
"trust": 0.7
},
{
"db": "CNNVD",
"id": "CNNVD-201510-199",
"trust": 0.7
},
{
"db": "ZDI",
"id": "ZDI-15-471",
"trust": 0.3
},
{
"db": "ZDI",
"id": "ZDI-15-472",
"trust": 0.3
},
{
"db": "ZDI",
"id": "ZDI-15-467",
"trust": 0.3
},
{
"db": "ZDI",
"id": "ZDI-15-473",
"trust": 0.3
},
{
"db": "BID",
"id": "77069",
"trust": 0.3
},
{
"db": "VULHUB",
"id": "VHN-84647",
"trust": 0.1
}
],
"sources": [
{
"db": "ZDI",
"id": "ZDI-15-466"
},
{
"db": "VULHUB",
"id": "VHN-84647"
},
{
"db": "BID",
"id": "77069"
},
{
"db": "JVNDB",
"id": "JVNDB-2015-005243"
},
{
"db": "CNNVD",
"id": "CNNVD-201510-199"
},
{
"db": "NVD",
"id": "CVE-2015-6686"
}
]
},
"id": "VAR-201510-0357",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "VULHUB",
"id": "VHN-84647"
}
],
"trust": 0.01
},
"last_update_date": "2025-04-13T23:03:48.750000Z",
"patch": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/patch#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"title": "APSB15-24",
"trust": 1.5,
"url": "https://helpx.adobe.com/security/products/acrobat/apsb15-24.html"
},
{
"title": "APSB15-24",
"trust": 0.8,
"url": "https://helpx.adobe.com/jp/security/products/reader/apsb15-24.html"
},
{
"title": "\u30a2\u30c9\u30d3 \u30b7\u30b9\u30c6\u30e0\u30ba\u793e Adobe Reader \u306e\u8106\u5f31\u6027\u306b\u95a2\u3059\u308b\u304a\u77e5\u3089\u305b",
"trust": 0.8,
"url": "http://www.fmworld.net/biz/common/adobe/20151015.html"
},
{
"title": "Multiple Adobe Product Buffer Overflow Vulnerability Fix",
"trust": 0.6,
"url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=58048"
}
],
"sources": [
{
"db": "ZDI",
"id": "ZDI-15-466"
},
{
"db": "JVNDB",
"id": "JVNDB-2015-005243"
},
{
"db": "CNNVD",
"id": "CNNVD-201510-199"
}
]
},
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "CWE-119",
"trust": 1.9
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-84647"
},
{
"db": "JVNDB",
"id": "JVNDB-2015-005243"
},
{
"db": "NVD",
"id": "CVE-2015-6686"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 2.7,
"url": "https://helpx.adobe.com/security/products/acrobat/apsb15-24.html"
},
{
"trust": 1.7,
"url": "http://www.zerodayinitiative.com/advisories/zdi-15-466"
},
{
"trust": 1.7,
"url": "http://www.securitytracker.com/id/1033796"
},
{
"trust": 0.8,
"url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-6686"
},
{
"trust": 0.8,
"url": "http://www.ipa.go.jp/security/ciadr/vul/20151014-adobereader.html"
},
{
"trust": 0.8,
"url": "http://www.jpcert.or.jp/at/2015/at150035.html"
},
{
"trust": 0.8,
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2015-6686"
},
{
"trust": 0.8,
"url": "http://www.npa.go.jp/cyberpolice/topics/?seq=17022"
},
{
"trust": 0.3,
"url": "http://www.adobe.com"
},
{
"trust": 0.3,
"url": "http://www.zerodayinitiative.com/advisories/zdi-15-467/"
},
{
"trust": 0.3,
"url": "http://www.zerodayinitiative.com/advisories/zdi-15-466/"
},
{
"trust": 0.3,
"url": "http://www.zerodayinitiative.com/advisories/zdi-15-473/"
},
{
"trust": 0.3,
"url": "http://www.zerodayinitiative.com/advisories/zdi-15-471/"
},
{
"trust": 0.3,
"url": "http://www.zerodayinitiative.com/advisories/zdi-15-472/"
}
],
"sources": [
{
"db": "ZDI",
"id": "ZDI-15-466"
},
{
"db": "VULHUB",
"id": "VHN-84647"
},
{
"db": "BID",
"id": "77069"
},
{
"db": "JVNDB",
"id": "JVNDB-2015-005243"
},
{
"db": "CNNVD",
"id": "CNNVD-201510-199"
},
{
"db": "NVD",
"id": "CVE-2015-6686"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "ZDI",
"id": "ZDI-15-466"
},
{
"db": "VULHUB",
"id": "VHN-84647"
},
{
"db": "BID",
"id": "77069"
},
{
"db": "JVNDB",
"id": "JVNDB-2015-005243"
},
{
"db": "CNNVD",
"id": "CNNVD-201510-199"
},
{
"db": "NVD",
"id": "CVE-2015-6686"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2015-10-13T00:00:00",
"db": "ZDI",
"id": "ZDI-15-466"
},
{
"date": "2015-10-14T00:00:00",
"db": "VULHUB",
"id": "VHN-84647"
},
{
"date": "2015-10-13T00:00:00",
"db": "BID",
"id": "77069"
},
{
"date": "2015-10-16T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2015-005243"
},
{
"date": "2015-10-15T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201510-199"
},
{
"date": "2015-10-14T23:59:07.733000",
"db": "NVD",
"id": "CVE-2015-6686"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2015-10-13T00:00:00",
"db": "ZDI",
"id": "ZDI-15-466"
},
{
"date": "2020-05-13T00:00:00",
"db": "VULHUB",
"id": "VHN-84647"
},
{
"date": "2015-11-03T19:59:00",
"db": "BID",
"id": "77069"
},
{
"date": "2015-10-16T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2015-005243"
},
{
"date": "2020-05-14T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201510-199"
},
{
"date": "2025-04-12T10:46:40.837000",
"db": "NVD",
"id": "CVE-2015-6686"
}
]
},
"threat_type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/threat_type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "remote",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201510-199"
}
],
"trust": 0.6
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Windows and Mac OS X Run on Adobe Reader and Acrobat Vulnerable to arbitrary code execution",
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2015-005243"
}
],
"trust": 0.8
},
"type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "buffer error",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201510-199"
}
],
"trust": 0.6
}
}
VAR-201510-0333
Vulnerability from variot - Updated: 2025-04-13 23:03The ANSendForFormDistribution method in Adobe Reader and Acrobat 10.x before 10.1.16 and 11.x before 11.0.13, Acrobat and Acrobat Reader DC Classic before 2015.006.30094, and Acrobat and Acrobat Reader DC Continuous before 2015.009.20069 on Windows and OS X allows attackers to bypass JavaScript API execution restrictions via unspecified vectors, a different vulnerability than CVE-2015-6707, CVE-2015-6708, CVE-2015-6709, CVE-2015-6710, CVE-2015-6711, CVE-2015-6712, CVE-2015-6713, CVE-2015-6714, CVE-2015-6715, CVE-2015-6717, CVE-2015-6718, CVE-2015-6719, CVE-2015-6720, CVE-2015-6721, CVE-2015-6722, CVE-2015-6723, CVE-2015-6724, CVE-2015-6725, CVE-2015-7614, CVE-2015-7616, CVE-2015-7618, CVE-2015-7619, CVE-2015-7620, and CVE-2015-7623. This vulnerability CVE-2015-6707 , CVE-2015-6708 , CVE-2015-6709 , CVE-2015-6710 , CVE-2015-6711 , CVE-2015-6712 , CVE-2015-6713 , CVE-2015-6714 , CVE-2015-6715 , CVE-2015-6717 , CVE-2015-6718 , CVE-2015-6719 , CVE-2015-6720 , CVE-2015-6721 , CVE-2015-6722 , CVE-2015-6723 , CVE-2015-6724 , CVE-2015-6725 , CVE-2015-7614 , CVE-2015-7616 , CVE-2015-7618 , CVE-2015-7619 , CVE-2015-7620 ,and CVE-2015-7623 Is a different vulnerability.By the attacker, JavaScript API Execution restrictions may be avoided. This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Adobe Reader DC. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the ANSendForFormDistribution method. By creating a specially crafted PDF with specific Javascript instructions, it is possible to bypass the Javascript API restrictions. A remote attacker could exploit this vulnerability to execute arbitrary code. Adobe Acrobat and Reader are prone to multiple security-bypass vulnerabilities. An attacker can exploit these issues to bypass certain security restrictions and perform unauthorized actions. This may lead to further attacks. Adobe Reader, etc. are all products of Adobe (Adobe) in the United States. Adobe Reader is a free PDF file reader; Acrobat is a PDF file editing and conversion tool; Acrobat Reader DC is a set of tools for viewing, printing and annotating PDF. Classic and Continuous are two update mechanisms provided by Acrobat Reader DC Product Download Center. A security vulnerability exists in the ANSendForFormDistribution method of several Adobe products. 30060 and earlier, Acrobat XI Desktop 11.0.12 and earlier, Reader XI Desktop 11.0.12 and earlier, Acrobat X Desktop 10.1.15 and earlier, Reader X Desktop 10.1.15 and earlier
Show details on source website{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"configurations": {
"@id": "https://www.variotdbs.pl/ref/configurations"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-201510-0333",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "acrobat reader dc",
"scope": "gte",
"trust": 1.0,
"vendor": "adobe",
"version": "15.008.20082"
},
{
"model": "acrobat dc",
"scope": "gte",
"trust": 1.0,
"vendor": "adobe",
"version": "15.008.20082"
},
{
"model": "acrobat dc",
"scope": "gte",
"trust": 1.0,
"vendor": "adobe",
"version": "15.006.30060"
},
{
"model": "acrobat reader dc",
"scope": "lt",
"trust": 1.0,
"vendor": "adobe",
"version": "15.009.20069"
},
{
"model": "acrobat dc",
"scope": "lt",
"trust": 1.0,
"vendor": "adobe",
"version": "15.006.30094"
},
{
"model": "acrobat",
"scope": "gte",
"trust": 1.0,
"vendor": "adobe",
"version": "10.0"
},
{
"model": "acrobat reader",
"scope": "lte",
"trust": 1.0,
"vendor": "adobe",
"version": "10.1.15"
},
{
"model": "acrobat reader",
"scope": "gte",
"trust": 1.0,
"vendor": "adobe",
"version": "10.0"
},
{
"model": "acrobat reader",
"scope": "lte",
"trust": 1.0,
"vendor": "adobe",
"version": "11.0.12"
},
{
"model": "acrobat",
"scope": "lte",
"trust": 1.0,
"vendor": "adobe",
"version": "10.1.15"
},
{
"model": "acrobat",
"scope": "lte",
"trust": 1.0,
"vendor": "adobe",
"version": "11.0.12"
},
{
"model": "acrobat reader dc",
"scope": "lt",
"trust": 1.0,
"vendor": "adobe",
"version": "15.006.30094"
},
{
"model": "acrobat",
"scope": "gte",
"trust": 1.0,
"vendor": "adobe",
"version": "11.0.0"
},
{
"model": "acrobat dc",
"scope": "lt",
"trust": 1.0,
"vendor": "adobe",
"version": "15.009.20069"
},
{
"model": "acrobat reader",
"scope": "gte",
"trust": 1.0,
"vendor": "adobe",
"version": "11.0.0"
},
{
"model": "acrobat reader dc",
"scope": "gte",
"trust": 1.0,
"vendor": "adobe",
"version": "15.006.30060"
},
{
"model": "acrobat dc",
"scope": "lt",
"trust": 0.8,
"vendor": "adobe",
"version": "(windows/macintosh)"
},
{
"model": "acrobat reader dc",
"scope": "lt",
"trust": 0.8,
"vendor": "adobe",
"version": "(windows/macintosh)"
},
{
"model": "acrobat reader dc",
"scope": "eq",
"trust": 0.8,
"vendor": "adobe",
"version": "classic 2015.006.30094"
},
{
"model": "acrobat",
"scope": "lt",
"trust": 0.8,
"vendor": "adobe",
"version": "11.x (windows/macintosh)"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.8,
"vendor": "adobe",
"version": "xi desktop 11.0.13"
},
{
"model": "reader",
"scope": "lt",
"trust": 0.8,
"vendor": "adobe",
"version": "11.x (windows/macintosh)"
},
{
"model": "acrobat dc",
"scope": "eq",
"trust": 0.8,
"vendor": "adobe",
"version": "continuous 2015.009.20069"
},
{
"model": "acrobat",
"scope": "lt",
"trust": 0.8,
"vendor": "adobe",
"version": "10.x (windows/macintosh)"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.8,
"vendor": "adobe",
"version": "xi desktop 11.0.13"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.8,
"vendor": "adobe",
"version": "x desktop 10.1.16"
},
{
"model": "acrobat dc",
"scope": "eq",
"trust": 0.8,
"vendor": "adobe",
"version": "classic 2015.006.30094"
},
{
"model": "reader",
"scope": "lt",
"trust": 0.8,
"vendor": "adobe",
"version": "10.x (windows/macintosh)"
},
{
"model": "acrobat reader dc",
"scope": "eq",
"trust": 0.8,
"vendor": "adobe",
"version": "continuous 2015.009.20069"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.8,
"vendor": "adobe",
"version": "x desktop 10.1.16"
},
{
"model": "acrobat reader dc",
"scope": null,
"trust": 0.7,
"vendor": "adobe",
"version": null
},
{
"model": "acrobat reader",
"scope": "eq",
"trust": 0.6,
"vendor": "adobe",
"version": "11.0.8"
},
{
"model": "acrobat reader",
"scope": "eq",
"trust": 0.6,
"vendor": "adobe",
"version": "11.0.6"
},
{
"model": "acrobat reader",
"scope": "eq",
"trust": 0.6,
"vendor": "adobe",
"version": "11.0.5"
},
{
"model": "acrobat reader",
"scope": "eq",
"trust": 0.6,
"vendor": "adobe",
"version": "11.0.7"
},
{
"model": "acrobat reader",
"scope": "eq",
"trust": 0.6,
"vendor": "adobe",
"version": "11.0.2"
},
{
"model": "acrobat reader",
"scope": "eq",
"trust": 0.6,
"vendor": "adobe",
"version": "11.0.1"
},
{
"model": "acrobat reader",
"scope": "eq",
"trust": 0.6,
"vendor": "adobe",
"version": "11.0.4"
},
{
"model": "acrobat reader",
"scope": "eq",
"trust": 0.6,
"vendor": "adobe",
"version": "11.0.9"
},
{
"model": "acrobat reader",
"scope": "eq",
"trust": 0.6,
"vendor": "adobe",
"version": "11.0.0"
},
{
"model": "acrobat reader",
"scope": "eq",
"trust": 0.6,
"vendor": "adobe",
"version": "11.0.3"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1.14"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1.9"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1.1"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1.13"
},
{
"model": "acrobat reader dc",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "2015.8.20082"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.10"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.0"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1.2"
},
{
"model": "acrobat dc",
"scope": "ne",
"trust": 0.3,
"vendor": "adobe",
"version": "2015.006.30094"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1.15"
},
{
"model": "acrobat reader dc",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "2015.6.30060"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.0.3"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1.10"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.3"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.0.13"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.6"
},
{
"model": "acrobat",
"scope": "ne",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.13"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0"
},
{
"model": "acrobat reader dc",
"scope": "ne",
"trust": 0.3,
"vendor": "adobe",
"version": "2015.006.30094"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.10"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.4"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1.3"
},
{
"model": "acrobat",
"scope": "ne",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1.16"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.0.2"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.0.1"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.11"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1.4"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1.6"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1.11"
},
{
"model": "reader",
"scope": "ne",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.13"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.7"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1.14"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1.3"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1.1"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1"
},
{
"model": "reader",
"scope": "ne",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1.16"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.0.2"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1.5"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.0"
},
{
"model": "acrobat dc",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "2015.007.20033"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1.12"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.1"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1.2"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1.13"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1.4"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1.8"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1.11"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.0.3"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.2"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.12"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.08"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.9"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.7"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.6"
},
{
"model": "acrobat dc",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "2015.006.30060"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.05"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1.10"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.09"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.3"
},
{
"model": "acrobat dc",
"scope": "ne",
"trust": 0.3,
"vendor": "adobe",
"version": "2015.009.20069"
},
{
"model": "acrobat dc",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "2015.006.30033"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1.12"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.1"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.4"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1.9"
},
{
"model": "acrobat reader dc",
"scope": "ne",
"trust": 0.3,
"vendor": "adobe",
"version": "2015.009.20069"
},
{
"model": "acrobat reader dc",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "2015.006.30033"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.12"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.08"
},
{
"model": "acrobat dc",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "2015.008.20082"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1.7"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.0.1"
},
{
"model": "acrobat reader dc",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "2015.007.20033"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.09"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.11"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1.15"
}
],
"sources": [
{
"db": "ZDI",
"id": "ZDI-15-507"
},
{
"db": "BID",
"id": "77074"
},
{
"db": "JVNDB",
"id": "JVNDB-2015-005273"
},
{
"db": "CNNVD",
"id": "CNNVD-201510-229"
},
{
"db": "NVD",
"id": "CVE-2015-6716"
}
]
},
"configurations": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/configurations#",
"children": {
"@container": "@list"
},
"cpe_match": {
"@container": "@list"
},
"data": {
"@container": "@list"
},
"nodes": {
"@container": "@list"
}
},
"data": [
{
"CVE_data_version": "4.0",
"nodes": [
{
"cpe_match": [
{
"cpe22Uri": "cpe:/a:adobe:acrobat",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/a:adobe:acrobat_dc",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/a:adobe:acrobat_reader_dc",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/a:adobe:acrobat_reader",
"vulnerable": true
}
],
"operator": "OR"
}
]
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2015-005273"
}
]
},
"credits": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/credits#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Matt Molinyawe and Jasiel Spelman of HP Zero Day Initiative",
"sources": [
{
"db": "ZDI",
"id": "ZDI-15-507"
}
],
"trust": 0.7
},
"cve": "CVE-2015-6716",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [
{
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "nvd@nist.gov",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 8.6,
"id": "CVE-2015-6716",
"impactScore": 6.4,
"integrityImpact": "PARTIAL",
"severity": "MEDIUM",
"trust": 1.7,
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
{
"acInsufInfo": null,
"accessComplexity": "Medium",
"accessVector": "Network",
"authentication": "None",
"author": "NVD",
"availabilityImpact": "Complete",
"baseScore": 9.3,
"confidentialityImpact": "Complete",
"exploitabilityScore": null,
"id": "CVE-2015-6716",
"impactScore": null,
"integrityImpact": "Complete",
"obtainAllPrivilege": null,
"obtainOtherPrivilege": null,
"obtainUserPrivilege": null,
"severity": "High",
"trust": 0.8,
"userInteractionRequired": null,
"vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
{
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "VULHUB",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 8.6,
"id": "VHN-84677",
"impactScore": 6.4,
"integrityImpact": "PARTIAL",
"severity": "MEDIUM",
"trust": 0.1,
"vectorString": "AV:N/AC:M/AU:N/C:P/I:P/A:P",
"version": "2.0"
}
],
"cvssV3": [],
"severity": [
{
"author": "nvd@nist.gov",
"id": "CVE-2015-6716",
"trust": 1.0,
"value": "MEDIUM"
},
{
"author": "NVD",
"id": "CVE-2015-6716",
"trust": 0.8,
"value": "High"
},
{
"author": "ZDI",
"id": "CVE-2015-6716",
"trust": 0.7,
"value": "MEDIUM"
},
{
"author": "CNNVD",
"id": "CNNVD-201510-229",
"trust": 0.6,
"value": "CRITICAL"
},
{
"author": "VULHUB",
"id": "VHN-84677",
"trust": 0.1,
"value": "MEDIUM"
}
]
}
],
"sources": [
{
"db": "ZDI",
"id": "ZDI-15-507"
},
{
"db": "VULHUB",
"id": "VHN-84677"
},
{
"db": "JVNDB",
"id": "JVNDB-2015-005273"
},
{
"db": "CNNVD",
"id": "CNNVD-201510-229"
},
{
"db": "NVD",
"id": "CVE-2015-6716"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "The ANSendForFormDistribution method in Adobe Reader and Acrobat 10.x before 10.1.16 and 11.x before 11.0.13, Acrobat and Acrobat Reader DC Classic before 2015.006.30094, and Acrobat and Acrobat Reader DC Continuous before 2015.009.20069 on Windows and OS X allows attackers to bypass JavaScript API execution restrictions via unspecified vectors, a different vulnerability than CVE-2015-6707, CVE-2015-6708, CVE-2015-6709, CVE-2015-6710, CVE-2015-6711, CVE-2015-6712, CVE-2015-6713, CVE-2015-6714, CVE-2015-6715, CVE-2015-6717, CVE-2015-6718, CVE-2015-6719, CVE-2015-6720, CVE-2015-6721, CVE-2015-6722, CVE-2015-6723, CVE-2015-6724, CVE-2015-6725, CVE-2015-7614, CVE-2015-7616, CVE-2015-7618, CVE-2015-7619, CVE-2015-7620, and CVE-2015-7623. This vulnerability CVE-2015-6707 , CVE-2015-6708 , CVE-2015-6709 , CVE-2015-6710 , CVE-2015-6711 , CVE-2015-6712 , CVE-2015-6713 , CVE-2015-6714 , CVE-2015-6715 , CVE-2015-6717 , CVE-2015-6718 , CVE-2015-6719 , CVE-2015-6720 , CVE-2015-6721 , CVE-2015-6722 , CVE-2015-6723 , CVE-2015-6724 , CVE-2015-6725 , CVE-2015-7614 , CVE-2015-7616 , CVE-2015-7618 , CVE-2015-7619 , CVE-2015-7620 ,and CVE-2015-7623 Is a different vulnerability.By the attacker, JavaScript API Execution restrictions may be avoided. This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Adobe Reader DC. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the ANSendForFormDistribution method. By creating a specially crafted PDF with specific Javascript instructions, it is possible to bypass the Javascript API restrictions. A remote attacker could exploit this vulnerability to execute arbitrary code. Adobe Acrobat and Reader are prone to multiple security-bypass vulnerabilities. \nAn attacker can exploit these issues to bypass certain security restrictions and perform unauthorized actions. This may lead to further attacks. Adobe Reader, etc. are all products of Adobe (Adobe) in the United States. Adobe Reader is a free PDF file reader; Acrobat is a PDF file editing and conversion tool; Acrobat Reader DC is a set of tools for viewing, printing and annotating PDF. Classic and Continuous are two update mechanisms provided by Acrobat Reader DC Product Download Center. A security vulnerability exists in the ANSendForFormDistribution method of several Adobe products. 30060 and earlier, Acrobat XI Desktop 11.0.12 and earlier, Reader XI Desktop 11.0.12 and earlier, Acrobat X Desktop 10.1.15 and earlier, Reader X Desktop 10.1.15 and earlier",
"sources": [
{
"db": "NVD",
"id": "CVE-2015-6716"
},
{
"db": "JVNDB",
"id": "JVNDB-2015-005273"
},
{
"db": "ZDI",
"id": "ZDI-15-507"
},
{
"db": "BID",
"id": "77074"
},
{
"db": "VULHUB",
"id": "VHN-84677"
}
],
"trust": 2.61
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "NVD",
"id": "CVE-2015-6716",
"trust": 3.5
},
{
"db": "ZDI",
"id": "ZDI-15-507",
"trust": 2.4
},
{
"db": "SECTRACK",
"id": "1033796",
"trust": 1.7
},
{
"db": "JVNDB",
"id": "JVNDB-2015-005273",
"trust": 0.8
},
{
"db": "ZDI_CAN",
"id": "ZDI-CAN-3091",
"trust": 0.7
},
{
"db": "CNNVD",
"id": "CNNVD-201510-229",
"trust": 0.7
},
{
"db": "BID",
"id": "77074",
"trust": 0.3
},
{
"db": "VULHUB",
"id": "VHN-84677",
"trust": 0.1
}
],
"sources": [
{
"db": "ZDI",
"id": "ZDI-15-507"
},
{
"db": "VULHUB",
"id": "VHN-84677"
},
{
"db": "BID",
"id": "77074"
},
{
"db": "JVNDB",
"id": "JVNDB-2015-005273"
},
{
"db": "CNNVD",
"id": "CNNVD-201510-229"
},
{
"db": "NVD",
"id": "CVE-2015-6716"
}
]
},
"id": "VAR-201510-0333",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "VULHUB",
"id": "VHN-84677"
}
],
"trust": 0.01
},
"last_update_date": "2025-04-13T23:03:48.713000Z",
"patch": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/patch#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"title": "APSB15-24",
"trust": 1.5,
"url": "https://helpx.adobe.com/security/products/acrobat/apsb15-24.html"
},
{
"title": "APSB15-24",
"trust": 0.8,
"url": "https://helpx.adobe.com/jp/security/products/reader/apsb15-24.html"
},
{
"title": "\u30a2\u30c9\u30d3 \u30b7\u30b9\u30c6\u30e0\u30ba\u793e Adobe Reader \u306e\u8106\u5f31\u6027\u306b\u95a2\u3059\u308b\u304a\u77e5\u3089\u305b",
"trust": 0.8,
"url": "http://www.fmworld.net/biz/common/adobe/20151015.html"
},
{
"title": "Multiple Adobe Product Privilege License and Access Control Vulnerability Fixes",
"trust": 0.6,
"url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=58078"
}
],
"sources": [
{
"db": "ZDI",
"id": "ZDI-15-507"
},
{
"db": "JVNDB",
"id": "JVNDB-2015-005273"
},
{
"db": "CNNVD",
"id": "CNNVD-201510-229"
}
]
},
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "NVD-CWE-noinfo",
"trust": 1.0
},
{
"problemtype": "CWE-264",
"trust": 0.9
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-84677"
},
{
"db": "JVNDB",
"id": "JVNDB-2015-005273"
},
{
"db": "NVD",
"id": "CVE-2015-6716"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 2.4,
"url": "https://helpx.adobe.com/security/products/acrobat/apsb15-24.html"
},
{
"trust": 1.7,
"url": "http://www.zerodayinitiative.com/advisories/zdi-15-507"
},
{
"trust": 1.7,
"url": "http://www.securitytracker.com/id/1033796"
},
{
"trust": 0.8,
"url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-6716"
},
{
"trust": 0.8,
"url": "http://www.ipa.go.jp/security/ciadr/vul/20151014-adobereader.html"
},
{
"trust": 0.8,
"url": "http://www.jpcert.or.jp/at/2015/at150035.html"
},
{
"trust": 0.8,
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2015-6716"
},
{
"trust": 0.8,
"url": "http://www.npa.go.jp/cyberpolice/topics/?seq=17022"
},
{
"trust": 0.3,
"url": "http://www.adobe.com"
}
],
"sources": [
{
"db": "ZDI",
"id": "ZDI-15-507"
},
{
"db": "VULHUB",
"id": "VHN-84677"
},
{
"db": "BID",
"id": "77074"
},
{
"db": "JVNDB",
"id": "JVNDB-2015-005273"
},
{
"db": "CNNVD",
"id": "CNNVD-201510-229"
},
{
"db": "NVD",
"id": "CVE-2015-6716"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "ZDI",
"id": "ZDI-15-507"
},
{
"db": "VULHUB",
"id": "VHN-84677"
},
{
"db": "BID",
"id": "77074"
},
{
"db": "JVNDB",
"id": "JVNDB-2015-005273"
},
{
"db": "CNNVD",
"id": "CNNVD-201510-229"
},
{
"db": "NVD",
"id": "CVE-2015-6716"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2015-10-13T00:00:00",
"db": "ZDI",
"id": "ZDI-15-507"
},
{
"date": "2015-10-14T00:00:00",
"db": "VULHUB",
"id": "VHN-84677"
},
{
"date": "2015-10-13T00:00:00",
"db": "BID",
"id": "77074"
},
{
"date": "2015-10-16T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2015-005273"
},
{
"date": "2015-10-15T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201510-229"
},
{
"date": "2015-10-14T23:59:37.837000",
"db": "NVD",
"id": "CVE-2015-6716"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2015-10-13T00:00:00",
"db": "ZDI",
"id": "ZDI-15-507"
},
{
"date": "2020-05-18T00:00:00",
"db": "VULHUB",
"id": "VHN-84677"
},
{
"date": "2015-11-03T19:59:00",
"db": "BID",
"id": "77074"
},
{
"date": "2015-10-16T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2015-005273"
},
{
"date": "2020-05-19T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201510-229"
},
{
"date": "2025-04-12T10:46:40.837000",
"db": "NVD",
"id": "CVE-2015-6716"
}
]
},
"threat_type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/threat_type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "remote",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201510-229"
}
],
"trust": 0.6
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Windows and Mac OS X Run on Adobe Reader and Acrobat of ANSendForFormDistribution In the method JavaScript API Vulnerability that circumvents execution restrictions",
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2015-005273"
}
],
"trust": 0.8
},
"type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "permissions and access control issues",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201510-229"
}
],
"trust": 0.6
}
}
VAR-201510-0338
Vulnerability from variot - Updated: 2025-04-13 23:03The CBSharedReviewSecurityDialog method in Adobe Reader and Acrobat 10.x before 10.1.16 and 11.x before 11.0.13, Acrobat and Acrobat Reader DC Classic before 2015.006.30094, and Acrobat and Acrobat Reader DC Continuous before 2015.009.20069 on Windows and OS X allows attackers to bypass JavaScript API execution restrictions via unspecified vectors, a different vulnerability than CVE-2015-6707, CVE-2015-6708, CVE-2015-6709, CVE-2015-6710, CVE-2015-6711, CVE-2015-6712, CVE-2015-6713, CVE-2015-6714, CVE-2015-6715, CVE-2015-6716, CVE-2015-6717, CVE-2015-6718, CVE-2015-6719, CVE-2015-6720, CVE-2015-6722, CVE-2015-6723, CVE-2015-6724, CVE-2015-6725, CVE-2015-7614, CVE-2015-7616, CVE-2015-7618, CVE-2015-7619, CVE-2015-7620, and CVE-2015-7623. This vulnerability is CVE-2015-6707 , CVE-2015-6708 , CVE-2015-6709 , CVE-2015-6710 , CVE-2015-6711 , CVE-2015-6712 , CVE-2015-6713 , CVE-2015-6714 , CVE-2015-6715 , CVE-2015-6716 , CVE-2015-6717 , CVE-2015-6718 , CVE-2015-6719 , CVE-2015-6720 , CVE-2015-6722 , CVE-2015-6723 , CVE-2015-6724 , CVE-2015-6725 , CVE-2015-7614 , CVE-2015-7616 , CVE-2015-7618 , CVE-2015-7619 , CVE-2015-7620 ,and CVE-2015-7623 This is a different vulnerability.By the attacker, JavaScript API Execution restrictions may be bypassed. This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Adobe Reader DC. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the CBSharedReviewSecurityDialog method. A remote attacker could exploit this vulnerability to execute arbitrary code. Adobe Acrobat and Reader are prone to multiple security-bypass vulnerabilities. An attacker can exploit these issues to bypass certain security restrictions and perform unauthorized actions. This may lead to further attacks. Adobe Reader, etc. are all products of Adobe (Adobe) in the United States. Adobe Reader is a free PDF file reader; Acrobat is a PDF file editing and conversion tool; Acrobat Reader DC is a set of tools for viewing, printing and annotating PDF. Classic and Continuous are two update mechanisms provided by Acrobat Reader DC Product Download Center. A security vulnerability exists in the CBSharedReviewSecurityDialog method of several Adobe products. 30060 and earlier, Acrobat XI Desktop 11.0.12 and earlier, Reader XI Desktop 11.0.12 and earlier, Acrobat X Desktop 10.1.15 and earlier, Reader X Desktop 10.1.15 and earlier
Show details on source website{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"configurations": {
"@id": "https://www.variotdbs.pl/ref/configurations"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-201510-0338",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "acrobat reader dc",
"scope": "gte",
"trust": 1.0,
"vendor": "adobe",
"version": "15.008.20082"
},
{
"model": "acrobat dc",
"scope": "gte",
"trust": 1.0,
"vendor": "adobe",
"version": "15.008.20082"
},
{
"model": "acrobat dc",
"scope": "gte",
"trust": 1.0,
"vendor": "adobe",
"version": "15.006.30060"
},
{
"model": "acrobat reader dc",
"scope": "lt",
"trust": 1.0,
"vendor": "adobe",
"version": "15.009.20069"
},
{
"model": "acrobat dc",
"scope": "lt",
"trust": 1.0,
"vendor": "adobe",
"version": "15.006.30094"
},
{
"model": "acrobat",
"scope": "gte",
"trust": 1.0,
"vendor": "adobe",
"version": "10.0"
},
{
"model": "acrobat reader",
"scope": "lte",
"trust": 1.0,
"vendor": "adobe",
"version": "10.1.15"
},
{
"model": "acrobat reader",
"scope": "gte",
"trust": 1.0,
"vendor": "adobe",
"version": "10.0"
},
{
"model": "acrobat reader",
"scope": "lte",
"trust": 1.0,
"vendor": "adobe",
"version": "11.0.12"
},
{
"model": "acrobat",
"scope": "lte",
"trust": 1.0,
"vendor": "adobe",
"version": "10.1.15"
},
{
"model": "acrobat",
"scope": "lte",
"trust": 1.0,
"vendor": "adobe",
"version": "11.0.12"
},
{
"model": "acrobat reader dc",
"scope": "lt",
"trust": 1.0,
"vendor": "adobe",
"version": "15.006.30094"
},
{
"model": "acrobat",
"scope": "gte",
"trust": 1.0,
"vendor": "adobe",
"version": "11.0.0"
},
{
"model": "acrobat dc",
"scope": "lt",
"trust": 1.0,
"vendor": "adobe",
"version": "15.009.20069"
},
{
"model": "acrobat reader",
"scope": "gte",
"trust": 1.0,
"vendor": "adobe",
"version": "11.0.0"
},
{
"model": "acrobat reader dc",
"scope": "gte",
"trust": 1.0,
"vendor": "adobe",
"version": "15.006.30060"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.9,
"vendor": "adobe",
"version": "11.0.10"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.9,
"vendor": "adobe",
"version": "11.0.6"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.9,
"vendor": "adobe",
"version": "11.0.7"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.9,
"vendor": "adobe",
"version": "11.0.12"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.9,
"vendor": "adobe",
"version": "11.0.9"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.9,
"vendor": "adobe",
"version": "11.0.3"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.9,
"vendor": "adobe",
"version": "11.0.4"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.9,
"vendor": "adobe",
"version": "11.0.11"
},
{
"model": "acrobat dc",
"scope": "lt",
"trust": 0.8,
"vendor": "adobe",
"version": "(windows/macintosh)"
},
{
"model": "acrobat reader dc",
"scope": "lt",
"trust": 0.8,
"vendor": "adobe",
"version": "(windows/macintosh)"
},
{
"model": "acrobat reader dc",
"scope": "eq",
"trust": 0.8,
"vendor": "adobe",
"version": "classic 2015.006.30094"
},
{
"model": "acrobat",
"scope": "lt",
"trust": 0.8,
"vendor": "adobe",
"version": "11.x (windows/macintosh)"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.8,
"vendor": "adobe",
"version": "xi desktop 11.0.13"
},
{
"model": "reader",
"scope": "lt",
"trust": 0.8,
"vendor": "adobe",
"version": "11.x (windows/macintosh)"
},
{
"model": "acrobat dc",
"scope": "eq",
"trust": 0.8,
"vendor": "adobe",
"version": "continuous 2015.009.20069"
},
{
"model": "acrobat",
"scope": "lt",
"trust": 0.8,
"vendor": "adobe",
"version": "10.x (windows/macintosh)"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.8,
"vendor": "adobe",
"version": "xi desktop 11.0.13"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.8,
"vendor": "adobe",
"version": "x desktop 10.1.16"
},
{
"model": "acrobat dc",
"scope": "eq",
"trust": 0.8,
"vendor": "adobe",
"version": "classic 2015.006.30094"
},
{
"model": "reader",
"scope": "lt",
"trust": 0.8,
"vendor": "adobe",
"version": "10.x (windows/macintosh)"
},
{
"model": "acrobat reader dc",
"scope": "eq",
"trust": 0.8,
"vendor": "adobe",
"version": "continuous 2015.009.20069"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.8,
"vendor": "adobe",
"version": "x desktop 10.1.16"
},
{
"model": "acrobat reader dc",
"scope": null,
"trust": 0.7,
"vendor": "adobe",
"version": null
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.6,
"vendor": "adobe",
"version": "11.0.8"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.6,
"vendor": "adobe",
"version": "11.0.5"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1.14"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1.9"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1.1"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1.13"
},
{
"model": "acrobat reader dc",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "2015.8.20082"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.0"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1.2"
},
{
"model": "acrobat dc",
"scope": "ne",
"trust": 0.3,
"vendor": "adobe",
"version": "2015.006.30094"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1.15"
},
{
"model": "acrobat reader dc",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "2015.6.30060"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.0.3"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1.10"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.3"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.0.13"
},
{
"model": "acrobat",
"scope": "ne",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.13"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0"
},
{
"model": "acrobat reader dc",
"scope": "ne",
"trust": 0.3,
"vendor": "adobe",
"version": "2015.006.30094"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.10"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.4"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1.3"
},
{
"model": "acrobat",
"scope": "ne",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1.16"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.0.2"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.0.1"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.11"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1.4"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1.6"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1.11"
},
{
"model": "reader",
"scope": "ne",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.13"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1.14"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1.3"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1.1"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1"
},
{
"model": "reader",
"scope": "ne",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1.16"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.0.2"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1.5"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.0"
},
{
"model": "acrobat dc",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "2015.007.20033"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1.12"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.1"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1.2"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1.13"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1.4"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1.8"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1.11"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.0.3"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.2"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.08"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.7"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.6"
},
{
"model": "acrobat dc",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "2015.006.30060"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.05"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1.10"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.09"
},
{
"model": "acrobat dc",
"scope": "ne",
"trust": 0.3,
"vendor": "adobe",
"version": "2015.009.20069"
},
{
"model": "acrobat dc",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "2015.006.30033"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1.12"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.1"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1.9"
},
{
"model": "acrobat reader dc",
"scope": "ne",
"trust": 0.3,
"vendor": "adobe",
"version": "2015.009.20069"
},
{
"model": "acrobat reader dc",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "2015.006.30033"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.12"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.08"
},
{
"model": "acrobat dc",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "2015.008.20082"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1.7"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.0.1"
},
{
"model": "acrobat reader dc",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "2015.007.20033"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.09"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1.15"
}
],
"sources": [
{
"db": "ZDI",
"id": "ZDI-15-502"
},
{
"db": "BID",
"id": "77074"
},
{
"db": "JVNDB",
"id": "JVNDB-2015-005278"
},
{
"db": "CNNVD",
"id": "CNNVD-201510-234"
},
{
"db": "NVD",
"id": "CVE-2015-6721"
}
]
},
"configurations": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/configurations#",
"children": {
"@container": "@list"
},
"cpe_match": {
"@container": "@list"
},
"data": {
"@container": "@list"
},
"nodes": {
"@container": "@list"
}
},
"data": [
{
"CVE_data_version": "4.0",
"nodes": [
{
"cpe_match": [
{
"cpe22Uri": "cpe:/a:adobe:acrobat",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/a:adobe:acrobat_dc",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/a:adobe:acrobat_reader_dc",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/a:adobe:acrobat_reader",
"vulnerable": true
}
],
"operator": "OR"
}
]
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2015-005278"
}
]
},
"credits": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/credits#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Matt Molinyawe and Jasiel Spelman of HP Zero Day Initiative",
"sources": [
{
"db": "ZDI",
"id": "ZDI-15-502"
}
],
"trust": 0.7
},
"cve": "CVE-2015-6721",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [
{
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "nvd@nist.gov",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 8.6,
"id": "CVE-2015-6721",
"impactScore": 6.4,
"integrityImpact": "PARTIAL",
"severity": "MEDIUM",
"trust": 1.7,
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
{
"acInsufInfo": null,
"accessComplexity": "Medium",
"accessVector": "Network",
"authentication": "None",
"author": "NVD",
"availabilityImpact": "Complete",
"baseScore": 9.3,
"confidentialityImpact": "Complete",
"exploitabilityScore": null,
"id": "CVE-2015-6721",
"impactScore": null,
"integrityImpact": "Complete",
"obtainAllPrivilege": null,
"obtainOtherPrivilege": null,
"obtainUserPrivilege": null,
"severity": "High",
"trust": 0.8,
"userInteractionRequired": null,
"vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
{
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "VULHUB",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 8.6,
"id": "VHN-84682",
"impactScore": 6.4,
"integrityImpact": "PARTIAL",
"severity": "MEDIUM",
"trust": 0.1,
"vectorString": "AV:N/AC:M/AU:N/C:P/I:P/A:P",
"version": "2.0"
}
],
"cvssV3": [],
"severity": [
{
"author": "nvd@nist.gov",
"id": "CVE-2015-6721",
"trust": 1.0,
"value": "MEDIUM"
},
{
"author": "NVD",
"id": "CVE-2015-6721",
"trust": 0.8,
"value": "High"
},
{
"author": "ZDI",
"id": "CVE-2015-6721",
"trust": 0.7,
"value": "MEDIUM"
},
{
"author": "CNNVD",
"id": "CNNVD-201510-234",
"trust": 0.6,
"value": "CRITICAL"
},
{
"author": "VULHUB",
"id": "VHN-84682",
"trust": 0.1,
"value": "MEDIUM"
}
]
}
],
"sources": [
{
"db": "ZDI",
"id": "ZDI-15-502"
},
{
"db": "VULHUB",
"id": "VHN-84682"
},
{
"db": "JVNDB",
"id": "JVNDB-2015-005278"
},
{
"db": "CNNVD",
"id": "CNNVD-201510-234"
},
{
"db": "NVD",
"id": "CVE-2015-6721"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "The CBSharedReviewSecurityDialog method in Adobe Reader and Acrobat 10.x before 10.1.16 and 11.x before 11.0.13, Acrobat and Acrobat Reader DC Classic before 2015.006.30094, and Acrobat and Acrobat Reader DC Continuous before 2015.009.20069 on Windows and OS X allows attackers to bypass JavaScript API execution restrictions via unspecified vectors, a different vulnerability than CVE-2015-6707, CVE-2015-6708, CVE-2015-6709, CVE-2015-6710, CVE-2015-6711, CVE-2015-6712, CVE-2015-6713, CVE-2015-6714, CVE-2015-6715, CVE-2015-6716, CVE-2015-6717, CVE-2015-6718, CVE-2015-6719, CVE-2015-6720, CVE-2015-6722, CVE-2015-6723, CVE-2015-6724, CVE-2015-6725, CVE-2015-7614, CVE-2015-7616, CVE-2015-7618, CVE-2015-7619, CVE-2015-7620, and CVE-2015-7623. This vulnerability is CVE-2015-6707 , CVE-2015-6708 , CVE-2015-6709 , CVE-2015-6710 , CVE-2015-6711 , CVE-2015-6712 , CVE-2015-6713 , CVE-2015-6714 , CVE-2015-6715 , CVE-2015-6716 , CVE-2015-6717 , CVE-2015-6718 , CVE-2015-6719 , CVE-2015-6720 , CVE-2015-6722 , CVE-2015-6723 , CVE-2015-6724 , CVE-2015-6725 , CVE-2015-7614 , CVE-2015-7616 , CVE-2015-7618 , CVE-2015-7619 , CVE-2015-7620 ,and CVE-2015-7623 This is a different vulnerability.By the attacker, JavaScript API Execution restrictions may be bypassed. This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Adobe Reader DC. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the CBSharedReviewSecurityDialog method. A remote attacker could exploit this vulnerability to execute arbitrary code. Adobe Acrobat and Reader are prone to multiple security-bypass vulnerabilities. \nAn attacker can exploit these issues to bypass certain security restrictions and perform unauthorized actions. This may lead to further attacks. Adobe Reader, etc. are all products of Adobe (Adobe) in the United States. Adobe Reader is a free PDF file reader; Acrobat is a PDF file editing and conversion tool; Acrobat Reader DC is a set of tools for viewing, printing and annotating PDF. Classic and Continuous are two update mechanisms provided by Acrobat Reader DC Product Download Center. A security vulnerability exists in the CBSharedReviewSecurityDialog method of several Adobe products. 30060 and earlier, Acrobat XI Desktop 11.0.12 and earlier, Reader XI Desktop 11.0.12 and earlier, Acrobat X Desktop 10.1.15 and earlier, Reader X Desktop 10.1.15 and earlier",
"sources": [
{
"db": "NVD",
"id": "CVE-2015-6721"
},
{
"db": "JVNDB",
"id": "JVNDB-2015-005278"
},
{
"db": "ZDI",
"id": "ZDI-15-502"
},
{
"db": "BID",
"id": "77074"
},
{
"db": "VULHUB",
"id": "VHN-84682"
}
],
"trust": 2.61
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "NVD",
"id": "CVE-2015-6721",
"trust": 3.5
},
{
"db": "ZDI",
"id": "ZDI-15-502",
"trust": 2.4
},
{
"db": "SECTRACK",
"id": "1033796",
"trust": 1.7
},
{
"db": "JVNDB",
"id": "JVNDB-2015-005278",
"trust": 0.8
},
{
"db": "ZDI_CAN",
"id": "ZDI-CAN-3086",
"trust": 0.7
},
{
"db": "CNNVD",
"id": "CNNVD-201510-234",
"trust": 0.7
},
{
"db": "BID",
"id": "77074",
"trust": 0.3
},
{
"db": "VULHUB",
"id": "VHN-84682",
"trust": 0.1
}
],
"sources": [
{
"db": "ZDI",
"id": "ZDI-15-502"
},
{
"db": "VULHUB",
"id": "VHN-84682"
},
{
"db": "BID",
"id": "77074"
},
{
"db": "JVNDB",
"id": "JVNDB-2015-005278"
},
{
"db": "CNNVD",
"id": "CNNVD-201510-234"
},
{
"db": "NVD",
"id": "CVE-2015-6721"
}
]
},
"id": "VAR-201510-0338",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "VULHUB",
"id": "VHN-84682"
}
],
"trust": 0.01
},
"last_update_date": "2025-04-13T23:03:48.675000Z",
"patch": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/patch#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"title": "APSB15-24",
"trust": 1.5,
"url": "https://helpx.adobe.com/security/products/acrobat/apsb15-24.html"
},
{
"title": "APSB15-24",
"trust": 0.8,
"url": "https://helpx.adobe.com/jp/security/products/reader/apsb15-24.html"
},
{
"title": "\u30a2\u30c9\u30d3 \u30b7\u30b9\u30c6\u30e0\u30ba\u793e Adobe Reader \u306e\u8106\u5f31\u6027\u306b\u95a2\u3059\u308b\u304a\u77e5\u3089\u305b",
"trust": 0.8,
"url": "http://www.fmworld.net/biz/common/adobe/20151015.html"
},
{
"title": "Multiple Adobe Product Privilege License and Access Control Vulnerability Fixes",
"trust": 0.6,
"url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=58083"
}
],
"sources": [
{
"db": "ZDI",
"id": "ZDI-15-502"
},
{
"db": "JVNDB",
"id": "JVNDB-2015-005278"
},
{
"db": "CNNVD",
"id": "CNNVD-201510-234"
}
]
},
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "NVD-CWE-noinfo",
"trust": 1.0
},
{
"problemtype": "CWE-264",
"trust": 0.9
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-84682"
},
{
"db": "JVNDB",
"id": "JVNDB-2015-005278"
},
{
"db": "NVD",
"id": "CVE-2015-6721"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 2.4,
"url": "https://helpx.adobe.com/security/products/acrobat/apsb15-24.html"
},
{
"trust": 1.7,
"url": "http://www.zerodayinitiative.com/advisories/zdi-15-502"
},
{
"trust": 1.7,
"url": "http://www.securitytracker.com/id/1033796"
},
{
"trust": 0.8,
"url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-6721"
},
{
"trust": 0.8,
"url": "http://www.ipa.go.jp/security/ciadr/vul/20151014-adobereader.html"
},
{
"trust": 0.8,
"url": "http://www.jpcert.or.jp/at/2015/at150035.html"
},
{
"trust": 0.8,
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2015-6721"
},
{
"trust": 0.8,
"url": "http://www.npa.go.jp/cyberpolice/topics/?seq=17022"
},
{
"trust": 0.3,
"url": "http://www.adobe.com"
}
],
"sources": [
{
"db": "ZDI",
"id": "ZDI-15-502"
},
{
"db": "VULHUB",
"id": "VHN-84682"
},
{
"db": "BID",
"id": "77074"
},
{
"db": "JVNDB",
"id": "JVNDB-2015-005278"
},
{
"db": "CNNVD",
"id": "CNNVD-201510-234"
},
{
"db": "NVD",
"id": "CVE-2015-6721"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "ZDI",
"id": "ZDI-15-502"
},
{
"db": "VULHUB",
"id": "VHN-84682"
},
{
"db": "BID",
"id": "77074"
},
{
"db": "JVNDB",
"id": "JVNDB-2015-005278"
},
{
"db": "CNNVD",
"id": "CNNVD-201510-234"
},
{
"db": "NVD",
"id": "CVE-2015-6721"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2015-10-13T00:00:00",
"db": "ZDI",
"id": "ZDI-15-502"
},
{
"date": "2015-10-14T00:00:00",
"db": "VULHUB",
"id": "VHN-84682"
},
{
"date": "2015-10-13T00:00:00",
"db": "BID",
"id": "77074"
},
{
"date": "2015-10-16T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2015-005278"
},
{
"date": "2015-10-15T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201510-234"
},
{
"date": "2015-10-14T23:59:42.713000",
"db": "NVD",
"id": "CVE-2015-6721"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2015-10-13T00:00:00",
"db": "ZDI",
"id": "ZDI-15-502"
},
{
"date": "2020-05-13T00:00:00",
"db": "VULHUB",
"id": "VHN-84682"
},
{
"date": "2015-11-03T19:59:00",
"db": "BID",
"id": "77074"
},
{
"date": "2015-10-16T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2015-005278"
},
{
"date": "2020-05-14T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201510-234"
},
{
"date": "2025-04-12T10:46:40.837000",
"db": "NVD",
"id": "CVE-2015-6721"
}
]
},
"threat_type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/threat_type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "remote",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201510-234"
}
],
"trust": 0.6
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Windows and Mac OS X Run on Adobe Reader and Acrobat of CBSharedReviewSecurityDialog In the method JavaScript API Vulnerability bypassing execution restrictions",
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2015-005278"
}
],
"trust": 0.8
},
"type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "permissions and access control issues",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201510-234"
}
],
"trust": 0.6
}
}
VAR-201510-0346
Vulnerability from variot - Updated: 2025-04-13 23:03Adobe Reader and Acrobat 10.x before 10.1.16 and 11.x before 11.0.13, Acrobat and Acrobat Reader DC Classic before 2015.006.30094, and Acrobat and Acrobat Reader DC Continuous before 2015.009.20069 on Windows and OS X allow attackers to obtain sensitive information about color objects from process memory by reading a light object's RGB data, a different vulnerability than CVE-2015-6699, CVE-2015-6700, CVE-2015-6701, CVE-2015-6702, CVE-2015-6703, and CVE-2015-6704. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the implementation of color objects in light objects. The RGB values returned from a newly created light object can disclose the heap address of a color object. An attacker can use this information in conjunction with other vulnerabilities to execute code in the context of the process. Adobe Acrobat and Reader are prone to multiple information-disclosure vulnerabilities. An attacker can exploit these issues to gain access to sensitive information that may aid in further attacks. Adobe Reader, etc. are all products of Adobe (Adobe) in the United States. Adobe Reader is a free PDF file reader; Acrobat is a PDF file editing and conversion tool; Acrobat Reader DC is a set of tools for viewing, printing and annotating PDF. Classic and Continuous are two update mechanisms provided by Acrobat Reader DC Product Download Center. Security flaws exist in several Adobe products. 30060 and earlier, Acrobat XI Desktop 11.0.12 and earlier, Reader XI Desktop 11.0.12 and earlier, Acrobat X Desktop 10.1.15 and earlier, Reader X Desktop 10.1.15 and earlier
Show details on source website{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"configurations": {
"@id": "https://www.variotdbs.pl/ref/configurations"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-201510-0346",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "acrobat reader dc",
"scope": "gte",
"trust": 1.0,
"vendor": "adobe",
"version": "15.008.20082"
},
{
"model": "acrobat dc",
"scope": "gte",
"trust": 1.0,
"vendor": "adobe",
"version": "15.008.20082"
},
{
"model": "acrobat dc",
"scope": "gte",
"trust": 1.0,
"vendor": "adobe",
"version": "15.006.30060"
},
{
"model": "acrobat reader dc",
"scope": "lt",
"trust": 1.0,
"vendor": "adobe",
"version": "15.009.20069"
},
{
"model": "acrobat dc",
"scope": "lt",
"trust": 1.0,
"vendor": "adobe",
"version": "15.006.30094"
},
{
"model": "acrobat",
"scope": "gte",
"trust": 1.0,
"vendor": "adobe",
"version": "10.0"
},
{
"model": "acrobat reader",
"scope": "lte",
"trust": 1.0,
"vendor": "adobe",
"version": "10.1.15"
},
{
"model": "acrobat reader",
"scope": "gte",
"trust": 1.0,
"vendor": "adobe",
"version": "10.0"
},
{
"model": "acrobat reader",
"scope": "lte",
"trust": 1.0,
"vendor": "adobe",
"version": "11.0.12"
},
{
"model": "acrobat",
"scope": "lte",
"trust": 1.0,
"vendor": "adobe",
"version": "10.1.15"
},
{
"model": "acrobat",
"scope": "lte",
"trust": 1.0,
"vendor": "adobe",
"version": "11.0.12"
},
{
"model": "acrobat reader dc",
"scope": "lt",
"trust": 1.0,
"vendor": "adobe",
"version": "15.006.30094"
},
{
"model": "acrobat",
"scope": "gte",
"trust": 1.0,
"vendor": "adobe",
"version": "11.0.0"
},
{
"model": "acrobat dc",
"scope": "lt",
"trust": 1.0,
"vendor": "adobe",
"version": "15.009.20069"
},
{
"model": "acrobat reader",
"scope": "gte",
"trust": 1.0,
"vendor": "adobe",
"version": "11.0.0"
},
{
"model": "acrobat reader dc",
"scope": "gte",
"trust": 1.0,
"vendor": "adobe",
"version": "15.006.30060"
},
{
"model": "acrobat dc",
"scope": "lt",
"trust": 0.8,
"vendor": "adobe",
"version": "(windows/macintosh)"
},
{
"model": "acrobat reader dc",
"scope": "lt",
"trust": 0.8,
"vendor": "adobe",
"version": "(windows/macintosh)"
},
{
"model": "acrobat reader dc",
"scope": "eq",
"trust": 0.8,
"vendor": "adobe",
"version": "classic 2015.006.30094"
},
{
"model": "acrobat",
"scope": "lt",
"trust": 0.8,
"vendor": "adobe",
"version": "11.x (windows/macintosh)"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.8,
"vendor": "adobe",
"version": "xi desktop 11.0.13"
},
{
"model": "reader",
"scope": "lt",
"trust": 0.8,
"vendor": "adobe",
"version": "11.x (windows/macintosh)"
},
{
"model": "acrobat dc",
"scope": "eq",
"trust": 0.8,
"vendor": "adobe",
"version": "continuous 2015.009.20069"
},
{
"model": "acrobat",
"scope": "lt",
"trust": 0.8,
"vendor": "adobe",
"version": "10.x (windows/macintosh)"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.8,
"vendor": "adobe",
"version": "xi desktop 11.0.13"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.8,
"vendor": "adobe",
"version": "x desktop 10.1.16"
},
{
"model": "acrobat dc",
"scope": "eq",
"trust": 0.8,
"vendor": "adobe",
"version": "classic 2015.006.30094"
},
{
"model": "reader",
"scope": "lt",
"trust": 0.8,
"vendor": "adobe",
"version": "10.x (windows/macintosh)"
},
{
"model": "acrobat reader dc",
"scope": "eq",
"trust": 0.8,
"vendor": "adobe",
"version": "continuous 2015.009.20069"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.8,
"vendor": "adobe",
"version": "x desktop 10.1.16"
},
{
"model": "acrobat pro dc",
"scope": null,
"trust": 0.7,
"vendor": "adobe",
"version": null
},
{
"model": "acrobat reader",
"scope": "eq",
"trust": 0.6,
"vendor": "adobe",
"version": "10.1.2"
},
{
"model": "acrobat reader",
"scope": "eq",
"trust": 0.6,
"vendor": "adobe",
"version": "10.1.4"
},
{
"model": "acrobat reader",
"scope": "eq",
"trust": 0.6,
"vendor": "adobe",
"version": "10.1.0"
},
{
"model": "acrobat reader",
"scope": "eq",
"trust": 0.6,
"vendor": "adobe",
"version": "10.1.7"
},
{
"model": "acrobat reader",
"scope": "eq",
"trust": 0.6,
"vendor": "adobe",
"version": "11.0.9"
},
{
"model": "acrobat reader",
"scope": "eq",
"trust": 0.6,
"vendor": "adobe",
"version": "10.1.1"
},
{
"model": "acrobat reader",
"scope": "eq",
"trust": 0.6,
"vendor": "adobe",
"version": "10.1.8"
},
{
"model": "acrobat reader",
"scope": "eq",
"trust": 0.6,
"vendor": "adobe",
"version": "10.1.5"
},
{
"model": "acrobat reader",
"scope": "eq",
"trust": 0.6,
"vendor": "adobe",
"version": "10.1.3"
},
{
"model": "acrobat reader",
"scope": "eq",
"trust": 0.6,
"vendor": "adobe",
"version": "10.1.6"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1.14"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1.9"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1.1"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1.13"
},
{
"model": "acrobat reader dc",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "2015.8.20082"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.10"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.0"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1.2"
},
{
"model": "acrobat dc",
"scope": "ne",
"trust": 0.3,
"vendor": "adobe",
"version": "2015.006.30094"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1.15"
},
{
"model": "acrobat reader dc",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "2015.6.30060"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.0.3"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1.10"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.3"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.0.13"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.6"
},
{
"model": "acrobat",
"scope": "ne",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.13"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0"
},
{
"model": "acrobat reader dc",
"scope": "ne",
"trust": 0.3,
"vendor": "adobe",
"version": "2015.006.30094"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.10"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.4"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1.3"
},
{
"model": "acrobat",
"scope": "ne",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1.16"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.0.2"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.0.1"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.11"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1.4"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1.6"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1.11"
},
{
"model": "reader",
"scope": "ne",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.13"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.7"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1.14"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1.3"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1.1"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1"
},
{
"model": "reader",
"scope": "ne",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1.16"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.0.2"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1.5"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.0"
},
{
"model": "acrobat dc",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "2015.007.20033"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1.12"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.1"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1.2"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1.13"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1.4"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1.8"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1.11"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.0.3"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.2"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.12"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.08"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.9"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.7"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.6"
},
{
"model": "acrobat dc",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "2015.006.30060"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.05"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1.10"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.09"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.3"
},
{
"model": "acrobat dc",
"scope": "ne",
"trust": 0.3,
"vendor": "adobe",
"version": "2015.009.20069"
},
{
"model": "acrobat dc",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "2015.006.30033"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1.12"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.1"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.4"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1.9"
},
{
"model": "acrobat reader dc",
"scope": "ne",
"trust": 0.3,
"vendor": "adobe",
"version": "2015.009.20069"
},
{
"model": "acrobat reader dc",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "2015.006.30033"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.12"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.08"
},
{
"model": "acrobat dc",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "2015.008.20082"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1.7"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.0.1"
},
{
"model": "acrobat reader dc",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "2015.007.20033"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.09"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.11"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1.15"
}
],
"sources": [
{
"db": "ZDI",
"id": "ZDI-15-475"
},
{
"db": "BID",
"id": "77067"
},
{
"db": "JVNDB",
"id": "JVNDB-2015-005254"
},
{
"db": "CNNVD",
"id": "CNNVD-201510-210"
},
{
"db": "NVD",
"id": "CVE-2015-6697"
}
]
},
"configurations": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/configurations#",
"children": {
"@container": "@list"
},
"cpe_match": {
"@container": "@list"
},
"data": {
"@container": "@list"
},
"nodes": {
"@container": "@list"
}
},
"data": [
{
"CVE_data_version": "4.0",
"nodes": [
{
"cpe_match": [
{
"cpe22Uri": "cpe:/a:adobe:acrobat",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/a:adobe:acrobat_dc",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/a:adobe:acrobat_reader_dc",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/a:adobe:acrobat_reader",
"vulnerable": true
}
],
"operator": "OR"
}
]
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2015-005254"
}
]
},
"credits": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/credits#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "AbdulAziz Hariri - HP Zero Day Initiative",
"sources": [
{
"db": "ZDI",
"id": "ZDI-15-475"
}
],
"trust": 0.7
},
"cve": "CVE-2015-6697",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [
{
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "nvd@nist.gov",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 8.6,
"id": "CVE-2015-6697",
"impactScore": 6.4,
"integrityImpact": "PARTIAL",
"severity": "MEDIUM",
"trust": 1.7,
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
{
"acInsufInfo": null,
"accessComplexity": "Medium",
"accessVector": "Network",
"authentication": "None",
"author": "NVD",
"availabilityImpact": "None",
"baseScore": 4.3,
"confidentialityImpact": "Partial",
"exploitabilityScore": null,
"id": "CVE-2015-6697",
"impactScore": null,
"integrityImpact": "None",
"obtainAllPrivilege": null,
"obtainOtherPrivilege": null,
"obtainUserPrivilege": null,
"severity": "Medium",
"trust": 0.8,
"userInteractionRequired": null,
"vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
{
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "VULHUB",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 8.6,
"id": "VHN-84658",
"impactScore": 6.4,
"integrityImpact": "PARTIAL",
"severity": "MEDIUM",
"trust": 0.1,
"vectorString": "AV:N/AC:M/AU:N/C:P/I:P/A:P",
"version": "2.0"
}
],
"cvssV3": [],
"severity": [
{
"author": "nvd@nist.gov",
"id": "CVE-2015-6697",
"trust": 1.0,
"value": "MEDIUM"
},
{
"author": "NVD",
"id": "CVE-2015-6697",
"trust": 0.8,
"value": "Medium"
},
{
"author": "ZDI",
"id": "CVE-2015-6697",
"trust": 0.7,
"value": "MEDIUM"
},
{
"author": "CNNVD",
"id": "CNNVD-201510-210",
"trust": 0.6,
"value": "MEDIUM"
},
{
"author": "VULHUB",
"id": "VHN-84658",
"trust": 0.1,
"value": "MEDIUM"
}
]
}
],
"sources": [
{
"db": "ZDI",
"id": "ZDI-15-475"
},
{
"db": "VULHUB",
"id": "VHN-84658"
},
{
"db": "JVNDB",
"id": "JVNDB-2015-005254"
},
{
"db": "CNNVD",
"id": "CNNVD-201510-210"
},
{
"db": "NVD",
"id": "CVE-2015-6697"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Adobe Reader and Acrobat 10.x before 10.1.16 and 11.x before 11.0.13, Acrobat and Acrobat Reader DC Classic before 2015.006.30094, and Acrobat and Acrobat Reader DC Continuous before 2015.009.20069 on Windows and OS X allow attackers to obtain sensitive information about color objects from process memory by reading a light object\u0027s RGB data, a different vulnerability than CVE-2015-6699, CVE-2015-6700, CVE-2015-6701, CVE-2015-6702, CVE-2015-6703, and CVE-2015-6704. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the implementation of color objects in light objects. The RGB values returned from a newly created light object can disclose the heap address of a color object. An attacker can use this information in conjunction with other vulnerabilities to execute code in the context of the process. Adobe Acrobat and Reader are prone to multiple information-disclosure vulnerabilities. \nAn attacker can exploit these issues to gain access to sensitive information that may aid in further attacks. Adobe Reader, etc. are all products of Adobe (Adobe) in the United States. Adobe Reader is a free PDF file reader; Acrobat is a PDF file editing and conversion tool; Acrobat Reader DC is a set of tools for viewing, printing and annotating PDF. Classic and Continuous are two update mechanisms provided by Acrobat Reader DC Product Download Center. Security flaws exist in several Adobe products. 30060 and earlier, Acrobat XI Desktop 11.0.12 and earlier, Reader XI Desktop 11.0.12 and earlier, Acrobat X Desktop 10.1.15 and earlier, Reader X Desktop 10.1.15 and earlier",
"sources": [
{
"db": "NVD",
"id": "CVE-2015-6697"
},
{
"db": "JVNDB",
"id": "JVNDB-2015-005254"
},
{
"db": "ZDI",
"id": "ZDI-15-475"
},
{
"db": "BID",
"id": "77067"
},
{
"db": "VULHUB",
"id": "VHN-84658"
}
],
"trust": 2.61
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "NVD",
"id": "CVE-2015-6697",
"trust": 3.5
},
{
"db": "ZDI",
"id": "ZDI-15-475",
"trust": 2.7
},
{
"db": "SECTRACK",
"id": "1033796",
"trust": 1.7
},
{
"db": "JVNDB",
"id": "JVNDB-2015-005254",
"trust": 0.8
},
{
"db": "ZDI_CAN",
"id": "ZDI-CAN-3036",
"trust": 0.7
},
{
"db": "CNNVD",
"id": "CNNVD-201510-210",
"trust": 0.7
},
{
"db": "ZDI",
"id": "ZDI-15-481",
"trust": 0.3
},
{
"db": "ZDI",
"id": "ZDI-15-482",
"trust": 0.3
},
{
"db": "ZDI",
"id": "ZDI-15-479",
"trust": 0.3
},
{
"db": "ZDI",
"id": "ZDI-15-480",
"trust": 0.3
},
{
"db": "ZDI",
"id": "ZDI-15-478",
"trust": 0.3
},
{
"db": "ZDI",
"id": "ZDI-15-477",
"trust": 0.3
},
{
"db": "BID",
"id": "77067",
"trust": 0.3
},
{
"db": "VULHUB",
"id": "VHN-84658",
"trust": 0.1
}
],
"sources": [
{
"db": "ZDI",
"id": "ZDI-15-475"
},
{
"db": "VULHUB",
"id": "VHN-84658"
},
{
"db": "BID",
"id": "77067"
},
{
"db": "JVNDB",
"id": "JVNDB-2015-005254"
},
{
"db": "CNNVD",
"id": "CNNVD-201510-210"
},
{
"db": "NVD",
"id": "CVE-2015-6697"
}
]
},
"id": "VAR-201510-0346",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "VULHUB",
"id": "VHN-84658"
}
],
"trust": 0.01
},
"last_update_date": "2025-04-13T23:03:48.637000Z",
"patch": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/patch#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"title": "APSB15-24",
"trust": 1.5,
"url": "https://helpx.adobe.com/security/products/acrobat/apsb15-24.html"
},
{
"title": "APSB15-24",
"trust": 0.8,
"url": "https://helpx.adobe.com/jp/security/products/reader/apsb15-24.html"
},
{
"title": "\u30a2\u30c9\u30d3 \u30b7\u30b9\u30c6\u30e0\u30ba\u793e Adobe Reader \u306e\u8106\u5f31\u6027\u306b\u95a2\u3059\u308b\u304a\u77e5\u3089\u305b",
"trust": 0.8,
"url": "http://www.fmworld.net/biz/common/adobe/20151015.html"
},
{
"title": "Multiple Adobe Product security vulnerabilities",
"trust": 0.6,
"url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=58059"
}
],
"sources": [
{
"db": "ZDI",
"id": "ZDI-15-475"
},
{
"db": "JVNDB",
"id": "JVNDB-2015-005254"
},
{
"db": "CNNVD",
"id": "CNNVD-201510-210"
}
]
},
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "CWE-772",
"trust": 1.1
},
{
"problemtype": "CWE-200",
"trust": 0.9
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-84658"
},
{
"db": "JVNDB",
"id": "JVNDB-2015-005254"
},
{
"db": "NVD",
"id": "CVE-2015-6697"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 2.7,
"url": "https://helpx.adobe.com/security/products/acrobat/apsb15-24.html"
},
{
"trust": 1.7,
"url": "http://www.zerodayinitiative.com/advisories/zdi-15-475"
},
{
"trust": 1.7,
"url": "http://www.securitytracker.com/id/1033796"
},
{
"trust": 0.8,
"url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-6697"
},
{
"trust": 0.8,
"url": "http://www.ipa.go.jp/security/ciadr/vul/20151014-adobereader.html"
},
{
"trust": 0.8,
"url": "http://www.jpcert.or.jp/at/2015/at150035.html"
},
{
"trust": 0.8,
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2015-6697"
},
{
"trust": 0.8,
"url": "http://www.npa.go.jp/cyberpolice/topics/?seq=17022"
},
{
"trust": 0.3,
"url": "http://www.adobe.com"
},
{
"trust": 0.3,
"url": "http://www.zerodayinitiative.com/advisories/zdi-15-475/"
},
{
"trust": 0.3,
"url": "http://www.zerodayinitiative.com/advisories/zdi-15-477/"
},
{
"trust": 0.3,
"url": "http://www.zerodayinitiative.com/advisories/zdi-15-479/"
},
{
"trust": 0.3,
"url": "http://www.zerodayinitiative.com/advisories/zdi-15-482/"
},
{
"trust": 0.3,
"url": "http://www.zerodayinitiative.com/advisories/zdi-15-480/"
},
{
"trust": 0.3,
"url": "http://www.zerodayinitiative.com/advisories/zdi-15-481/"
},
{
"trust": 0.3,
"url": "http://www.zerodayinitiative.com/advisories/zdi-15-478/"
}
],
"sources": [
{
"db": "ZDI",
"id": "ZDI-15-475"
},
{
"db": "VULHUB",
"id": "VHN-84658"
},
{
"db": "BID",
"id": "77067"
},
{
"db": "JVNDB",
"id": "JVNDB-2015-005254"
},
{
"db": "CNNVD",
"id": "CNNVD-201510-210"
},
{
"db": "NVD",
"id": "CVE-2015-6697"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "ZDI",
"id": "ZDI-15-475"
},
{
"db": "VULHUB",
"id": "VHN-84658"
},
{
"db": "BID",
"id": "77067"
},
{
"db": "JVNDB",
"id": "JVNDB-2015-005254"
},
{
"db": "CNNVD",
"id": "CNNVD-201510-210"
},
{
"db": "NVD",
"id": "CVE-2015-6697"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2015-10-13T00:00:00",
"db": "ZDI",
"id": "ZDI-15-475"
},
{
"date": "2015-10-14T00:00:00",
"db": "VULHUB",
"id": "VHN-84658"
},
{
"date": "2015-10-13T00:00:00",
"db": "BID",
"id": "77067"
},
{
"date": "2015-10-16T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2015-005254"
},
{
"date": "2015-10-15T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201510-210"
},
{
"date": "2015-10-14T23:59:19.300000",
"db": "NVD",
"id": "CVE-2015-6697"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2015-10-13T00:00:00",
"db": "ZDI",
"id": "ZDI-15-475"
},
{
"date": "2020-05-13T00:00:00",
"db": "VULHUB",
"id": "VHN-84658"
},
{
"date": "2015-11-03T19:59:00",
"db": "BID",
"id": "77067"
},
{
"date": "2015-10-16T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2015-005254"
},
{
"date": "2020-05-14T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201510-210"
},
{
"date": "2025-04-12T10:46:40.837000",
"db": "NVD",
"id": "CVE-2015-6697"
}
]
},
"threat_type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/threat_type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "remote",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201510-210"
}
],
"trust": 0.6
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Windows and Mac OS X Run on Adobe Reader and Acrobat Vulnerability in obtaining important information about color objects from process memory",
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2015-005254"
}
],
"trust": 0.8
},
"type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "information disclosure",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201510-210"
}
],
"trust": 0.6
}
}
VAR-201510-0362
Vulnerability from variot - Updated: 2025-04-13 23:03Use-after-free vulnerability in Adobe Reader and Acrobat 10.x before 10.1.16 and 11.x before 11.0.13, Acrobat and Acrobat Reader DC Classic before 2015.006.30094, and Acrobat and Acrobat Reader DC Continuous before 2015.009.20069 on Windows and OS X allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-5586, CVE-2015-6683, CVE-2015-6684, CVE-2015-6687, CVE-2015-6688, CVE-2015-6689, CVE-2015-6690, CVE-2015-7615, CVE-2015-7617, and CVE-2015-7621. This vulnerability CVE-2015-5586 , CVE-2015-6683 , CVE-2015-6684 , CVE-2015-6687 , CVE-2015-6688 , CVE-2015-6689 , CVE-2015-6690 , CVE-2015-7615 , CVE-2015-7617 ,and CVE-2015-7621 Is a different vulnerability. Supplementary information : CWE Vulnerability type by CWE-416: Use-after-free ( Use of freed memory ) Has been identified. http://cwe.mitre.org/data/definitions/416.htmlAn attacker could execute arbitrary code. Adobe Acrobat and Reader are prone to multiple remote code-execution vulnerabilities. Failed exploit attempts will likely cause a denial-of-service condition. Adobe Reader, etc. are all products of Adobe (Adobe) in the United States. Adobe Reader is a free PDF file reader; Acrobat is a PDF file editing and conversion tool; Acrobat Reader DC is a set of tools for viewing, printing and annotating PDF. A use-after-free vulnerability exists in several Adobe products. 30060 and earlier, Acrobat XI Desktop 11.0.12 and earlier, Reader XI Desktop 11.0.12 and earlier, Acrobat X Desktop 10.1.15 and earlier, Reader X Desktop 10.1.15 and earlier
Show details on source website{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"configurations": {
"@id": "https://www.variotdbs.pl/ref/configurations"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-201510-0362",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "acrobat reader dc",
"scope": "gte",
"trust": 1.0,
"vendor": "adobe",
"version": "15.008.20082"
},
{
"model": "acrobat dc",
"scope": "gte",
"trust": 1.0,
"vendor": "adobe",
"version": "15.008.20082"
},
{
"model": "acrobat dc",
"scope": "gte",
"trust": 1.0,
"vendor": "adobe",
"version": "15.006.30060"
},
{
"model": "acrobat reader dc",
"scope": "lt",
"trust": 1.0,
"vendor": "adobe",
"version": "15.009.20069"
},
{
"model": "acrobat dc",
"scope": "lt",
"trust": 1.0,
"vendor": "adobe",
"version": "15.006.30094"
},
{
"model": "acrobat",
"scope": "gte",
"trust": 1.0,
"vendor": "adobe",
"version": "10.0"
},
{
"model": "acrobat reader",
"scope": "lte",
"trust": 1.0,
"vendor": "adobe",
"version": "10.1.15"
},
{
"model": "acrobat reader",
"scope": "gte",
"trust": 1.0,
"vendor": "adobe",
"version": "10.0"
},
{
"model": "acrobat reader",
"scope": "lte",
"trust": 1.0,
"vendor": "adobe",
"version": "11.0.12"
},
{
"model": "acrobat",
"scope": "lte",
"trust": 1.0,
"vendor": "adobe",
"version": "10.1.15"
},
{
"model": "acrobat",
"scope": "lte",
"trust": 1.0,
"vendor": "adobe",
"version": "11.0.12"
},
{
"model": "acrobat reader dc",
"scope": "lt",
"trust": 1.0,
"vendor": "adobe",
"version": "15.006.30094"
},
{
"model": "acrobat",
"scope": "gte",
"trust": 1.0,
"vendor": "adobe",
"version": "11.0.0"
},
{
"model": "acrobat dc",
"scope": "lt",
"trust": 1.0,
"vendor": "adobe",
"version": "15.009.20069"
},
{
"model": "acrobat reader",
"scope": "gte",
"trust": 1.0,
"vendor": "adobe",
"version": "11.0.0"
},
{
"model": "acrobat reader dc",
"scope": "gte",
"trust": 1.0,
"vendor": "adobe",
"version": "15.006.30060"
},
{
"model": "acrobat dc",
"scope": "lt",
"trust": 0.8,
"vendor": "adobe",
"version": "(windows/macintosh)"
},
{
"model": "acrobat reader dc",
"scope": "lt",
"trust": 0.8,
"vendor": "adobe",
"version": "(windows/macintosh)"
},
{
"model": "acrobat reader dc",
"scope": "eq",
"trust": 0.8,
"vendor": "adobe",
"version": "classic 2015.006.30094"
},
{
"model": "acrobat",
"scope": "lt",
"trust": 0.8,
"vendor": "adobe",
"version": "11.x (windows/macintosh)"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.8,
"vendor": "adobe",
"version": "xi desktop 11.0.13"
},
{
"model": "reader",
"scope": "lt",
"trust": 0.8,
"vendor": "adobe",
"version": "11.x (windows/macintosh)"
},
{
"model": "acrobat dc",
"scope": "eq",
"trust": 0.8,
"vendor": "adobe",
"version": "continuous 2015.009.20069"
},
{
"model": "acrobat",
"scope": "lt",
"trust": 0.8,
"vendor": "adobe",
"version": "10.x (windows/macintosh)"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.8,
"vendor": "adobe",
"version": "xi desktop 11.0.13"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.8,
"vendor": "adobe",
"version": "x desktop 10.1.16"
},
{
"model": "acrobat dc",
"scope": "eq",
"trust": 0.8,
"vendor": "adobe",
"version": "classic 2015.006.30094"
},
{
"model": "reader",
"scope": "lt",
"trust": 0.8,
"vendor": "adobe",
"version": "10.x (windows/macintosh)"
},
{
"model": "acrobat reader dc",
"scope": "eq",
"trust": 0.8,
"vendor": "adobe",
"version": "continuous 2015.009.20069"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.8,
"vendor": "adobe",
"version": "x desktop 10.1.16"
},
{
"model": "acrobat reader",
"scope": "eq",
"trust": 0.6,
"vendor": "adobe",
"version": "11.0.8"
},
{
"model": "acrobat reader",
"scope": "eq",
"trust": 0.6,
"vendor": "adobe",
"version": "10.1.14"
},
{
"model": "acrobat reader",
"scope": "eq",
"trust": 0.6,
"vendor": "adobe",
"version": "11.0.11"
},
{
"model": "acrobat reader",
"scope": "eq",
"trust": 0.6,
"vendor": "adobe",
"version": "11.0.10"
},
{
"model": "acrobat reader",
"scope": "eq",
"trust": 0.6,
"vendor": "adobe",
"version": "11.0.7"
},
{
"model": "acrobat reader",
"scope": "eq",
"trust": 0.6,
"vendor": "adobe",
"version": "10.1.12"
},
{
"model": "acrobat reader",
"scope": "eq",
"trust": 0.6,
"vendor": "adobe",
"version": "10.1.13"
},
{
"model": "acrobat reader",
"scope": "eq",
"trust": 0.6,
"vendor": "adobe",
"version": "11.0.9"
},
{
"model": "acrobat reader",
"scope": "eq",
"trust": 0.6,
"vendor": "adobe",
"version": "11.0.12"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.6,
"vendor": "adobe",
"version": "11.0.12"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1.3"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1.2"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1.1"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.0.3"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.0.2"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.0.1"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.0"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1.3"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1.2"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1.1"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.0.3"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.0.2"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.0.1"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.0"
}
],
"sources": [
{
"db": "BID",
"id": "77064"
},
{
"db": "JVNDB",
"id": "JVNDB-2015-005248"
},
{
"db": "CNNVD",
"id": "CNNVD-201510-204"
},
{
"db": "NVD",
"id": "CVE-2015-6691"
}
]
},
"configurations": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/configurations#",
"children": {
"@container": "@list"
},
"cpe_match": {
"@container": "@list"
},
"data": {
"@container": "@list"
},
"nodes": {
"@container": "@list"
}
},
"data": [
{
"CVE_data_version": "4.0",
"nodes": [
{
"cpe_match": [
{
"cpe22Uri": "cpe:/a:adobe:acrobat",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/a:adobe:acrobat_dc",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/a:adobe:acrobat_reader_dc",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/a:adobe:acrobat_reader",
"vulnerable": true
}
],
"operator": "OR"
}
]
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2015-005248"
}
]
},
"credits": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/credits#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "AbdulAziz Hariri of HP Zero Day Initiative, Bill Finlayson of Vectra Networks, bilou working with VeriSign iDefense Labs, James Loureiro of MWR Labs, kdot working with HP\u0027s\u0027s Zero Day Initiative, Wei Lei and Wu Hongjun of Nanyang Technological University w",
"sources": [
{
"db": "BID",
"id": "77064"
}
],
"trust": 0.3
},
"cve": "CVE-2015-6691",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "nvd@nist.gov",
"availabilityImpact": "COMPLETE",
"baseScore": 10.0,
"confidentialityImpact": "COMPLETE",
"exploitabilityScore": 10.0,
"id": "CVE-2015-6691",
"impactScore": 10.0,
"integrityImpact": "COMPLETE",
"severity": "HIGH",
"trust": 1.8,
"vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "VULHUB",
"availabilityImpact": "COMPLETE",
"baseScore": 10.0,
"confidentialityImpact": "COMPLETE",
"exploitabilityScore": 10.0,
"id": "VHN-84652",
"impactScore": 10.0,
"integrityImpact": "COMPLETE",
"severity": "HIGH",
"trust": 0.1,
"vectorString": "AV:N/AC:L/AU:N/C:C/I:C/A:C",
"version": "2.0"
}
],
"cvssV3": [],
"severity": [
{
"author": "nvd@nist.gov",
"id": "CVE-2015-6691",
"trust": 1.0,
"value": "HIGH"
},
{
"author": "NVD",
"id": "CVE-2015-6691",
"trust": 0.8,
"value": "High"
},
{
"author": "CNNVD",
"id": "CNNVD-201510-204",
"trust": 0.6,
"value": "CRITICAL"
},
{
"author": "VULHUB",
"id": "VHN-84652",
"trust": 0.1,
"value": "HIGH"
}
]
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-84652"
},
{
"db": "JVNDB",
"id": "JVNDB-2015-005248"
},
{
"db": "CNNVD",
"id": "CNNVD-201510-204"
},
{
"db": "NVD",
"id": "CVE-2015-6691"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Use-after-free vulnerability in Adobe Reader and Acrobat 10.x before 10.1.16 and 11.x before 11.0.13, Acrobat and Acrobat Reader DC Classic before 2015.006.30094, and Acrobat and Acrobat Reader DC Continuous before 2015.009.20069 on Windows and OS X allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-5586, CVE-2015-6683, CVE-2015-6684, CVE-2015-6687, CVE-2015-6688, CVE-2015-6689, CVE-2015-6690, CVE-2015-7615, CVE-2015-7617, and CVE-2015-7621. This vulnerability CVE-2015-5586 , CVE-2015-6683 , CVE-2015-6684 , CVE-2015-6687 , CVE-2015-6688 , CVE-2015-6689 , CVE-2015-6690 , CVE-2015-7615 , CVE-2015-7617 ,and CVE-2015-7621 Is a different vulnerability. Supplementary information : CWE Vulnerability type by CWE-416: Use-after-free ( Use of freed memory ) Has been identified. http://cwe.mitre.org/data/definitions/416.htmlAn attacker could execute arbitrary code. Adobe Acrobat and Reader are prone to multiple remote code-execution vulnerabilities. Failed exploit attempts will likely cause a denial-of-service condition. Adobe Reader, etc. are all products of Adobe (Adobe) in the United States. Adobe Reader is a free PDF file reader; Acrobat is a PDF file editing and conversion tool; Acrobat Reader DC is a set of tools for viewing, printing and annotating PDF. A use-after-free vulnerability exists in several Adobe products. 30060 and earlier, Acrobat XI Desktop 11.0.12 and earlier, Reader XI Desktop 11.0.12 and earlier, Acrobat X Desktop 10.1.15 and earlier, Reader X Desktop 10.1.15 and earlier",
"sources": [
{
"db": "NVD",
"id": "CVE-2015-6691"
},
{
"db": "JVNDB",
"id": "JVNDB-2015-005248"
},
{
"db": "BID",
"id": "77064"
},
{
"db": "VULHUB",
"id": "VHN-84652"
}
],
"trust": 1.98
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "NVD",
"id": "CVE-2015-6691",
"trust": 2.8
},
{
"db": "SECTRACK",
"id": "1033796",
"trust": 1.7
},
{
"db": "JVNDB",
"id": "JVNDB-2015-005248",
"trust": 0.8
},
{
"db": "CNNVD",
"id": "CNNVD-201510-204",
"trust": 0.7
},
{
"db": "ZDI",
"id": "ZDI-15-508",
"trust": 0.3
},
{
"db": "ZDI",
"id": "ZDI-15-470",
"trust": 0.3
},
{
"db": "ZDI",
"id": "ZDI-15-493",
"trust": 0.3
},
{
"db": "ZDI",
"id": "ZDI-15-469",
"trust": 0.3
},
{
"db": "ZDI",
"id": "ZDI-15-474",
"trust": 0.3
},
{
"db": "ZDI",
"id": "ZDI-15-492",
"trust": 0.3
},
{
"db": "BID",
"id": "77064",
"trust": 0.3
},
{
"db": "VULHUB",
"id": "VHN-84652",
"trust": 0.1
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-84652"
},
{
"db": "BID",
"id": "77064"
},
{
"db": "JVNDB",
"id": "JVNDB-2015-005248"
},
{
"db": "CNNVD",
"id": "CNNVD-201510-204"
},
{
"db": "NVD",
"id": "CVE-2015-6691"
}
]
},
"id": "VAR-201510-0362",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "VULHUB",
"id": "VHN-84652"
}
],
"trust": 0.01
},
"last_update_date": "2025-04-13T23:03:48.604000Z",
"patch": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/patch#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"title": "APSB15-24",
"trust": 0.8,
"url": "https://helpx.adobe.com/security/products/acrobat/apsb15-24.html"
},
{
"title": "APSB15-24",
"trust": 0.8,
"url": "https://helpx.adobe.com/jp/security/products/reader/apsb15-24.html"
},
{
"title": "\u30a2\u30c9\u30d3 \u30b7\u30b9\u30c6\u30e0\u30ba\u793e Adobe Reader \u306e\u8106\u5f31\u6027\u306b\u95a2\u3059\u308b\u304a\u77e5\u3089\u305b",
"trust": 0.8,
"url": "http://www.fmworld.net/biz/common/adobe/20151015.html"
},
{
"title": "Multiple Adobe Remediation measures for reusing vulnerabilities after product release",
"trust": 0.6,
"url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=58053"
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2015-005248"
},
{
"db": "CNNVD",
"id": "CNNVD-201510-204"
}
]
},
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "CWE-416",
"trust": 1.1
},
{
"problemtype": "CWE-Other",
"trust": 0.8
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-84652"
},
{
"db": "JVNDB",
"id": "JVNDB-2015-005248"
},
{
"db": "NVD",
"id": "CVE-2015-6691"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 2.0,
"url": "https://helpx.adobe.com/security/products/acrobat/apsb15-24.html"
},
{
"trust": 1.7,
"url": "http://www.securitytracker.com/id/1033796"
},
{
"trust": 0.8,
"url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-6691"
},
{
"trust": 0.8,
"url": "http://www.ipa.go.jp/security/ciadr/vul/20151014-adobereader.html"
},
{
"trust": 0.8,
"url": "http://www.jpcert.or.jp/at/2015/at150035.html"
},
{
"trust": 0.8,
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2015-6691"
},
{
"trust": 0.8,
"url": "http://www.npa.go.jp/cyberpolice/topics/?seq=17022"
},
{
"trust": 0.3,
"url": "http://www.adobe.com"
},
{
"trust": 0.3,
"url": "http://www.zerodayinitiative.com/advisories/zdi-15-469/"
},
{
"trust": 0.3,
"url": "http://www.zerodayinitiative.com/advisories/zdi-15-470/"
},
{
"trust": 0.3,
"url": "http://www.zerodayinitiative.com/advisories/zdi-15-474/"
},
{
"trust": 0.3,
"url": "http://www.zerodayinitiative.com/advisories/zdi-15-492/"
},
{
"trust": 0.3,
"url": "http://www.zerodayinitiative.com/advisories/zdi-15-493/"
},
{
"trust": 0.3,
"url": "http://www.zerodayinitiative.com/advisories/zdi-15-508/"
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-84652"
},
{
"db": "BID",
"id": "77064"
},
{
"db": "JVNDB",
"id": "JVNDB-2015-005248"
},
{
"db": "CNNVD",
"id": "CNNVD-201510-204"
},
{
"db": "NVD",
"id": "CVE-2015-6691"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "VULHUB",
"id": "VHN-84652"
},
{
"db": "BID",
"id": "77064"
},
{
"db": "JVNDB",
"id": "JVNDB-2015-005248"
},
{
"db": "CNNVD",
"id": "CNNVD-201510-204"
},
{
"db": "NVD",
"id": "CVE-2015-6691"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2015-10-14T00:00:00",
"db": "VULHUB",
"id": "VHN-84652"
},
{
"date": "2015-10-13T00:00:00",
"db": "BID",
"id": "77064"
},
{
"date": "2015-10-16T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2015-005248"
},
{
"date": "2015-10-15T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201510-204"
},
{
"date": "2015-10-14T23:59:13.080000",
"db": "NVD",
"id": "CVE-2015-6691"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2020-05-13T00:00:00",
"db": "VULHUB",
"id": "VHN-84652"
},
{
"date": "2015-10-26T17:00:00",
"db": "BID",
"id": "77064"
},
{
"date": "2015-10-16T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2015-005248"
},
{
"date": "2020-05-14T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201510-204"
},
{
"date": "2025-04-12T10:46:40.837000",
"db": "NVD",
"id": "CVE-2015-6691"
}
]
},
"threat_type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/threat_type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "remote",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201510-204"
}
],
"trust": 0.6
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Windows and Mac OS X Run on Adobe Reader and Acrobat Vulnerable to arbitrary code execution",
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2015-005248"
}
],
"trust": 0.8
},
"type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "resource management error",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201510-204"
}
],
"trust": 0.6
}
}
VAR-201510-0345
Vulnerability from variot - Updated: 2025-04-13 23:03Heap-based buffer overflow in Adobe Reader and Acrobat 10.x before 10.1.16 and 11.x before 11.0.13, Acrobat and Acrobat Reader DC Classic before 2015.006.30094, and Acrobat and Acrobat Reader DC Continuous before 2015.009.20069 on Windows and OS X allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-6698. This vulnerability CVE-2015-6698 and CVE-2015-8458 Is a different vulnerability.An attacker could execute arbitrary code. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within AGM.dll. A specially crafted PDF with multiple layers can force a dangling pointer to be reused after it has been freed. Failed exploit attempts will likely cause a denial-of-service condition. Adobe Reader, etc. are all products of Adobe (Adobe) in the United States. Adobe Reader is a free PDF file reader; Acrobat is a PDF file editing and conversion tool; Acrobat Reader DC is a set of tools for viewing, printing and annotating PDF. 30060 and earlier, Acrobat XI Desktop 11.0.12 and earlier, Reader XI Desktop 11.0.12 and earlier, Acrobat X Desktop 10.1.15 and earlier, Reader X Desktop 10.1.15 and earlier
Show details on source website{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"configurations": {
"@id": "https://www.variotdbs.pl/ref/configurations"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-201510-0345",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "acrobat reader dc",
"scope": "gte",
"trust": 1.0,
"vendor": "adobe",
"version": "15.008.20082"
},
{
"model": "acrobat dc",
"scope": "gte",
"trust": 1.0,
"vendor": "adobe",
"version": "15.008.20082"
},
{
"model": "acrobat dc",
"scope": "gte",
"trust": 1.0,
"vendor": "adobe",
"version": "15.006.30060"
},
{
"model": "acrobat reader dc",
"scope": "lt",
"trust": 1.0,
"vendor": "adobe",
"version": "15.009.20069"
},
{
"model": "acrobat dc",
"scope": "lt",
"trust": 1.0,
"vendor": "adobe",
"version": "15.006.30094"
},
{
"model": "acrobat",
"scope": "gte",
"trust": 1.0,
"vendor": "adobe",
"version": "10.0"
},
{
"model": "acrobat reader",
"scope": "lte",
"trust": 1.0,
"vendor": "adobe",
"version": "10.1.15"
},
{
"model": "acrobat reader",
"scope": "gte",
"trust": 1.0,
"vendor": "adobe",
"version": "10.0"
},
{
"model": "acrobat reader",
"scope": "lte",
"trust": 1.0,
"vendor": "adobe",
"version": "11.0.12"
},
{
"model": "acrobat",
"scope": "lte",
"trust": 1.0,
"vendor": "adobe",
"version": "10.1.15"
},
{
"model": "acrobat",
"scope": "lte",
"trust": 1.0,
"vendor": "adobe",
"version": "11.0.12"
},
{
"model": "acrobat reader dc",
"scope": "lt",
"trust": 1.0,
"vendor": "adobe",
"version": "15.006.30094"
},
{
"model": "acrobat",
"scope": "gte",
"trust": 1.0,
"vendor": "adobe",
"version": "11.0.0"
},
{
"model": "acrobat dc",
"scope": "lt",
"trust": 1.0,
"vendor": "adobe",
"version": "15.009.20069"
},
{
"model": "acrobat reader",
"scope": "gte",
"trust": 1.0,
"vendor": "adobe",
"version": "11.0.0"
},
{
"model": "acrobat reader dc",
"scope": "gte",
"trust": 1.0,
"vendor": "adobe",
"version": "15.006.30060"
},
{
"model": "acrobat dc",
"scope": "lt",
"trust": 0.8,
"vendor": "adobe",
"version": "(windows/macintosh)"
},
{
"model": "acrobat reader dc",
"scope": "lt",
"trust": 0.8,
"vendor": "adobe",
"version": "(windows/macintosh)"
},
{
"model": "acrobat reader dc",
"scope": "eq",
"trust": 0.8,
"vendor": "adobe",
"version": "classic 2015.006.30094"
},
{
"model": "acrobat",
"scope": "lt",
"trust": 0.8,
"vendor": "adobe",
"version": "11.x (windows/macintosh)"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.8,
"vendor": "adobe",
"version": "xi desktop 11.0.13"
},
{
"model": "reader",
"scope": "lt",
"trust": 0.8,
"vendor": "adobe",
"version": "11.x (windows/macintosh)"
},
{
"model": "acrobat dc",
"scope": "eq",
"trust": 0.8,
"vendor": "adobe",
"version": "continuous 2015.009.20069"
},
{
"model": "acrobat",
"scope": "lt",
"trust": 0.8,
"vendor": "adobe",
"version": "10.x (windows/macintosh)"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.8,
"vendor": "adobe",
"version": "xi desktop 11.0.13"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.8,
"vendor": "adobe",
"version": "x desktop 10.1.16"
},
{
"model": "acrobat dc",
"scope": "eq",
"trust": 0.8,
"vendor": "adobe",
"version": "classic 2015.006.30094"
},
{
"model": "reader",
"scope": "lt",
"trust": 0.8,
"vendor": "adobe",
"version": "10.x (windows/macintosh)"
},
{
"model": "acrobat reader dc",
"scope": "eq",
"trust": 0.8,
"vendor": "adobe",
"version": "continuous 2015.009.20069"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.8,
"vendor": "adobe",
"version": "x desktop 10.1.16"
},
{
"model": "acrobat reader dc",
"scope": null,
"trust": 0.7,
"vendor": "adobe",
"version": null
},
{
"model": "acrobat reader",
"scope": "eq",
"trust": 0.6,
"vendor": "adobe",
"version": "11.0.8"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.6,
"vendor": "adobe",
"version": "10.1.8"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.6,
"vendor": "adobe",
"version": "10.1.6"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.6,
"vendor": "adobe",
"version": "10.1.12"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.6,
"vendor": "adobe",
"version": "10.1.4"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.6,
"vendor": "adobe",
"version": "10.1.10"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.6,
"vendor": "adobe",
"version": "10.1.9"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.6,
"vendor": "adobe",
"version": "10.1.11"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.6,
"vendor": "adobe",
"version": "10.1.7"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.6,
"vendor": "adobe",
"version": "10.1.5"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1.3"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1.2"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1.1"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.0.3"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.0.2"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.0.1"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.0"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1.3"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1.2"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1.1"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.0.3"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.0.2"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.0.1"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.0"
}
],
"sources": [
{
"db": "ZDI",
"id": "ZDI-15-569"
},
{
"db": "BID",
"id": "77068"
},
{
"db": "JVNDB",
"id": "JVNDB-2015-005253"
},
{
"db": "CNNVD",
"id": "CNNVD-201510-209"
},
{
"db": "NVD",
"id": "CVE-2015-6696"
}
]
},
"configurations": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/configurations#",
"children": {
"@container": "@list"
},
"cpe_match": {
"@container": "@list"
},
"data": {
"@container": "@list"
},
"nodes": {
"@container": "@list"
}
},
"data": [
{
"CVE_data_version": "4.0",
"nodes": [
{
"cpe_match": [
{
"cpe22Uri": "cpe:/a:adobe:acrobat",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/a:adobe:acrobat_dc",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/a:adobe:acrobat_reader_dc",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/a:adobe:acrobat_reader",
"vulnerable": true
}
],
"operator": "OR"
}
]
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2015-005253"
}
]
},
"credits": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/credits#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Jaanus Kp Clarified Security",
"sources": [
{
"db": "ZDI",
"id": "ZDI-15-569"
}
],
"trust": 0.7
},
"cve": "CVE-2015-6696",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [
{
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "nvd@nist.gov",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 8.6,
"id": "CVE-2015-6696",
"impactScore": 6.4,
"integrityImpact": "PARTIAL",
"severity": "MEDIUM",
"trust": 1.8,
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
{
"acInsufInfo": null,
"accessComplexity": "Low",
"accessVector": "Network",
"authentication": "None",
"author": "NVD",
"availabilityImpact": "Complete",
"baseScore": 10.0,
"confidentialityImpact": "Complete",
"exploitabilityScore": null,
"id": "CVE-2015-6696",
"impactScore": null,
"integrityImpact": "Complete",
"obtainAllPrivilege": null,
"obtainOtherPrivilege": null,
"obtainUserPrivilege": null,
"severity": "High",
"trust": 0.8,
"userInteractionRequired": null,
"vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
{
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "VULHUB",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 8.6,
"id": "VHN-84657",
"impactScore": 6.4,
"integrityImpact": "PARTIAL",
"severity": "MEDIUM",
"trust": 0.1,
"vectorString": "AV:N/AC:M/AU:N/C:P/I:P/A:P",
"version": "2.0"
}
],
"cvssV3": [],
"severity": [
{
"author": "nvd@nist.gov",
"id": "CVE-2015-6696",
"trust": 1.0,
"value": "MEDIUM"
},
{
"author": "NVD",
"id": "CVE-2015-6696",
"trust": 0.8,
"value": "High"
},
{
"author": "ZDI",
"id": "CVE-2015-6696",
"trust": 0.7,
"value": "MEDIUM"
},
{
"author": "CNNVD",
"id": "CNNVD-201510-209",
"trust": 0.6,
"value": "CRITICAL"
},
{
"author": "VULHUB",
"id": "VHN-84657",
"trust": 0.1,
"value": "MEDIUM"
},
{
"author": "VULMON",
"id": "CVE-2015-6696",
"trust": 0.1,
"value": "MEDIUM"
}
]
}
],
"sources": [
{
"db": "ZDI",
"id": "ZDI-15-569"
},
{
"db": "VULHUB",
"id": "VHN-84657"
},
{
"db": "VULMON",
"id": "CVE-2015-6696"
},
{
"db": "JVNDB",
"id": "JVNDB-2015-005253"
},
{
"db": "CNNVD",
"id": "CNNVD-201510-209"
},
{
"db": "NVD",
"id": "CVE-2015-6696"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Heap-based buffer overflow in Adobe Reader and Acrobat 10.x before 10.1.16 and 11.x before 11.0.13, Acrobat and Acrobat Reader DC Classic before 2015.006.30094, and Acrobat and Acrobat Reader DC Continuous before 2015.009.20069 on Windows and OS X allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-6698. This vulnerability CVE-2015-6698 and CVE-2015-8458 Is a different vulnerability.An attacker could execute arbitrary code. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within AGM.dll. A specially crafted PDF with multiple layers can force a dangling pointer to be reused after it has been freed. Failed exploit attempts will likely cause a denial-of-service condition. Adobe Reader, etc. are all products of Adobe (Adobe) in the United States. Adobe Reader is a free PDF file reader; Acrobat is a PDF file editing and conversion tool; Acrobat Reader DC is a set of tools for viewing, printing and annotating PDF. 30060 and earlier, Acrobat XI Desktop 11.0.12 and earlier, Reader XI Desktop 11.0.12 and earlier, Acrobat X Desktop 10.1.15 and earlier, Reader X Desktop 10.1.15 and earlier",
"sources": [
{
"db": "NVD",
"id": "CVE-2015-6696"
},
{
"db": "JVNDB",
"id": "JVNDB-2015-005253"
},
{
"db": "ZDI",
"id": "ZDI-15-569"
},
{
"db": "BID",
"id": "77068"
},
{
"db": "VULHUB",
"id": "VHN-84657"
},
{
"db": "VULMON",
"id": "CVE-2015-6696"
}
],
"trust": 2.7
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "NVD",
"id": "CVE-2015-6696",
"trust": 3.6
},
{
"db": "ZDI",
"id": "ZDI-15-569",
"trust": 2.5
},
{
"db": "BID",
"id": "77068",
"trust": 2.1
},
{
"db": "SECTRACK",
"id": "1033796",
"trust": 1.8
},
{
"db": "JVNDB",
"id": "JVNDB-2015-005253",
"trust": 0.8
},
{
"db": "ZDI_CAN",
"id": "ZDI-CAN-3002",
"trust": 0.7
},
{
"db": "CNNVD",
"id": "CNNVD-201510-209",
"trust": 0.7
},
{
"db": "VULHUB",
"id": "VHN-84657",
"trust": 0.1
},
{
"db": "VULMON",
"id": "CVE-2015-6696",
"trust": 0.1
}
],
"sources": [
{
"db": "ZDI",
"id": "ZDI-15-569"
},
{
"db": "VULHUB",
"id": "VHN-84657"
},
{
"db": "VULMON",
"id": "CVE-2015-6696"
},
{
"db": "BID",
"id": "77068"
},
{
"db": "JVNDB",
"id": "JVNDB-2015-005253"
},
{
"db": "CNNVD",
"id": "CNNVD-201510-209"
},
{
"db": "NVD",
"id": "CVE-2015-6696"
}
]
},
"id": "VAR-201510-0345",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "VULHUB",
"id": "VHN-84657"
}
],
"trust": 0.01
},
"last_update_date": "2025-04-13T23:03:48.565000Z",
"patch": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/patch#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"title": "APSB15-24",
"trust": 1.5,
"url": "https://helpx.adobe.com/security/products/acrobat/apsb15-24.html"
},
{
"title": "APSB15-24",
"trust": 0.8,
"url": "https://helpx.adobe.com/jp/security/products/reader/apsb15-24.html"
},
{
"title": "\u30a2\u30c9\u30d3 \u30b7\u30b9\u30c6\u30e0\u30ba\u793e Adobe Reader \u306e\u8106\u5f31\u6027\u306b\u95a2\u3059\u308b\u304a\u77e5\u3089\u305b",
"trust": 0.8,
"url": "http://www.fmworld.net/biz/common/adobe/20151015.html"
},
{
"title": "Multiple Adobe Product-based patch-based buffer overflow vulnerability fixes",
"trust": 0.6,
"url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=58058"
}
],
"sources": [
{
"db": "ZDI",
"id": "ZDI-15-569"
},
{
"db": "JVNDB",
"id": "JVNDB-2015-005253"
},
{
"db": "CNNVD",
"id": "CNNVD-201510-209"
}
]
},
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "CWE-787",
"trust": 1.1
},
{
"problemtype": "CWE-119",
"trust": 0.9
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-84657"
},
{
"db": "JVNDB",
"id": "JVNDB-2015-005253"
},
{
"db": "NVD",
"id": "CVE-2015-6696"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 2.5,
"url": "https://helpx.adobe.com/security/products/acrobat/apsb15-24.html"
},
{
"trust": 1.8,
"url": "http://www.securityfocus.com/bid/77068"
},
{
"trust": 1.8,
"url": "http://www.zerodayinitiative.com/advisories/zdi-15-569"
},
{
"trust": 1.8,
"url": "http://www.securitytracker.com/id/1033796"
},
{
"trust": 0.8,
"url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-6696"
},
{
"trust": 0.8,
"url": "http://www.ipa.go.jp/security/ciadr/vul/20151014-adobereader.html"
},
{
"trust": 0.8,
"url": "http://www.jpcert.or.jp/at/2015/at150035.html"
},
{
"trust": 0.8,
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2015-6696"
},
{
"trust": 0.8,
"url": "http://www.npa.go.jp/cyberpolice/topics/?seq=17022"
},
{
"trust": 0.3,
"url": "http://www.adobe.com"
},
{
"trust": 0.1,
"url": "https://cwe.mitre.org/data/definitions/787.html"
},
{
"trust": 0.1,
"url": "http://tools.cisco.com/security/center/viewalert.x?alertid=42121"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov"
}
],
"sources": [
{
"db": "ZDI",
"id": "ZDI-15-569"
},
{
"db": "VULHUB",
"id": "VHN-84657"
},
{
"db": "VULMON",
"id": "CVE-2015-6696"
},
{
"db": "BID",
"id": "77068"
},
{
"db": "JVNDB",
"id": "JVNDB-2015-005253"
},
{
"db": "CNNVD",
"id": "CNNVD-201510-209"
},
{
"db": "NVD",
"id": "CVE-2015-6696"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "ZDI",
"id": "ZDI-15-569"
},
{
"db": "VULHUB",
"id": "VHN-84657"
},
{
"db": "VULMON",
"id": "CVE-2015-6696"
},
{
"db": "BID",
"id": "77068"
},
{
"db": "JVNDB",
"id": "JVNDB-2015-005253"
},
{
"db": "CNNVD",
"id": "CNNVD-201510-209"
},
{
"db": "NVD",
"id": "CVE-2015-6696"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2015-11-16T00:00:00",
"db": "ZDI",
"id": "ZDI-15-569"
},
{
"date": "2015-10-14T00:00:00",
"db": "VULHUB",
"id": "VHN-84657"
},
{
"date": "2015-10-14T00:00:00",
"db": "VULMON",
"id": "CVE-2015-6696"
},
{
"date": "2015-10-13T00:00:00",
"db": "BID",
"id": "77068"
},
{
"date": "2015-10-16T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2015-005253"
},
{
"date": "2015-10-15T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201510-209"
},
{
"date": "2015-10-14T23:59:18.207000",
"db": "NVD",
"id": "CVE-2015-6696"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2015-11-16T00:00:00",
"db": "ZDI",
"id": "ZDI-15-569"
},
{
"date": "2020-05-13T00:00:00",
"db": "VULHUB",
"id": "VHN-84657"
},
{
"date": "2020-05-13T00:00:00",
"db": "VULMON",
"id": "CVE-2015-6696"
},
{
"date": "2015-12-07T22:23:00",
"db": "BID",
"id": "77068"
},
{
"date": "2015-10-16T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2015-005253"
},
{
"date": "2020-05-14T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201510-209"
},
{
"date": "2025-04-12T10:46:40.837000",
"db": "NVD",
"id": "CVE-2015-6696"
}
]
},
"threat_type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/threat_type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "remote",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201510-209"
}
],
"trust": 0.6
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Windows and Mac OS X Run on Adobe Reader and Acrobat Heap-based buffer overflow vulnerability",
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2015-005253"
}
],
"trust": 0.8
},
"type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "buffer error",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201510-209"
}
],
"trust": 0.6
}
}
VAR-201510-0049
Vulnerability from variot - Updated: 2025-04-13 23:03Adobe Reader and Acrobat 10.x before 10.1.16 and 11.x before 11.0.13, Acrobat and Acrobat Reader DC Classic before 2015.006.30094, and Acrobat and Acrobat Reader DC Continuous before 2015.009.20069 on Windows and OS X allow attackers to bypass intended access restrictions and obtain sensitive information via unspecified vectors, a different vulnerability than CVE-2015-5583, CVE-2015-6705, and CVE-2015-6706. This vulnerability CVE-2015-5583 , CVE-2015-6705 ,and CVE-2015-6706 Is a different vulnerability. Supplementary information : CWE Vulnerability type by CWE-284: Improper Access Control ( Inappropriate access control ) Has been identified. http://cwe.mitre.org/data/definitions/284.htmlAn attacker could bypass access restrictions and obtain important information. Adobe Reader, etc. are all products of Adobe (Adobe) in the United States. Adobe Reader is a free PDF file reader; Acrobat is a PDF file editing and conversion tool; Acrobat Reader DC is a set of tools for viewing, printing and annotating PDF. Security flaws exist in several Adobe products. 30060 and earlier, Acrobat XI Desktop 11.0.12 and earlier, Reader XI Desktop 11.0.12 and earlier, Acrobat X Desktop 10.1.15 and earlier, Reader X Desktop 10.1.15 and earlier
Show details on source website{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"configurations": {
"@id": "https://www.variotdbs.pl/ref/configurations"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-201510-0049",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "acrobat reader dc",
"scope": "gte",
"trust": 1.0,
"vendor": "adobe",
"version": "15.008.20082"
},
{
"model": "acrobat dc",
"scope": "gte",
"trust": 1.0,
"vendor": "adobe",
"version": "15.008.20082"
},
{
"model": "acrobat dc",
"scope": "gte",
"trust": 1.0,
"vendor": "adobe",
"version": "15.006.30060"
},
{
"model": "acrobat reader dc",
"scope": "lt",
"trust": 1.0,
"vendor": "adobe",
"version": "15.009.20069"
},
{
"model": "acrobat dc",
"scope": "lt",
"trust": 1.0,
"vendor": "adobe",
"version": "15.006.30094"
},
{
"model": "acrobat",
"scope": "gte",
"trust": 1.0,
"vendor": "adobe",
"version": "10.0"
},
{
"model": "acrobat reader",
"scope": "lte",
"trust": 1.0,
"vendor": "adobe",
"version": "10.1.15"
},
{
"model": "acrobat reader",
"scope": "gte",
"trust": 1.0,
"vendor": "adobe",
"version": "10.0"
},
{
"model": "acrobat reader",
"scope": "lte",
"trust": 1.0,
"vendor": "adobe",
"version": "11.0.12"
},
{
"model": "acrobat",
"scope": "lte",
"trust": 1.0,
"vendor": "adobe",
"version": "10.1.15"
},
{
"model": "acrobat",
"scope": "lte",
"trust": 1.0,
"vendor": "adobe",
"version": "11.0.12"
},
{
"model": "acrobat reader dc",
"scope": "lt",
"trust": 1.0,
"vendor": "adobe",
"version": "15.006.30094"
},
{
"model": "acrobat",
"scope": "gte",
"trust": 1.0,
"vendor": "adobe",
"version": "11.0.0"
},
{
"model": "acrobat dc",
"scope": "lt",
"trust": 1.0,
"vendor": "adobe",
"version": "15.009.20069"
},
{
"model": "acrobat reader",
"scope": "gte",
"trust": 1.0,
"vendor": "adobe",
"version": "11.0.0"
},
{
"model": "acrobat reader dc",
"scope": "gte",
"trust": 1.0,
"vendor": "adobe",
"version": "15.006.30060"
},
{
"model": "acrobat",
"scope": "lt",
"trust": 0.8,
"vendor": "adobe",
"version": "11.x (windows)"
},
{
"model": "acrobat dc",
"scope": "lt",
"trust": 0.8,
"vendor": "adobe",
"version": "(windows)"
},
{
"model": "acrobat reader dc",
"scope": "lt",
"trust": 0.8,
"vendor": "adobe",
"version": "(windows)"
},
{
"model": "acrobat reader dc",
"scope": "eq",
"trust": 0.8,
"vendor": "adobe",
"version": "classic 2015.006.30094"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.8,
"vendor": "adobe",
"version": "xi desktop 11.0.13"
},
{
"model": "reader",
"scope": "lt",
"trust": 0.8,
"vendor": "adobe",
"version": "10.x (windows)"
},
{
"model": "reader",
"scope": "lt",
"trust": 0.8,
"vendor": "adobe",
"version": "11.x (windows)"
},
{
"model": "acrobat dc",
"scope": "eq",
"trust": 0.8,
"vendor": "adobe",
"version": "continuous 2015.009.20069"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.8,
"vendor": "adobe",
"version": "xi desktop 11.0.13"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.8,
"vendor": "adobe",
"version": "x desktop 10.1.16"
},
{
"model": "acrobat dc",
"scope": "eq",
"trust": 0.8,
"vendor": "adobe",
"version": "classic 2015.006.30094"
},
{
"model": "acrobat reader dc",
"scope": "eq",
"trust": 0.8,
"vendor": "adobe",
"version": "continuous 2015.009.20069"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.8,
"vendor": "adobe",
"version": "x desktop 10.1.16"
},
{
"model": "acrobat",
"scope": "lt",
"trust": 0.8,
"vendor": "adobe",
"version": "10.x (windows)"
},
{
"model": "acrobat reader",
"scope": "eq",
"trust": 0.6,
"vendor": "adobe",
"version": "11.0.8"
},
{
"model": "acrobat reader",
"scope": "eq",
"trust": 0.6,
"vendor": "adobe",
"version": "11.0.10"
},
{
"model": "acrobat reader",
"scope": "eq",
"trust": 0.6,
"vendor": "adobe",
"version": "11.0.11"
},
{
"model": "acrobat reader",
"scope": "eq",
"trust": 0.6,
"vendor": "adobe",
"version": "11.0.5"
},
{
"model": "acrobat reader",
"scope": "eq",
"trust": 0.6,
"vendor": "adobe",
"version": "11.0.7"
},
{
"model": "acrobat reader",
"scope": "eq",
"trust": 0.6,
"vendor": "adobe",
"version": "10.1.14"
},
{
"model": "acrobat reader",
"scope": "eq",
"trust": 0.6,
"vendor": "adobe",
"version": "11.0.6"
},
{
"model": "acrobat reader dc",
"scope": "eq",
"trust": 0.6,
"vendor": "adobe",
"version": "2015.008.20082"
},
{
"model": "acrobat reader",
"scope": "eq",
"trust": 0.6,
"vendor": "adobe",
"version": "11.0.9"
},
{
"model": "acrobat reader",
"scope": "eq",
"trust": 0.6,
"vendor": "adobe",
"version": "11.0.12"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1.14"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1.9"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1.1"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1.13"
},
{
"model": "acrobat reader dc",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "2015.8.20082"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.10"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.0"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1.2"
},
{
"model": "acrobat dc",
"scope": "ne",
"trust": 0.3,
"vendor": "adobe",
"version": "2015.006.30094"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1.15"
},
{
"model": "acrobat reader dc",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "2015.6.30060"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.0.3"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1.10"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.3"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.0.13"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.6"
},
{
"model": "acrobat",
"scope": "ne",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.13"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0"
},
{
"model": "acrobat reader dc",
"scope": "ne",
"trust": 0.3,
"vendor": "adobe",
"version": "2015.006.30094"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.10"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.4"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1.3"
},
{
"model": "acrobat",
"scope": "ne",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1.16"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.0.2"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.0.1"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.11"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1.4"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1.6"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1.11"
},
{
"model": "reader",
"scope": "ne",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.13"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.7"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1.14"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1.3"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1.1"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1"
},
{
"model": "reader",
"scope": "ne",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1.16"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.0.2"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1.5"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.0"
},
{
"model": "acrobat dc",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "2015.007.20033"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1.12"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.1"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1.2"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1.13"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1.4"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1.8"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1.11"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.0.3"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.2"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.12"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.08"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.9"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.7"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.6"
},
{
"model": "acrobat dc",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "2015.006.30060"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.05"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1.10"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.3"
},
{
"model": "acrobat dc",
"scope": "ne",
"trust": 0.3,
"vendor": "adobe",
"version": "2015.009.20069"
},
{
"model": "acrobat dc",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "2015.006.30033"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1.12"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.1"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.4"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1.9"
},
{
"model": "acrobat reader dc",
"scope": "ne",
"trust": 0.3,
"vendor": "adobe",
"version": "2015.009.20069"
},
{
"model": "acrobat reader dc",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "2015.006.30033"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.12"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.08"
},
{
"model": "acrobat dc",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "2015.008.20082"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1.7"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.0.1"
},
{
"model": "acrobat reader dc",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "2015.007.20033"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.09"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.11"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1.15"
}
],
"sources": [
{
"db": "BID",
"id": "77070"
},
{
"db": "JVNDB",
"id": "JVNDB-2015-005300"
},
{
"db": "CNNVD",
"id": "CNNVD-201510-249"
},
{
"db": "NVD",
"id": "CVE-2015-7624"
}
]
},
"configurations": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/configurations#",
"children": {
"@container": "@list"
},
"cpe_match": {
"@container": "@list"
},
"data": {
"@container": "@list"
},
"nodes": {
"@container": "@list"
}
},
"data": [
{
"CVE_data_version": "4.0",
"nodes": [
{
"cpe_match": [
{
"cpe22Uri": "cpe:/a:adobe:acrobat",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/a:adobe:acrobat_dc",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/a:adobe:acrobat_reader_dc",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/a:adobe:acrobat_reader",
"vulnerable": true
}
],
"operator": "OR"
}
]
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2015-005300"
}
]
},
"credits": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/credits#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Joel Brewer, Alex Inf\u00fchr of Cure53.de, AbdulAziz Hariri and Jasiel Spelman of HP Zero Day Initiative",
"sources": [
{
"db": "BID",
"id": "77070"
}
],
"trust": 0.3
},
"cve": "CVE-2015-7624",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "nvd@nist.gov",
"availabilityImpact": "NONE",
"baseScore": 5.0,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 10.0,
"id": "CVE-2015-7624",
"impactScore": 2.9,
"integrityImpact": "NONE",
"severity": "MEDIUM",
"trust": 1.8,
"vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "VULHUB",
"availabilityImpact": "NONE",
"baseScore": 5.0,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 10.0,
"id": "VHN-85585",
"impactScore": 2.9,
"integrityImpact": "NONE",
"severity": "MEDIUM",
"trust": 0.1,
"vectorString": "AV:N/AC:L/AU:N/C:P/I:N/A:N",
"version": "2.0"
}
],
"cvssV3": [],
"severity": [
{
"author": "nvd@nist.gov",
"id": "CVE-2015-7624",
"trust": 1.0,
"value": "MEDIUM"
},
{
"author": "NVD",
"id": "CVE-2015-7624",
"trust": 0.8,
"value": "Medium"
},
{
"author": "CNNVD",
"id": "CNNVD-201510-249",
"trust": 0.6,
"value": "MEDIUM"
},
{
"author": "VULHUB",
"id": "VHN-85585",
"trust": 0.1,
"value": "MEDIUM"
}
]
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-85585"
},
{
"db": "JVNDB",
"id": "JVNDB-2015-005300"
},
{
"db": "CNNVD",
"id": "CNNVD-201510-249"
},
{
"db": "NVD",
"id": "CVE-2015-7624"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Adobe Reader and Acrobat 10.x before 10.1.16 and 11.x before 11.0.13, Acrobat and Acrobat Reader DC Classic before 2015.006.30094, and Acrobat and Acrobat Reader DC Continuous before 2015.009.20069 on Windows and OS X allow attackers to bypass intended access restrictions and obtain sensitive information via unspecified vectors, a different vulnerability than CVE-2015-5583, CVE-2015-6705, and CVE-2015-6706. This vulnerability CVE-2015-5583 , CVE-2015-6705 ,and CVE-2015-6706 Is a different vulnerability. Supplementary information : CWE Vulnerability type by CWE-284: Improper Access Control ( Inappropriate access control ) Has been identified. http://cwe.mitre.org/data/definitions/284.htmlAn attacker could bypass access restrictions and obtain important information. Adobe Reader, etc. are all products of Adobe (Adobe) in the United States. Adobe Reader is a free PDF file reader; Acrobat is a PDF file editing and conversion tool; Acrobat Reader DC is a set of tools for viewing, printing and annotating PDF. Security flaws exist in several Adobe products. 30060 and earlier, Acrobat XI Desktop 11.0.12 and earlier, Reader XI Desktop 11.0.12 and earlier, Acrobat X Desktop 10.1.15 and earlier, Reader X Desktop 10.1.15 and earlier",
"sources": [
{
"db": "NVD",
"id": "CVE-2015-7624"
},
{
"db": "JVNDB",
"id": "JVNDB-2015-005300"
},
{
"db": "BID",
"id": "77070"
},
{
"db": "VULHUB",
"id": "VHN-85585"
}
],
"trust": 1.98
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "NVD",
"id": "CVE-2015-7624",
"trust": 2.8
},
{
"db": "SECTRACK",
"id": "1033796",
"trust": 1.7
},
{
"db": "JVNDB",
"id": "JVNDB-2015-005300",
"trust": 0.8
},
{
"db": "CNNVD",
"id": "CNNVD-201510-249",
"trust": 0.7
},
{
"db": "BID",
"id": "77070",
"trust": 0.3
},
{
"db": "VULHUB",
"id": "VHN-85585",
"trust": 0.1
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-85585"
},
{
"db": "BID",
"id": "77070"
},
{
"db": "JVNDB",
"id": "JVNDB-2015-005300"
},
{
"db": "CNNVD",
"id": "CNNVD-201510-249"
},
{
"db": "NVD",
"id": "CVE-2015-7624"
}
]
},
"id": "VAR-201510-0049",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "VULHUB",
"id": "VHN-85585"
}
],
"trust": 0.01
},
"last_update_date": "2025-04-13T23:03:48.532000Z",
"patch": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/patch#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"title": "APSB15-24",
"trust": 0.8,
"url": "https://helpx.adobe.com/security/products/acrobat/apsb15-24.html"
},
{
"title": "APSB15-24",
"trust": 0.8,
"url": "https://helpx.adobe.com/jp/security/products/reader/apsb15-24.html"
},
{
"title": "\u30a2\u30c9\u30d3 \u30b7\u30b9\u30c6\u30e0\u30ba\u793e Adobe Reader \u306e\u8106\u5f31\u6027\u306b\u95a2\u3059\u308b\u304a\u77e5\u3089\u305b",
"trust": 0.8,
"url": "http://www.fmworld.net/biz/common/adobe/20151015.html"
},
{
"title": "Multiple Adobe Product security vulnerabilities",
"trust": 0.6,
"url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=58098"
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2015-005300"
},
{
"db": "CNNVD",
"id": "CNNVD-201510-249"
}
]
},
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "CWE-200",
"trust": 1.1
},
{
"problemtype": "CWE-Other",
"trust": 0.8
},
{
"problemtype": "CWE-284",
"trust": 0.1
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-85585"
},
{
"db": "JVNDB",
"id": "JVNDB-2015-005300"
},
{
"db": "NVD",
"id": "CVE-2015-7624"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 1.7,
"url": "https://helpx.adobe.com/security/products/acrobat/apsb15-24.html"
},
{
"trust": 1.7,
"url": "http://www.securitytracker.com/id/1033796"
},
{
"trust": 0.8,
"url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-7624"
},
{
"trust": 0.8,
"url": "http://www.ipa.go.jp/security/ciadr/vul/20151014-adobereader.html"
},
{
"trust": 0.8,
"url": "http://www.jpcert.or.jp/at/2015/at150035.html"
},
{
"trust": 0.8,
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2015-7624"
},
{
"trust": 0.8,
"url": "http://www.npa.go.jp/cyberpolice/topics/?seq=17022"
},
{
"trust": 0.3,
"url": "http://www.adobe.com"
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-85585"
},
{
"db": "BID",
"id": "77070"
},
{
"db": "JVNDB",
"id": "JVNDB-2015-005300"
},
{
"db": "CNNVD",
"id": "CNNVD-201510-249"
},
{
"db": "NVD",
"id": "CVE-2015-7624"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "VULHUB",
"id": "VHN-85585"
},
{
"db": "BID",
"id": "77070"
},
{
"db": "JVNDB",
"id": "JVNDB-2015-005300"
},
{
"db": "CNNVD",
"id": "CNNVD-201510-249"
},
{
"db": "NVD",
"id": "CVE-2015-7624"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2015-10-14T00:00:00",
"db": "VULHUB",
"id": "VHN-85585"
},
{
"date": "2015-10-13T00:00:00",
"db": "BID",
"id": "77070"
},
{
"date": "2015-10-19T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2015-005300"
},
{
"date": "2015-10-15T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201510-249"
},
{
"date": "2015-10-14T23:59:57.887000",
"db": "NVD",
"id": "CVE-2015-7624"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2020-05-19T00:00:00",
"db": "VULHUB",
"id": "VHN-85585"
},
{
"date": "2015-11-03T19:59:00",
"db": "BID",
"id": "77070"
},
{
"date": "2015-10-19T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2015-005300"
},
{
"date": "2020-05-20T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201510-249"
},
{
"date": "2025-04-12T10:46:40.837000",
"db": "NVD",
"id": "CVE-2015-7624"
}
]
},
"threat_type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/threat_type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "remote",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201510-249"
}
],
"trust": 0.6
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Windows and Mac OS X Run on Adobe Reader and Acrobat Vulnerable to access restrictions",
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2015-005300"
}
],
"trust": 0.8
},
"type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "information disclosure",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201510-249"
}
],
"trust": 0.6
}
}
VAR-201510-0368
Vulnerability from variot - Updated: 2025-04-13 23:03The ANStartApproval method in Adobe Reader and Acrobat 10.x before 10.1.16 and 11.x before 11.0.13, Acrobat and Acrobat Reader DC Classic before 2015.006.30094, and Acrobat and Acrobat Reader DC Continuous before 2015.009.20069 on Windows and OS X allows attackers to bypass JavaScript API execution restrictions via unspecified vectors, a different vulnerability than CVE-2015-6707, CVE-2015-6709, CVE-2015-6710, CVE-2015-6711, CVE-2015-6712, CVE-2015-6713, CVE-2015-6714, CVE-2015-6715, CVE-2015-6716, CVE-2015-6717, CVE-2015-6718, CVE-2015-6719, CVE-2015-6720, CVE-2015-6721, CVE-2015-6722, CVE-2015-6723, CVE-2015-6724, CVE-2015-6725, CVE-2015-7614, CVE-2015-7616, CVE-2015-7618, CVE-2015-7619, CVE-2015-7620, and CVE-2015-7623. This vulnerability CVE-2015-6707 , CVE-2015-6709 , CVE-2015-6710 , CVE-2015-6711 , CVE-2015-6712 , CVE-2015-6713 , CVE-2015-6714 , CVE-2015-6715 , CVE-2015-6716 , CVE-2015-6717 , CVE-2015-6718 , CVE-2015-6719 , CVE-2015-6720 , CVE-2015-6721 , CVE-2015-6722 , CVE-2015-6723 , CVE-2015-6724 , CVE-2015-6725 , CVE-2015-7614 , CVE-2015-7616 , CVE-2015-7618 , CVE-2015-7619 , CVE-2015-7620 ,and CVE-2015-7623 Is a different vulnerability.By the attacker, JavaScript API Execution restrictions may be avoided. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the ANStartApproval method. By creating a specially crafted PDF with specific Javascript instructions, it is possible to bypass the Javascript API restrictions. A remote attacker could exploit this vulnerability to execute arbitrary code. Adobe Acrobat and Reader are prone to multiple security-bypass vulnerabilities. An attacker can exploit these issues to bypass certain security restrictions and perform unauthorized actions. This may lead to further attacks. Adobe Reader, etc. are all products of Adobe (Adobe) in the United States. Adobe Reader is a free PDF file reader; Acrobat is a PDF file editing and conversion tool; Acrobat Reader DC is a set of tools for viewing, printing and annotating PDF. Classic and Continuous are two update mechanisms provided by Acrobat Reader DC Product Download Center. A security vulnerability exists in the ANStartApproval method of several Adobe products. 30060 and earlier, Acrobat XI Desktop 11.0.12 and earlier, Reader XI Desktop 11.0.12 and earlier, Acrobat X Desktop 10.1.15 and earlier, Reader X Desktop 10.1.15 and earlier
Show details on source website{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"configurations": {
"@id": "https://www.variotdbs.pl/ref/configurations"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-201510-0368",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "acrobat reader dc",
"scope": "gte",
"trust": 1.0,
"vendor": "adobe",
"version": "15.008.20082"
},
{
"model": "acrobat dc",
"scope": "gte",
"trust": 1.0,
"vendor": "adobe",
"version": "15.008.20082"
},
{
"model": "acrobat dc",
"scope": "gte",
"trust": 1.0,
"vendor": "adobe",
"version": "15.006.30060"
},
{
"model": "acrobat reader dc",
"scope": "lt",
"trust": 1.0,
"vendor": "adobe",
"version": "15.009.20069"
},
{
"model": "acrobat dc",
"scope": "lt",
"trust": 1.0,
"vendor": "adobe",
"version": "15.006.30094"
},
{
"model": "acrobat",
"scope": "gte",
"trust": 1.0,
"vendor": "adobe",
"version": "10.0"
},
{
"model": "acrobat reader",
"scope": "lte",
"trust": 1.0,
"vendor": "adobe",
"version": "10.1.15"
},
{
"model": "acrobat reader",
"scope": "gte",
"trust": 1.0,
"vendor": "adobe",
"version": "10.0"
},
{
"model": "acrobat reader",
"scope": "lte",
"trust": 1.0,
"vendor": "adobe",
"version": "11.0.12"
},
{
"model": "acrobat",
"scope": "lte",
"trust": 1.0,
"vendor": "adobe",
"version": "10.1.15"
},
{
"model": "acrobat",
"scope": "lte",
"trust": 1.0,
"vendor": "adobe",
"version": "11.0.12"
},
{
"model": "acrobat reader dc",
"scope": "lt",
"trust": 1.0,
"vendor": "adobe",
"version": "15.006.30094"
},
{
"model": "acrobat",
"scope": "gte",
"trust": 1.0,
"vendor": "adobe",
"version": "11.0.0"
},
{
"model": "acrobat dc",
"scope": "lt",
"trust": 1.0,
"vendor": "adobe",
"version": "15.009.20069"
},
{
"model": "acrobat reader",
"scope": "gte",
"trust": 1.0,
"vendor": "adobe",
"version": "11.0.0"
},
{
"model": "acrobat reader dc",
"scope": "gte",
"trust": 1.0,
"vendor": "adobe",
"version": "15.006.30060"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.9,
"vendor": "adobe",
"version": "11.0.10"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.9,
"vendor": "adobe",
"version": "11.0.6"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.9,
"vendor": "adobe",
"version": "11.0.7"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.9,
"vendor": "adobe",
"version": "11.0.12"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.9,
"vendor": "adobe",
"version": "11.0.9"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.9,
"vendor": "adobe",
"version": "11.0.3"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.9,
"vendor": "adobe",
"version": "11.0.4"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.9,
"vendor": "adobe",
"version": "11.0.11"
},
{
"model": "acrobat dc",
"scope": "lt",
"trust": 0.8,
"vendor": "adobe",
"version": "(windows/macintosh)"
},
{
"model": "acrobat reader dc",
"scope": "lt",
"trust": 0.8,
"vendor": "adobe",
"version": "(windows/macintosh)"
},
{
"model": "acrobat reader dc",
"scope": "eq",
"trust": 0.8,
"vendor": "adobe",
"version": "classic 2015.006.30094"
},
{
"model": "acrobat",
"scope": "lt",
"trust": 0.8,
"vendor": "adobe",
"version": "11.x (windows/macintosh)"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.8,
"vendor": "adobe",
"version": "xi desktop 11.0.13"
},
{
"model": "reader",
"scope": "lt",
"trust": 0.8,
"vendor": "adobe",
"version": "11.x (windows/macintosh)"
},
{
"model": "acrobat dc",
"scope": "eq",
"trust": 0.8,
"vendor": "adobe",
"version": "continuous 2015.009.20069"
},
{
"model": "acrobat",
"scope": "lt",
"trust": 0.8,
"vendor": "adobe",
"version": "10.x (windows/macintosh)"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.8,
"vendor": "adobe",
"version": "xi desktop 11.0.13"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.8,
"vendor": "adobe",
"version": "x desktop 10.1.16"
},
{
"model": "acrobat dc",
"scope": "eq",
"trust": 0.8,
"vendor": "adobe",
"version": "classic 2015.006.30094"
},
{
"model": "reader",
"scope": "lt",
"trust": 0.8,
"vendor": "adobe",
"version": "10.x (windows/macintosh)"
},
{
"model": "acrobat reader dc",
"scope": "eq",
"trust": 0.8,
"vendor": "adobe",
"version": "continuous 2015.009.20069"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.8,
"vendor": "adobe",
"version": "x desktop 10.1.16"
},
{
"model": "acrobat reader dc",
"scope": null,
"trust": 0.7,
"vendor": "adobe",
"version": null
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.6,
"vendor": "adobe",
"version": "11.0.8"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.6,
"vendor": "adobe",
"version": "11.0.5"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1.14"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1.9"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1.1"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1.13"
},
{
"model": "acrobat reader dc",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "2015.8.20082"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.0"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1.2"
},
{
"model": "acrobat dc",
"scope": "ne",
"trust": 0.3,
"vendor": "adobe",
"version": "2015.006.30094"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1.15"
},
{
"model": "acrobat reader dc",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "2015.6.30060"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.0.3"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1.10"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.3"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.0.13"
},
{
"model": "acrobat",
"scope": "ne",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.13"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0"
},
{
"model": "acrobat reader dc",
"scope": "ne",
"trust": 0.3,
"vendor": "adobe",
"version": "2015.006.30094"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.10"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.4"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1.3"
},
{
"model": "acrobat",
"scope": "ne",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1.16"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.0.2"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.0.1"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.11"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1.4"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1.6"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1.11"
},
{
"model": "reader",
"scope": "ne",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.13"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1.14"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1.3"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1.1"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1"
},
{
"model": "reader",
"scope": "ne",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1.16"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.0.2"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1.5"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.0"
},
{
"model": "acrobat dc",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "2015.007.20033"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1.12"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.1"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1.2"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1.13"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1.4"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1.8"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1.11"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.0.3"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.2"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.08"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.7"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.6"
},
{
"model": "acrobat dc",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "2015.006.30060"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.05"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1.10"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.09"
},
{
"model": "acrobat dc",
"scope": "ne",
"trust": 0.3,
"vendor": "adobe",
"version": "2015.009.20069"
},
{
"model": "acrobat dc",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "2015.006.30033"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1.12"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.1"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1.9"
},
{
"model": "acrobat reader dc",
"scope": "ne",
"trust": 0.3,
"vendor": "adobe",
"version": "2015.009.20069"
},
{
"model": "acrobat reader dc",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "2015.006.30033"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.12"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.08"
},
{
"model": "acrobat dc",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "2015.008.20082"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1.7"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.0.1"
},
{
"model": "acrobat reader dc",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "2015.007.20033"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.09"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1.15"
}
],
"sources": [
{
"db": "ZDI",
"id": "ZDI-15-484"
},
{
"db": "BID",
"id": "77074"
},
{
"db": "JVNDB",
"id": "JVNDB-2015-005265"
},
{
"db": "CNNVD",
"id": "CNNVD-201510-221"
},
{
"db": "NVD",
"id": "CVE-2015-6708"
}
]
},
"configurations": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/configurations#",
"children": {
"@container": "@list"
},
"cpe_match": {
"@container": "@list"
},
"data": {
"@container": "@list"
},
"nodes": {
"@container": "@list"
}
},
"data": [
{
"CVE_data_version": "4.0",
"nodes": [
{
"cpe_match": [
{
"cpe22Uri": "cpe:/a:adobe:acrobat",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/a:adobe:acrobat_dc",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/a:adobe:acrobat_reader_dc",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/a:adobe:acrobat_reader",
"vulnerable": true
}
],
"operator": "OR"
}
]
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2015-005265"
}
]
},
"credits": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/credits#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "AbdulAziz Hariri - HP Zero Day Initiative",
"sources": [
{
"db": "ZDI",
"id": "ZDI-15-484"
}
],
"trust": 0.7
},
"cve": "CVE-2015-6708",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [
{
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "nvd@nist.gov",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 8.6,
"id": "CVE-2015-6708",
"impactScore": 6.4,
"integrityImpact": "PARTIAL",
"severity": "MEDIUM",
"trust": 1.7,
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
{
"acInsufInfo": null,
"accessComplexity": "Medium",
"accessVector": "Network",
"authentication": "None",
"author": "NVD",
"availabilityImpact": "Complete",
"baseScore": 9.3,
"confidentialityImpact": "Complete",
"exploitabilityScore": null,
"id": "CVE-2015-6708",
"impactScore": null,
"integrityImpact": "Complete",
"obtainAllPrivilege": null,
"obtainOtherPrivilege": null,
"obtainUserPrivilege": null,
"severity": "High",
"trust": 0.8,
"userInteractionRequired": null,
"vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
{
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "VULHUB",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 8.6,
"id": "VHN-84669",
"impactScore": 6.4,
"integrityImpact": "PARTIAL",
"severity": "MEDIUM",
"trust": 0.1,
"vectorString": "AV:N/AC:M/AU:N/C:P/I:P/A:P",
"version": "2.0"
}
],
"cvssV3": [],
"severity": [
{
"author": "nvd@nist.gov",
"id": "CVE-2015-6708",
"trust": 1.0,
"value": "MEDIUM"
},
{
"author": "NVD",
"id": "CVE-2015-6708",
"trust": 0.8,
"value": "High"
},
{
"author": "ZDI",
"id": "CVE-2015-6708",
"trust": 0.7,
"value": "MEDIUM"
},
{
"author": "CNNVD",
"id": "CNNVD-201510-221",
"trust": 0.6,
"value": "CRITICAL"
},
{
"author": "VULHUB",
"id": "VHN-84669",
"trust": 0.1,
"value": "MEDIUM"
}
]
}
],
"sources": [
{
"db": "ZDI",
"id": "ZDI-15-484"
},
{
"db": "VULHUB",
"id": "VHN-84669"
},
{
"db": "JVNDB",
"id": "JVNDB-2015-005265"
},
{
"db": "CNNVD",
"id": "CNNVD-201510-221"
},
{
"db": "NVD",
"id": "CVE-2015-6708"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "The ANStartApproval method in Adobe Reader and Acrobat 10.x before 10.1.16 and 11.x before 11.0.13, Acrobat and Acrobat Reader DC Classic before 2015.006.30094, and Acrobat and Acrobat Reader DC Continuous before 2015.009.20069 on Windows and OS X allows attackers to bypass JavaScript API execution restrictions via unspecified vectors, a different vulnerability than CVE-2015-6707, CVE-2015-6709, CVE-2015-6710, CVE-2015-6711, CVE-2015-6712, CVE-2015-6713, CVE-2015-6714, CVE-2015-6715, CVE-2015-6716, CVE-2015-6717, CVE-2015-6718, CVE-2015-6719, CVE-2015-6720, CVE-2015-6721, CVE-2015-6722, CVE-2015-6723, CVE-2015-6724, CVE-2015-6725, CVE-2015-7614, CVE-2015-7616, CVE-2015-7618, CVE-2015-7619, CVE-2015-7620, and CVE-2015-7623. This vulnerability CVE-2015-6707 , CVE-2015-6709 , CVE-2015-6710 , CVE-2015-6711 , CVE-2015-6712 , CVE-2015-6713 , CVE-2015-6714 , CVE-2015-6715 , CVE-2015-6716 , CVE-2015-6717 , CVE-2015-6718 , CVE-2015-6719 , CVE-2015-6720 , CVE-2015-6721 , CVE-2015-6722 , CVE-2015-6723 , CVE-2015-6724 , CVE-2015-6725 , CVE-2015-7614 , CVE-2015-7616 , CVE-2015-7618 , CVE-2015-7619 , CVE-2015-7620 ,and CVE-2015-7623 Is a different vulnerability.By the attacker, JavaScript API Execution restrictions may be avoided. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the ANStartApproval method. By creating a specially crafted PDF with specific Javascript instructions, it is possible to bypass the Javascript API restrictions. A remote attacker could exploit this vulnerability to execute arbitrary code. Adobe Acrobat and Reader are prone to multiple security-bypass vulnerabilities. \nAn attacker can exploit these issues to bypass certain security restrictions and perform unauthorized actions. This may lead to further attacks. Adobe Reader, etc. are all products of Adobe (Adobe) in the United States. Adobe Reader is a free PDF file reader; Acrobat is a PDF file editing and conversion tool; Acrobat Reader DC is a set of tools for viewing, printing and annotating PDF. Classic and Continuous are two update mechanisms provided by Acrobat Reader DC Product Download Center. A security vulnerability exists in the ANStartApproval method of several Adobe products. 30060 and earlier, Acrobat XI Desktop 11.0.12 and earlier, Reader XI Desktop 11.0.12 and earlier, Acrobat X Desktop 10.1.15 and earlier, Reader X Desktop 10.1.15 and earlier",
"sources": [
{
"db": "NVD",
"id": "CVE-2015-6708"
},
{
"db": "JVNDB",
"id": "JVNDB-2015-005265"
},
{
"db": "ZDI",
"id": "ZDI-15-484"
},
{
"db": "BID",
"id": "77074"
},
{
"db": "VULHUB",
"id": "VHN-84669"
}
],
"trust": 2.61
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "NVD",
"id": "CVE-2015-6708",
"trust": 3.5
},
{
"db": "ZDI",
"id": "ZDI-15-484",
"trust": 2.4
},
{
"db": "SECTRACK",
"id": "1033796",
"trust": 1.7
},
{
"db": "JVNDB",
"id": "JVNDB-2015-005265",
"trust": 0.8
},
{
"db": "ZDI_CAN",
"id": "ZDI-CAN-3059",
"trust": 0.7
},
{
"db": "CNNVD",
"id": "CNNVD-201510-221",
"trust": 0.7
},
{
"db": "BID",
"id": "77074",
"trust": 0.3
},
{
"db": "VULHUB",
"id": "VHN-84669",
"trust": 0.1
}
],
"sources": [
{
"db": "ZDI",
"id": "ZDI-15-484"
},
{
"db": "VULHUB",
"id": "VHN-84669"
},
{
"db": "BID",
"id": "77074"
},
{
"db": "JVNDB",
"id": "JVNDB-2015-005265"
},
{
"db": "CNNVD",
"id": "CNNVD-201510-221"
},
{
"db": "NVD",
"id": "CVE-2015-6708"
}
]
},
"id": "VAR-201510-0368",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "VULHUB",
"id": "VHN-84669"
}
],
"trust": 0.01
},
"last_update_date": "2025-04-13T23:03:48.497000Z",
"patch": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/patch#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"title": "APSB15-24",
"trust": 1.5,
"url": "https://helpx.adobe.com/security/products/acrobat/apsb15-24.html"
},
{
"title": "APSB15-24",
"trust": 0.8,
"url": "https://helpx.adobe.com/jp/security/products/reader/apsb15-24.html"
},
{
"title": "\u30a2\u30c9\u30d3 \u30b7\u30b9\u30c6\u30e0\u30ba\u793e Adobe Reader \u306e\u8106\u5f31\u6027\u306b\u95a2\u3059\u308b\u304a\u77e5\u3089\u305b",
"trust": 0.8,
"url": "http://www.fmworld.net/biz/common/adobe/20151015.html"
},
{
"title": "Multiple Adobe Product Privilege License and Access Control Vulnerability Fixes",
"trust": 0.6,
"url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=58070"
}
],
"sources": [
{
"db": "ZDI",
"id": "ZDI-15-484"
},
{
"db": "JVNDB",
"id": "JVNDB-2015-005265"
},
{
"db": "CNNVD",
"id": "CNNVD-201510-221"
}
]
},
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "NVD-CWE-noinfo",
"trust": 1.0
},
{
"problemtype": "CWE-264",
"trust": 0.9
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-84669"
},
{
"db": "JVNDB",
"id": "JVNDB-2015-005265"
},
{
"db": "NVD",
"id": "CVE-2015-6708"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 2.4,
"url": "https://helpx.adobe.com/security/products/acrobat/apsb15-24.html"
},
{
"trust": 1.7,
"url": "http://www.zerodayinitiative.com/advisories/zdi-15-484"
},
{
"trust": 1.7,
"url": "http://www.securitytracker.com/id/1033796"
},
{
"trust": 0.8,
"url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-6708"
},
{
"trust": 0.8,
"url": "http://www.ipa.go.jp/security/ciadr/vul/20151014-adobereader.html"
},
{
"trust": 0.8,
"url": "http://www.jpcert.or.jp/at/2015/at150035.html"
},
{
"trust": 0.8,
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2015-6708"
},
{
"trust": 0.8,
"url": "http://www.npa.go.jp/cyberpolice/topics/?seq=17022"
},
{
"trust": 0.3,
"url": "http://www.adobe.com"
}
],
"sources": [
{
"db": "ZDI",
"id": "ZDI-15-484"
},
{
"db": "VULHUB",
"id": "VHN-84669"
},
{
"db": "BID",
"id": "77074"
},
{
"db": "JVNDB",
"id": "JVNDB-2015-005265"
},
{
"db": "CNNVD",
"id": "CNNVD-201510-221"
},
{
"db": "NVD",
"id": "CVE-2015-6708"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "ZDI",
"id": "ZDI-15-484"
},
{
"db": "VULHUB",
"id": "VHN-84669"
},
{
"db": "BID",
"id": "77074"
},
{
"db": "JVNDB",
"id": "JVNDB-2015-005265"
},
{
"db": "CNNVD",
"id": "CNNVD-201510-221"
},
{
"db": "NVD",
"id": "CVE-2015-6708"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2015-10-13T00:00:00",
"db": "ZDI",
"id": "ZDI-15-484"
},
{
"date": "2015-10-14T00:00:00",
"db": "VULHUB",
"id": "VHN-84669"
},
{
"date": "2015-10-13T00:00:00",
"db": "BID",
"id": "77074"
},
{
"date": "2015-10-16T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2015-005265"
},
{
"date": "2015-10-15T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201510-221"
},
{
"date": "2015-10-14T23:59:30.303000",
"db": "NVD",
"id": "CVE-2015-6708"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2015-10-13T00:00:00",
"db": "ZDI",
"id": "ZDI-15-484"
},
{
"date": "2020-05-13T00:00:00",
"db": "VULHUB",
"id": "VHN-84669"
},
{
"date": "2015-11-03T19:59:00",
"db": "BID",
"id": "77074"
},
{
"date": "2015-10-16T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2015-005265"
},
{
"date": "2020-05-14T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201510-221"
},
{
"date": "2025-04-12T10:46:40.837000",
"db": "NVD",
"id": "CVE-2015-6708"
}
]
},
"threat_type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/threat_type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "remote",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201510-221"
}
],
"trust": 0.6
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Windows and Mac OS X Run on Adobe Reader and Acrobat of ANStartApproval In the method JavaScript API Vulnerability that circumvents execution restrictions",
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2015-005265"
}
],
"trust": 0.8
},
"type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "permissions and access control issues",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201510-221"
}
],
"trust": 0.6
}
}
VAR-201510-0356
Vulnerability from variot - Updated: 2025-04-13 23:03Adobe Reader and Acrobat 10.x before 10.1.16 and 11.x before 11.0.13, Acrobat and Acrobat Reader DC Classic before 2015.006.30094, and Acrobat and Acrobat Reader DC Continuous before 2015.009.20069 on Windows and OS X allow attackers to execute arbitrary code or cause a denial of service (memory corruption) by using the Format action for unspecified fields, a different vulnerability than CVE-2015-6686, CVE-2015-6693, CVE-2015-6694, CVE-2015-6695, and CVE-2015-7622. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The flaw exists within the handling of fields. A specially crafted PDF with specific fields with the Format action can force a dangling pointer to be reused after it has been freed. An attacker can leverage this vulnerability to execute code under the context of the current process. Adobe Acrobat and Reader are prone to multiple memory-corruption vulnerabilities. Failed exploit attempts will likely cause a denial-of-service condition. Adobe Reader, etc. are all products of Adobe (Adobe) in the United States. Adobe Reader is a free PDF file reader; Acrobat is a PDF file editing and conversion tool; Acrobat Reader DC is a set of tools for viewing, printing and annotating PDF. Classic and Continuous are two update mechanisms provided by Acrobat Reader DC Product Download Center. Security flaws exist in several Adobe products. 30060 and earlier, Acrobat XI Desktop 11.0.12 and earlier, Reader XI Desktop 11.0.12 and earlier, Acrobat X Desktop 10.1.15 and earlier, Reader X Desktop 10.1.15 and earlier
Show details on source website{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"configurations": {
"@id": "https://www.variotdbs.pl/ref/configurations"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-201510-0356",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "acrobat reader dc",
"scope": "gte",
"trust": 1.0,
"vendor": "adobe",
"version": "15.008.20082"
},
{
"model": "acrobat dc",
"scope": "gte",
"trust": 1.0,
"vendor": "adobe",
"version": "15.008.20082"
},
{
"model": "acrobat dc",
"scope": "gte",
"trust": 1.0,
"vendor": "adobe",
"version": "15.006.30060"
},
{
"model": "acrobat reader dc",
"scope": "lt",
"trust": 1.0,
"vendor": "adobe",
"version": "15.009.20069"
},
{
"model": "acrobat dc",
"scope": "lt",
"trust": 1.0,
"vendor": "adobe",
"version": "15.006.30094"
},
{
"model": "acrobat",
"scope": "gte",
"trust": 1.0,
"vendor": "adobe",
"version": "10.0"
},
{
"model": "acrobat reader",
"scope": "lte",
"trust": 1.0,
"vendor": "adobe",
"version": "10.1.15"
},
{
"model": "acrobat reader",
"scope": "gte",
"trust": 1.0,
"vendor": "adobe",
"version": "10.0"
},
{
"model": "acrobat reader",
"scope": "lte",
"trust": 1.0,
"vendor": "adobe",
"version": "11.0.12"
},
{
"model": "acrobat",
"scope": "lte",
"trust": 1.0,
"vendor": "adobe",
"version": "10.1.15"
},
{
"model": "acrobat",
"scope": "lte",
"trust": 1.0,
"vendor": "adobe",
"version": "11.0.12"
},
{
"model": "acrobat reader dc",
"scope": "lt",
"trust": 1.0,
"vendor": "adobe",
"version": "15.006.30094"
},
{
"model": "acrobat",
"scope": "gte",
"trust": 1.0,
"vendor": "adobe",
"version": "11.0.0"
},
{
"model": "acrobat dc",
"scope": "lt",
"trust": 1.0,
"vendor": "adobe",
"version": "15.009.20069"
},
{
"model": "acrobat reader",
"scope": "gte",
"trust": 1.0,
"vendor": "adobe",
"version": "11.0.0"
},
{
"model": "acrobat reader dc",
"scope": "gte",
"trust": 1.0,
"vendor": "adobe",
"version": "15.006.30060"
},
{
"model": "acrobat dc",
"scope": "lt",
"trust": 0.8,
"vendor": "adobe",
"version": "(windows/macintosh)"
},
{
"model": "acrobat reader dc",
"scope": "lt",
"trust": 0.8,
"vendor": "adobe",
"version": "(windows/macintosh)"
},
{
"model": "acrobat reader dc",
"scope": "eq",
"trust": 0.8,
"vendor": "adobe",
"version": "classic 2015.006.30094"
},
{
"model": "acrobat",
"scope": "lt",
"trust": 0.8,
"vendor": "adobe",
"version": "11.x (windows/macintosh)"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.8,
"vendor": "adobe",
"version": "xi desktop 11.0.13"
},
{
"model": "reader",
"scope": "lt",
"trust": 0.8,
"vendor": "adobe",
"version": "11.x (windows/macintosh)"
},
{
"model": "acrobat dc",
"scope": "eq",
"trust": 0.8,
"vendor": "adobe",
"version": "continuous 2015.009.20069"
},
{
"model": "acrobat",
"scope": "lt",
"trust": 0.8,
"vendor": "adobe",
"version": "10.x (windows/macintosh)"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.8,
"vendor": "adobe",
"version": "xi desktop 11.0.13"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.8,
"vendor": "adobe",
"version": "x desktop 10.1.16"
},
{
"model": "acrobat dc",
"scope": "eq",
"trust": 0.8,
"vendor": "adobe",
"version": "classic 2015.006.30094"
},
{
"model": "reader",
"scope": "lt",
"trust": 0.8,
"vendor": "adobe",
"version": "10.x (windows/macintosh)"
},
{
"model": "acrobat reader dc",
"scope": "eq",
"trust": 0.8,
"vendor": "adobe",
"version": "continuous 2015.009.20069"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.8,
"vendor": "adobe",
"version": "x desktop 10.1.16"
},
{
"model": "acrobat reader dc",
"scope": null,
"trust": 0.7,
"vendor": "adobe",
"version": null
},
{
"model": "acrobat reader",
"scope": "eq",
"trust": 0.6,
"vendor": "adobe",
"version": "11.0.8"
},
{
"model": "acrobat reader",
"scope": "eq",
"trust": 0.6,
"vendor": "adobe",
"version": "11.0.10"
},
{
"model": "acrobat reader",
"scope": "eq",
"trust": 0.6,
"vendor": "adobe",
"version": "11.0.11"
},
{
"model": "acrobat reader",
"scope": "eq",
"trust": 0.6,
"vendor": "adobe",
"version": "10.1.14"
},
{
"model": "acrobat reader",
"scope": "eq",
"trust": 0.6,
"vendor": "adobe",
"version": "11.0.7"
},
{
"model": "acrobat reader",
"scope": "eq",
"trust": 0.6,
"vendor": "adobe",
"version": "11.0.5"
},
{
"model": "acrobat reader",
"scope": "eq",
"trust": 0.6,
"vendor": "adobe",
"version": "11.0.6"
},
{
"model": "acrobat reader",
"scope": "eq",
"trust": 0.6,
"vendor": "adobe",
"version": "11.0.4"
},
{
"model": "acrobat reader",
"scope": "eq",
"trust": 0.6,
"vendor": "adobe",
"version": "11.0.9"
},
{
"model": "acrobat reader",
"scope": "eq",
"trust": 0.6,
"vendor": "adobe",
"version": "11.0.12"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1.3"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1.2"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1.1"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.0.3"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.0.2"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.0.1"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.0"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1.3"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1.2"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1.1"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.0.3"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.0.2"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.0.1"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.0"
}
],
"sources": [
{
"db": "ZDI",
"id": "ZDI-15-467"
},
{
"db": "BID",
"id": "77069"
},
{
"db": "JVNDB",
"id": "JVNDB-2015-005242"
},
{
"db": "CNNVD",
"id": "CNNVD-201510-198"
},
{
"db": "NVD",
"id": "CVE-2015-6685"
}
]
},
"configurations": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/configurations#",
"children": {
"@container": "@list"
},
"cpe_match": {
"@container": "@list"
},
"data": {
"@container": "@list"
},
"nodes": {
"@container": "@list"
}
},
"data": [
{
"CVE_data_version": "4.0",
"nodes": [
{
"cpe_match": [
{
"cpe22Uri": "cpe:/a:adobe:acrobat",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/a:adobe:acrobat_dc",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/a:adobe:acrobat_reader_dc",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/a:adobe:acrobat_reader",
"vulnerable": true
}
],
"operator": "OR"
}
]
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2015-005242"
}
]
},
"credits": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/credits#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "AbdulAziz Hariri - HP Zero Day Initiative",
"sources": [
{
"db": "ZDI",
"id": "ZDI-15-467"
}
],
"trust": 0.7
},
"cve": "CVE-2015-6685",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [
{
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "nvd@nist.gov",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 8.6,
"id": "CVE-2015-6685",
"impactScore": 6.4,
"integrityImpact": "PARTIAL",
"severity": "MEDIUM",
"trust": 1.7,
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
{
"acInsufInfo": null,
"accessComplexity": "Medium",
"accessVector": "Network",
"authentication": "None",
"author": "NVD",
"availabilityImpact": "Complete",
"baseScore": 9.3,
"confidentialityImpact": "Complete",
"exploitabilityScore": null,
"id": "CVE-2015-6685",
"impactScore": null,
"integrityImpact": "Complete",
"obtainAllPrivilege": null,
"obtainOtherPrivilege": null,
"obtainUserPrivilege": null,
"severity": "High",
"trust": 0.8,
"userInteractionRequired": null,
"vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
{
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "VULHUB",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 8.6,
"id": "VHN-84646",
"impactScore": 6.4,
"integrityImpact": "PARTIAL",
"severity": "MEDIUM",
"trust": 0.1,
"vectorString": "AV:N/AC:M/AU:N/C:P/I:P/A:P",
"version": "2.0"
}
],
"cvssV3": [],
"severity": [
{
"author": "nvd@nist.gov",
"id": "CVE-2015-6685",
"trust": 1.0,
"value": "MEDIUM"
},
{
"author": "NVD",
"id": "CVE-2015-6685",
"trust": 0.8,
"value": "High"
},
{
"author": "ZDI",
"id": "CVE-2015-6685",
"trust": 0.7,
"value": "MEDIUM"
},
{
"author": "CNNVD",
"id": "CNNVD-201510-198",
"trust": 0.6,
"value": "CRITICAL"
},
{
"author": "VULHUB",
"id": "VHN-84646",
"trust": 0.1,
"value": "MEDIUM"
}
]
}
],
"sources": [
{
"db": "ZDI",
"id": "ZDI-15-467"
},
{
"db": "VULHUB",
"id": "VHN-84646"
},
{
"db": "JVNDB",
"id": "JVNDB-2015-005242"
},
{
"db": "CNNVD",
"id": "CNNVD-201510-198"
},
{
"db": "NVD",
"id": "CVE-2015-6685"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Adobe Reader and Acrobat 10.x before 10.1.16 and 11.x before 11.0.13, Acrobat and Acrobat Reader DC Classic before 2015.006.30094, and Acrobat and Acrobat Reader DC Continuous before 2015.009.20069 on Windows and OS X allow attackers to execute arbitrary code or cause a denial of service (memory corruption) by using the Format action for unspecified fields, a different vulnerability than CVE-2015-6686, CVE-2015-6693, CVE-2015-6694, CVE-2015-6695, and CVE-2015-7622. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The flaw exists within the handling of fields. A specially crafted PDF with specific fields with the Format action can force a dangling pointer to be reused after it has been freed. An attacker can leverage this vulnerability to execute code under the context of the current process. Adobe Acrobat and Reader are prone to multiple memory-corruption vulnerabilities. Failed exploit attempts will likely cause a denial-of-service condition. Adobe Reader, etc. are all products of Adobe (Adobe) in the United States. Adobe Reader is a free PDF file reader; Acrobat is a PDF file editing and conversion tool; Acrobat Reader DC is a set of tools for viewing, printing and annotating PDF. Classic and Continuous are two update mechanisms provided by Acrobat Reader DC Product Download Center. Security flaws exist in several Adobe products. 30060 and earlier, Acrobat XI Desktop 11.0.12 and earlier, Reader XI Desktop 11.0.12 and earlier, Acrobat X Desktop 10.1.15 and earlier, Reader X Desktop 10.1.15 and earlier",
"sources": [
{
"db": "NVD",
"id": "CVE-2015-6685"
},
{
"db": "JVNDB",
"id": "JVNDB-2015-005242"
},
{
"db": "ZDI",
"id": "ZDI-15-467"
},
{
"db": "BID",
"id": "77069"
},
{
"db": "VULHUB",
"id": "VHN-84646"
}
],
"trust": 2.61
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "NVD",
"id": "CVE-2015-6685",
"trust": 3.5
},
{
"db": "ZDI",
"id": "ZDI-15-467",
"trust": 2.7
},
{
"db": "SECTRACK",
"id": "1033796",
"trust": 1.7
},
{
"db": "JVNDB",
"id": "JVNDB-2015-005242",
"trust": 0.8
},
{
"db": "ZDI_CAN",
"id": "ZDI-CAN-2816",
"trust": 0.7
},
{
"db": "CNNVD",
"id": "CNNVD-201510-198",
"trust": 0.7
},
{
"db": "ZDI",
"id": "ZDI-15-471",
"trust": 0.3
},
{
"db": "ZDI",
"id": "ZDI-15-466",
"trust": 0.3
},
{
"db": "ZDI",
"id": "ZDI-15-472",
"trust": 0.3
},
{
"db": "ZDI",
"id": "ZDI-15-473",
"trust": 0.3
},
{
"db": "BID",
"id": "77069",
"trust": 0.3
},
{
"db": "VULHUB",
"id": "VHN-84646",
"trust": 0.1
}
],
"sources": [
{
"db": "ZDI",
"id": "ZDI-15-467"
},
{
"db": "VULHUB",
"id": "VHN-84646"
},
{
"db": "BID",
"id": "77069"
},
{
"db": "JVNDB",
"id": "JVNDB-2015-005242"
},
{
"db": "CNNVD",
"id": "CNNVD-201510-198"
},
{
"db": "NVD",
"id": "CVE-2015-6685"
}
]
},
"id": "VAR-201510-0356",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "VULHUB",
"id": "VHN-84646"
}
],
"trust": 0.01
},
"last_update_date": "2025-04-13T23:03:48.460000Z",
"patch": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/patch#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"title": "APSB15-24",
"trust": 1.5,
"url": "https://helpx.adobe.com/security/products/acrobat/apsb15-24.html"
},
{
"title": "APSB15-24",
"trust": 0.8,
"url": "https://helpx.adobe.com/jp/security/products/reader/apsb15-24.html"
},
{
"title": "\u30a2\u30c9\u30d3 \u30b7\u30b9\u30c6\u30e0\u30ba\u793e Adobe Reader \u306e\u8106\u5f31\u6027\u306b\u95a2\u3059\u308b\u304a\u77e5\u3089\u305b",
"trust": 0.8,
"url": "http://www.fmworld.net/biz/common/adobe/20151015.html"
},
{
"title": "Multiple Adobe Product Buffer Overflow Vulnerability Fix",
"trust": 0.6,
"url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=58047"
}
],
"sources": [
{
"db": "ZDI",
"id": "ZDI-15-467"
},
{
"db": "JVNDB",
"id": "JVNDB-2015-005242"
},
{
"db": "CNNVD",
"id": "CNNVD-201510-198"
}
]
},
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "CWE-119",
"trust": 1.9
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-84646"
},
{
"db": "JVNDB",
"id": "JVNDB-2015-005242"
},
{
"db": "NVD",
"id": "CVE-2015-6685"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 2.7,
"url": "https://helpx.adobe.com/security/products/acrobat/apsb15-24.html"
},
{
"trust": 1.7,
"url": "http://www.zerodayinitiative.com/advisories/zdi-15-467"
},
{
"trust": 1.7,
"url": "http://www.securitytracker.com/id/1033796"
},
{
"trust": 0.8,
"url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-6685"
},
{
"trust": 0.8,
"url": "http://www.ipa.go.jp/security/ciadr/vul/20151014-adobereader.html"
},
{
"trust": 0.8,
"url": "http://www.jpcert.or.jp/at/2015/at150035.html"
},
{
"trust": 0.8,
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2015-6685"
},
{
"trust": 0.8,
"url": "http://www.npa.go.jp/cyberpolice/topics/?seq=17022"
},
{
"trust": 0.3,
"url": "http://www.adobe.com"
},
{
"trust": 0.3,
"url": "http://www.zerodayinitiative.com/advisories/zdi-15-467/"
},
{
"trust": 0.3,
"url": "http://www.zerodayinitiative.com/advisories/zdi-15-466/"
},
{
"trust": 0.3,
"url": "http://www.zerodayinitiative.com/advisories/zdi-15-473/"
},
{
"trust": 0.3,
"url": "http://www.zerodayinitiative.com/advisories/zdi-15-471/"
},
{
"trust": 0.3,
"url": "http://www.zerodayinitiative.com/advisories/zdi-15-472/"
}
],
"sources": [
{
"db": "ZDI",
"id": "ZDI-15-467"
},
{
"db": "VULHUB",
"id": "VHN-84646"
},
{
"db": "BID",
"id": "77069"
},
{
"db": "JVNDB",
"id": "JVNDB-2015-005242"
},
{
"db": "CNNVD",
"id": "CNNVD-201510-198"
},
{
"db": "NVD",
"id": "CVE-2015-6685"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "ZDI",
"id": "ZDI-15-467"
},
{
"db": "VULHUB",
"id": "VHN-84646"
},
{
"db": "BID",
"id": "77069"
},
{
"db": "JVNDB",
"id": "JVNDB-2015-005242"
},
{
"db": "CNNVD",
"id": "CNNVD-201510-198"
},
{
"db": "NVD",
"id": "CVE-2015-6685"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2015-10-13T00:00:00",
"db": "ZDI",
"id": "ZDI-15-467"
},
{
"date": "2015-10-14T00:00:00",
"db": "VULHUB",
"id": "VHN-84646"
},
{
"date": "2015-10-13T00:00:00",
"db": "BID",
"id": "77069"
},
{
"date": "2015-10-16T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2015-005242"
},
{
"date": "2015-10-15T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201510-198"
},
{
"date": "2015-10-14T23:59:06.530000",
"db": "NVD",
"id": "CVE-2015-6685"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2015-10-13T00:00:00",
"db": "ZDI",
"id": "ZDI-15-467"
},
{
"date": "2020-05-18T00:00:00",
"db": "VULHUB",
"id": "VHN-84646"
},
{
"date": "2015-11-03T19:59:00",
"db": "BID",
"id": "77069"
},
{
"date": "2015-10-16T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2015-005242"
},
{
"date": "2020-05-19T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201510-198"
},
{
"date": "2025-04-12T10:46:40.837000",
"db": "NVD",
"id": "CVE-2015-6685"
}
]
},
"threat_type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/threat_type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "remote",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201510-198"
}
],
"trust": 0.6
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Windows and Mac OS X Run on Adobe Reader and Acrobat Vulnerable to arbitrary code execution",
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2015-005242"
}
],
"trust": 0.8
},
"type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "buffer error",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201510-198"
}
],
"trust": 0.6
}
}
VAR-201510-0341
Vulnerability from variot - Updated: 2025-04-13 23:03The ANSendForApproval method in Adobe Reader and Acrobat 10.x before 10.1.16 and 11.x before 11.0.13, Acrobat and Acrobat Reader DC Classic before 2015.006.30094, and Acrobat and Acrobat Reader DC Continuous before 2015.009.20069 on Windows and OS X allows attackers to bypass JavaScript API execution restrictions via unspecified vectors, a different vulnerability than CVE-2015-6707, CVE-2015-6708, CVE-2015-6709, CVE-2015-6710, CVE-2015-6711, CVE-2015-6712, CVE-2015-6713, CVE-2015-6714, CVE-2015-6715, CVE-2015-6716, CVE-2015-6717, CVE-2015-6718, CVE-2015-6719, CVE-2015-6720, CVE-2015-6721, CVE-2015-6722, CVE-2015-6723, CVE-2015-6725, CVE-2015-7614, CVE-2015-7616, CVE-2015-7618, CVE-2015-7619, CVE-2015-7620, and CVE-2015-7623. This vulnerability CVE-2015-6707 , CVE-2015-6708 , CVE-2015-6709 , CVE-2015-6710 , CVE-2015-6711 , CVE-2015-6712 , CVE-2015-6713 , CVE-2015-6714 , CVE-2015-6715 , CVE-2015-6716 , CVE-2015-6717 , CVE-2015-6718 , CVE-2015-6719 , CVE-2015-6720 , CVE-2015-6721 , CVE-2015-6722 , CVE-2015-6723 , CVE-2015-6725 , CVE-2015-7614 , CVE-2015-7616 , CVE-2015-7618 , CVE-2015-7619 , CVE-2015-7620 ,and CVE-2015-7623 Is a different vulnerability.By the attacker, JavaScript API Execution restrictions may be avoided. This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Adobe Reader DC. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the ANSendForApproval method. By creating a specially crafted PDF with specific Javascript instructions, it is possible to bypass the Javascript API restrictions. A remote attacker could exploit this vulnerability to execute arbitrary code. Adobe Acrobat and Reader are prone to multiple security-bypass vulnerabilities. An attacker can exploit these issues to bypass certain security restrictions and perform unauthorized actions. This may lead to further attacks. Adobe Reader, etc. are all products of Adobe (Adobe) in the United States. Adobe Reader is a free PDF file reader; Acrobat is a PDF file editing and conversion tool; Acrobat Reader DC is a set of tools for viewing, printing and annotating PDF. Classic and Continuous are two update mechanisms provided by Acrobat Reader DC Product Download Center. A security vulnerability exists in the ANSendForApproval method of several Adobe products. 30060 and earlier, Acrobat XI Desktop 11.0.12 and earlier, Reader XI Desktop 11.0.12 and earlier, Acrobat X Desktop 10.1.15 and earlier, Reader X Desktop 10.1.15 and earlier
Show details on source website{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"configurations": {
"@id": "https://www.variotdbs.pl/ref/configurations"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-201510-0341",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "acrobat reader dc",
"scope": "gte",
"trust": 1.0,
"vendor": "adobe",
"version": "15.008.20082"
},
{
"model": "acrobat dc",
"scope": "gte",
"trust": 1.0,
"vendor": "adobe",
"version": "15.008.20082"
},
{
"model": "acrobat dc",
"scope": "gte",
"trust": 1.0,
"vendor": "adobe",
"version": "15.006.30060"
},
{
"model": "acrobat reader dc",
"scope": "lt",
"trust": 1.0,
"vendor": "adobe",
"version": "15.009.20069"
},
{
"model": "acrobat dc",
"scope": "lt",
"trust": 1.0,
"vendor": "adobe",
"version": "15.006.30094"
},
{
"model": "acrobat",
"scope": "gte",
"trust": 1.0,
"vendor": "adobe",
"version": "10.0"
},
{
"model": "acrobat reader",
"scope": "lte",
"trust": 1.0,
"vendor": "adobe",
"version": "10.1.15"
},
{
"model": "acrobat reader",
"scope": "gte",
"trust": 1.0,
"vendor": "adobe",
"version": "10.0"
},
{
"model": "acrobat reader",
"scope": "lte",
"trust": 1.0,
"vendor": "adobe",
"version": "11.0.12"
},
{
"model": "acrobat",
"scope": "lte",
"trust": 1.0,
"vendor": "adobe",
"version": "10.1.15"
},
{
"model": "acrobat",
"scope": "lte",
"trust": 1.0,
"vendor": "adobe",
"version": "11.0.12"
},
{
"model": "acrobat reader dc",
"scope": "lt",
"trust": 1.0,
"vendor": "adobe",
"version": "15.006.30094"
},
{
"model": "acrobat",
"scope": "gte",
"trust": 1.0,
"vendor": "adobe",
"version": "11.0.0"
},
{
"model": "acrobat dc",
"scope": "lt",
"trust": 1.0,
"vendor": "adobe",
"version": "15.009.20069"
},
{
"model": "acrobat reader",
"scope": "gte",
"trust": 1.0,
"vendor": "adobe",
"version": "11.0.0"
},
{
"model": "acrobat reader dc",
"scope": "gte",
"trust": 1.0,
"vendor": "adobe",
"version": "15.006.30060"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.9,
"vendor": "adobe",
"version": "10.1.14"
},
{
"model": "acrobat dc",
"scope": "eq",
"trust": 0.9,
"vendor": "adobe",
"version": "2015.008.20082"
},
{
"model": "acrobat dc",
"scope": "lt",
"trust": 0.8,
"vendor": "adobe",
"version": "(windows/macintosh)"
},
{
"model": "acrobat reader dc",
"scope": "lt",
"trust": 0.8,
"vendor": "adobe",
"version": "(windows/macintosh)"
},
{
"model": "acrobat reader dc",
"scope": "eq",
"trust": 0.8,
"vendor": "adobe",
"version": "classic 2015.006.30094"
},
{
"model": "acrobat",
"scope": "lt",
"trust": 0.8,
"vendor": "adobe",
"version": "11.x (windows/macintosh)"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.8,
"vendor": "adobe",
"version": "xi desktop 11.0.13"
},
{
"model": "reader",
"scope": "lt",
"trust": 0.8,
"vendor": "adobe",
"version": "11.x (windows/macintosh)"
},
{
"model": "acrobat dc",
"scope": "eq",
"trust": 0.8,
"vendor": "adobe",
"version": "continuous 2015.009.20069"
},
{
"model": "acrobat",
"scope": "lt",
"trust": 0.8,
"vendor": "adobe",
"version": "10.x (windows/macintosh)"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.8,
"vendor": "adobe",
"version": "xi desktop 11.0.13"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.8,
"vendor": "adobe",
"version": "x desktop 10.1.16"
},
{
"model": "acrobat dc",
"scope": "eq",
"trust": 0.8,
"vendor": "adobe",
"version": "classic 2015.006.30094"
},
{
"model": "reader",
"scope": "lt",
"trust": 0.8,
"vendor": "adobe",
"version": "10.x (windows/macintosh)"
},
{
"model": "acrobat reader dc",
"scope": "eq",
"trust": 0.8,
"vendor": "adobe",
"version": "continuous 2015.009.20069"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.8,
"vendor": "adobe",
"version": "x desktop 10.1.16"
},
{
"model": "acrobat reader dc",
"scope": null,
"trust": 0.7,
"vendor": "adobe",
"version": null
},
{
"model": "acrobat reader",
"scope": "eq",
"trust": 0.6,
"vendor": "adobe",
"version": "11.0.10"
},
{
"model": "acrobat reader",
"scope": "eq",
"trust": 0.6,
"vendor": "adobe",
"version": "11.0.11"
},
{
"model": "acrobat reader",
"scope": "eq",
"trust": 0.6,
"vendor": "adobe",
"version": "10.1.14"
},
{
"model": "acrobat reader",
"scope": "eq",
"trust": 0.6,
"vendor": "adobe",
"version": "11.0.7"
},
{
"model": "acrobat reader dc",
"scope": "eq",
"trust": 0.6,
"vendor": "adobe",
"version": "2015.006.30060"
},
{
"model": "acrobat reader dc",
"scope": "eq",
"trust": 0.6,
"vendor": "adobe",
"version": "2015.008.20082"
},
{
"model": "acrobat reader",
"scope": "eq",
"trust": 0.6,
"vendor": "adobe",
"version": "11.0.9"
},
{
"model": "acrobat reader",
"scope": "eq",
"trust": 0.6,
"vendor": "adobe",
"version": "11.0.12"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1.9"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1.1"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1.13"
},
{
"model": "acrobat reader dc",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "2015.8.20082"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.10"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.0"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1.2"
},
{
"model": "acrobat dc",
"scope": "ne",
"trust": 0.3,
"vendor": "adobe",
"version": "2015.006.30094"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1.15"
},
{
"model": "acrobat reader dc",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "2015.6.30060"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.0.3"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1.10"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.3"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.0.13"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.6"
},
{
"model": "acrobat",
"scope": "ne",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.13"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0"
},
{
"model": "acrobat reader dc",
"scope": "ne",
"trust": 0.3,
"vendor": "adobe",
"version": "2015.006.30094"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.10"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.4"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1.3"
},
{
"model": "acrobat",
"scope": "ne",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1.16"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.0.2"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.0.1"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.11"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1.4"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1.6"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1.11"
},
{
"model": "reader",
"scope": "ne",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.13"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.7"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1.14"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1.3"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1.1"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1"
},
{
"model": "reader",
"scope": "ne",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1.16"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.0.2"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1.5"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.0"
},
{
"model": "acrobat dc",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "2015.007.20033"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1.12"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.1"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1.2"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1.13"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1.4"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1.8"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1.11"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.0.3"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.2"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.12"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.08"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.9"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.7"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.6"
},
{
"model": "acrobat dc",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "2015.006.30060"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.05"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1.10"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.09"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.3"
},
{
"model": "acrobat dc",
"scope": "ne",
"trust": 0.3,
"vendor": "adobe",
"version": "2015.009.20069"
},
{
"model": "acrobat dc",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "2015.006.30033"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1.12"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.1"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.4"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1.9"
},
{
"model": "acrobat reader dc",
"scope": "ne",
"trust": 0.3,
"vendor": "adobe",
"version": "2015.009.20069"
},
{
"model": "acrobat reader dc",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "2015.006.30033"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.12"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.08"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1.7"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.0.1"
},
{
"model": "acrobat reader dc",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "2015.007.20033"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.09"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.11"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1.15"
}
],
"sources": [
{
"db": "ZDI",
"id": "ZDI-15-495"
},
{
"db": "BID",
"id": "77074"
},
{
"db": "JVNDB",
"id": "JVNDB-2015-005281"
},
{
"db": "CNNVD",
"id": "CNNVD-201510-237"
},
{
"db": "NVD",
"id": "CVE-2015-6724"
}
]
},
"configurations": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/configurations#",
"children": {
"@container": "@list"
},
"cpe_match": {
"@container": "@list"
},
"data": {
"@container": "@list"
},
"nodes": {
"@container": "@list"
}
},
"data": [
{
"CVE_data_version": "4.0",
"nodes": [
{
"cpe_match": [
{
"cpe22Uri": "cpe:/a:adobe:acrobat",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/a:adobe:acrobat_dc",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/a:adobe:acrobat_reader_dc",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/a:adobe:acrobat_reader",
"vulnerable": true
}
],
"operator": "OR"
}
]
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2015-005281"
}
]
},
"credits": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/credits#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Matt Molinyawe and Jasiel Spelman of HP Zero Day Initiative",
"sources": [
{
"db": "ZDI",
"id": "ZDI-15-495"
}
],
"trust": 0.7
},
"cve": "CVE-2015-6724",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [
{
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "nvd@nist.gov",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 8.6,
"id": "CVE-2015-6724",
"impactScore": 6.4,
"integrityImpact": "PARTIAL",
"severity": "MEDIUM",
"trust": 1.7,
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
{
"acInsufInfo": null,
"accessComplexity": "Medium",
"accessVector": "Network",
"authentication": "None",
"author": "NVD",
"availabilityImpact": "Complete",
"baseScore": 9.3,
"confidentialityImpact": "Complete",
"exploitabilityScore": null,
"id": "CVE-2015-6724",
"impactScore": null,
"integrityImpact": "Complete",
"obtainAllPrivilege": null,
"obtainOtherPrivilege": null,
"obtainUserPrivilege": null,
"severity": "High",
"trust": 0.8,
"userInteractionRequired": null,
"vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
{
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "VULHUB",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 8.6,
"id": "VHN-84685",
"impactScore": 6.4,
"integrityImpact": "PARTIAL",
"severity": "MEDIUM",
"trust": 0.1,
"vectorString": "AV:N/AC:M/AU:N/C:P/I:P/A:P",
"version": "2.0"
}
],
"cvssV3": [],
"severity": [
{
"author": "nvd@nist.gov",
"id": "CVE-2015-6724",
"trust": 1.0,
"value": "MEDIUM"
},
{
"author": "NVD",
"id": "CVE-2015-6724",
"trust": 0.8,
"value": "High"
},
{
"author": "ZDI",
"id": "CVE-2015-6724",
"trust": 0.7,
"value": "MEDIUM"
},
{
"author": "CNNVD",
"id": "CNNVD-201510-237",
"trust": 0.6,
"value": "CRITICAL"
},
{
"author": "VULHUB",
"id": "VHN-84685",
"trust": 0.1,
"value": "MEDIUM"
}
]
}
],
"sources": [
{
"db": "ZDI",
"id": "ZDI-15-495"
},
{
"db": "VULHUB",
"id": "VHN-84685"
},
{
"db": "JVNDB",
"id": "JVNDB-2015-005281"
},
{
"db": "CNNVD",
"id": "CNNVD-201510-237"
},
{
"db": "NVD",
"id": "CVE-2015-6724"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "The ANSendForApproval method in Adobe Reader and Acrobat 10.x before 10.1.16 and 11.x before 11.0.13, Acrobat and Acrobat Reader DC Classic before 2015.006.30094, and Acrobat and Acrobat Reader DC Continuous before 2015.009.20069 on Windows and OS X allows attackers to bypass JavaScript API execution restrictions via unspecified vectors, a different vulnerability than CVE-2015-6707, CVE-2015-6708, CVE-2015-6709, CVE-2015-6710, CVE-2015-6711, CVE-2015-6712, CVE-2015-6713, CVE-2015-6714, CVE-2015-6715, CVE-2015-6716, CVE-2015-6717, CVE-2015-6718, CVE-2015-6719, CVE-2015-6720, CVE-2015-6721, CVE-2015-6722, CVE-2015-6723, CVE-2015-6725, CVE-2015-7614, CVE-2015-7616, CVE-2015-7618, CVE-2015-7619, CVE-2015-7620, and CVE-2015-7623. This vulnerability CVE-2015-6707 , CVE-2015-6708 , CVE-2015-6709 , CVE-2015-6710 , CVE-2015-6711 , CVE-2015-6712 , CVE-2015-6713 , CVE-2015-6714 , CVE-2015-6715 , CVE-2015-6716 , CVE-2015-6717 , CVE-2015-6718 , CVE-2015-6719 , CVE-2015-6720 , CVE-2015-6721 , CVE-2015-6722 , CVE-2015-6723 , CVE-2015-6725 , CVE-2015-7614 , CVE-2015-7616 , CVE-2015-7618 , CVE-2015-7619 , CVE-2015-7620 ,and CVE-2015-7623 Is a different vulnerability.By the attacker, JavaScript API Execution restrictions may be avoided. This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Adobe Reader DC. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the ANSendForApproval method. By creating a specially crafted PDF with specific Javascript instructions, it is possible to bypass the Javascript API restrictions. A remote attacker could exploit this vulnerability to execute arbitrary code. Adobe Acrobat and Reader are prone to multiple security-bypass vulnerabilities. \nAn attacker can exploit these issues to bypass certain security restrictions and perform unauthorized actions. This may lead to further attacks. Adobe Reader, etc. are all products of Adobe (Adobe) in the United States. Adobe Reader is a free PDF file reader; Acrobat is a PDF file editing and conversion tool; Acrobat Reader DC is a set of tools for viewing, printing and annotating PDF. Classic and Continuous are two update mechanisms provided by Acrobat Reader DC Product Download Center. A security vulnerability exists in the ANSendForApproval method of several Adobe products. 30060 and earlier, Acrobat XI Desktop 11.0.12 and earlier, Reader XI Desktop 11.0.12 and earlier, Acrobat X Desktop 10.1.15 and earlier, Reader X Desktop 10.1.15 and earlier",
"sources": [
{
"db": "NVD",
"id": "CVE-2015-6724"
},
{
"db": "JVNDB",
"id": "JVNDB-2015-005281"
},
{
"db": "ZDI",
"id": "ZDI-15-495"
},
{
"db": "BID",
"id": "77074"
},
{
"db": "VULHUB",
"id": "VHN-84685"
}
],
"trust": 2.61
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "NVD",
"id": "CVE-2015-6724",
"trust": 3.5
},
{
"db": "ZDI",
"id": "ZDI-15-495",
"trust": 2.4
},
{
"db": "SECTRACK",
"id": "1033796",
"trust": 1.7
},
{
"db": "JVNDB",
"id": "JVNDB-2015-005281",
"trust": 0.8
},
{
"db": "ZDI_CAN",
"id": "ZDI-CAN-3079",
"trust": 0.7
},
{
"db": "CNNVD",
"id": "CNNVD-201510-237",
"trust": 0.7
},
{
"db": "BID",
"id": "77074",
"trust": 0.3
},
{
"db": "VULHUB",
"id": "VHN-84685",
"trust": 0.1
}
],
"sources": [
{
"db": "ZDI",
"id": "ZDI-15-495"
},
{
"db": "VULHUB",
"id": "VHN-84685"
},
{
"db": "BID",
"id": "77074"
},
{
"db": "JVNDB",
"id": "JVNDB-2015-005281"
},
{
"db": "CNNVD",
"id": "CNNVD-201510-237"
},
{
"db": "NVD",
"id": "CVE-2015-6724"
}
]
},
"id": "VAR-201510-0341",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "VULHUB",
"id": "VHN-84685"
}
],
"trust": 0.01
},
"last_update_date": "2025-04-13T23:03:48.422000Z",
"patch": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/patch#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"title": "APSB15-24",
"trust": 1.5,
"url": "https://helpx.adobe.com/security/products/acrobat/apsb15-24.html"
},
{
"title": "APSB15-24",
"trust": 0.8,
"url": "https://helpx.adobe.com/jp/security/products/reader/apsb15-24.html"
},
{
"title": "\u30a2\u30c9\u30d3 \u30b7\u30b9\u30c6\u30e0\u30ba\u793e Adobe Reader \u306e\u8106\u5f31\u6027\u306b\u95a2\u3059\u308b\u304a\u77e5\u3089\u305b",
"trust": 0.8,
"url": "http://www.fmworld.net/biz/common/adobe/20151015.html"
},
{
"title": "Multiple Adobe Product Privilege License and Access Control Vulnerability Fixes",
"trust": 0.6,
"url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=58086"
}
],
"sources": [
{
"db": "ZDI",
"id": "ZDI-15-495"
},
{
"db": "JVNDB",
"id": "JVNDB-2015-005281"
},
{
"db": "CNNVD",
"id": "CNNVD-201510-237"
}
]
},
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "NVD-CWE-noinfo",
"trust": 1.0
},
{
"problemtype": "CWE-264",
"trust": 0.9
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-84685"
},
{
"db": "JVNDB",
"id": "JVNDB-2015-005281"
},
{
"db": "NVD",
"id": "CVE-2015-6724"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 2.4,
"url": "https://helpx.adobe.com/security/products/acrobat/apsb15-24.html"
},
{
"trust": 1.7,
"url": "http://www.zerodayinitiative.com/advisories/zdi-15-495"
},
{
"trust": 1.7,
"url": "http://www.securitytracker.com/id/1033796"
},
{
"trust": 0.8,
"url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-6724"
},
{
"trust": 0.8,
"url": "http://www.ipa.go.jp/security/ciadr/vul/20151014-adobereader.html"
},
{
"trust": 0.8,
"url": "http://www.jpcert.or.jp/at/2015/at150035.html"
},
{
"trust": 0.8,
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2015-6724"
},
{
"trust": 0.8,
"url": "http://www.npa.go.jp/cyberpolice/topics/?seq=17022"
},
{
"trust": 0.3,
"url": "http://www.adobe.com"
}
],
"sources": [
{
"db": "ZDI",
"id": "ZDI-15-495"
},
{
"db": "VULHUB",
"id": "VHN-84685"
},
{
"db": "BID",
"id": "77074"
},
{
"db": "JVNDB",
"id": "JVNDB-2015-005281"
},
{
"db": "CNNVD",
"id": "CNNVD-201510-237"
},
{
"db": "NVD",
"id": "CVE-2015-6724"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "ZDI",
"id": "ZDI-15-495"
},
{
"db": "VULHUB",
"id": "VHN-84685"
},
{
"db": "BID",
"id": "77074"
},
{
"db": "JVNDB",
"id": "JVNDB-2015-005281"
},
{
"db": "CNNVD",
"id": "CNNVD-201510-237"
},
{
"db": "NVD",
"id": "CVE-2015-6724"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2015-10-13T00:00:00",
"db": "ZDI",
"id": "ZDI-15-495"
},
{
"date": "2015-10-14T00:00:00",
"db": "VULHUB",
"id": "VHN-84685"
},
{
"date": "2015-10-13T00:00:00",
"db": "BID",
"id": "77074"
},
{
"date": "2015-10-16T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2015-005281"
},
{
"date": "2015-10-15T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201510-237"
},
{
"date": "2015-10-14T23:59:45.870000",
"db": "NVD",
"id": "CVE-2015-6724"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2015-10-13T00:00:00",
"db": "ZDI",
"id": "ZDI-15-495"
},
{
"date": "2020-05-18T00:00:00",
"db": "VULHUB",
"id": "VHN-84685"
},
{
"date": "2015-11-03T19:59:00",
"db": "BID",
"id": "77074"
},
{
"date": "2015-10-16T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2015-005281"
},
{
"date": "2020-05-19T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201510-237"
},
{
"date": "2025-04-12T10:46:40.837000",
"db": "NVD",
"id": "CVE-2015-6724"
}
]
},
"threat_type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/threat_type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "remote",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201510-237"
}
],
"trust": 0.6
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Windows and Mac OS X Run on Adobe Reader and Acrobat of ANSendForApproval In the method JavaScript API Vulnerability that circumvents execution restrictions",
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2015-005281"
}
],
"trust": 0.8
},
"type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "permissions and access control issues",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201510-237"
}
],
"trust": 0.6
}
}
VAR-201510-0360
Vulnerability from variot - Updated: 2025-04-13 23:03Use-after-free vulnerability in Adobe Reader and Acrobat 10.x before 10.1.16 and 11.x before 11.0.13, Acrobat and Acrobat Reader DC Classic before 2015.006.30094, and Acrobat and Acrobat Reader DC Continuous before 2015.009.20069 on Windows and OS X allows attackers to execute arbitrary code via a crafted WillSave document action, a different vulnerability than CVE-2015-5586, CVE-2015-6683, CVE-2015-6684, CVE-2015-6687, CVE-2015-6688, CVE-2015-6690, CVE-2015-6691, CVE-2015-7615, CVE-2015-7617, and CVE-2015-7621. This vulnerability CVE-2015-5586 , CVE-2015-6683 , CVE-2015-6684 , CVE-2015-6687 , CVE-2015-6688 , CVE-2015-6690 , CVE-2015-6691 , CVE-2015-7615 , CVE-2015-7617 ,and CVE-2015-7621 Is a different vulnerability. Supplementary information : CWE Vulnerability type by CWE-416: Use-after-free ( Use of freed memory ) Has been identified. http://cwe.mitre.org/data/definitions/416.htmlCrafted by attackers WillSave document An arbitrary code may be executed through an action. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the handling of the WillSave document action. A specially crafted WillSave document action can force a dangling pointer to be reused after it has been freed. Adobe Acrobat and Reader are prone to multiple remote code-execution vulnerabilities. Failed exploit attempts will likely cause a denial-of-service condition. Adobe Reader, etc. are all products of Adobe (Adobe) in the United States. Adobe Reader is a free PDF file reader; Acrobat is a PDF file editing and conversion tool; Acrobat Reader DC is a set of tools for viewing, printing and annotating PDF. A use-after-free vulnerability exists in several Adobe products. 30060 and earlier, Acrobat XI Desktop 11.0.12 and earlier, Reader XI Desktop 11.0.12 and earlier, Acrobat X Desktop 10.1.15 and earlier, Reader X Desktop 10.1.15 and earlier
Show details on source website{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"configurations": {
"@id": "https://www.variotdbs.pl/ref/configurations"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-201510-0360",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "acrobat reader dc",
"scope": "gte",
"trust": 1.0,
"vendor": "adobe",
"version": "15.008.20082"
},
{
"model": "acrobat dc",
"scope": "gte",
"trust": 1.0,
"vendor": "adobe",
"version": "15.008.20082"
},
{
"model": "acrobat dc",
"scope": "gte",
"trust": 1.0,
"vendor": "adobe",
"version": "15.006.30060"
},
{
"model": "acrobat reader dc",
"scope": "lt",
"trust": 1.0,
"vendor": "adobe",
"version": "15.009.20069"
},
{
"model": "acrobat dc",
"scope": "lt",
"trust": 1.0,
"vendor": "adobe",
"version": "15.006.30094"
},
{
"model": "acrobat",
"scope": "gte",
"trust": 1.0,
"vendor": "adobe",
"version": "10.0"
},
{
"model": "acrobat reader",
"scope": "lte",
"trust": 1.0,
"vendor": "adobe",
"version": "10.1.15"
},
{
"model": "acrobat reader",
"scope": "gte",
"trust": 1.0,
"vendor": "adobe",
"version": "10.0"
},
{
"model": "acrobat reader",
"scope": "lte",
"trust": 1.0,
"vendor": "adobe",
"version": "11.0.12"
},
{
"model": "acrobat",
"scope": "lte",
"trust": 1.0,
"vendor": "adobe",
"version": "10.1.15"
},
{
"model": "acrobat",
"scope": "lte",
"trust": 1.0,
"vendor": "adobe",
"version": "11.0.12"
},
{
"model": "acrobat reader dc",
"scope": "lt",
"trust": 1.0,
"vendor": "adobe",
"version": "15.006.30094"
},
{
"model": "acrobat",
"scope": "gte",
"trust": 1.0,
"vendor": "adobe",
"version": "11.0.0"
},
{
"model": "acrobat dc",
"scope": "lt",
"trust": 1.0,
"vendor": "adobe",
"version": "15.009.20069"
},
{
"model": "acrobat reader",
"scope": "gte",
"trust": 1.0,
"vendor": "adobe",
"version": "11.0.0"
},
{
"model": "acrobat reader dc",
"scope": "gte",
"trust": 1.0,
"vendor": "adobe",
"version": "15.006.30060"
},
{
"model": "acrobat dc",
"scope": "lt",
"trust": 0.8,
"vendor": "adobe",
"version": "(windows/macintosh)"
},
{
"model": "acrobat reader dc",
"scope": "lt",
"trust": 0.8,
"vendor": "adobe",
"version": "(windows/macintosh)"
},
{
"model": "acrobat reader dc",
"scope": "eq",
"trust": 0.8,
"vendor": "adobe",
"version": "classic 2015.006.30094"
},
{
"model": "acrobat",
"scope": "lt",
"trust": 0.8,
"vendor": "adobe",
"version": "11.x (windows/macintosh)"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.8,
"vendor": "adobe",
"version": "xi desktop 11.0.13"
},
{
"model": "reader",
"scope": "lt",
"trust": 0.8,
"vendor": "adobe",
"version": "11.x (windows/macintosh)"
},
{
"model": "acrobat dc",
"scope": "eq",
"trust": 0.8,
"vendor": "adobe",
"version": "continuous 2015.009.20069"
},
{
"model": "acrobat",
"scope": "lt",
"trust": 0.8,
"vendor": "adobe",
"version": "10.x (windows/macintosh)"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.8,
"vendor": "adobe",
"version": "xi desktop 11.0.13"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.8,
"vendor": "adobe",
"version": "x desktop 10.1.16"
},
{
"model": "acrobat dc",
"scope": "eq",
"trust": 0.8,
"vendor": "adobe",
"version": "classic 2015.006.30094"
},
{
"model": "reader",
"scope": "lt",
"trust": 0.8,
"vendor": "adobe",
"version": "10.x (windows/macintosh)"
},
{
"model": "acrobat reader dc",
"scope": "eq",
"trust": 0.8,
"vendor": "adobe",
"version": "continuous 2015.009.20069"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.8,
"vendor": "adobe",
"version": "x desktop 10.1.16"
},
{
"model": "acrobat pro dc",
"scope": null,
"trust": 0.7,
"vendor": "adobe",
"version": null
},
{
"model": "acrobat reader dc",
"scope": "eq",
"trust": 0.6,
"vendor": "adobe",
"version": "2015.006.30060"
},
{
"model": "acrobat reader",
"scope": "eq",
"trust": 0.6,
"vendor": "adobe",
"version": "11.0.2"
},
{
"model": "acrobat reader",
"scope": "eq",
"trust": 0.6,
"vendor": "adobe",
"version": "11.0.1"
},
{
"model": "acrobat reader dc",
"scope": "eq",
"trust": 0.6,
"vendor": "adobe",
"version": "2015.008.20082"
},
{
"model": "acrobat dc",
"scope": "eq",
"trust": 0.6,
"vendor": "adobe",
"version": "2015.006.30060"
},
{
"model": "acrobat reader",
"scope": "eq",
"trust": 0.6,
"vendor": "adobe",
"version": "10.1.7"
},
{
"model": "acrobat dc",
"scope": "eq",
"trust": 0.6,
"vendor": "adobe",
"version": "2015.008.20082"
},
{
"model": "acrobat reader",
"scope": "eq",
"trust": 0.6,
"vendor": "adobe",
"version": "11.0.0"
},
{
"model": "acrobat reader",
"scope": "eq",
"trust": 0.6,
"vendor": "adobe",
"version": "10.1.8"
},
{
"model": "acrobat reader",
"scope": "eq",
"trust": 0.6,
"vendor": "adobe",
"version": "10.1.6"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1.3"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1.2"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1.1"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.0.3"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.0.2"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.0.1"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.0"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1.3"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1.2"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1.1"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.0.3"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.0.2"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.0.1"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.0"
}
],
"sources": [
{
"db": "ZDI",
"id": "ZDI-15-470"
},
{
"db": "BID",
"id": "77064"
},
{
"db": "JVNDB",
"id": "JVNDB-2015-005246"
},
{
"db": "CNNVD",
"id": "CNNVD-201510-202"
},
{
"db": "NVD",
"id": "CVE-2015-6689"
}
]
},
"configurations": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/configurations#",
"children": {
"@container": "@list"
},
"cpe_match": {
"@container": "@list"
},
"data": {
"@container": "@list"
},
"nodes": {
"@container": "@list"
}
},
"data": [
{
"CVE_data_version": "4.0",
"nodes": [
{
"cpe_match": [
{
"cpe22Uri": "cpe:/a:adobe:acrobat",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/a:adobe:acrobat_dc",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/a:adobe:acrobat_reader_dc",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/a:adobe:acrobat_reader",
"vulnerable": true
}
],
"operator": "OR"
}
]
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2015-005246"
}
]
},
"credits": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/credits#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "AbdulAziz Hariri - HP Zero Day Initiative",
"sources": [
{
"db": "ZDI",
"id": "ZDI-15-470"
}
],
"trust": 0.7
},
"cve": "CVE-2015-6689",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [
{
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "nvd@nist.gov",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 8.6,
"id": "CVE-2015-6689",
"impactScore": 6.4,
"integrityImpact": "PARTIAL",
"severity": "MEDIUM",
"trust": 1.7,
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
{
"acInsufInfo": null,
"accessComplexity": "Medium",
"accessVector": "Network",
"authentication": "None",
"author": "NVD",
"availabilityImpact": "Complete",
"baseScore": 9.3,
"confidentialityImpact": "Complete",
"exploitabilityScore": null,
"id": "CVE-2015-6689",
"impactScore": null,
"integrityImpact": "Complete",
"obtainAllPrivilege": null,
"obtainOtherPrivilege": null,
"obtainUserPrivilege": null,
"severity": "High",
"trust": 0.8,
"userInteractionRequired": null,
"vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
{
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "VULHUB",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 8.6,
"id": "VHN-84650",
"impactScore": 6.4,
"integrityImpact": "PARTIAL",
"severity": "MEDIUM",
"trust": 0.1,
"vectorString": "AV:N/AC:M/AU:N/C:P/I:P/A:P",
"version": "2.0"
}
],
"cvssV3": [],
"severity": [
{
"author": "nvd@nist.gov",
"id": "CVE-2015-6689",
"trust": 1.0,
"value": "MEDIUM"
},
{
"author": "NVD",
"id": "CVE-2015-6689",
"trust": 0.8,
"value": "High"
},
{
"author": "ZDI",
"id": "CVE-2015-6689",
"trust": 0.7,
"value": "MEDIUM"
},
{
"author": "CNNVD",
"id": "CNNVD-201510-202",
"trust": 0.6,
"value": "CRITICAL"
},
{
"author": "VULHUB",
"id": "VHN-84650",
"trust": 0.1,
"value": "MEDIUM"
}
]
}
],
"sources": [
{
"db": "ZDI",
"id": "ZDI-15-470"
},
{
"db": "VULHUB",
"id": "VHN-84650"
},
{
"db": "JVNDB",
"id": "JVNDB-2015-005246"
},
{
"db": "CNNVD",
"id": "CNNVD-201510-202"
},
{
"db": "NVD",
"id": "CVE-2015-6689"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Use-after-free vulnerability in Adobe Reader and Acrobat 10.x before 10.1.16 and 11.x before 11.0.13, Acrobat and Acrobat Reader DC Classic before 2015.006.30094, and Acrobat and Acrobat Reader DC Continuous before 2015.009.20069 on Windows and OS X allows attackers to execute arbitrary code via a crafted WillSave document action, a different vulnerability than CVE-2015-5586, CVE-2015-6683, CVE-2015-6684, CVE-2015-6687, CVE-2015-6688, CVE-2015-6690, CVE-2015-6691, CVE-2015-7615, CVE-2015-7617, and CVE-2015-7621. This vulnerability CVE-2015-5586 , CVE-2015-6683 , CVE-2015-6684 , CVE-2015-6687 , CVE-2015-6688 , CVE-2015-6690 , CVE-2015-6691 , CVE-2015-7615 , CVE-2015-7617 ,and CVE-2015-7621 Is a different vulnerability. Supplementary information : CWE Vulnerability type by CWE-416: Use-after-free ( Use of freed memory ) Has been identified. http://cwe.mitre.org/data/definitions/416.htmlCrafted by attackers WillSave document An arbitrary code may be executed through an action. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the handling of the WillSave document action. A specially crafted WillSave document action can force a dangling pointer to be reused after it has been freed. Adobe Acrobat and Reader are prone to multiple remote code-execution vulnerabilities. Failed exploit attempts will likely cause a denial-of-service condition. Adobe Reader, etc. are all products of Adobe (Adobe) in the United States. Adobe Reader is a free PDF file reader; Acrobat is a PDF file editing and conversion tool; Acrobat Reader DC is a set of tools for viewing, printing and annotating PDF. A use-after-free vulnerability exists in several Adobe products. 30060 and earlier, Acrobat XI Desktop 11.0.12 and earlier, Reader XI Desktop 11.0.12 and earlier, Acrobat X Desktop 10.1.15 and earlier, Reader X Desktop 10.1.15 and earlier",
"sources": [
{
"db": "NVD",
"id": "CVE-2015-6689"
},
{
"db": "JVNDB",
"id": "JVNDB-2015-005246"
},
{
"db": "ZDI",
"id": "ZDI-15-470"
},
{
"db": "BID",
"id": "77064"
},
{
"db": "VULHUB",
"id": "VHN-84650"
}
],
"trust": 2.61
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "NVD",
"id": "CVE-2015-6689",
"trust": 3.5
},
{
"db": "ZDI",
"id": "ZDI-15-470",
"trust": 2.7
},
{
"db": "SECTRACK",
"id": "1033796",
"trust": 1.7
},
{
"db": "JVNDB",
"id": "JVNDB-2015-005246",
"trust": 0.8
},
{
"db": "ZDI_CAN",
"id": "ZDI-CAN-2998",
"trust": 0.7
},
{
"db": "CNNVD",
"id": "CNNVD-201510-202",
"trust": 0.7
},
{
"db": "ZDI",
"id": "ZDI-15-508",
"trust": 0.3
},
{
"db": "ZDI",
"id": "ZDI-15-493",
"trust": 0.3
},
{
"db": "ZDI",
"id": "ZDI-15-469",
"trust": 0.3
},
{
"db": "ZDI",
"id": "ZDI-15-474",
"trust": 0.3
},
{
"db": "ZDI",
"id": "ZDI-15-492",
"trust": 0.3
},
{
"db": "BID",
"id": "77064",
"trust": 0.3
},
{
"db": "VULHUB",
"id": "VHN-84650",
"trust": 0.1
}
],
"sources": [
{
"db": "ZDI",
"id": "ZDI-15-470"
},
{
"db": "VULHUB",
"id": "VHN-84650"
},
{
"db": "BID",
"id": "77064"
},
{
"db": "JVNDB",
"id": "JVNDB-2015-005246"
},
{
"db": "CNNVD",
"id": "CNNVD-201510-202"
},
{
"db": "NVD",
"id": "CVE-2015-6689"
}
]
},
"id": "VAR-201510-0360",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "VULHUB",
"id": "VHN-84650"
}
],
"trust": 0.01
},
"last_update_date": "2025-04-13T23:03:48.379000Z",
"patch": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/patch#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"title": "APSB15-24",
"trust": 1.5,
"url": "https://helpx.adobe.com/security/products/acrobat/apsb15-24.html"
},
{
"title": "APSB15-24",
"trust": 0.8,
"url": "https://helpx.adobe.com/jp/security/products/reader/apsb15-24.html"
},
{
"title": "\u30a2\u30c9\u30d3 \u30b7\u30b9\u30c6\u30e0\u30ba\u793e Adobe Reader \u306e\u8106\u5f31\u6027\u306b\u95a2\u3059\u308b\u304a\u77e5\u3089\u305b",
"trust": 0.8,
"url": "http://www.fmworld.net/biz/common/adobe/20151015.html"
},
{
"title": "Multiple Adobe Remediation measures for reusing vulnerabilities after product release",
"trust": 0.6,
"url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=58051"
}
],
"sources": [
{
"db": "ZDI",
"id": "ZDI-15-470"
},
{
"db": "JVNDB",
"id": "JVNDB-2015-005246"
},
{
"db": "CNNVD",
"id": "CNNVD-201510-202"
}
]
},
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "CWE-416",
"trust": 1.1
},
{
"problemtype": "CWE-Other",
"trust": 0.8
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-84650"
},
{
"db": "JVNDB",
"id": "JVNDB-2015-005246"
},
{
"db": "NVD",
"id": "CVE-2015-6689"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 2.7,
"url": "https://helpx.adobe.com/security/products/acrobat/apsb15-24.html"
},
{
"trust": 1.7,
"url": "http://www.zerodayinitiative.com/advisories/zdi-15-470"
},
{
"trust": 1.7,
"url": "http://www.securitytracker.com/id/1033796"
},
{
"trust": 0.8,
"url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-6689"
},
{
"trust": 0.8,
"url": "http://www.ipa.go.jp/security/ciadr/vul/20151014-adobereader.html"
},
{
"trust": 0.8,
"url": "http://www.jpcert.or.jp/at/2015/at150035.html"
},
{
"trust": 0.8,
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2015-6689"
},
{
"trust": 0.8,
"url": "http://www.npa.go.jp/cyberpolice/topics/?seq=17022"
},
{
"trust": 0.3,
"url": "http://www.adobe.com"
},
{
"trust": 0.3,
"url": "http://www.zerodayinitiative.com/advisories/zdi-15-469/"
},
{
"trust": 0.3,
"url": "http://www.zerodayinitiative.com/advisories/zdi-15-470/"
},
{
"trust": 0.3,
"url": "http://www.zerodayinitiative.com/advisories/zdi-15-474/"
},
{
"trust": 0.3,
"url": "http://www.zerodayinitiative.com/advisories/zdi-15-492/"
},
{
"trust": 0.3,
"url": "http://www.zerodayinitiative.com/advisories/zdi-15-493/"
},
{
"trust": 0.3,
"url": "http://www.zerodayinitiative.com/advisories/zdi-15-508/"
}
],
"sources": [
{
"db": "ZDI",
"id": "ZDI-15-470"
},
{
"db": "VULHUB",
"id": "VHN-84650"
},
{
"db": "BID",
"id": "77064"
},
{
"db": "JVNDB",
"id": "JVNDB-2015-005246"
},
{
"db": "CNNVD",
"id": "CNNVD-201510-202"
},
{
"db": "NVD",
"id": "CVE-2015-6689"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "ZDI",
"id": "ZDI-15-470"
},
{
"db": "VULHUB",
"id": "VHN-84650"
},
{
"db": "BID",
"id": "77064"
},
{
"db": "JVNDB",
"id": "JVNDB-2015-005246"
},
{
"db": "CNNVD",
"id": "CNNVD-201510-202"
},
{
"db": "NVD",
"id": "CVE-2015-6689"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2015-10-13T00:00:00",
"db": "ZDI",
"id": "ZDI-15-470"
},
{
"date": "2015-10-14T00:00:00",
"db": "VULHUB",
"id": "VHN-84650"
},
{
"date": "2015-10-13T00:00:00",
"db": "BID",
"id": "77064"
},
{
"date": "2015-10-16T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2015-005246"
},
{
"date": "2015-10-15T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201510-202"
},
{
"date": "2015-10-14T23:59:11.017000",
"db": "NVD",
"id": "CVE-2015-6689"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2015-10-13T00:00:00",
"db": "ZDI",
"id": "ZDI-15-470"
},
{
"date": "2020-05-13T00:00:00",
"db": "VULHUB",
"id": "VHN-84650"
},
{
"date": "2015-10-26T17:00:00",
"db": "BID",
"id": "77064"
},
{
"date": "2015-10-16T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2015-005246"
},
{
"date": "2020-05-14T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201510-202"
},
{
"date": "2025-04-12T10:46:40.837000",
"db": "NVD",
"id": "CVE-2015-6689"
}
]
},
"threat_type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/threat_type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "remote",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201510-202"
}
],
"trust": 0.6
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Windows and Mac OS X Run on Adobe Reader and Acrobat Vulnerable to arbitrary code execution",
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2015-005246"
}
],
"trust": 0.8
},
"type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "resource management error",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201510-202"
}
],
"trust": 0.6
}
}
VAR-201510-0047
Vulnerability from variot - Updated: 2025-04-13 23:03Adobe Reader and Acrobat 10.x before 10.1.16 and 11.x before 11.0.13, Acrobat and Acrobat Reader DC Classic before 2015.006.30094, and Acrobat and Acrobat Reader DC Continuous before 2015.009.20069 on Windows and OS X allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2015-6685, CVE-2015-6686, CVE-2015-6693, CVE-2015-6694, and CVE-2015-6695. This vulnerability CVE-2015-6685 , CVE-2015-6686 , CVE-2015-6693 , CVE-2015-6694 , CVE-2015-6695 ,and CVE-2015-7650 Is a different vulnerability.An attacker could execute arbitrary code or cause a denial of service ( Memory corruption ) There is a possibility of being put into a state. Adobe Acrobat and Reader are prone to multiple memory-corruption vulnerabilities. Attackers can exploit these issues to execute arbitrary code in the context of the user running the affected applications. Failed exploit attempts will likely cause a denial-of-service condition. Adobe Reader, etc. are all products of Adobe (Adobe) in the United States. Adobe Reader is a free PDF file reader; Acrobat is a PDF file editing and conversion tool; Acrobat Reader DC is a set of tools for viewing, printing and annotating PDF. Classic and Continuous are two update mechanisms provided by Acrobat Reader DC Product Download Center. Security flaws exist in several Adobe products. 30060 and earlier, Acrobat XI Desktop 11.0.12 and earlier, Reader XI Desktop 11.0.12 and earlier, Acrobat X Desktop 10.1.15 and earlier, Reader X Desktop 10.1.15 and earlier
Show details on source website{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"configurations": {
"@id": "https://www.variotdbs.pl/ref/configurations"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-201510-0047",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "acrobat reader dc",
"scope": "gte",
"trust": 1.0,
"vendor": "adobe",
"version": "15.008.20082"
},
{
"model": "acrobat dc",
"scope": "gte",
"trust": 1.0,
"vendor": "adobe",
"version": "15.008.20082"
},
{
"model": "acrobat dc",
"scope": "gte",
"trust": 1.0,
"vendor": "adobe",
"version": "15.006.30060"
},
{
"model": "acrobat reader dc",
"scope": "lt",
"trust": 1.0,
"vendor": "adobe",
"version": "15.009.20069"
},
{
"model": "acrobat dc",
"scope": "lt",
"trust": 1.0,
"vendor": "adobe",
"version": "15.006.30094"
},
{
"model": "acrobat",
"scope": "gte",
"trust": 1.0,
"vendor": "adobe",
"version": "10.0"
},
{
"model": "acrobat reader",
"scope": "lte",
"trust": 1.0,
"vendor": "adobe",
"version": "10.1.15"
},
{
"model": "acrobat reader",
"scope": "gte",
"trust": 1.0,
"vendor": "adobe",
"version": "10.0"
},
{
"model": "acrobat reader",
"scope": "lte",
"trust": 1.0,
"vendor": "adobe",
"version": "11.0.12"
},
{
"model": "acrobat",
"scope": "lte",
"trust": 1.0,
"vendor": "adobe",
"version": "10.1.15"
},
{
"model": "acrobat",
"scope": "lte",
"trust": 1.0,
"vendor": "adobe",
"version": "11.0.12"
},
{
"model": "acrobat reader dc",
"scope": "lt",
"trust": 1.0,
"vendor": "adobe",
"version": "15.006.30094"
},
{
"model": "acrobat",
"scope": "gte",
"trust": 1.0,
"vendor": "adobe",
"version": "11.0.0"
},
{
"model": "acrobat dc",
"scope": "lt",
"trust": 1.0,
"vendor": "adobe",
"version": "15.009.20069"
},
{
"model": "acrobat reader",
"scope": "gte",
"trust": 1.0,
"vendor": "adobe",
"version": "11.0.0"
},
{
"model": "acrobat reader dc",
"scope": "gte",
"trust": 1.0,
"vendor": "adobe",
"version": "15.006.30060"
},
{
"model": "acrobat dc",
"scope": "lt",
"trust": 0.8,
"vendor": "adobe",
"version": "(windows/macintosh)"
},
{
"model": "acrobat reader dc",
"scope": "lt",
"trust": 0.8,
"vendor": "adobe",
"version": "(windows/macintosh)"
},
{
"model": "acrobat reader dc",
"scope": "eq",
"trust": 0.8,
"vendor": "adobe",
"version": "classic 2015.006.30094"
},
{
"model": "acrobat",
"scope": "lt",
"trust": 0.8,
"vendor": "adobe",
"version": "11.x (windows/macintosh)"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.8,
"vendor": "adobe",
"version": "xi desktop 11.0.13"
},
{
"model": "reader",
"scope": "lt",
"trust": 0.8,
"vendor": "adobe",
"version": "11.x (windows/macintosh)"
},
{
"model": "acrobat dc",
"scope": "eq",
"trust": 0.8,
"vendor": "adobe",
"version": "continuous 2015.009.20069"
},
{
"model": "acrobat",
"scope": "lt",
"trust": 0.8,
"vendor": "adobe",
"version": "10.x (windows/macintosh)"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.8,
"vendor": "adobe",
"version": "xi desktop 11.0.13"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.8,
"vendor": "adobe",
"version": "x desktop 10.1.16"
},
{
"model": "acrobat dc",
"scope": "eq",
"trust": 0.8,
"vendor": "adobe",
"version": "classic 2015.006.30094"
},
{
"model": "reader",
"scope": "lt",
"trust": 0.8,
"vendor": "adobe",
"version": "10.x (windows/macintosh)"
},
{
"model": "acrobat reader dc",
"scope": "eq",
"trust": 0.8,
"vendor": "adobe",
"version": "continuous 2015.009.20069"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.8,
"vendor": "adobe",
"version": "x desktop 10.1.16"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.6,
"vendor": "adobe",
"version": "10.1.8"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.6,
"vendor": "adobe",
"version": "10.1.6"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.6,
"vendor": "adobe",
"version": "10.1.14"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.6,
"vendor": "adobe",
"version": "10.1.12"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.6,
"vendor": "adobe",
"version": "10.1.9"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.6,
"vendor": "adobe",
"version": "10.1.10"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.6,
"vendor": "adobe",
"version": "10.1.11"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.6,
"vendor": "adobe",
"version": "10.1.13"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.6,
"vendor": "adobe",
"version": "10.1.7"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.6,
"vendor": "adobe",
"version": "10.1.5"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1.3"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1.2"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1.1"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.0.3"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.0.2"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.0.1"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.0"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1.3"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1.2"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1.1"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.0.3"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.0.2"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.0.1"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.0"
}
],
"sources": [
{
"db": "BID",
"id": "77069"
},
{
"db": "JVNDB",
"id": "JVNDB-2015-005285"
},
{
"db": "CNNVD",
"id": "CNNVD-201510-247"
},
{
"db": "NVD",
"id": "CVE-2015-7622"
}
]
},
"configurations": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/configurations#",
"children": {
"@container": "@list"
},
"cpe_match": {
"@container": "@list"
},
"data": {
"@container": "@list"
},
"nodes": {
"@container": "@list"
}
},
"data": [
{
"CVE_data_version": "4.0",
"nodes": [
{
"cpe_match": [
{
"cpe22Uri": "cpe:/a:adobe:acrobat",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/a:adobe:acrobat_dc",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/a:adobe:acrobat_reader_dc",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/a:adobe:acrobat_reader",
"vulnerable": true
}
],
"operator": "OR"
}
]
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2015-005285"
}
]
},
"credits": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/credits#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "AbdulAziz Hariri of HP Zero Day Initiative, Brian Gorenc of HP Zero Day Initiative and Francis Provencher from COSIG.",
"sources": [
{
"db": "BID",
"id": "77069"
}
],
"trust": 0.3
},
"cve": "CVE-2015-7622",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "nvd@nist.gov",
"availabilityImpact": "COMPLETE",
"baseScore": 10.0,
"confidentialityImpact": "COMPLETE",
"exploitabilityScore": 10.0,
"id": "CVE-2015-7622",
"impactScore": 10.0,
"integrityImpact": "COMPLETE",
"severity": "HIGH",
"trust": 1.9,
"vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "VULHUB",
"availabilityImpact": "COMPLETE",
"baseScore": 10.0,
"confidentialityImpact": "COMPLETE",
"exploitabilityScore": 10.0,
"id": "VHN-85583",
"impactScore": 10.0,
"integrityImpact": "COMPLETE",
"severity": "HIGH",
"trust": 0.1,
"vectorString": "AV:N/AC:L/AU:N/C:C/I:C/A:C",
"version": "2.0"
}
],
"cvssV3": [],
"severity": [
{
"author": "nvd@nist.gov",
"id": "CVE-2015-7622",
"trust": 1.0,
"value": "HIGH"
},
{
"author": "NVD",
"id": "CVE-2015-7622",
"trust": 0.8,
"value": "High"
},
{
"author": "CNNVD",
"id": "CNNVD-201510-247",
"trust": 0.6,
"value": "CRITICAL"
},
{
"author": "VULHUB",
"id": "VHN-85583",
"trust": 0.1,
"value": "HIGH"
},
{
"author": "VULMON",
"id": "CVE-2015-7622",
"trust": 0.1,
"value": "HIGH"
}
]
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-85583"
},
{
"db": "VULMON",
"id": "CVE-2015-7622"
},
{
"db": "JVNDB",
"id": "JVNDB-2015-005285"
},
{
"db": "CNNVD",
"id": "CNNVD-201510-247"
},
{
"db": "NVD",
"id": "CVE-2015-7622"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Adobe Reader and Acrobat 10.x before 10.1.16 and 11.x before 11.0.13, Acrobat and Acrobat Reader DC Classic before 2015.006.30094, and Acrobat and Acrobat Reader DC Continuous before 2015.009.20069 on Windows and OS X allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2015-6685, CVE-2015-6686, CVE-2015-6693, CVE-2015-6694, and CVE-2015-6695. This vulnerability CVE-2015-6685 , CVE-2015-6686 , CVE-2015-6693 , CVE-2015-6694 , CVE-2015-6695 ,and CVE-2015-7650 Is a different vulnerability.An attacker could execute arbitrary code or cause a denial of service ( Memory corruption ) There is a possibility of being put into a state. Adobe Acrobat and Reader are prone to multiple memory-corruption vulnerabilities. \nAttackers can exploit these issues to execute arbitrary code in the context of the user running the affected applications. Failed exploit attempts will likely cause a denial-of-service condition. Adobe Reader, etc. are all products of Adobe (Adobe) in the United States. Adobe Reader is a free PDF file reader; Acrobat is a PDF file editing and conversion tool; Acrobat Reader DC is a set of tools for viewing, printing and annotating PDF. Classic and Continuous are two update mechanisms provided by Acrobat Reader DC Product Download Center. Security flaws exist in several Adobe products. 30060 and earlier, Acrobat XI Desktop 11.0.12 and earlier, Reader XI Desktop 11.0.12 and earlier, Acrobat X Desktop 10.1.15 and earlier, Reader X Desktop 10.1.15 and earlier",
"sources": [
{
"db": "NVD",
"id": "CVE-2015-7622"
},
{
"db": "JVNDB",
"id": "JVNDB-2015-005285"
},
{
"db": "BID",
"id": "77069"
},
{
"db": "VULHUB",
"id": "VHN-85583"
},
{
"db": "VULMON",
"id": "CVE-2015-7622"
}
],
"trust": 2.07
},
"exploit_availability": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/exploit_availability#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"reference": "https://www.scap.org.cn/vuln/vhn-85583",
"trust": 0.1,
"type": "unknown"
},
{
"reference": "https://vulmon.com/exploitdetails?qidtp=exploitdb\u0026qid=38787",
"trust": 0.1,
"type": "exploit"
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-85583"
},
{
"db": "VULMON",
"id": "CVE-2015-7622"
}
]
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "NVD",
"id": "CVE-2015-7622",
"trust": 2.9
},
{
"db": "EXPLOIT-DB",
"id": "38787",
"trust": 1.8
},
{
"db": "SECTRACK",
"id": "1033796",
"trust": 1.8
},
{
"db": "JVNDB",
"id": "JVNDB-2015-005285",
"trust": 0.8
},
{
"db": "CNNVD",
"id": "CNNVD-201510-247",
"trust": 0.7
},
{
"db": "ZDI",
"id": "ZDI-15-471",
"trust": 0.3
},
{
"db": "ZDI",
"id": "ZDI-15-466",
"trust": 0.3
},
{
"db": "ZDI",
"id": "ZDI-15-472",
"trust": 0.3
},
{
"db": "ZDI",
"id": "ZDI-15-467",
"trust": 0.3
},
{
"db": "ZDI",
"id": "ZDI-15-473",
"trust": 0.3
},
{
"db": "BID",
"id": "77069",
"trust": 0.3
},
{
"db": "VULHUB",
"id": "VHN-85583",
"trust": 0.1
},
{
"db": "VULMON",
"id": "CVE-2015-7622",
"trust": 0.1
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-85583"
},
{
"db": "VULMON",
"id": "CVE-2015-7622"
},
{
"db": "BID",
"id": "77069"
},
{
"db": "JVNDB",
"id": "JVNDB-2015-005285"
},
{
"db": "CNNVD",
"id": "CNNVD-201510-247"
},
{
"db": "NVD",
"id": "CVE-2015-7622"
}
]
},
"id": "VAR-201510-0047",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "VULHUB",
"id": "VHN-85583"
}
],
"trust": 0.01
},
"last_update_date": "2025-04-13T23:03:48.344000Z",
"patch": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/patch#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"title": "APSB15-24",
"trust": 0.8,
"url": "https://helpx.adobe.com/security/products/acrobat/apsb15-24.html"
},
{
"title": "APSB15-24",
"trust": 0.8,
"url": "https://helpx.adobe.com/jp/security/products/reader/apsb15-24.html"
},
{
"title": "\u30a2\u30c9\u30d3 \u30b7\u30b9\u30c6\u30e0\u30ba\u793e Adobe Reader \u306e\u8106\u5f31\u6027\u306b\u95a2\u3059\u308b\u304a\u77e5\u3089\u305b",
"trust": 0.8,
"url": "http://www.fmworld.net/biz/common/adobe/20151015.html"
},
{
"title": "Multiple Adobe Product Buffer Overflow Vulnerability Fix",
"trust": 0.6,
"url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=58096"
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2015-005285"
},
{
"db": "CNNVD",
"id": "CNNVD-201510-247"
}
]
},
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "CWE-119",
"trust": 1.9
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-85583"
},
{
"db": "JVNDB",
"id": "JVNDB-2015-005285"
},
{
"db": "NVD",
"id": "CVE-2015-7622"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 2.1,
"url": "https://helpx.adobe.com/security/products/acrobat/apsb15-24.html"
},
{
"trust": 1.9,
"url": "https://www.exploit-db.com/exploits/38787/"
},
{
"trust": 1.8,
"url": "http://www.securitytracker.com/id/1033796"
},
{
"trust": 0.8,
"url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-7622"
},
{
"trust": 0.8,
"url": "http://www.ipa.go.jp/security/ciadr/vul/20151014-adobereader.html"
},
{
"trust": 0.8,
"url": "http://www.jpcert.or.jp/at/2015/at150035.html"
},
{
"trust": 0.8,
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2015-7622"
},
{
"trust": 0.8,
"url": "http://www.npa.go.jp/cyberpolice/topics/?seq=17022"
},
{
"trust": 0.3,
"url": "http://www.adobe.com"
},
{
"trust": 0.3,
"url": "http://www.zerodayinitiative.com/advisories/zdi-15-467/"
},
{
"trust": 0.3,
"url": "http://www.zerodayinitiative.com/advisories/zdi-15-466/"
},
{
"trust": 0.3,
"url": "http://www.zerodayinitiative.com/advisories/zdi-15-473/"
},
{
"trust": 0.3,
"url": "http://www.zerodayinitiative.com/advisories/zdi-15-471/"
},
{
"trust": 0.3,
"url": "http://www.zerodayinitiative.com/advisories/zdi-15-472/"
},
{
"trust": 0.1,
"url": "https://cwe.mitre.org/data/definitions/119.html"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov"
},
{
"trust": 0.1,
"url": "https://www.rapid7.com/db/vulnerabilities/adobe-reader-apsb15-24-cve-2015-6686"
},
{
"trust": 0.1,
"url": "http://tools.cisco.com/security/center/viewalert.x?alertid=41495"
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-85583"
},
{
"db": "VULMON",
"id": "CVE-2015-7622"
},
{
"db": "BID",
"id": "77069"
},
{
"db": "JVNDB",
"id": "JVNDB-2015-005285"
},
{
"db": "CNNVD",
"id": "CNNVD-201510-247"
},
{
"db": "NVD",
"id": "CVE-2015-7622"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "VULHUB",
"id": "VHN-85583"
},
{
"db": "VULMON",
"id": "CVE-2015-7622"
},
{
"db": "BID",
"id": "77069"
},
{
"db": "JVNDB",
"id": "JVNDB-2015-005285"
},
{
"db": "CNNVD",
"id": "CNNVD-201510-247"
},
{
"db": "NVD",
"id": "CVE-2015-7622"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2015-10-14T00:00:00",
"db": "VULHUB",
"id": "VHN-85583"
},
{
"date": "2015-10-14T00:00:00",
"db": "VULMON",
"id": "CVE-2015-7622"
},
{
"date": "2015-10-13T00:00:00",
"db": "BID",
"id": "77069"
},
{
"date": "2015-10-16T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2015-005285"
},
{
"date": "2015-10-15T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201510-247"
},
{
"date": "2015-10-14T23:59:55.793000",
"db": "NVD",
"id": "CVE-2015-7622"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2020-05-19T00:00:00",
"db": "VULHUB",
"id": "VHN-85583"
},
{
"date": "2020-05-19T00:00:00",
"db": "VULMON",
"id": "CVE-2015-7622"
},
{
"date": "2015-11-03T19:59:00",
"db": "BID",
"id": "77069"
},
{
"date": "2015-10-16T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2015-005285"
},
{
"date": "2020-05-20T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201510-247"
},
{
"date": "2025-04-12T10:46:40.837000",
"db": "NVD",
"id": "CVE-2015-7622"
}
]
},
"threat_type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/threat_type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "remote",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201510-247"
}
],
"trust": 0.6
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Windows and Mac OS X Run on Adobe Reader and Acrobat Vulnerable to arbitrary code execution",
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2015-005285"
}
],
"trust": 0.8
},
"type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "buffer error",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201510-247"
}
],
"trust": 0.6
}
}
VAR-201510-0344
Vulnerability from variot - Updated: 2025-04-13 23:03Adobe Reader and Acrobat 10.x before 10.1.16 and 11.x before 11.0.13, Acrobat and Acrobat Reader DC Classic before 2015.006.30094, and Acrobat and Acrobat Reader DC Continuous before 2015.009.20069 on Windows and OS X allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via crafted use of the value attribute, a different vulnerability than CVE-2015-6685, CVE-2015-6686, CVE-2015-6693, CVE-2015-6694, and CVE-2015-7622. This vulnerability CVE-2015-6685 , CVE-2015-6686 , CVE-2015-6693 , CVE-2015-6694 , CVE-2015-7622 ,and CVE-2015-7650 Is a different vulnerability.By the attacker, value Arbitrary code execution, or the denial of service, through the clever use of attributes ( Memory corruption ) There is a possibility of being put into a state. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the handling of the value attribute. By setting the value attribute to a specially crafted array an attacker can force a dangling pointer to be reused after it has been freed. An attacker can leverage this vulnerability to execute arbitrary code under the context of the current process. Adobe Acrobat and Reader are prone to multiple memory-corruption vulnerabilities. Failed exploit attempts will likely cause a denial-of-service condition. Adobe Reader, etc. are all products of Adobe (Adobe) in the United States. Adobe Reader is a free PDF file reader; Acrobat is a PDF file editing and conversion tool; Acrobat Reader DC is a set of tools for viewing, printing and annotating PDF. Security flaws exist in several Adobe products. 30060 and earlier, Acrobat XI Desktop 11.0.12 and earlier, Reader XI Desktop 11.0.12 and earlier, Acrobat X Desktop 10.1.15 and earlier, Reader X Desktop 10.1.15 and earlier
Show details on source website{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"configurations": {
"@id": "https://www.variotdbs.pl/ref/configurations"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-201510-0344",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "acrobat reader dc",
"scope": "gte",
"trust": 1.0,
"vendor": "adobe",
"version": "15.008.20082"
},
{
"model": "acrobat dc",
"scope": "gte",
"trust": 1.0,
"vendor": "adobe",
"version": "15.008.20082"
},
{
"model": "acrobat dc",
"scope": "gte",
"trust": 1.0,
"vendor": "adobe",
"version": "15.006.30060"
},
{
"model": "acrobat reader dc",
"scope": "lt",
"trust": 1.0,
"vendor": "adobe",
"version": "15.009.20069"
},
{
"model": "acrobat dc",
"scope": "lt",
"trust": 1.0,
"vendor": "adobe",
"version": "15.006.30094"
},
{
"model": "acrobat",
"scope": "gte",
"trust": 1.0,
"vendor": "adobe",
"version": "10.0"
},
{
"model": "acrobat reader",
"scope": "lte",
"trust": 1.0,
"vendor": "adobe",
"version": "10.1.15"
},
{
"model": "acrobat reader",
"scope": "gte",
"trust": 1.0,
"vendor": "adobe",
"version": "10.0"
},
{
"model": "acrobat reader",
"scope": "lte",
"trust": 1.0,
"vendor": "adobe",
"version": "11.0.12"
},
{
"model": "acrobat",
"scope": "lte",
"trust": 1.0,
"vendor": "adobe",
"version": "10.1.15"
},
{
"model": "acrobat",
"scope": "lte",
"trust": 1.0,
"vendor": "adobe",
"version": "11.0.12"
},
{
"model": "acrobat reader dc",
"scope": "lt",
"trust": 1.0,
"vendor": "adobe",
"version": "15.006.30094"
},
{
"model": "acrobat",
"scope": "gte",
"trust": 1.0,
"vendor": "adobe",
"version": "11.0.0"
},
{
"model": "acrobat dc",
"scope": "lt",
"trust": 1.0,
"vendor": "adobe",
"version": "15.009.20069"
},
{
"model": "acrobat reader",
"scope": "gte",
"trust": 1.0,
"vendor": "adobe",
"version": "11.0.0"
},
{
"model": "acrobat reader dc",
"scope": "gte",
"trust": 1.0,
"vendor": "adobe",
"version": "15.006.30060"
},
{
"model": "acrobat dc",
"scope": "lt",
"trust": 0.8,
"vendor": "adobe",
"version": "(windows/macintosh)"
},
{
"model": "acrobat reader dc",
"scope": "lt",
"trust": 0.8,
"vendor": "adobe",
"version": "(windows/macintosh)"
},
{
"model": "acrobat reader dc",
"scope": "eq",
"trust": 0.8,
"vendor": "adobe",
"version": "classic 2015.006.30094"
},
{
"model": "acrobat",
"scope": "lt",
"trust": 0.8,
"vendor": "adobe",
"version": "11.x (windows/macintosh)"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.8,
"vendor": "adobe",
"version": "xi desktop 11.0.13"
},
{
"model": "reader",
"scope": "lt",
"trust": 0.8,
"vendor": "adobe",
"version": "11.x (windows/macintosh)"
},
{
"model": "acrobat dc",
"scope": "eq",
"trust": 0.8,
"vendor": "adobe",
"version": "continuous 2015.009.20069"
},
{
"model": "acrobat",
"scope": "lt",
"trust": 0.8,
"vendor": "adobe",
"version": "10.x (windows/macintosh)"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.8,
"vendor": "adobe",
"version": "xi desktop 11.0.13"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.8,
"vendor": "adobe",
"version": "x desktop 10.1.16"
},
{
"model": "acrobat dc",
"scope": "eq",
"trust": 0.8,
"vendor": "adobe",
"version": "classic 2015.006.30094"
},
{
"model": "reader",
"scope": "lt",
"trust": 0.8,
"vendor": "adobe",
"version": "10.x (windows/macintosh)"
},
{
"model": "acrobat reader dc",
"scope": "eq",
"trust": 0.8,
"vendor": "adobe",
"version": "continuous 2015.009.20069"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.8,
"vendor": "adobe",
"version": "x desktop 10.1.16"
},
{
"model": "acrobat reader dc",
"scope": null,
"trust": 0.7,
"vendor": "adobe",
"version": null
},
{
"model": "acrobat reader",
"scope": "eq",
"trust": 0.6,
"vendor": "adobe",
"version": "11.0.8"
},
{
"model": "acrobat reader",
"scope": "eq",
"trust": 0.6,
"vendor": "adobe",
"version": "11.0.5"
},
{
"model": "acrobat reader dc",
"scope": "eq",
"trust": 0.6,
"vendor": "adobe",
"version": "2015.006.30060"
},
{
"model": "acrobat reader",
"scope": "eq",
"trust": 0.6,
"vendor": "adobe",
"version": "11.0.1"
},
{
"model": "acrobat reader dc",
"scope": "eq",
"trust": 0.6,
"vendor": "adobe",
"version": "2015.008.20082"
},
{
"model": "acrobat reader",
"scope": "eq",
"trust": 0.6,
"vendor": "adobe",
"version": "11.0.4"
},
{
"model": "acrobat dc",
"scope": "eq",
"trust": 0.6,
"vendor": "adobe",
"version": "2015.006.30060"
},
{
"model": "acrobat dc",
"scope": "eq",
"trust": 0.6,
"vendor": "adobe",
"version": "2015.008.20082"
},
{
"model": "acrobat reader",
"scope": "eq",
"trust": 0.6,
"vendor": "adobe",
"version": "11.0.0"
},
{
"model": "acrobat reader",
"scope": "eq",
"trust": 0.6,
"vendor": "adobe",
"version": "11.0.3"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1.3"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1.2"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1.1"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.0.3"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.0.2"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.0.1"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.0"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1.3"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1.2"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1.1"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.0.3"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.0.2"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.0.1"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.0"
}
],
"sources": [
{
"db": "ZDI",
"id": "ZDI-15-472"
},
{
"db": "BID",
"id": "77069"
},
{
"db": "JVNDB",
"id": "JVNDB-2015-005252"
},
{
"db": "CNNVD",
"id": "CNNVD-201510-208"
},
{
"db": "NVD",
"id": "CVE-2015-6695"
}
]
},
"configurations": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/configurations#",
"children": {
"@container": "@list"
},
"cpe_match": {
"@container": "@list"
},
"data": {
"@container": "@list"
},
"nodes": {
"@container": "@list"
}
},
"data": [
{
"CVE_data_version": "4.0",
"nodes": [
{
"cpe_match": [
{
"cpe22Uri": "cpe:/a:adobe:acrobat",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/a:adobe:acrobat_dc",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/a:adobe:acrobat_reader_dc",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/a:adobe:acrobat_reader",
"vulnerable": true
}
],
"operator": "OR"
}
]
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2015-005252"
}
]
},
"credits": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/credits#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "AbdulAziz Hariri - HP Zero Day Initiative",
"sources": [
{
"db": "ZDI",
"id": "ZDI-15-472"
}
],
"trust": 0.7
},
"cve": "CVE-2015-6695",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [
{
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "nvd@nist.gov",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 8.6,
"id": "CVE-2015-6695",
"impactScore": 6.4,
"integrityImpact": "PARTIAL",
"severity": "MEDIUM",
"trust": 1.7,
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
{
"acInsufInfo": null,
"accessComplexity": "Medium",
"accessVector": "Network",
"authentication": "None",
"author": "NVD",
"availabilityImpact": "Complete",
"baseScore": 9.3,
"confidentialityImpact": "Complete",
"exploitabilityScore": null,
"id": "CVE-2015-6695",
"impactScore": null,
"integrityImpact": "Complete",
"obtainAllPrivilege": null,
"obtainOtherPrivilege": null,
"obtainUserPrivilege": null,
"severity": "High",
"trust": 0.8,
"userInteractionRequired": null,
"vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
{
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "VULHUB",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 8.6,
"id": "VHN-84656",
"impactScore": 6.4,
"integrityImpact": "PARTIAL",
"severity": "MEDIUM",
"trust": 0.1,
"vectorString": "AV:N/AC:M/AU:N/C:P/I:P/A:P",
"version": "2.0"
}
],
"cvssV3": [],
"severity": [
{
"author": "nvd@nist.gov",
"id": "CVE-2015-6695",
"trust": 1.0,
"value": "MEDIUM"
},
{
"author": "NVD",
"id": "CVE-2015-6695",
"trust": 0.8,
"value": "High"
},
{
"author": "ZDI",
"id": "CVE-2015-6695",
"trust": 0.7,
"value": "MEDIUM"
},
{
"author": "CNNVD",
"id": "CNNVD-201510-208",
"trust": 0.6,
"value": "CRITICAL"
},
{
"author": "VULHUB",
"id": "VHN-84656",
"trust": 0.1,
"value": "MEDIUM"
}
]
}
],
"sources": [
{
"db": "ZDI",
"id": "ZDI-15-472"
},
{
"db": "VULHUB",
"id": "VHN-84656"
},
{
"db": "JVNDB",
"id": "JVNDB-2015-005252"
},
{
"db": "CNNVD",
"id": "CNNVD-201510-208"
},
{
"db": "NVD",
"id": "CVE-2015-6695"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Adobe Reader and Acrobat 10.x before 10.1.16 and 11.x before 11.0.13, Acrobat and Acrobat Reader DC Classic before 2015.006.30094, and Acrobat and Acrobat Reader DC Continuous before 2015.009.20069 on Windows and OS X allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via crafted use of the value attribute, a different vulnerability than CVE-2015-6685, CVE-2015-6686, CVE-2015-6693, CVE-2015-6694, and CVE-2015-7622. This vulnerability CVE-2015-6685 , CVE-2015-6686 , CVE-2015-6693 , CVE-2015-6694 , CVE-2015-7622 ,and CVE-2015-7650 Is a different vulnerability.By the attacker, value Arbitrary code execution, or the denial of service, through the clever use of attributes ( Memory corruption ) There is a possibility of being put into a state. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the handling of the value attribute. By setting the value attribute to a specially crafted array an attacker can force a dangling pointer to be reused after it has been freed. An attacker can leverage this vulnerability to execute arbitrary code under the context of the current process. Adobe Acrobat and Reader are prone to multiple memory-corruption vulnerabilities. Failed exploit attempts will likely cause a denial-of-service condition. Adobe Reader, etc. are all products of Adobe (Adobe) in the United States. Adobe Reader is a free PDF file reader; Acrobat is a PDF file editing and conversion tool; Acrobat Reader DC is a set of tools for viewing, printing and annotating PDF. Security flaws exist in several Adobe products. 30060 and earlier, Acrobat XI Desktop 11.0.12 and earlier, Reader XI Desktop 11.0.12 and earlier, Acrobat X Desktop 10.1.15 and earlier, Reader X Desktop 10.1.15 and earlier",
"sources": [
{
"db": "NVD",
"id": "CVE-2015-6695"
},
{
"db": "JVNDB",
"id": "JVNDB-2015-005252"
},
{
"db": "ZDI",
"id": "ZDI-15-472"
},
{
"db": "BID",
"id": "77069"
},
{
"db": "VULHUB",
"id": "VHN-84656"
}
],
"trust": 2.61
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "NVD",
"id": "CVE-2015-6695",
"trust": 3.5
},
{
"db": "ZDI",
"id": "ZDI-15-472",
"trust": 2.7
},
{
"db": "SECTRACK",
"id": "1033796",
"trust": 1.7
},
{
"db": "JVNDB",
"id": "JVNDB-2015-005252",
"trust": 0.8
},
{
"db": "ZDI_CAN",
"id": "ZDI-CAN-3016",
"trust": 0.7
},
{
"db": "CNNVD",
"id": "CNNVD-201510-208",
"trust": 0.7
},
{
"db": "ZDI",
"id": "ZDI-15-471",
"trust": 0.3
},
{
"db": "ZDI",
"id": "ZDI-15-466",
"trust": 0.3
},
{
"db": "ZDI",
"id": "ZDI-15-467",
"trust": 0.3
},
{
"db": "ZDI",
"id": "ZDI-15-473",
"trust": 0.3
},
{
"db": "BID",
"id": "77069",
"trust": 0.3
},
{
"db": "VULHUB",
"id": "VHN-84656",
"trust": 0.1
}
],
"sources": [
{
"db": "ZDI",
"id": "ZDI-15-472"
},
{
"db": "VULHUB",
"id": "VHN-84656"
},
{
"db": "BID",
"id": "77069"
},
{
"db": "JVNDB",
"id": "JVNDB-2015-005252"
},
{
"db": "CNNVD",
"id": "CNNVD-201510-208"
},
{
"db": "NVD",
"id": "CVE-2015-6695"
}
]
},
"id": "VAR-201510-0344",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "VULHUB",
"id": "VHN-84656"
}
],
"trust": 0.01
},
"last_update_date": "2025-04-13T23:03:48.305000Z",
"patch": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/patch#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"title": "APSB15-24",
"trust": 1.5,
"url": "https://helpx.adobe.com/security/products/acrobat/apsb15-24.html"
},
{
"title": "APSB15-24",
"trust": 0.8,
"url": "https://helpx.adobe.com/jp/security/products/reader/apsb15-24.html"
},
{
"title": "\u30a2\u30c9\u30d3 \u30b7\u30b9\u30c6\u30e0\u30ba\u793e Adobe Reader \u306e\u8106\u5f31\u6027\u306b\u95a2\u3059\u308b\u304a\u77e5\u3089\u305b",
"trust": 0.8,
"url": "http://www.fmworld.net/biz/common/adobe/20151015.html"
},
{
"title": "Multiple Adobe Product Buffer Overflow Vulnerability Fix",
"trust": 0.6,
"url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=58057"
}
],
"sources": [
{
"db": "ZDI",
"id": "ZDI-15-472"
},
{
"db": "JVNDB",
"id": "JVNDB-2015-005252"
},
{
"db": "CNNVD",
"id": "CNNVD-201510-208"
}
]
},
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "CWE-119",
"trust": 1.9
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-84656"
},
{
"db": "JVNDB",
"id": "JVNDB-2015-005252"
},
{
"db": "NVD",
"id": "CVE-2015-6695"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 2.7,
"url": "https://helpx.adobe.com/security/products/acrobat/apsb15-24.html"
},
{
"trust": 1.7,
"url": "http://www.zerodayinitiative.com/advisories/zdi-15-472"
},
{
"trust": 1.7,
"url": "http://www.securitytracker.com/id/1033796"
},
{
"trust": 0.8,
"url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-6695"
},
{
"trust": 0.8,
"url": "http://www.ipa.go.jp/security/ciadr/vul/20151014-adobereader.html"
},
{
"trust": 0.8,
"url": "http://www.jpcert.or.jp/at/2015/at150035.html"
},
{
"trust": 0.8,
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2015-6695"
},
{
"trust": 0.8,
"url": "http://www.npa.go.jp/cyberpolice/topics/?seq=17022"
},
{
"trust": 0.3,
"url": "http://www.adobe.com"
},
{
"trust": 0.3,
"url": "http://www.zerodayinitiative.com/advisories/zdi-15-467/"
},
{
"trust": 0.3,
"url": "http://www.zerodayinitiative.com/advisories/zdi-15-466/"
},
{
"trust": 0.3,
"url": "http://www.zerodayinitiative.com/advisories/zdi-15-473/"
},
{
"trust": 0.3,
"url": "http://www.zerodayinitiative.com/advisories/zdi-15-471/"
},
{
"trust": 0.3,
"url": "http://www.zerodayinitiative.com/advisories/zdi-15-472/"
}
],
"sources": [
{
"db": "ZDI",
"id": "ZDI-15-472"
},
{
"db": "VULHUB",
"id": "VHN-84656"
},
{
"db": "BID",
"id": "77069"
},
{
"db": "JVNDB",
"id": "JVNDB-2015-005252"
},
{
"db": "CNNVD",
"id": "CNNVD-201510-208"
},
{
"db": "NVD",
"id": "CVE-2015-6695"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "ZDI",
"id": "ZDI-15-472"
},
{
"db": "VULHUB",
"id": "VHN-84656"
},
{
"db": "BID",
"id": "77069"
},
{
"db": "JVNDB",
"id": "JVNDB-2015-005252"
},
{
"db": "CNNVD",
"id": "CNNVD-201510-208"
},
{
"db": "NVD",
"id": "CVE-2015-6695"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2015-10-13T00:00:00",
"db": "ZDI",
"id": "ZDI-15-472"
},
{
"date": "2015-10-14T00:00:00",
"db": "VULHUB",
"id": "VHN-84656"
},
{
"date": "2015-10-13T00:00:00",
"db": "BID",
"id": "77069"
},
{
"date": "2015-10-16T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2015-005252"
},
{
"date": "2015-10-15T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201510-208"
},
{
"date": "2015-10-14T23:59:16.957000",
"db": "NVD",
"id": "CVE-2015-6695"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2015-10-13T00:00:00",
"db": "ZDI",
"id": "ZDI-15-472"
},
{
"date": "2020-05-18T00:00:00",
"db": "VULHUB",
"id": "VHN-84656"
},
{
"date": "2015-11-03T19:59:00",
"db": "BID",
"id": "77069"
},
{
"date": "2015-10-16T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2015-005252"
},
{
"date": "2020-05-19T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201510-208"
},
{
"date": "2025-04-12T10:46:40.837000",
"db": "NVD",
"id": "CVE-2015-6695"
}
]
},
"threat_type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/threat_type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "remote",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201510-208"
}
],
"trust": 0.6
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Windows and Mac OS X Run on Adobe Reader and Acrobat Vulnerable to arbitrary code execution",
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2015-005252"
}
],
"trust": 0.8
},
"type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "buffer error",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201510-208"
}
],
"trust": 0.6
}
}
VAR-201510-0350
Vulnerability from variot - Updated: 2025-04-13 23:03The ambientIlluminationColor property implementation in Adobe Reader and Acrobat 10.x before 10.1.16 and 11.x before 11.0.13, Acrobat and Acrobat Reader DC Classic before 2015.006.30094, and Acrobat and Acrobat Reader DC Continuous before 2015.009.20069 on Windows and OS X allows attackers to obtain sensitive information from process memory via a function call, a different vulnerability than CVE-2015-6697, CVE-2015-6699, CVE-2015-6700, CVE-2015-6702, CVE-2015-6703, and CVE-2015-6704. This vulnerability CVE-2015-6697 , CVE-2015-6699 , CVE-2015-6700 , CVE-2015-6702 , CVE-2015-6703 ,and CVE-2015-6704 Is a different vulnerability.An attacker could obtain important information from process memory via a function call. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the handling of the ambientIlluminationColor property. The issue lies in excess values being returned in the error message when the property is called as a function. Adobe Acrobat and Reader are prone to multiple information-disclosure vulnerabilities. An attacker can exploit these issues to gain access to sensitive information that may aid in further attacks. Adobe Reader, etc. are all products of Adobe (Adobe) in the United States. Adobe Reader is a free PDF file reader; Acrobat is a PDF file editing and conversion tool; Acrobat Reader DC is a set of tools for viewing, printing and annotating PDF. A security vulnerability exists in the implementation of the ambientIlluminationColor property of several Adobe products. 30060 and earlier, Acrobat XI Desktop 11.0.12 and earlier, Reader XI Desktop 11.0.12 and earlier, Acrobat X Desktop 10.1.15 and earlier, Reader X Desktop 10.1.15 and earlier
Show details on source website{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"configurations": {
"@id": "https://www.variotdbs.pl/ref/configurations"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-201510-0350",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "acrobat reader dc",
"scope": "gte",
"trust": 1.0,
"vendor": "adobe",
"version": "15.008.20082"
},
{
"model": "acrobat dc",
"scope": "gte",
"trust": 1.0,
"vendor": "adobe",
"version": "15.008.20082"
},
{
"model": "acrobat dc",
"scope": "gte",
"trust": 1.0,
"vendor": "adobe",
"version": "15.006.30060"
},
{
"model": "acrobat reader dc",
"scope": "lt",
"trust": 1.0,
"vendor": "adobe",
"version": "15.009.20069"
},
{
"model": "acrobat dc",
"scope": "lt",
"trust": 1.0,
"vendor": "adobe",
"version": "15.006.30094"
},
{
"model": "acrobat",
"scope": "gte",
"trust": 1.0,
"vendor": "adobe",
"version": "10.0"
},
{
"model": "acrobat reader",
"scope": "lte",
"trust": 1.0,
"vendor": "adobe",
"version": "10.1.15"
},
{
"model": "acrobat reader",
"scope": "gte",
"trust": 1.0,
"vendor": "adobe",
"version": "10.0"
},
{
"model": "acrobat reader",
"scope": "lte",
"trust": 1.0,
"vendor": "adobe",
"version": "11.0.12"
},
{
"model": "acrobat",
"scope": "lte",
"trust": 1.0,
"vendor": "adobe",
"version": "10.1.15"
},
{
"model": "acrobat",
"scope": "lte",
"trust": 1.0,
"vendor": "adobe",
"version": "11.0.12"
},
{
"model": "acrobat reader dc",
"scope": "lt",
"trust": 1.0,
"vendor": "adobe",
"version": "15.006.30094"
},
{
"model": "acrobat",
"scope": "gte",
"trust": 1.0,
"vendor": "adobe",
"version": "11.0.0"
},
{
"model": "acrobat dc",
"scope": "lt",
"trust": 1.0,
"vendor": "adobe",
"version": "15.009.20069"
},
{
"model": "acrobat reader",
"scope": "gte",
"trust": 1.0,
"vendor": "adobe",
"version": "11.0.0"
},
{
"model": "acrobat reader dc",
"scope": "gte",
"trust": 1.0,
"vendor": "adobe",
"version": "15.006.30060"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.9,
"vendor": "adobe",
"version": "11.0.6"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.9,
"vendor": "adobe",
"version": "11.0.9"
},
{
"model": "acrobat dc",
"scope": "eq",
"trust": 0.9,
"vendor": "adobe",
"version": "2015.006.30060"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.9,
"vendor": "adobe",
"version": "11.0.3"
},
{
"model": "acrobat dc",
"scope": "eq",
"trust": 0.9,
"vendor": "adobe",
"version": "2015.008.20082"
},
{
"model": "acrobat dc",
"scope": "lt",
"trust": 0.8,
"vendor": "adobe",
"version": "(windows/macintosh)"
},
{
"model": "acrobat reader dc",
"scope": "lt",
"trust": 0.8,
"vendor": "adobe",
"version": "(windows/macintosh)"
},
{
"model": "acrobat reader dc",
"scope": "eq",
"trust": 0.8,
"vendor": "adobe",
"version": "classic 2015.006.30094"
},
{
"model": "acrobat",
"scope": "lt",
"trust": 0.8,
"vendor": "adobe",
"version": "11.x (windows/macintosh)"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.8,
"vendor": "adobe",
"version": "xi desktop 11.0.13"
},
{
"model": "reader",
"scope": "lt",
"trust": 0.8,
"vendor": "adobe",
"version": "11.x (windows/macintosh)"
},
{
"model": "acrobat dc",
"scope": "eq",
"trust": 0.8,
"vendor": "adobe",
"version": "continuous 2015.009.20069"
},
{
"model": "acrobat",
"scope": "lt",
"trust": 0.8,
"vendor": "adobe",
"version": "10.x (windows/macintosh)"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.8,
"vendor": "adobe",
"version": "xi desktop 11.0.13"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.8,
"vendor": "adobe",
"version": "x desktop 10.1.16"
},
{
"model": "acrobat dc",
"scope": "eq",
"trust": 0.8,
"vendor": "adobe",
"version": "classic 2015.006.30094"
},
{
"model": "reader",
"scope": "lt",
"trust": 0.8,
"vendor": "adobe",
"version": "10.x (windows/macintosh)"
},
{
"model": "acrobat reader dc",
"scope": "eq",
"trust": 0.8,
"vendor": "adobe",
"version": "continuous 2015.009.20069"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.8,
"vendor": "adobe",
"version": "x desktop 10.1.16"
},
{
"model": "acrobat reader dc",
"scope": null,
"trust": 0.7,
"vendor": "adobe",
"version": null
},
{
"model": "acrobat reader",
"scope": "eq",
"trust": 0.6,
"vendor": "adobe",
"version": "11.0.8"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.6,
"vendor": "adobe",
"version": "11.0.8"
},
{
"model": "acrobat reader dc",
"scope": "eq",
"trust": 0.6,
"vendor": "adobe",
"version": "2015.006.30060"
},
{
"model": "acrobat reader dc",
"scope": "eq",
"trust": 0.6,
"vendor": "adobe",
"version": "2015.008.20082"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.6,
"vendor": "adobe",
"version": "11.0.5"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1.14"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1.9"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1.1"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1.13"
},
{
"model": "acrobat reader dc",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "2015.8.20082"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.10"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.0"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1.2"
},
{
"model": "acrobat dc",
"scope": "ne",
"trust": 0.3,
"vendor": "adobe",
"version": "2015.006.30094"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1.15"
},
{
"model": "acrobat reader dc",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "2015.6.30060"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.0.3"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1.10"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.3"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.0.13"
},
{
"model": "acrobat",
"scope": "ne",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.13"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0"
},
{
"model": "acrobat reader dc",
"scope": "ne",
"trust": 0.3,
"vendor": "adobe",
"version": "2015.006.30094"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.10"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.4"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1.3"
},
{
"model": "acrobat",
"scope": "ne",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1.16"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.0.2"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.0.1"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.11"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1.4"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1.6"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1.11"
},
{
"model": "reader",
"scope": "ne",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.13"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.7"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1.14"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1.3"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1.1"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1"
},
{
"model": "reader",
"scope": "ne",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1.16"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.0.2"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1.5"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.0"
},
{
"model": "acrobat dc",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "2015.007.20033"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1.12"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.1"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1.2"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1.13"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1.4"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1.8"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1.11"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.0.3"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.2"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.12"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.08"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.7"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.6"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.05"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1.10"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.09"
},
{
"model": "acrobat dc",
"scope": "ne",
"trust": 0.3,
"vendor": "adobe",
"version": "2015.009.20069"
},
{
"model": "acrobat dc",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "2015.006.30033"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1.12"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.1"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.4"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1.9"
},
{
"model": "acrobat reader dc",
"scope": "ne",
"trust": 0.3,
"vendor": "adobe",
"version": "2015.009.20069"
},
{
"model": "acrobat reader dc",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "2015.006.30033"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.12"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.08"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1.7"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.0.1"
},
{
"model": "acrobat reader dc",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "2015.007.20033"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.09"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.11"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1.15"
}
],
"sources": [
{
"db": "ZDI",
"id": "ZDI-15-479"
},
{
"db": "BID",
"id": "77067"
},
{
"db": "JVNDB",
"id": "JVNDB-2015-005258"
},
{
"db": "CNNVD",
"id": "CNNVD-201510-214"
},
{
"db": "NVD",
"id": "CVE-2015-6701"
}
]
},
"configurations": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/configurations#",
"children": {
"@container": "@list"
},
"cpe_match": {
"@container": "@list"
},
"data": {
"@container": "@list"
},
"nodes": {
"@container": "@list"
}
},
"data": [
{
"CVE_data_version": "4.0",
"nodes": [
{
"cpe_match": [
{
"cpe22Uri": "cpe:/a:adobe:acrobat",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/a:adobe:acrobat_dc",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/a:adobe:acrobat_reader_dc",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/a:adobe:acrobat_reader",
"vulnerable": true
}
],
"operator": "OR"
}
]
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2015-005258"
}
]
},
"credits": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/credits#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "AbdulAziz Hariri and Jasiel Spelman of HP Zero Day Initiative",
"sources": [
{
"db": "ZDI",
"id": "ZDI-15-479"
},
{
"db": "BID",
"id": "77067"
}
],
"trust": 1.0
},
"cve": "CVE-2015-6701",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [
{
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "nvd@nist.gov",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 8.6,
"id": "CVE-2015-6701",
"impactScore": 2.9,
"integrityImpact": "NONE",
"severity": "MEDIUM",
"trust": 1.8,
"vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
{
"acInsufInfo": null,
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "ZDI",
"availabilityImpact": "NONE",
"baseScore": 5.0,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 10.0,
"id": "CVE-2015-6701",
"impactScore": 2.9,
"integrityImpact": "NONE",
"obtainAllPrivilege": null,
"obtainOtherPrivilege": null,
"obtainUserPrivilege": null,
"severity": "MEDIUM",
"trust": 0.7,
"userInteractionRequired": null,
"vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
{
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "VULHUB",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 8.6,
"id": "VHN-84662",
"impactScore": 2.9,
"integrityImpact": "NONE",
"severity": "MEDIUM",
"trust": 0.1,
"vectorString": "AV:N/AC:M/AU:N/C:P/I:N/A:N",
"version": "2.0"
}
],
"cvssV3": [],
"severity": [
{
"author": "nvd@nist.gov",
"id": "CVE-2015-6701",
"trust": 1.0,
"value": "MEDIUM"
},
{
"author": "NVD",
"id": "CVE-2015-6701",
"trust": 0.8,
"value": "Medium"
},
{
"author": "ZDI",
"id": "CVE-2015-6701",
"trust": 0.7,
"value": "MEDIUM"
},
{
"author": "CNNVD",
"id": "CNNVD-201510-214",
"trust": 0.6,
"value": "MEDIUM"
},
{
"author": "VULHUB",
"id": "VHN-84662",
"trust": 0.1,
"value": "MEDIUM"
}
]
}
],
"sources": [
{
"db": "ZDI",
"id": "ZDI-15-479"
},
{
"db": "VULHUB",
"id": "VHN-84662"
},
{
"db": "JVNDB",
"id": "JVNDB-2015-005258"
},
{
"db": "CNNVD",
"id": "CNNVD-201510-214"
},
{
"db": "NVD",
"id": "CVE-2015-6701"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "The ambientIlluminationColor property implementation in Adobe Reader and Acrobat 10.x before 10.1.16 and 11.x before 11.0.13, Acrobat and Acrobat Reader DC Classic before 2015.006.30094, and Acrobat and Acrobat Reader DC Continuous before 2015.009.20069 on Windows and OS X allows attackers to obtain sensitive information from process memory via a function call, a different vulnerability than CVE-2015-6697, CVE-2015-6699, CVE-2015-6700, CVE-2015-6702, CVE-2015-6703, and CVE-2015-6704. This vulnerability CVE-2015-6697 , CVE-2015-6699 , CVE-2015-6700 , CVE-2015-6702 , CVE-2015-6703 ,and CVE-2015-6704 Is a different vulnerability.An attacker could obtain important information from process memory via a function call. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the handling of the ambientIlluminationColor property. The issue lies in excess values being returned in the error message when the property is called as a function. Adobe Acrobat and Reader are prone to multiple information-disclosure vulnerabilities. \nAn attacker can exploit these issues to gain access to sensitive information that may aid in further attacks. Adobe Reader, etc. are all products of Adobe (Adobe) in the United States. Adobe Reader is a free PDF file reader; Acrobat is a PDF file editing and conversion tool; Acrobat Reader DC is a set of tools for viewing, printing and annotating PDF. A security vulnerability exists in the implementation of the ambientIlluminationColor property of several Adobe products. 30060 and earlier, Acrobat XI Desktop 11.0.12 and earlier, Reader XI Desktop 11.0.12 and earlier, Acrobat X Desktop 10.1.15 and earlier, Reader X Desktop 10.1.15 and earlier",
"sources": [
{
"db": "NVD",
"id": "CVE-2015-6701"
},
{
"db": "JVNDB",
"id": "JVNDB-2015-005258"
},
{
"db": "ZDI",
"id": "ZDI-15-479"
},
{
"db": "BID",
"id": "77067"
},
{
"db": "VULHUB",
"id": "VHN-84662"
}
],
"trust": 2.61
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "NVD",
"id": "CVE-2015-6701",
"trust": 3.5
},
{
"db": "ZDI",
"id": "ZDI-15-479",
"trust": 2.7
},
{
"db": "SECTRACK",
"id": "1033796",
"trust": 1.7
},
{
"db": "JVNDB",
"id": "JVNDB-2015-005258",
"trust": 0.8
},
{
"db": "ZDI_CAN",
"id": "ZDI-CAN-3048",
"trust": 0.7
},
{
"db": "CNNVD",
"id": "CNNVD-201510-214",
"trust": 0.7
},
{
"db": "ZDI",
"id": "ZDI-15-481",
"trust": 0.3
},
{
"db": "ZDI",
"id": "ZDI-15-475",
"trust": 0.3
},
{
"db": "ZDI",
"id": "ZDI-15-482",
"trust": 0.3
},
{
"db": "ZDI",
"id": "ZDI-15-480",
"trust": 0.3
},
{
"db": "ZDI",
"id": "ZDI-15-478",
"trust": 0.3
},
{
"db": "ZDI",
"id": "ZDI-15-477",
"trust": 0.3
},
{
"db": "BID",
"id": "77067",
"trust": 0.3
},
{
"db": "VULHUB",
"id": "VHN-84662",
"trust": 0.1
}
],
"sources": [
{
"db": "ZDI",
"id": "ZDI-15-479"
},
{
"db": "VULHUB",
"id": "VHN-84662"
},
{
"db": "BID",
"id": "77067"
},
{
"db": "JVNDB",
"id": "JVNDB-2015-005258"
},
{
"db": "CNNVD",
"id": "CNNVD-201510-214"
},
{
"db": "NVD",
"id": "CVE-2015-6701"
}
]
},
"id": "VAR-201510-0350",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "VULHUB",
"id": "VHN-84662"
}
],
"trust": 0.01
},
"last_update_date": "2025-04-13T23:03:48.261000Z",
"patch": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/patch#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"title": "APSB15-24",
"trust": 1.5,
"url": "https://helpx.adobe.com/security/products/acrobat/apsb15-24.html"
},
{
"title": "APSB15-24",
"trust": 0.8,
"url": "https://helpx.adobe.com/jp/security/products/reader/apsb15-24.html"
},
{
"title": "\u30a2\u30c9\u30d3 \u30b7\u30b9\u30c6\u30e0\u30ba\u793e Adobe Reader \u306e\u8106\u5f31\u6027\u306b\u95a2\u3059\u308b\u304a\u77e5\u3089\u305b",
"trust": 0.8,
"url": "http://www.fmworld.net/biz/common/adobe/20151015.html"
},
{
"title": "Multiple Adobe Product security vulnerabilities",
"trust": 0.6,
"url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=58063"
}
],
"sources": [
{
"db": "ZDI",
"id": "ZDI-15-479"
},
{
"db": "JVNDB",
"id": "JVNDB-2015-005258"
},
{
"db": "CNNVD",
"id": "CNNVD-201510-214"
}
]
},
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "CWE-772",
"trust": 1.1
},
{
"problemtype": "CWE-200",
"trust": 0.9
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-84662"
},
{
"db": "JVNDB",
"id": "JVNDB-2015-005258"
},
{
"db": "NVD",
"id": "CVE-2015-6701"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 2.7,
"url": "https://helpx.adobe.com/security/products/acrobat/apsb15-24.html"
},
{
"trust": 1.7,
"url": "http://www.zerodayinitiative.com/advisories/zdi-15-479"
},
{
"trust": 1.7,
"url": "http://www.securitytracker.com/id/1033796"
},
{
"trust": 0.8,
"url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-6701"
},
{
"trust": 0.8,
"url": "http://www.ipa.go.jp/security/ciadr/vul/20151014-adobereader.html"
},
{
"trust": 0.8,
"url": "http://www.jpcert.or.jp/at/2015/at150035.html"
},
{
"trust": 0.8,
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2015-6701"
},
{
"trust": 0.8,
"url": "http://www.npa.go.jp/cyberpolice/topics/?seq=17022"
},
{
"trust": 0.3,
"url": "http://www.adobe.com"
},
{
"trust": 0.3,
"url": "http://www.zerodayinitiative.com/advisories/zdi-15-475/"
},
{
"trust": 0.3,
"url": "http://www.zerodayinitiative.com/advisories/zdi-15-477/"
},
{
"trust": 0.3,
"url": "http://www.zerodayinitiative.com/advisories/zdi-15-479/"
},
{
"trust": 0.3,
"url": "http://www.zerodayinitiative.com/advisories/zdi-15-482/"
},
{
"trust": 0.3,
"url": "http://www.zerodayinitiative.com/advisories/zdi-15-480/"
},
{
"trust": 0.3,
"url": "http://www.zerodayinitiative.com/advisories/zdi-15-481/"
},
{
"trust": 0.3,
"url": "http://www.zerodayinitiative.com/advisories/zdi-15-478/"
}
],
"sources": [
{
"db": "ZDI",
"id": "ZDI-15-479"
},
{
"db": "VULHUB",
"id": "VHN-84662"
},
{
"db": "BID",
"id": "77067"
},
{
"db": "JVNDB",
"id": "JVNDB-2015-005258"
},
{
"db": "CNNVD",
"id": "CNNVD-201510-214"
},
{
"db": "NVD",
"id": "CVE-2015-6701"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "ZDI",
"id": "ZDI-15-479"
},
{
"db": "VULHUB",
"id": "VHN-84662"
},
{
"db": "BID",
"id": "77067"
},
{
"db": "JVNDB",
"id": "JVNDB-2015-005258"
},
{
"db": "CNNVD",
"id": "CNNVD-201510-214"
},
{
"db": "NVD",
"id": "CVE-2015-6701"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2015-10-13T00:00:00",
"db": "ZDI",
"id": "ZDI-15-479"
},
{
"date": "2015-10-14T00:00:00",
"db": "VULHUB",
"id": "VHN-84662"
},
{
"date": "2015-10-13T00:00:00",
"db": "BID",
"id": "77067"
},
{
"date": "2015-10-16T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2015-005258"
},
{
"date": "2015-10-15T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201510-214"
},
{
"date": "2015-10-14T23:59:23.800000",
"db": "NVD",
"id": "CVE-2015-6701"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2015-10-13T00:00:00",
"db": "ZDI",
"id": "ZDI-15-479"
},
{
"date": "2020-05-18T00:00:00",
"db": "VULHUB",
"id": "VHN-84662"
},
{
"date": "2015-11-03T19:59:00",
"db": "BID",
"id": "77067"
},
{
"date": "2015-10-16T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2015-005258"
},
{
"date": "2020-05-19T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201510-214"
},
{
"date": "2025-04-12T10:46:40.837000",
"db": "NVD",
"id": "CVE-2015-6701"
}
]
},
"threat_type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/threat_type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "remote",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201510-214"
}
],
"trust": 0.6
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Windows and Mac OS X Run on Adobe Reader and Acrobat of ambientIlluminationColor Vulnerability in which important information is obtained from process memory in property implementation",
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2015-005258"
}
],
"trust": 0.8
},
"type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "information disclosure",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201510-214"
}
],
"trust": 0.6
}
}
VAR-201510-0043
Vulnerability from variot - Updated: 2025-04-13 23:03The CBAutoConfigCommentRepository method in Adobe Reader and Acrobat 10.x before 10.1.16 and 11.x before 11.0.13, Acrobat and Acrobat Reader DC Classic before 2015.006.30094, and Acrobat and Acrobat Reader DC Continuous before 2015.009.20069 on Windows and OS X allows attackers to bypass JavaScript API execution restrictions via unspecified vectors, a different vulnerability than CVE-2015-6707, CVE-2015-6708, CVE-2015-6709, CVE-2015-6710, CVE-2015-6711, CVE-2015-6712, CVE-2015-6713, CVE-2015-6714, CVE-2015-6715, CVE-2015-6716, CVE-2015-6717, CVE-2015-6718, CVE-2015-6719, CVE-2015-6720, CVE-2015-6721, CVE-2015-6722, CVE-2015-6723, CVE-2015-6724, CVE-2015-6725, CVE-2015-7614, CVE-2015-7616, CVE-2015-7619, CVE-2015-7620, and CVE-2015-7623. This vulnerability CVE-2015-6707 , CVE-2015-6708 , CVE-2015-6709 , CVE-2015-6710 , CVE-2015-6711 , CVE-2015-6712 , CVE-2015-6713 , CVE-2015-6714 , CVE-2015-6715 , CVE-2015-6716 , CVE-2015-6717 , CVE-2015-6718 , CVE-2015-6719 , CVE-2015-6720 , CVE-2015-6721 , CVE-2015-6722 , CVE-2015-6723 , CVE-2015-6724 , CVE-2015-6725 , CVE-2015-7614 , CVE-2015-7616 , CVE-2015-7619 , CVE-2015-7620 ,and CVE-2015-7623 Is a different vulnerability.By the attacker, JavaScript API Execution restrictions may be avoided. This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Adobe Reader DC. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the CBAutoConfigCommentRepository method. By creating a specially crafted PDF with specific Javascript instructions, it is possible to bypass the Javascript API restrictions. A remote attacker could exploit this vulnerability to execute arbitrary code. Adobe Acrobat and Reader are prone to multiple security-bypass vulnerabilities. An attacker can exploit these issues to bypass certain security restrictions and perform unauthorized actions. This may lead to further attacks. Adobe Reader, etc. are all products of Adobe (Adobe) in the United States. Adobe Reader is a free PDF file reader; Acrobat is a PDF file editing and conversion tool; Acrobat Reader DC is a set of tools for viewing, printing and annotating PDF. Classic and Continuous are two update mechanisms provided by Acrobat Reader DC Product Download Center. A security vulnerability exists in the CBAutoConfigCommentRepository method of several Adobe products. 30060 and earlier, Acrobat XI Desktop 11.0.12 and earlier, Reader XI Desktop 11.0.12 and earlier, Acrobat X Desktop 10.1.15 and earlier, Reader X Desktop 10.1.15 and earlier
Show details on source website{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"configurations": {
"@id": "https://www.variotdbs.pl/ref/configurations"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-201510-0043",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "acrobat reader dc",
"scope": "gte",
"trust": 1.0,
"vendor": "adobe",
"version": "15.008.20082"
},
{
"model": "acrobat dc",
"scope": "gte",
"trust": 1.0,
"vendor": "adobe",
"version": "15.008.20082"
},
{
"model": "acrobat dc",
"scope": "gte",
"trust": 1.0,
"vendor": "adobe",
"version": "15.006.30060"
},
{
"model": "acrobat reader dc",
"scope": "lt",
"trust": 1.0,
"vendor": "adobe",
"version": "15.009.20069"
},
{
"model": "acrobat dc",
"scope": "lt",
"trust": 1.0,
"vendor": "adobe",
"version": "15.006.30094"
},
{
"model": "acrobat",
"scope": "gte",
"trust": 1.0,
"vendor": "adobe",
"version": "10.0"
},
{
"model": "acrobat reader",
"scope": "lte",
"trust": 1.0,
"vendor": "adobe",
"version": "10.1.15"
},
{
"model": "acrobat reader",
"scope": "gte",
"trust": 1.0,
"vendor": "adobe",
"version": "10.0"
},
{
"model": "acrobat reader",
"scope": "lte",
"trust": 1.0,
"vendor": "adobe",
"version": "11.0.12"
},
{
"model": "acrobat",
"scope": "lte",
"trust": 1.0,
"vendor": "adobe",
"version": "10.1.15"
},
{
"model": "acrobat",
"scope": "lte",
"trust": 1.0,
"vendor": "adobe",
"version": "11.0.12"
},
{
"model": "acrobat reader dc",
"scope": "lt",
"trust": 1.0,
"vendor": "adobe",
"version": "15.006.30094"
},
{
"model": "acrobat",
"scope": "gte",
"trust": 1.0,
"vendor": "adobe",
"version": "11.0.0"
},
{
"model": "acrobat dc",
"scope": "lt",
"trust": 1.0,
"vendor": "adobe",
"version": "15.009.20069"
},
{
"model": "acrobat reader",
"scope": "gte",
"trust": 1.0,
"vendor": "adobe",
"version": "11.0.0"
},
{
"model": "acrobat reader dc",
"scope": "gte",
"trust": 1.0,
"vendor": "adobe",
"version": "15.006.30060"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.9,
"vendor": "adobe",
"version": "10.1.14"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.9,
"vendor": "adobe",
"version": "10.1.10"
},
{
"model": "acrobat dc",
"scope": "lt",
"trust": 0.8,
"vendor": "adobe",
"version": "(windows/macintosh)"
},
{
"model": "acrobat reader dc",
"scope": "lt",
"trust": 0.8,
"vendor": "adobe",
"version": "(windows/macintosh)"
},
{
"model": "acrobat reader dc",
"scope": "eq",
"trust": 0.8,
"vendor": "adobe",
"version": "classic 2015.006.30094"
},
{
"model": "acrobat",
"scope": "lt",
"trust": 0.8,
"vendor": "adobe",
"version": "11.x (windows/macintosh)"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.8,
"vendor": "adobe",
"version": "xi desktop 11.0.13"
},
{
"model": "reader",
"scope": "lt",
"trust": 0.8,
"vendor": "adobe",
"version": "11.x (windows/macintosh)"
},
{
"model": "acrobat dc",
"scope": "eq",
"trust": 0.8,
"vendor": "adobe",
"version": "continuous 2015.009.20069"
},
{
"model": "acrobat",
"scope": "lt",
"trust": 0.8,
"vendor": "adobe",
"version": "10.x (windows/macintosh)"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.8,
"vendor": "adobe",
"version": "xi desktop 11.0.13"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.8,
"vendor": "adobe",
"version": "x desktop 10.1.16"
},
{
"model": "acrobat dc",
"scope": "eq",
"trust": 0.8,
"vendor": "adobe",
"version": "classic 2015.006.30094"
},
{
"model": "reader",
"scope": "lt",
"trust": 0.8,
"vendor": "adobe",
"version": "10.x (windows/macintosh)"
},
{
"model": "acrobat reader dc",
"scope": "eq",
"trust": 0.8,
"vendor": "adobe",
"version": "continuous 2015.009.20069"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.8,
"vendor": "adobe",
"version": "x desktop 10.1.16"
},
{
"model": "acrobat reader dc",
"scope": null,
"trust": 0.7,
"vendor": "adobe",
"version": null
},
{
"model": "acrobat reader",
"scope": "eq",
"trust": 0.6,
"vendor": "adobe",
"version": "11.0.5"
},
{
"model": "acrobat reader",
"scope": "eq",
"trust": 0.6,
"vendor": "adobe",
"version": "11.0.2"
},
{
"model": "acrobat reader",
"scope": "eq",
"trust": 0.6,
"vendor": "adobe",
"version": "10.1.9"
},
{
"model": "acrobat reader",
"scope": "eq",
"trust": 0.6,
"vendor": "adobe",
"version": "10.1.10"
},
{
"model": "acrobat reader",
"scope": "eq",
"trust": 0.6,
"vendor": "adobe",
"version": "11.0.1"
},
{
"model": "acrobat reader",
"scope": "eq",
"trust": 0.6,
"vendor": "adobe",
"version": "11.0.4"
},
{
"model": "acrobat reader",
"scope": "eq",
"trust": 0.6,
"vendor": "adobe",
"version": "10.1.8"
},
{
"model": "acrobat reader",
"scope": "eq",
"trust": 0.6,
"vendor": "adobe",
"version": "11.0.3"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1.9"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1.1"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1.13"
},
{
"model": "acrobat reader dc",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "2015.8.20082"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.10"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.0"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1.2"
},
{
"model": "acrobat dc",
"scope": "ne",
"trust": 0.3,
"vendor": "adobe",
"version": "2015.006.30094"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1.15"
},
{
"model": "acrobat reader dc",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "2015.6.30060"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.0.3"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1.10"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.3"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.0.13"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.6"
},
{
"model": "acrobat",
"scope": "ne",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.13"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0"
},
{
"model": "acrobat reader dc",
"scope": "ne",
"trust": 0.3,
"vendor": "adobe",
"version": "2015.006.30094"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.10"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.4"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1.3"
},
{
"model": "acrobat",
"scope": "ne",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1.16"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.0.2"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.0.1"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.11"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1.4"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1.6"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1.11"
},
{
"model": "reader",
"scope": "ne",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.13"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.7"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1.14"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1.3"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1.1"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1"
},
{
"model": "reader",
"scope": "ne",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1.16"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.0.2"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1.5"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.0"
},
{
"model": "acrobat dc",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "2015.007.20033"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1.12"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.1"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1.2"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1.13"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1.4"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1.8"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1.11"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.0.3"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.2"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.12"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.08"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.9"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.7"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.6"
},
{
"model": "acrobat dc",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "2015.006.30060"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.05"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.09"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.3"
},
{
"model": "acrobat dc",
"scope": "ne",
"trust": 0.3,
"vendor": "adobe",
"version": "2015.009.20069"
},
{
"model": "acrobat dc",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "2015.006.30033"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1.12"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.1"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.4"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1.9"
},
{
"model": "acrobat reader dc",
"scope": "ne",
"trust": 0.3,
"vendor": "adobe",
"version": "2015.009.20069"
},
{
"model": "acrobat reader dc",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "2015.006.30033"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.12"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.08"
},
{
"model": "acrobat dc",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "2015.008.20082"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1.7"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.0.1"
},
{
"model": "acrobat reader dc",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "2015.007.20033"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.09"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.11"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1.15"
}
],
"sources": [
{
"db": "ZDI",
"id": "ZDI-15-498"
},
{
"db": "BID",
"id": "77074"
},
{
"db": "JVNDB",
"id": "JVNDB-2015-005284"
},
{
"db": "CNNVD",
"id": "CNNVD-201510-243"
},
{
"db": "NVD",
"id": "CVE-2015-7618"
}
]
},
"configurations": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/configurations#",
"children": {
"@container": "@list"
},
"cpe_match": {
"@container": "@list"
},
"data": {
"@container": "@list"
},
"nodes": {
"@container": "@list"
}
},
"data": [
{
"CVE_data_version": "4.0",
"nodes": [
{
"cpe_match": [
{
"cpe22Uri": "cpe:/a:adobe:acrobat",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/a:adobe:acrobat_dc",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/a:adobe:acrobat_reader_dc",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/a:adobe:acrobat_reader",
"vulnerable": true
}
],
"operator": "OR"
}
]
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2015-005284"
}
]
},
"credits": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/credits#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Matt Molinyawe and Jasiel Spelman of HP Zero Day Initiative",
"sources": [
{
"db": "ZDI",
"id": "ZDI-15-498"
}
],
"trust": 0.7
},
"cve": "CVE-2015-7618",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [
{
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "nvd@nist.gov",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 8.6,
"id": "CVE-2015-7618",
"impactScore": 6.4,
"integrityImpact": "PARTIAL",
"severity": "MEDIUM",
"trust": 1.7,
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
{
"acInsufInfo": null,
"accessComplexity": "Medium",
"accessVector": "Network",
"authentication": "None",
"author": "NVD",
"availabilityImpact": "Complete",
"baseScore": 9.3,
"confidentialityImpact": "Complete",
"exploitabilityScore": null,
"id": "CVE-2015-7618",
"impactScore": null,
"integrityImpact": "Complete",
"obtainAllPrivilege": null,
"obtainOtherPrivilege": null,
"obtainUserPrivilege": null,
"severity": "High",
"trust": 0.8,
"userInteractionRequired": null,
"vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
{
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "VULHUB",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 8.6,
"id": "VHN-85579",
"impactScore": 6.4,
"integrityImpact": "PARTIAL",
"severity": "MEDIUM",
"trust": 0.1,
"vectorString": "AV:N/AC:M/AU:N/C:P/I:P/A:P",
"version": "2.0"
}
],
"cvssV3": [],
"severity": [
{
"author": "nvd@nist.gov",
"id": "CVE-2015-7618",
"trust": 1.0,
"value": "MEDIUM"
},
{
"author": "NVD",
"id": "CVE-2015-7618",
"trust": 0.8,
"value": "High"
},
{
"author": "ZDI",
"id": "CVE-2015-7618",
"trust": 0.7,
"value": "MEDIUM"
},
{
"author": "CNNVD",
"id": "CNNVD-201510-243",
"trust": 0.6,
"value": "CRITICAL"
},
{
"author": "VULHUB",
"id": "VHN-85579",
"trust": 0.1,
"value": "MEDIUM"
}
]
}
],
"sources": [
{
"db": "ZDI",
"id": "ZDI-15-498"
},
{
"db": "VULHUB",
"id": "VHN-85579"
},
{
"db": "JVNDB",
"id": "JVNDB-2015-005284"
},
{
"db": "CNNVD",
"id": "CNNVD-201510-243"
},
{
"db": "NVD",
"id": "CVE-2015-7618"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "The CBAutoConfigCommentRepository method in Adobe Reader and Acrobat 10.x before 10.1.16 and 11.x before 11.0.13, Acrobat and Acrobat Reader DC Classic before 2015.006.30094, and Acrobat and Acrobat Reader DC Continuous before 2015.009.20069 on Windows and OS X allows attackers to bypass JavaScript API execution restrictions via unspecified vectors, a different vulnerability than CVE-2015-6707, CVE-2015-6708, CVE-2015-6709, CVE-2015-6710, CVE-2015-6711, CVE-2015-6712, CVE-2015-6713, CVE-2015-6714, CVE-2015-6715, CVE-2015-6716, CVE-2015-6717, CVE-2015-6718, CVE-2015-6719, CVE-2015-6720, CVE-2015-6721, CVE-2015-6722, CVE-2015-6723, CVE-2015-6724, CVE-2015-6725, CVE-2015-7614, CVE-2015-7616, CVE-2015-7619, CVE-2015-7620, and CVE-2015-7623. This vulnerability CVE-2015-6707 , CVE-2015-6708 , CVE-2015-6709 , CVE-2015-6710 , CVE-2015-6711 , CVE-2015-6712 , CVE-2015-6713 , CVE-2015-6714 , CVE-2015-6715 , CVE-2015-6716 , CVE-2015-6717 , CVE-2015-6718 , CVE-2015-6719 , CVE-2015-6720 , CVE-2015-6721 , CVE-2015-6722 , CVE-2015-6723 , CVE-2015-6724 , CVE-2015-6725 , CVE-2015-7614 , CVE-2015-7616 , CVE-2015-7619 , CVE-2015-7620 ,and CVE-2015-7623 Is a different vulnerability.By the attacker, JavaScript API Execution restrictions may be avoided. This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Adobe Reader DC. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the CBAutoConfigCommentRepository method. By creating a specially crafted PDF with specific Javascript instructions, it is possible to bypass the Javascript API restrictions. A remote attacker could exploit this vulnerability to execute arbitrary code. Adobe Acrobat and Reader are prone to multiple security-bypass vulnerabilities. \nAn attacker can exploit these issues to bypass certain security restrictions and perform unauthorized actions. This may lead to further attacks. Adobe Reader, etc. are all products of Adobe (Adobe) in the United States. Adobe Reader is a free PDF file reader; Acrobat is a PDF file editing and conversion tool; Acrobat Reader DC is a set of tools for viewing, printing and annotating PDF. Classic and Continuous are two update mechanisms provided by Acrobat Reader DC Product Download Center. A security vulnerability exists in the CBAutoConfigCommentRepository method of several Adobe products. 30060 and earlier, Acrobat XI Desktop 11.0.12 and earlier, Reader XI Desktop 11.0.12 and earlier, Acrobat X Desktop 10.1.15 and earlier, Reader X Desktop 10.1.15 and earlier",
"sources": [
{
"db": "NVD",
"id": "CVE-2015-7618"
},
{
"db": "JVNDB",
"id": "JVNDB-2015-005284"
},
{
"db": "ZDI",
"id": "ZDI-15-498"
},
{
"db": "BID",
"id": "77074"
},
{
"db": "VULHUB",
"id": "VHN-85579"
}
],
"trust": 2.61
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "NVD",
"id": "CVE-2015-7618",
"trust": 3.5
},
{
"db": "ZDI",
"id": "ZDI-15-498",
"trust": 2.4
},
{
"db": "SECTRACK",
"id": "1033796",
"trust": 1.7
},
{
"db": "JVNDB",
"id": "JVNDB-2015-005284",
"trust": 0.8
},
{
"db": "ZDI_CAN",
"id": "ZDI-CAN-3082",
"trust": 0.7
},
{
"db": "CNNVD",
"id": "CNNVD-201510-243",
"trust": 0.7
},
{
"db": "BID",
"id": "77074",
"trust": 0.3
},
{
"db": "VULHUB",
"id": "VHN-85579",
"trust": 0.1
}
],
"sources": [
{
"db": "ZDI",
"id": "ZDI-15-498"
},
{
"db": "VULHUB",
"id": "VHN-85579"
},
{
"db": "BID",
"id": "77074"
},
{
"db": "JVNDB",
"id": "JVNDB-2015-005284"
},
{
"db": "CNNVD",
"id": "CNNVD-201510-243"
},
{
"db": "NVD",
"id": "CVE-2015-7618"
}
]
},
"id": "VAR-201510-0043",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "VULHUB",
"id": "VHN-85579"
}
],
"trust": 0.01
},
"last_update_date": "2025-04-13T23:03:47.752000Z",
"patch": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/patch#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"title": "APSB15-24",
"trust": 1.5,
"url": "https://helpx.adobe.com/security/products/acrobat/apsb15-24.html"
},
{
"title": "APSB15-24",
"trust": 0.8,
"url": "https://helpx.adobe.com/jp/security/products/reader/apsb15-24.html"
},
{
"title": "\u30a2\u30c9\u30d3 \u30b7\u30b9\u30c6\u30e0\u30ba\u793e Adobe Reader \u306e\u8106\u5f31\u6027\u306b\u95a2\u3059\u308b\u304a\u77e5\u3089\u305b",
"trust": 0.8,
"url": "http://www.fmworld.net/biz/common/adobe/20151015.html"
},
{
"title": "Multiple Adobe Product Privilege License and Access Control Vulnerability Fixes",
"trust": 0.6,
"url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=58092"
}
],
"sources": [
{
"db": "ZDI",
"id": "ZDI-15-498"
},
{
"db": "JVNDB",
"id": "JVNDB-2015-005284"
},
{
"db": "CNNVD",
"id": "CNNVD-201510-243"
}
]
},
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "CWE-416",
"trust": 1.1
},
{
"problemtype": "CWE-264",
"trust": 0.9
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-85579"
},
{
"db": "JVNDB",
"id": "JVNDB-2015-005284"
},
{
"db": "NVD",
"id": "CVE-2015-7618"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 2.4,
"url": "https://helpx.adobe.com/security/products/acrobat/apsb15-24.html"
},
{
"trust": 1.7,
"url": "http://www.zerodayinitiative.com/advisories/zdi-15-498"
},
{
"trust": 1.7,
"url": "http://www.securitytracker.com/id/1033796"
},
{
"trust": 0.8,
"url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-7618"
},
{
"trust": 0.8,
"url": "http://www.ipa.go.jp/security/ciadr/vul/20151014-adobereader.html"
},
{
"trust": 0.8,
"url": "http://www.jpcert.or.jp/at/2015/at150035.html"
},
{
"trust": 0.8,
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2015-7618"
},
{
"trust": 0.8,
"url": "http://www.npa.go.jp/cyberpolice/topics/?seq=17022"
},
{
"trust": 0.3,
"url": "http://www.adobe.com"
}
],
"sources": [
{
"db": "ZDI",
"id": "ZDI-15-498"
},
{
"db": "VULHUB",
"id": "VHN-85579"
},
{
"db": "BID",
"id": "77074"
},
{
"db": "JVNDB",
"id": "JVNDB-2015-005284"
},
{
"db": "CNNVD",
"id": "CNNVD-201510-243"
},
{
"db": "NVD",
"id": "CVE-2015-7618"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "ZDI",
"id": "ZDI-15-498"
},
{
"db": "VULHUB",
"id": "VHN-85579"
},
{
"db": "BID",
"id": "77074"
},
{
"db": "JVNDB",
"id": "JVNDB-2015-005284"
},
{
"db": "CNNVD",
"id": "CNNVD-201510-243"
},
{
"db": "NVD",
"id": "CVE-2015-7618"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2015-10-13T00:00:00",
"db": "ZDI",
"id": "ZDI-15-498"
},
{
"date": "2015-10-14T00:00:00",
"db": "VULHUB",
"id": "VHN-85579"
},
{
"date": "2015-10-13T00:00:00",
"db": "BID",
"id": "77074"
},
{
"date": "2015-10-16T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2015-005284"
},
{
"date": "2015-10-15T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201510-243"
},
{
"date": "2015-10-14T23:59:51.980000",
"db": "NVD",
"id": "CVE-2015-7618"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2015-10-13T00:00:00",
"db": "ZDI",
"id": "ZDI-15-498"
},
{
"date": "2020-05-18T00:00:00",
"db": "VULHUB",
"id": "VHN-85579"
},
{
"date": "2015-11-03T19:59:00",
"db": "BID",
"id": "77074"
},
{
"date": "2015-10-16T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2015-005284"
},
{
"date": "2020-05-19T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201510-243"
},
{
"date": "2025-04-12T10:46:40.837000",
"db": "NVD",
"id": "CVE-2015-7618"
}
]
},
"threat_type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/threat_type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "remote",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201510-243"
}
],
"trust": 0.6
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Windows and Mac OS X Run on Adobe Reader and Acrobat of CBAutoConfigCommentRepository In the method JavaScript API Vulnerability that circumvents execution restrictions",
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2015-005284"
}
],
"trust": 0.8
},
"type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "resource management error",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201510-243"
}
],
"trust": 0.6
}
}
VAR-201510-0358
Vulnerability from variot - Updated: 2025-04-13 23:03Use-after-free vulnerability in Adobe Reader and Acrobat 10.x before 10.1.16 and 11.x before 11.0.13, Acrobat and Acrobat Reader DC Classic before 2015.006.30094, and Acrobat and Acrobat Reader DC Continuous before 2015.009.20069 on Windows and OS X allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-5586, CVE-2015-6683, CVE-2015-6684, CVE-2015-6688, CVE-2015-6689, CVE-2015-6690, CVE-2015-6691, CVE-2015-7615, CVE-2015-7617, and CVE-2015-7621. This vulnerability CVE-2015-5586 , CVE-2015-6683 , CVE-2015-6684 , CVE-2015-6688 , CVE-2015-6689 , CVE-2015-6690 , CVE-2015-6691 , CVE-2015-7615 , CVE-2015-7617 ,and CVE-2015-7621 Is a different vulnerability. Supplementary information : CWE Vulnerability type by CWE-416: Use-after-free ( Use of freed memory ) Has been identified. http://cwe.mitre.org/data/definitions/416.htmlAn attacker could execute arbitrary code. Adobe Acrobat and Reader are prone to multiple remote code-execution vulnerabilities. Failed exploit attempts will likely cause a denial-of-service condition. Adobe Reader, etc. are all products of Adobe (Adobe) in the United States. Adobe Reader is a free PDF file reader; Acrobat is a PDF file editing and conversion tool; Acrobat Reader DC is a set of tools for viewing, printing and annotating PDF. A use-after-free vulnerability exists in several Adobe products. 30060 and earlier, Acrobat XI Desktop 11.0.12 and earlier, Reader XI Desktop 11.0.12 and earlier, Acrobat X Desktop 10.1.15 and earlier, Reader X Desktop 10.1.15 and earlier
Show details on source website{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"configurations": {
"@id": "https://www.variotdbs.pl/ref/configurations"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-201510-0358",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "acrobat reader dc",
"scope": "gte",
"trust": 1.0,
"vendor": "adobe",
"version": "15.008.20082"
},
{
"model": "acrobat dc",
"scope": "gte",
"trust": 1.0,
"vendor": "adobe",
"version": "15.008.20082"
},
{
"model": "acrobat dc",
"scope": "gte",
"trust": 1.0,
"vendor": "adobe",
"version": "15.006.30060"
},
{
"model": "acrobat reader dc",
"scope": "lt",
"trust": 1.0,
"vendor": "adobe",
"version": "15.009.20069"
},
{
"model": "acrobat dc",
"scope": "lt",
"trust": 1.0,
"vendor": "adobe",
"version": "15.006.30094"
},
{
"model": "acrobat",
"scope": "gte",
"trust": 1.0,
"vendor": "adobe",
"version": "10.0"
},
{
"model": "acrobat reader",
"scope": "lte",
"trust": 1.0,
"vendor": "adobe",
"version": "10.1.15"
},
{
"model": "acrobat reader",
"scope": "gte",
"trust": 1.0,
"vendor": "adobe",
"version": "10.0"
},
{
"model": "acrobat reader",
"scope": "lte",
"trust": 1.0,
"vendor": "adobe",
"version": "11.0.12"
},
{
"model": "acrobat",
"scope": "lte",
"trust": 1.0,
"vendor": "adobe",
"version": "10.1.15"
},
{
"model": "acrobat",
"scope": "lte",
"trust": 1.0,
"vendor": "adobe",
"version": "11.0.12"
},
{
"model": "acrobat reader dc",
"scope": "lt",
"trust": 1.0,
"vendor": "adobe",
"version": "15.006.30094"
},
{
"model": "acrobat",
"scope": "gte",
"trust": 1.0,
"vendor": "adobe",
"version": "11.0.0"
},
{
"model": "acrobat dc",
"scope": "lt",
"trust": 1.0,
"vendor": "adobe",
"version": "15.009.20069"
},
{
"model": "acrobat reader",
"scope": "gte",
"trust": 1.0,
"vendor": "adobe",
"version": "11.0.0"
},
{
"model": "acrobat reader dc",
"scope": "gte",
"trust": 1.0,
"vendor": "adobe",
"version": "15.006.30060"
},
{
"model": "acrobat dc",
"scope": "lt",
"trust": 0.8,
"vendor": "adobe",
"version": "(windows/macintosh)"
},
{
"model": "acrobat reader dc",
"scope": "lt",
"trust": 0.8,
"vendor": "adobe",
"version": "(windows/macintosh)"
},
{
"model": "acrobat reader dc",
"scope": "eq",
"trust": 0.8,
"vendor": "adobe",
"version": "classic 2015.006.30094"
},
{
"model": "acrobat",
"scope": "lt",
"trust": 0.8,
"vendor": "adobe",
"version": "11.x (windows/macintosh)"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.8,
"vendor": "adobe",
"version": "xi desktop 11.0.13"
},
{
"model": "reader",
"scope": "lt",
"trust": 0.8,
"vendor": "adobe",
"version": "11.x (windows/macintosh)"
},
{
"model": "acrobat dc",
"scope": "eq",
"trust": 0.8,
"vendor": "adobe",
"version": "continuous 2015.009.20069"
},
{
"model": "acrobat",
"scope": "lt",
"trust": 0.8,
"vendor": "adobe",
"version": "10.x (windows/macintosh)"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.8,
"vendor": "adobe",
"version": "xi desktop 11.0.13"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.8,
"vendor": "adobe",
"version": "x desktop 10.1.16"
},
{
"model": "acrobat dc",
"scope": "eq",
"trust": 0.8,
"vendor": "adobe",
"version": "classic 2015.006.30094"
},
{
"model": "reader",
"scope": "lt",
"trust": 0.8,
"vendor": "adobe",
"version": "10.x (windows/macintosh)"
},
{
"model": "acrobat reader dc",
"scope": "eq",
"trust": 0.8,
"vendor": "adobe",
"version": "continuous 2015.009.20069"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.8,
"vendor": "adobe",
"version": "x desktop 10.1.16"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.6,
"vendor": "adobe",
"version": "10.1.8"
},
{
"model": "acrobat reader",
"scope": "eq",
"trust": 0.6,
"vendor": "adobe",
"version": "10.1.2"
},
{
"model": "acrobat reader",
"scope": "eq",
"trust": 0.6,
"vendor": "adobe",
"version": "10.1.4"
},
{
"model": "acrobat reader",
"scope": "eq",
"trust": 0.6,
"vendor": "adobe",
"version": "10.1.0"
},
{
"model": "acrobat reader",
"scope": "eq",
"trust": 0.6,
"vendor": "adobe",
"version": "10.1.7"
},
{
"model": "acrobat reader",
"scope": "eq",
"trust": 0.6,
"vendor": "adobe",
"version": "10.1.3"
},
{
"model": "acrobat reader",
"scope": "eq",
"trust": 0.6,
"vendor": "adobe",
"version": "10.1.1"
},
{
"model": "acrobat reader",
"scope": "eq",
"trust": 0.6,
"vendor": "adobe",
"version": "10.1.5"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.6,
"vendor": "adobe",
"version": "10.1.5"
},
{
"model": "acrobat reader",
"scope": "eq",
"trust": 0.6,
"vendor": "adobe",
"version": "10.1.6"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1.3"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1.2"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1.1"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.0.3"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.0.2"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.0.1"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.0"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1.3"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1.2"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1.1"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.0.3"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.0.2"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.0.1"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.0"
}
],
"sources": [
{
"db": "BID",
"id": "77064"
},
{
"db": "JVNDB",
"id": "JVNDB-2015-005244"
},
{
"db": "CNNVD",
"id": "CNNVD-201510-200"
},
{
"db": "NVD",
"id": "CVE-2015-6687"
}
]
},
"configurations": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/configurations#",
"children": {
"@container": "@list"
},
"cpe_match": {
"@container": "@list"
},
"data": {
"@container": "@list"
},
"nodes": {
"@container": "@list"
}
},
"data": [
{
"CVE_data_version": "4.0",
"nodes": [
{
"cpe_match": [
{
"cpe22Uri": "cpe:/a:adobe:acrobat",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/a:adobe:acrobat_dc",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/a:adobe:acrobat_reader_dc",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/a:adobe:acrobat_reader",
"vulnerable": true
}
],
"operator": "OR"
}
]
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2015-005244"
}
]
},
"credits": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/credits#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "AbdulAziz Hariri of HP Zero Day Initiative, Bill Finlayson of Vectra Networks, bilou working with VeriSign iDefense Labs, James Loureiro of MWR Labs, kdot working with HP\u0027s\u0027s Zero Day Initiative, Wei Lei and Wu Hongjun of Nanyang Technological University w",
"sources": [
{
"db": "BID",
"id": "77064"
}
],
"trust": 0.3
},
"cve": "CVE-2015-6687",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "nvd@nist.gov",
"availabilityImpact": "COMPLETE",
"baseScore": 10.0,
"confidentialityImpact": "COMPLETE",
"exploitabilityScore": 10.0,
"id": "CVE-2015-6687",
"impactScore": 10.0,
"integrityImpact": "COMPLETE",
"severity": "HIGH",
"trust": 1.8,
"vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "VULHUB",
"availabilityImpact": "COMPLETE",
"baseScore": 10.0,
"confidentialityImpact": "COMPLETE",
"exploitabilityScore": 10.0,
"id": "VHN-84648",
"impactScore": 10.0,
"integrityImpact": "COMPLETE",
"severity": "HIGH",
"trust": 0.1,
"vectorString": "AV:N/AC:L/AU:N/C:C/I:C/A:C",
"version": "2.0"
}
],
"cvssV3": [],
"severity": [
{
"author": "nvd@nist.gov",
"id": "CVE-2015-6687",
"trust": 1.0,
"value": "HIGH"
},
{
"author": "NVD",
"id": "CVE-2015-6687",
"trust": 0.8,
"value": "High"
},
{
"author": "CNNVD",
"id": "CNNVD-201510-200",
"trust": 0.6,
"value": "CRITICAL"
},
{
"author": "VULHUB",
"id": "VHN-84648",
"trust": 0.1,
"value": "HIGH"
}
]
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-84648"
},
{
"db": "JVNDB",
"id": "JVNDB-2015-005244"
},
{
"db": "CNNVD",
"id": "CNNVD-201510-200"
},
{
"db": "NVD",
"id": "CVE-2015-6687"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Use-after-free vulnerability in Adobe Reader and Acrobat 10.x before 10.1.16 and 11.x before 11.0.13, Acrobat and Acrobat Reader DC Classic before 2015.006.30094, and Acrobat and Acrobat Reader DC Continuous before 2015.009.20069 on Windows and OS X allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-5586, CVE-2015-6683, CVE-2015-6684, CVE-2015-6688, CVE-2015-6689, CVE-2015-6690, CVE-2015-6691, CVE-2015-7615, CVE-2015-7617, and CVE-2015-7621. This vulnerability CVE-2015-5586 , CVE-2015-6683 , CVE-2015-6684 , CVE-2015-6688 , CVE-2015-6689 , CVE-2015-6690 , CVE-2015-6691 , CVE-2015-7615 , CVE-2015-7617 ,and CVE-2015-7621 Is a different vulnerability. Supplementary information : CWE Vulnerability type by CWE-416: Use-after-free ( Use of freed memory ) Has been identified. http://cwe.mitre.org/data/definitions/416.htmlAn attacker could execute arbitrary code. Adobe Acrobat and Reader are prone to multiple remote code-execution vulnerabilities. Failed exploit attempts will likely cause a denial-of-service condition. Adobe Reader, etc. are all products of Adobe (Adobe) in the United States. Adobe Reader is a free PDF file reader; Acrobat is a PDF file editing and conversion tool; Acrobat Reader DC is a set of tools for viewing, printing and annotating PDF. A use-after-free vulnerability exists in several Adobe products. 30060 and earlier, Acrobat XI Desktop 11.0.12 and earlier, Reader XI Desktop 11.0.12 and earlier, Acrobat X Desktop 10.1.15 and earlier, Reader X Desktop 10.1.15 and earlier",
"sources": [
{
"db": "NVD",
"id": "CVE-2015-6687"
},
{
"db": "JVNDB",
"id": "JVNDB-2015-005244"
},
{
"db": "BID",
"id": "77064"
},
{
"db": "VULHUB",
"id": "VHN-84648"
}
],
"trust": 1.98
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "NVD",
"id": "CVE-2015-6687",
"trust": 2.8
},
{
"db": "SECTRACK",
"id": "1033796",
"trust": 1.7
},
{
"db": "JVNDB",
"id": "JVNDB-2015-005244",
"trust": 0.8
},
{
"db": "CNNVD",
"id": "CNNVD-201510-200",
"trust": 0.7
},
{
"db": "ZDI",
"id": "ZDI-15-508",
"trust": 0.3
},
{
"db": "ZDI",
"id": "ZDI-15-470",
"trust": 0.3
},
{
"db": "ZDI",
"id": "ZDI-15-493",
"trust": 0.3
},
{
"db": "ZDI",
"id": "ZDI-15-469",
"trust": 0.3
},
{
"db": "ZDI",
"id": "ZDI-15-474",
"trust": 0.3
},
{
"db": "ZDI",
"id": "ZDI-15-492",
"trust": 0.3
},
{
"db": "BID",
"id": "77064",
"trust": 0.3
},
{
"db": "VULHUB",
"id": "VHN-84648",
"trust": 0.1
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-84648"
},
{
"db": "BID",
"id": "77064"
},
{
"db": "JVNDB",
"id": "JVNDB-2015-005244"
},
{
"db": "CNNVD",
"id": "CNNVD-201510-200"
},
{
"db": "NVD",
"id": "CVE-2015-6687"
}
]
},
"id": "VAR-201510-0358",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "VULHUB",
"id": "VHN-84648"
}
],
"trust": 0.01
},
"last_update_date": "2025-04-13T23:03:47.720000Z",
"patch": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/patch#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"title": "APSB15-24",
"trust": 0.8,
"url": "https://helpx.adobe.com/security/products/acrobat/apsb15-24.html"
},
{
"title": "APSB15-24",
"trust": 0.8,
"url": "https://helpx.adobe.com/jp/security/products/reader/apsb15-24.html"
},
{
"title": "\u30a2\u30c9\u30d3 \u30b7\u30b9\u30c6\u30e0\u30ba\u793e Adobe Reader \u306e\u8106\u5f31\u6027\u306b\u95a2\u3059\u308b\u304a\u77e5\u3089\u305b",
"trust": 0.8,
"url": "http://www.fmworld.net/biz/common/adobe/20151015.html"
},
{
"title": "Multiple Adobe Remediation measures for reusing vulnerabilities after product release",
"trust": 0.6,
"url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=58049"
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2015-005244"
},
{
"db": "CNNVD",
"id": "CNNVD-201510-200"
}
]
},
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "CWE-416",
"trust": 1.1
},
{
"problemtype": "CWE-Other",
"trust": 0.8
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-84648"
},
{
"db": "JVNDB",
"id": "JVNDB-2015-005244"
},
{
"db": "NVD",
"id": "CVE-2015-6687"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 2.0,
"url": "https://helpx.adobe.com/security/products/acrobat/apsb15-24.html"
},
{
"trust": 1.7,
"url": "http://www.securitytracker.com/id/1033796"
},
{
"trust": 0.8,
"url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-6687"
},
{
"trust": 0.8,
"url": "http://www.ipa.go.jp/security/ciadr/vul/20151014-adobereader.html"
},
{
"trust": 0.8,
"url": "http://www.jpcert.or.jp/at/2015/at150035.html"
},
{
"trust": 0.8,
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2015-6687"
},
{
"trust": 0.8,
"url": "http://www.npa.go.jp/cyberpolice/topics/?seq=17022"
},
{
"trust": 0.3,
"url": "http://www.adobe.com"
},
{
"trust": 0.3,
"url": "http://www.zerodayinitiative.com/advisories/zdi-15-469/"
},
{
"trust": 0.3,
"url": "http://www.zerodayinitiative.com/advisories/zdi-15-470/"
},
{
"trust": 0.3,
"url": "http://www.zerodayinitiative.com/advisories/zdi-15-474/"
},
{
"trust": 0.3,
"url": "http://www.zerodayinitiative.com/advisories/zdi-15-492/"
},
{
"trust": 0.3,
"url": "http://www.zerodayinitiative.com/advisories/zdi-15-493/"
},
{
"trust": 0.3,
"url": "http://www.zerodayinitiative.com/advisories/zdi-15-508/"
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-84648"
},
{
"db": "BID",
"id": "77064"
},
{
"db": "JVNDB",
"id": "JVNDB-2015-005244"
},
{
"db": "CNNVD",
"id": "CNNVD-201510-200"
},
{
"db": "NVD",
"id": "CVE-2015-6687"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "VULHUB",
"id": "VHN-84648"
},
{
"db": "BID",
"id": "77064"
},
{
"db": "JVNDB",
"id": "JVNDB-2015-005244"
},
{
"db": "CNNVD",
"id": "CNNVD-201510-200"
},
{
"db": "NVD",
"id": "CVE-2015-6687"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2015-10-14T00:00:00",
"db": "VULHUB",
"id": "VHN-84648"
},
{
"date": "2015-10-13T00:00:00",
"db": "BID",
"id": "77064"
},
{
"date": "2015-10-16T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2015-005244"
},
{
"date": "2015-10-15T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201510-200"
},
{
"date": "2015-10-14T23:59:08.937000",
"db": "NVD",
"id": "CVE-2015-6687"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2020-05-18T00:00:00",
"db": "VULHUB",
"id": "VHN-84648"
},
{
"date": "2015-10-26T17:00:00",
"db": "BID",
"id": "77064"
},
{
"date": "2015-10-16T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2015-005244"
},
{
"date": "2020-05-19T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201510-200"
},
{
"date": "2025-04-12T10:46:40.837000",
"db": "NVD",
"id": "CVE-2015-6687"
}
]
},
"threat_type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/threat_type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "remote",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201510-200"
}
],
"trust": 0.6
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Windows and Mac OS X Run on Adobe Reader and Acrobat Vulnerable to arbitrary code execution",
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2015-005244"
}
],
"trust": 0.8
},
"type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "resource management error",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201510-200"
}
],
"trust": 0.6
}
}
VAR-201510-0340
Vulnerability from variot - Updated: 2025-04-13 23:03The ANTrustPropagateAll method in Adobe Reader and Acrobat 10.x before 10.1.16 and 11.x before 11.0.13, Acrobat and Acrobat Reader DC Classic before 2015.006.30094, and Acrobat and Acrobat Reader DC Continuous before 2015.009.20069 on Windows and OS X allows attackers to bypass JavaScript API execution restrictions via unspecified vectors, a different vulnerability than CVE-2015-6707, CVE-2015-6708, CVE-2015-6709, CVE-2015-6710, CVE-2015-6711, CVE-2015-6712, CVE-2015-6713, CVE-2015-6714, CVE-2015-6715, CVE-2015-6716, CVE-2015-6717, CVE-2015-6718, CVE-2015-6719, CVE-2015-6720, CVE-2015-6721, CVE-2015-6722, CVE-2015-6724, CVE-2015-6725, CVE-2015-7614, CVE-2015-7616, CVE-2015-7618, CVE-2015-7619, CVE-2015-7620, and CVE-2015-7623. This vulnerability CVE-2015-6707 , CVE-2015-6708 , CVE-2015-6709 , CVE-2015-6710 , CVE-2015-6711 , CVE-2015-6712 , CVE-2015-6713 , CVE-2015-6714 , CVE-2015-6715 , CVE-2015-6716 , CVE-2015-6717 , CVE-2015-6718 , CVE-2015-6719 , CVE-2015-6720 , CVE-2015-6721 , CVE-2015-6722 , CVE-2015-6724 , CVE-2015-6725 , CVE-2015-7614 , CVE-2015-7616 , CVE-2015-7618 , CVE-2015-7619 , CVE-2015-7620 ,and CVE-2015-7623 Is a different vulnerability.By the attacker, JavaScript API Execution restrictions may be avoided. This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Adobe Reader DC. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the ANTrustPropagateAll method. By creating a specially crafted PDF with specific Javascript instructions, it is possible to bypass the Javascript API restrictions. A remote attacker could exploit this vulnerability to execute arbitrary code. Adobe Acrobat and Reader are prone to multiple security-bypass vulnerabilities. An attacker can exploit these issues to bypass certain security restrictions and perform unauthorized actions. This may lead to further attacks. Adobe Reader, etc. are all products of Adobe (Adobe) in the United States. Adobe Reader is a free PDF file reader; Acrobat is a PDF file editing and conversion tool; Acrobat Reader DC is a set of tools for viewing, printing and annotating PDF. Classic and Continuous are two update mechanisms provided by Acrobat Reader DC Product Download Center. A security vulnerability exists in the ANTrustPropagateAll method of several Adobe products. 30060 and earlier, Acrobat XI Desktop 11.0.12 and earlier, Reader XI Desktop 11.0.12 and earlier, Acrobat X Desktop 10.1.15 and earlier, Reader X Desktop 10.1.15 and earlier
Show details on source website{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"configurations": {
"@id": "https://www.variotdbs.pl/ref/configurations"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-201510-0340",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "acrobat reader dc",
"scope": "gte",
"trust": 1.0,
"vendor": "adobe",
"version": "15.008.20082"
},
{
"model": "acrobat dc",
"scope": "gte",
"trust": 1.0,
"vendor": "adobe",
"version": "15.008.20082"
},
{
"model": "acrobat dc",
"scope": "gte",
"trust": 1.0,
"vendor": "adobe",
"version": "15.006.30060"
},
{
"model": "acrobat reader dc",
"scope": "lt",
"trust": 1.0,
"vendor": "adobe",
"version": "15.009.20069"
},
{
"model": "acrobat dc",
"scope": "lt",
"trust": 1.0,
"vendor": "adobe",
"version": "15.006.30094"
},
{
"model": "acrobat",
"scope": "gte",
"trust": 1.0,
"vendor": "adobe",
"version": "10.0"
},
{
"model": "acrobat reader",
"scope": "lte",
"trust": 1.0,
"vendor": "adobe",
"version": "10.1.15"
},
{
"model": "acrobat reader",
"scope": "gte",
"trust": 1.0,
"vendor": "adobe",
"version": "10.0"
},
{
"model": "acrobat reader",
"scope": "lte",
"trust": 1.0,
"vendor": "adobe",
"version": "11.0.12"
},
{
"model": "acrobat",
"scope": "lte",
"trust": 1.0,
"vendor": "adobe",
"version": "10.1.15"
},
{
"model": "acrobat",
"scope": "lte",
"trust": 1.0,
"vendor": "adobe",
"version": "11.0.12"
},
{
"model": "acrobat reader dc",
"scope": "lt",
"trust": 1.0,
"vendor": "adobe",
"version": "15.006.30094"
},
{
"model": "acrobat",
"scope": "gte",
"trust": 1.0,
"vendor": "adobe",
"version": "11.0.0"
},
{
"model": "acrobat dc",
"scope": "lt",
"trust": 1.0,
"vendor": "adobe",
"version": "15.009.20069"
},
{
"model": "acrobat reader",
"scope": "gte",
"trust": 1.0,
"vendor": "adobe",
"version": "11.0.0"
},
{
"model": "acrobat reader dc",
"scope": "gte",
"trust": 1.0,
"vendor": "adobe",
"version": "15.006.30060"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.9,
"vendor": "adobe",
"version": "10.1.1"
},
{
"model": "acrobat dc",
"scope": "eq",
"trust": 0.9,
"vendor": "adobe",
"version": "2015.006.30060"
},
{
"model": "acrobat dc",
"scope": "lt",
"trust": 0.8,
"vendor": "adobe",
"version": "(windows/macintosh)"
},
{
"model": "acrobat reader dc",
"scope": "lt",
"trust": 0.8,
"vendor": "adobe",
"version": "(windows/macintosh)"
},
{
"model": "acrobat reader dc",
"scope": "eq",
"trust": 0.8,
"vendor": "adobe",
"version": "classic 2015.006.30094"
},
{
"model": "acrobat",
"scope": "lt",
"trust": 0.8,
"vendor": "adobe",
"version": "11.x (windows/macintosh)"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.8,
"vendor": "adobe",
"version": "xi desktop 11.0.13"
},
{
"model": "reader",
"scope": "lt",
"trust": 0.8,
"vendor": "adobe",
"version": "11.x (windows/macintosh)"
},
{
"model": "acrobat dc",
"scope": "eq",
"trust": 0.8,
"vendor": "adobe",
"version": "continuous 2015.009.20069"
},
{
"model": "acrobat",
"scope": "lt",
"trust": 0.8,
"vendor": "adobe",
"version": "10.x (windows/macintosh)"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.8,
"vendor": "adobe",
"version": "xi desktop 11.0.13"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.8,
"vendor": "adobe",
"version": "x desktop 10.1.16"
},
{
"model": "acrobat dc",
"scope": "eq",
"trust": 0.8,
"vendor": "adobe",
"version": "classic 2015.006.30094"
},
{
"model": "reader",
"scope": "lt",
"trust": 0.8,
"vendor": "adobe",
"version": "10.x (windows/macintosh)"
},
{
"model": "acrobat reader dc",
"scope": "eq",
"trust": 0.8,
"vendor": "adobe",
"version": "continuous 2015.009.20069"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.8,
"vendor": "adobe",
"version": "x desktop 10.1.16"
},
{
"model": "acrobat reader dc",
"scope": null,
"trust": 0.7,
"vendor": "adobe",
"version": null
},
{
"model": "acrobat reader",
"scope": "eq",
"trust": 0.6,
"vendor": "adobe",
"version": "11.0.8"
},
{
"model": "acrobat reader",
"scope": "eq",
"trust": 0.6,
"vendor": "adobe",
"version": "11.0.7"
},
{
"model": "acrobat reader dc",
"scope": "eq",
"trust": 0.6,
"vendor": "adobe",
"version": "2015.006.30060"
},
{
"model": "acrobat reader dc",
"scope": "eq",
"trust": 0.6,
"vendor": "adobe",
"version": "2015.008.20082"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.6,
"vendor": "adobe",
"version": "10.1.0"
},
{
"model": "acrobat reader",
"scope": "eq",
"trust": 0.6,
"vendor": "adobe",
"version": "11.0.9"
},
{
"model": "acrobat reader",
"scope": "eq",
"trust": 0.6,
"vendor": "adobe",
"version": "11.0.0"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.6,
"vendor": "adobe",
"version": "11.0.0"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1.14"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1.9"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1.13"
},
{
"model": "acrobat reader dc",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "2015.8.20082"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.10"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.0"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1.2"
},
{
"model": "acrobat dc",
"scope": "ne",
"trust": 0.3,
"vendor": "adobe",
"version": "2015.006.30094"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1.15"
},
{
"model": "acrobat reader dc",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "2015.6.30060"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.0.3"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1.10"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.3"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.0.13"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.6"
},
{
"model": "acrobat",
"scope": "ne",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.13"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0"
},
{
"model": "acrobat reader dc",
"scope": "ne",
"trust": 0.3,
"vendor": "adobe",
"version": "2015.006.30094"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.10"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.4"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1.3"
},
{
"model": "acrobat",
"scope": "ne",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1.16"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.0.2"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.0.1"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.11"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1.4"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1.6"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1.11"
},
{
"model": "reader",
"scope": "ne",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.13"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.7"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1.14"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1.3"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1.1"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1"
},
{
"model": "reader",
"scope": "ne",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1.16"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.0.2"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1.5"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.0"
},
{
"model": "acrobat dc",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "2015.007.20033"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1.12"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.1"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1.2"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1.13"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1.4"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1.8"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1.11"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.0.3"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.2"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.12"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.08"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.9"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.7"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.6"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.05"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1.10"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.09"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.3"
},
{
"model": "acrobat dc",
"scope": "ne",
"trust": 0.3,
"vendor": "adobe",
"version": "2015.009.20069"
},
{
"model": "acrobat dc",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "2015.006.30033"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1.12"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.1"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.4"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1.9"
},
{
"model": "acrobat reader dc",
"scope": "ne",
"trust": 0.3,
"vendor": "adobe",
"version": "2015.009.20069"
},
{
"model": "acrobat reader dc",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "2015.006.30033"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.12"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.08"
},
{
"model": "acrobat dc",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "2015.008.20082"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1.7"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.0.1"
},
{
"model": "acrobat reader dc",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "2015.007.20033"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.09"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.11"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1.15"
}
],
"sources": [
{
"db": "ZDI",
"id": "ZDI-15-497"
},
{
"db": "BID",
"id": "77074"
},
{
"db": "JVNDB",
"id": "JVNDB-2015-005280"
},
{
"db": "CNNVD",
"id": "CNNVD-201510-236"
},
{
"db": "NVD",
"id": "CVE-2015-6723"
}
]
},
"configurations": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/configurations#",
"children": {
"@container": "@list"
},
"cpe_match": {
"@container": "@list"
},
"data": {
"@container": "@list"
},
"nodes": {
"@container": "@list"
}
},
"data": [
{
"CVE_data_version": "4.0",
"nodes": [
{
"cpe_match": [
{
"cpe22Uri": "cpe:/a:adobe:acrobat",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/a:adobe:acrobat_dc",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/a:adobe:acrobat_reader_dc",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/a:adobe:acrobat_reader",
"vulnerable": true
}
],
"operator": "OR"
}
]
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2015-005280"
}
]
},
"credits": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/credits#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Matt Molinyawe and Jasiel Spelman - HP Zero Day Initiative",
"sources": [
{
"db": "ZDI",
"id": "ZDI-15-497"
}
],
"trust": 0.7
},
"cve": "CVE-2015-6723",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [
{
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "nvd@nist.gov",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 8.6,
"id": "CVE-2015-6723",
"impactScore": 6.4,
"integrityImpact": "PARTIAL",
"severity": "MEDIUM",
"trust": 1.7,
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
{
"acInsufInfo": null,
"accessComplexity": "Medium",
"accessVector": "Network",
"authentication": "None",
"author": "NVD",
"availabilityImpact": "Complete",
"baseScore": 9.3,
"confidentialityImpact": "Complete",
"exploitabilityScore": null,
"id": "CVE-2015-6723",
"impactScore": null,
"integrityImpact": "Complete",
"obtainAllPrivilege": null,
"obtainOtherPrivilege": null,
"obtainUserPrivilege": null,
"severity": "High",
"trust": 0.8,
"userInteractionRequired": null,
"vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
{
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "VULHUB",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 8.6,
"id": "VHN-84684",
"impactScore": 6.4,
"integrityImpact": "PARTIAL",
"severity": "MEDIUM",
"trust": 0.1,
"vectorString": "AV:N/AC:M/AU:N/C:P/I:P/A:P",
"version": "2.0"
}
],
"cvssV3": [],
"severity": [
{
"author": "nvd@nist.gov",
"id": "CVE-2015-6723",
"trust": 1.0,
"value": "MEDIUM"
},
{
"author": "NVD",
"id": "CVE-2015-6723",
"trust": 0.8,
"value": "High"
},
{
"author": "ZDI",
"id": "CVE-2015-6723",
"trust": 0.7,
"value": "MEDIUM"
},
{
"author": "CNNVD",
"id": "CNNVD-201510-236",
"trust": 0.6,
"value": "CRITICAL"
},
{
"author": "VULHUB",
"id": "VHN-84684",
"trust": 0.1,
"value": "MEDIUM"
}
]
}
],
"sources": [
{
"db": "ZDI",
"id": "ZDI-15-497"
},
{
"db": "VULHUB",
"id": "VHN-84684"
},
{
"db": "JVNDB",
"id": "JVNDB-2015-005280"
},
{
"db": "CNNVD",
"id": "CNNVD-201510-236"
},
{
"db": "NVD",
"id": "CVE-2015-6723"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "The ANTrustPropagateAll method in Adobe Reader and Acrobat 10.x before 10.1.16 and 11.x before 11.0.13, Acrobat and Acrobat Reader DC Classic before 2015.006.30094, and Acrobat and Acrobat Reader DC Continuous before 2015.009.20069 on Windows and OS X allows attackers to bypass JavaScript API execution restrictions via unspecified vectors, a different vulnerability than CVE-2015-6707, CVE-2015-6708, CVE-2015-6709, CVE-2015-6710, CVE-2015-6711, CVE-2015-6712, CVE-2015-6713, CVE-2015-6714, CVE-2015-6715, CVE-2015-6716, CVE-2015-6717, CVE-2015-6718, CVE-2015-6719, CVE-2015-6720, CVE-2015-6721, CVE-2015-6722, CVE-2015-6724, CVE-2015-6725, CVE-2015-7614, CVE-2015-7616, CVE-2015-7618, CVE-2015-7619, CVE-2015-7620, and CVE-2015-7623. This vulnerability CVE-2015-6707 , CVE-2015-6708 , CVE-2015-6709 , CVE-2015-6710 , CVE-2015-6711 , CVE-2015-6712 , CVE-2015-6713 , CVE-2015-6714 , CVE-2015-6715 , CVE-2015-6716 , CVE-2015-6717 , CVE-2015-6718 , CVE-2015-6719 , CVE-2015-6720 , CVE-2015-6721 , CVE-2015-6722 , CVE-2015-6724 , CVE-2015-6725 , CVE-2015-7614 , CVE-2015-7616 , CVE-2015-7618 , CVE-2015-7619 , CVE-2015-7620 ,and CVE-2015-7623 Is a different vulnerability.By the attacker, JavaScript API Execution restrictions may be avoided. This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Adobe Reader DC. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the ANTrustPropagateAll method. By creating a specially crafted PDF with specific Javascript instructions, it is possible to bypass the Javascript API restrictions. A remote attacker could exploit this vulnerability to execute arbitrary code. Adobe Acrobat and Reader are prone to multiple security-bypass vulnerabilities. \nAn attacker can exploit these issues to bypass certain security restrictions and perform unauthorized actions. This may lead to further attacks. Adobe Reader, etc. are all products of Adobe (Adobe) in the United States. Adobe Reader is a free PDF file reader; Acrobat is a PDF file editing and conversion tool; Acrobat Reader DC is a set of tools for viewing, printing and annotating PDF. Classic and Continuous are two update mechanisms provided by Acrobat Reader DC Product Download Center. A security vulnerability exists in the ANTrustPropagateAll method of several Adobe products. 30060 and earlier, Acrobat XI Desktop 11.0.12 and earlier, Reader XI Desktop 11.0.12 and earlier, Acrobat X Desktop 10.1.15 and earlier, Reader X Desktop 10.1.15 and earlier",
"sources": [
{
"db": "NVD",
"id": "CVE-2015-6723"
},
{
"db": "JVNDB",
"id": "JVNDB-2015-005280"
},
{
"db": "ZDI",
"id": "ZDI-15-497"
},
{
"db": "BID",
"id": "77074"
},
{
"db": "VULHUB",
"id": "VHN-84684"
}
],
"trust": 2.61
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "NVD",
"id": "CVE-2015-6723",
"trust": 3.5
},
{
"db": "ZDI",
"id": "ZDI-15-497",
"trust": 2.4
},
{
"db": "SECTRACK",
"id": "1033796",
"trust": 1.7
},
{
"db": "JVNDB",
"id": "JVNDB-2015-005280",
"trust": 0.8
},
{
"db": "ZDI_CAN",
"id": "ZDI-CAN-3081",
"trust": 0.7
},
{
"db": "CNNVD",
"id": "CNNVD-201510-236",
"trust": 0.7
},
{
"db": "BID",
"id": "77074",
"trust": 0.3
},
{
"db": "VULHUB",
"id": "VHN-84684",
"trust": 0.1
}
],
"sources": [
{
"db": "ZDI",
"id": "ZDI-15-497"
},
{
"db": "VULHUB",
"id": "VHN-84684"
},
{
"db": "BID",
"id": "77074"
},
{
"db": "JVNDB",
"id": "JVNDB-2015-005280"
},
{
"db": "CNNVD",
"id": "CNNVD-201510-236"
},
{
"db": "NVD",
"id": "CVE-2015-6723"
}
]
},
"id": "VAR-201510-0340",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "VULHUB",
"id": "VHN-84684"
}
],
"trust": 0.01
},
"last_update_date": "2025-04-13T23:03:47.684000Z",
"patch": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/patch#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"title": "APSB15-24",
"trust": 1.5,
"url": "https://helpx.adobe.com/security/products/acrobat/apsb15-24.html"
},
{
"title": "APSB15-24",
"trust": 0.8,
"url": "https://helpx.adobe.com/jp/security/products/reader/apsb15-24.html"
},
{
"title": "\u30a2\u30c9\u30d3 \u30b7\u30b9\u30c6\u30e0\u30ba\u793e Adobe Reader \u306e\u8106\u5f31\u6027\u306b\u95a2\u3059\u308b\u304a\u77e5\u3089\u305b",
"trust": 0.8,
"url": "http://www.fmworld.net/biz/common/adobe/20151015.html"
},
{
"title": "Multiple Adobe Product Privilege License and Access Control Vulnerability Fixes",
"trust": 0.6,
"url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=58085"
}
],
"sources": [
{
"db": "ZDI",
"id": "ZDI-15-497"
},
{
"db": "JVNDB",
"id": "JVNDB-2015-005280"
},
{
"db": "CNNVD",
"id": "CNNVD-201510-236"
}
]
},
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "NVD-CWE-noinfo",
"trust": 1.0
},
{
"problemtype": "CWE-264",
"trust": 0.9
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-84684"
},
{
"db": "JVNDB",
"id": "JVNDB-2015-005280"
},
{
"db": "NVD",
"id": "CVE-2015-6723"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 2.4,
"url": "https://helpx.adobe.com/security/products/acrobat/apsb15-24.html"
},
{
"trust": 1.7,
"url": "http://www.zerodayinitiative.com/advisories/zdi-15-497"
},
{
"trust": 1.7,
"url": "http://www.securitytracker.com/id/1033796"
},
{
"trust": 0.8,
"url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-6723"
},
{
"trust": 0.8,
"url": "http://www.ipa.go.jp/security/ciadr/vul/20151014-adobereader.html"
},
{
"trust": 0.8,
"url": "http://www.jpcert.or.jp/at/2015/at150035.html"
},
{
"trust": 0.8,
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2015-6723"
},
{
"trust": 0.8,
"url": "http://www.npa.go.jp/cyberpolice/topics/?seq=17022"
},
{
"trust": 0.3,
"url": "http://www.adobe.com"
}
],
"sources": [
{
"db": "ZDI",
"id": "ZDI-15-497"
},
{
"db": "VULHUB",
"id": "VHN-84684"
},
{
"db": "BID",
"id": "77074"
},
{
"db": "JVNDB",
"id": "JVNDB-2015-005280"
},
{
"db": "CNNVD",
"id": "CNNVD-201510-236"
},
{
"db": "NVD",
"id": "CVE-2015-6723"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "ZDI",
"id": "ZDI-15-497"
},
{
"db": "VULHUB",
"id": "VHN-84684"
},
{
"db": "BID",
"id": "77074"
},
{
"db": "JVNDB",
"id": "JVNDB-2015-005280"
},
{
"db": "CNNVD",
"id": "CNNVD-201510-236"
},
{
"db": "NVD",
"id": "CVE-2015-6723"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2015-10-13T00:00:00",
"db": "ZDI",
"id": "ZDI-15-497"
},
{
"date": "2015-10-14T00:00:00",
"db": "VULHUB",
"id": "VHN-84684"
},
{
"date": "2015-10-13T00:00:00",
"db": "BID",
"id": "77074"
},
{
"date": "2015-10-16T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2015-005280"
},
{
"date": "2015-10-15T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201510-236"
},
{
"date": "2015-10-14T23:59:44.667000",
"db": "NVD",
"id": "CVE-2015-6723"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2015-10-13T00:00:00",
"db": "ZDI",
"id": "ZDI-15-497"
},
{
"date": "2020-05-18T00:00:00",
"db": "VULHUB",
"id": "VHN-84684"
},
{
"date": "2015-11-03T19:59:00",
"db": "BID",
"id": "77074"
},
{
"date": "2015-10-16T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2015-005280"
},
{
"date": "2020-05-19T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201510-236"
},
{
"date": "2025-04-12T10:46:40.837000",
"db": "NVD",
"id": "CVE-2015-6723"
}
]
},
"threat_type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/threat_type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "remote",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201510-236"
}
],
"trust": 0.6
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Windows and Mac OS X Run on Adobe Reader and Acrobat of ANTrustPropagateAll In the method JavaScript API Vulnerability that circumvents execution restrictions",
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2015-005280"
}
],
"trust": 0.8
},
"type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "permissions and access control issues",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201510-236"
}
],
"trust": 0.6
}
}
VAR-201510-0370
Vulnerability from variot - Updated: 2025-04-13 23:03The CBBBRInit method in Adobe Reader and Acrobat 10.x before 10.1.16 and 11.x before 11.0.13, Acrobat and Acrobat Reader DC Classic before 2015.006.30094, and Acrobat and Acrobat Reader DC Continuous before 2015.009.20069 on Windows and OS X allows attackers to bypass JavaScript API execution restrictions via unspecified vectors, a different vulnerability than CVE-2015-6707, CVE-2015-6708, CVE-2015-6709, CVE-2015-6711, CVE-2015-6712, CVE-2015-6713, CVE-2015-6714, CVE-2015-6715, CVE-2015-6716, CVE-2015-6717, CVE-2015-6718, CVE-2015-6719, CVE-2015-6720, CVE-2015-6721, CVE-2015-6722, CVE-2015-6723, CVE-2015-6724, CVE-2015-6725, CVE-2015-7614, CVE-2015-7616, CVE-2015-7618, CVE-2015-7619, CVE-2015-7620, and CVE-2015-7623. This vulnerability CVE-2015-6707 , CVE-2015-6708 , CVE-2015-6709 , CVE-2015-6711 , CVE-2015-6712 , CVE-2015-6713 , CVE-2015-6714 , CVE-2015-6715 , CVE-2015-6716 , CVE-2015-6717 , CVE-2015-6718 , CVE-2015-6719 , CVE-2015-6720 , CVE-2015-6721 , CVE-2015-6722 , CVE-2015-6723 , CVE-2015-6724 , CVE-2015-6725 , CVE-2015-7614 , CVE-2015-7616 , CVE-2015-7618 , CVE-2015-7619 , CVE-2015-7620 ,and CVE-2015-7623 Is a different vulnerability.By the attacker, JavaScript API Execution restrictions may be avoided. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the CBBBRInit method. By creating a specially crafted PDF with specific Javascript instructions, it is possible to bypass the Javascript API restrictions. A remote attacker could exploit this vulnerability to execute arbitrary code. Adobe Acrobat and Reader are prone to multiple security-bypass vulnerabilities. An attacker can exploit these issues to bypass certain security restrictions and perform unauthorized actions. This may lead to further attacks. Adobe Reader, etc. are all products of Adobe (Adobe) in the United States. Adobe Reader is a free PDF file reader; Acrobat is a PDF file editing and conversion tool; Acrobat Reader DC is a set of tools for viewing, printing and annotating PDF. Classic and Continuous are two update mechanisms provided by Acrobat Reader DC Product Download Center. A security vulnerability exists in the CBBBRInit method of several Adobe products. 30060 and earlier, Acrobat XI Desktop 11.0.12 and earlier, Reader XI Desktop 11.0.12 and earlier, Acrobat X Desktop 10.1.15 and earlier, Reader X Desktop 10.1.15 and earlier
Show details on source website{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"configurations": {
"@id": "https://www.variotdbs.pl/ref/configurations"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-201510-0370",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "acrobat reader dc",
"scope": "gte",
"trust": 1.0,
"vendor": "adobe",
"version": "15.008.20082"
},
{
"model": "acrobat dc",
"scope": "gte",
"trust": 1.0,
"vendor": "adobe",
"version": "15.008.20082"
},
{
"model": "acrobat dc",
"scope": "gte",
"trust": 1.0,
"vendor": "adobe",
"version": "15.006.30060"
},
{
"model": "acrobat reader dc",
"scope": "lt",
"trust": 1.0,
"vendor": "adobe",
"version": "15.009.20069"
},
{
"model": "acrobat dc",
"scope": "lt",
"trust": 1.0,
"vendor": "adobe",
"version": "15.006.30094"
},
{
"model": "acrobat",
"scope": "gte",
"trust": 1.0,
"vendor": "adobe",
"version": "10.0"
},
{
"model": "acrobat reader",
"scope": "lte",
"trust": 1.0,
"vendor": "adobe",
"version": "10.1.15"
},
{
"model": "acrobat reader",
"scope": "gte",
"trust": 1.0,
"vendor": "adobe",
"version": "10.0"
},
{
"model": "acrobat reader",
"scope": "lte",
"trust": 1.0,
"vendor": "adobe",
"version": "11.0.12"
},
{
"model": "acrobat",
"scope": "lte",
"trust": 1.0,
"vendor": "adobe",
"version": "10.1.15"
},
{
"model": "acrobat",
"scope": "lte",
"trust": 1.0,
"vendor": "adobe",
"version": "11.0.12"
},
{
"model": "acrobat reader dc",
"scope": "lt",
"trust": 1.0,
"vendor": "adobe",
"version": "15.006.30094"
},
{
"model": "acrobat",
"scope": "gte",
"trust": 1.0,
"vendor": "adobe",
"version": "11.0.0"
},
{
"model": "acrobat dc",
"scope": "lt",
"trust": 1.0,
"vendor": "adobe",
"version": "15.009.20069"
},
{
"model": "acrobat reader",
"scope": "gte",
"trust": 1.0,
"vendor": "adobe",
"version": "11.0.0"
},
{
"model": "acrobat reader dc",
"scope": "gte",
"trust": 1.0,
"vendor": "adobe",
"version": "15.006.30060"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.9,
"vendor": "adobe",
"version": "10.1.1"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.9,
"vendor": "adobe",
"version": "10.1.2"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.9,
"vendor": "adobe",
"version": "10.1.3"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.9,
"vendor": "adobe",
"version": "10.1.4"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.9,
"vendor": "adobe",
"version": "10.1.6"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.9,
"vendor": "adobe",
"version": "10.1.5"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.9,
"vendor": "adobe",
"version": "10.1.8"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.9,
"vendor": "adobe",
"version": "10.1.10"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.9,
"vendor": "adobe",
"version": "10.1.9"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.9,
"vendor": "adobe",
"version": "10.1.7"
},
{
"model": "acrobat dc",
"scope": "lt",
"trust": 0.8,
"vendor": "adobe",
"version": "(windows/macintosh)"
},
{
"model": "acrobat reader dc",
"scope": "lt",
"trust": 0.8,
"vendor": "adobe",
"version": "(windows/macintosh)"
},
{
"model": "acrobat reader dc",
"scope": "eq",
"trust": 0.8,
"vendor": "adobe",
"version": "classic 2015.006.30094"
},
{
"model": "acrobat",
"scope": "lt",
"trust": 0.8,
"vendor": "adobe",
"version": "11.x (windows/macintosh)"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.8,
"vendor": "adobe",
"version": "xi desktop 11.0.13"
},
{
"model": "reader",
"scope": "lt",
"trust": 0.8,
"vendor": "adobe",
"version": "11.x (windows/macintosh)"
},
{
"model": "acrobat dc",
"scope": "eq",
"trust": 0.8,
"vendor": "adobe",
"version": "continuous 2015.009.20069"
},
{
"model": "acrobat",
"scope": "lt",
"trust": 0.8,
"vendor": "adobe",
"version": "10.x (windows/macintosh)"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.8,
"vendor": "adobe",
"version": "xi desktop 11.0.13"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.8,
"vendor": "adobe",
"version": "x desktop 10.1.16"
},
{
"model": "acrobat dc",
"scope": "eq",
"trust": 0.8,
"vendor": "adobe",
"version": "classic 2015.006.30094"
},
{
"model": "reader",
"scope": "lt",
"trust": 0.8,
"vendor": "adobe",
"version": "10.x (windows/macintosh)"
},
{
"model": "acrobat reader dc",
"scope": "eq",
"trust": 0.8,
"vendor": "adobe",
"version": "continuous 2015.009.20069"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.8,
"vendor": "adobe",
"version": "x desktop 10.1.16"
},
{
"model": "acrobat reader dc",
"scope": null,
"trust": 0.7,
"vendor": "adobe",
"version": null
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1.14"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1.9"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1.13"
},
{
"model": "acrobat reader dc",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "2015.8.20082"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.10"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.0"
},
{
"model": "acrobat dc",
"scope": "ne",
"trust": 0.3,
"vendor": "adobe",
"version": "2015.006.30094"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1.15"
},
{
"model": "acrobat reader dc",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "2015.6.30060"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.0.3"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1.10"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.3"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.0.13"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.6"
},
{
"model": "acrobat",
"scope": "ne",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.13"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0"
},
{
"model": "acrobat reader dc",
"scope": "ne",
"trust": 0.3,
"vendor": "adobe",
"version": "2015.006.30094"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.10"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.4"
},
{
"model": "acrobat",
"scope": "ne",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1.16"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.0.2"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.0.1"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.11"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1.11"
},
{
"model": "reader",
"scope": "ne",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.13"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.7"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1.14"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1.3"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1.1"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1"
},
{
"model": "reader",
"scope": "ne",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1.16"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.0.2"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.0"
},
{
"model": "acrobat dc",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "2015.007.20033"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1.12"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.1"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1.2"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1.13"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1.4"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1.11"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.0.3"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.2"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.12"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.08"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.9"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.7"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.6"
},
{
"model": "acrobat dc",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "2015.006.30060"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.05"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.09"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.3"
},
{
"model": "acrobat dc",
"scope": "ne",
"trust": 0.3,
"vendor": "adobe",
"version": "2015.009.20069"
},
{
"model": "acrobat dc",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "2015.006.30033"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1.12"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.1"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.4"
},
{
"model": "acrobat reader dc",
"scope": "ne",
"trust": 0.3,
"vendor": "adobe",
"version": "2015.009.20069"
},
{
"model": "acrobat reader dc",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "2015.006.30033"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.12"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.08"
},
{
"model": "acrobat dc",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "2015.008.20082"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.0.1"
},
{
"model": "acrobat reader dc",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "2015.007.20033"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.09"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.11"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1.15"
}
],
"sources": [
{
"db": "ZDI",
"id": "ZDI-15-487"
},
{
"db": "BID",
"id": "77074"
},
{
"db": "JVNDB",
"id": "JVNDB-2015-005267"
},
{
"db": "CNNVD",
"id": "CNNVD-201510-223"
},
{
"db": "NVD",
"id": "CVE-2015-6710"
}
]
},
"configurations": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/configurations#",
"children": {
"@container": "@list"
},
"cpe_match": {
"@container": "@list"
},
"data": {
"@container": "@list"
},
"nodes": {
"@container": "@list"
}
},
"data": [
{
"CVE_data_version": "4.0",
"nodes": [
{
"cpe_match": [
{
"cpe22Uri": "cpe:/a:adobe:acrobat",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/a:adobe:acrobat_dc",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/a:adobe:acrobat_reader_dc",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/a:adobe:acrobat_reader",
"vulnerable": true
}
],
"operator": "OR"
}
]
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2015-005267"
}
]
},
"credits": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/credits#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "AbdulAziz Hariri - HP Zero Day Initiative",
"sources": [
{
"db": "ZDI",
"id": "ZDI-15-487"
}
],
"trust": 0.7
},
"cve": "CVE-2015-6710",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [
{
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "nvd@nist.gov",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 8.6,
"id": "CVE-2015-6710",
"impactScore": 6.4,
"integrityImpact": "PARTIAL",
"severity": "MEDIUM",
"trust": 1.7,
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
{
"acInsufInfo": null,
"accessComplexity": "Medium",
"accessVector": "Network",
"authentication": "None",
"author": "NVD",
"availabilityImpact": "Complete",
"baseScore": 9.3,
"confidentialityImpact": "Complete",
"exploitabilityScore": null,
"id": "CVE-2015-6710",
"impactScore": null,
"integrityImpact": "Complete",
"obtainAllPrivilege": null,
"obtainOtherPrivilege": null,
"obtainUserPrivilege": null,
"severity": "High",
"trust": 0.8,
"userInteractionRequired": null,
"vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
{
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "VULHUB",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 8.6,
"id": "VHN-84671",
"impactScore": 6.4,
"integrityImpact": "PARTIAL",
"severity": "MEDIUM",
"trust": 0.1,
"vectorString": "AV:N/AC:M/AU:N/C:P/I:P/A:P",
"version": "2.0"
}
],
"cvssV3": [],
"severity": [
{
"author": "nvd@nist.gov",
"id": "CVE-2015-6710",
"trust": 1.0,
"value": "MEDIUM"
},
{
"author": "NVD",
"id": "CVE-2015-6710",
"trust": 0.8,
"value": "High"
},
{
"author": "ZDI",
"id": "CVE-2015-6710",
"trust": 0.7,
"value": "MEDIUM"
},
{
"author": "CNNVD",
"id": "CNNVD-201510-223",
"trust": 0.6,
"value": "CRITICAL"
},
{
"author": "VULHUB",
"id": "VHN-84671",
"trust": 0.1,
"value": "MEDIUM"
}
]
}
],
"sources": [
{
"db": "ZDI",
"id": "ZDI-15-487"
},
{
"db": "VULHUB",
"id": "VHN-84671"
},
{
"db": "JVNDB",
"id": "JVNDB-2015-005267"
},
{
"db": "CNNVD",
"id": "CNNVD-201510-223"
},
{
"db": "NVD",
"id": "CVE-2015-6710"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "The CBBBRInit method in Adobe Reader and Acrobat 10.x before 10.1.16 and 11.x before 11.0.13, Acrobat and Acrobat Reader DC Classic before 2015.006.30094, and Acrobat and Acrobat Reader DC Continuous before 2015.009.20069 on Windows and OS X allows attackers to bypass JavaScript API execution restrictions via unspecified vectors, a different vulnerability than CVE-2015-6707, CVE-2015-6708, CVE-2015-6709, CVE-2015-6711, CVE-2015-6712, CVE-2015-6713, CVE-2015-6714, CVE-2015-6715, CVE-2015-6716, CVE-2015-6717, CVE-2015-6718, CVE-2015-6719, CVE-2015-6720, CVE-2015-6721, CVE-2015-6722, CVE-2015-6723, CVE-2015-6724, CVE-2015-6725, CVE-2015-7614, CVE-2015-7616, CVE-2015-7618, CVE-2015-7619, CVE-2015-7620, and CVE-2015-7623. This vulnerability CVE-2015-6707 , CVE-2015-6708 , CVE-2015-6709 , CVE-2015-6711 , CVE-2015-6712 , CVE-2015-6713 , CVE-2015-6714 , CVE-2015-6715 , CVE-2015-6716 , CVE-2015-6717 , CVE-2015-6718 , CVE-2015-6719 , CVE-2015-6720 , CVE-2015-6721 , CVE-2015-6722 , CVE-2015-6723 , CVE-2015-6724 , CVE-2015-6725 , CVE-2015-7614 , CVE-2015-7616 , CVE-2015-7618 , CVE-2015-7619 , CVE-2015-7620 ,and CVE-2015-7623 Is a different vulnerability.By the attacker, JavaScript API Execution restrictions may be avoided. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the CBBBRInit method. By creating a specially crafted PDF with specific Javascript instructions, it is possible to bypass the Javascript API restrictions. A remote attacker could exploit this vulnerability to execute arbitrary code. Adobe Acrobat and Reader are prone to multiple security-bypass vulnerabilities. \nAn attacker can exploit these issues to bypass certain security restrictions and perform unauthorized actions. This may lead to further attacks. Adobe Reader, etc. are all products of Adobe (Adobe) in the United States. Adobe Reader is a free PDF file reader; Acrobat is a PDF file editing and conversion tool; Acrobat Reader DC is a set of tools for viewing, printing and annotating PDF. Classic and Continuous are two update mechanisms provided by Acrobat Reader DC Product Download Center. A security vulnerability exists in the CBBBRInit method of several Adobe products. 30060 and earlier, Acrobat XI Desktop 11.0.12 and earlier, Reader XI Desktop 11.0.12 and earlier, Acrobat X Desktop 10.1.15 and earlier, Reader X Desktop 10.1.15 and earlier",
"sources": [
{
"db": "NVD",
"id": "CVE-2015-6710"
},
{
"db": "JVNDB",
"id": "JVNDB-2015-005267"
},
{
"db": "ZDI",
"id": "ZDI-15-487"
},
{
"db": "BID",
"id": "77074"
},
{
"db": "VULHUB",
"id": "VHN-84671"
}
],
"trust": 2.61
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "NVD",
"id": "CVE-2015-6710",
"trust": 3.5
},
{
"db": "ZDI",
"id": "ZDI-15-487",
"trust": 2.4
},
{
"db": "SECTRACK",
"id": "1033796",
"trust": 1.7
},
{
"db": "JVNDB",
"id": "JVNDB-2015-005267",
"trust": 0.8
},
{
"db": "ZDI_CAN",
"id": "ZDI-CAN-3062",
"trust": 0.7
},
{
"db": "CNNVD",
"id": "CNNVD-201510-223",
"trust": 0.7
},
{
"db": "BID",
"id": "77074",
"trust": 0.3
},
{
"db": "VULHUB",
"id": "VHN-84671",
"trust": 0.1
}
],
"sources": [
{
"db": "ZDI",
"id": "ZDI-15-487"
},
{
"db": "VULHUB",
"id": "VHN-84671"
},
{
"db": "BID",
"id": "77074"
},
{
"db": "JVNDB",
"id": "JVNDB-2015-005267"
},
{
"db": "CNNVD",
"id": "CNNVD-201510-223"
},
{
"db": "NVD",
"id": "CVE-2015-6710"
}
]
},
"id": "VAR-201510-0370",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "VULHUB",
"id": "VHN-84671"
}
],
"trust": 0.01
},
"last_update_date": "2025-04-13T23:03:47.648000Z",
"patch": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/patch#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"title": "APSB15-24",
"trust": 1.5,
"url": "https://helpx.adobe.com/security/products/acrobat/apsb15-24.html"
},
{
"title": "APSB15-24",
"trust": 0.8,
"url": "https://helpx.adobe.com/jp/security/products/reader/apsb15-24.html"
},
{
"title": "\u30a2\u30c9\u30d3 \u30b7\u30b9\u30c6\u30e0\u30ba\u793e Adobe Reader \u306e\u8106\u5f31\u6027\u306b\u95a2\u3059\u308b\u304a\u77e5\u3089\u305b",
"trust": 0.8,
"url": "http://www.fmworld.net/biz/common/adobe/20151015.html"
},
{
"title": "Multiple Adobe Product Privilege License and Access Control Vulnerability Fixes",
"trust": 0.6,
"url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=58072"
}
],
"sources": [
{
"db": "ZDI",
"id": "ZDI-15-487"
},
{
"db": "JVNDB",
"id": "JVNDB-2015-005267"
},
{
"db": "CNNVD",
"id": "CNNVD-201510-223"
}
]
},
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "NVD-CWE-noinfo",
"trust": 1.0
},
{
"problemtype": "CWE-264",
"trust": 0.9
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-84671"
},
{
"db": "JVNDB",
"id": "JVNDB-2015-005267"
},
{
"db": "NVD",
"id": "CVE-2015-6710"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 2.4,
"url": "https://helpx.adobe.com/security/products/acrobat/apsb15-24.html"
},
{
"trust": 1.7,
"url": "http://www.zerodayinitiative.com/advisories/zdi-15-487"
},
{
"trust": 1.7,
"url": "http://www.securitytracker.com/id/1033796"
},
{
"trust": 0.8,
"url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-6710"
},
{
"trust": 0.8,
"url": "http://www.ipa.go.jp/security/ciadr/vul/20151014-adobereader.html"
},
{
"trust": 0.8,
"url": "http://www.jpcert.or.jp/at/2015/at150035.html"
},
{
"trust": 0.8,
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2015-6710"
},
{
"trust": 0.8,
"url": "http://www.npa.go.jp/cyberpolice/topics/?seq=17022"
},
{
"trust": 0.3,
"url": "http://www.adobe.com"
}
],
"sources": [
{
"db": "ZDI",
"id": "ZDI-15-487"
},
{
"db": "VULHUB",
"id": "VHN-84671"
},
{
"db": "BID",
"id": "77074"
},
{
"db": "JVNDB",
"id": "JVNDB-2015-005267"
},
{
"db": "CNNVD",
"id": "CNNVD-201510-223"
},
{
"db": "NVD",
"id": "CVE-2015-6710"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "ZDI",
"id": "ZDI-15-487"
},
{
"db": "VULHUB",
"id": "VHN-84671"
},
{
"db": "BID",
"id": "77074"
},
{
"db": "JVNDB",
"id": "JVNDB-2015-005267"
},
{
"db": "CNNVD",
"id": "CNNVD-201510-223"
},
{
"db": "NVD",
"id": "CVE-2015-6710"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2015-10-13T00:00:00",
"db": "ZDI",
"id": "ZDI-15-487"
},
{
"date": "2015-10-14T00:00:00",
"db": "VULHUB",
"id": "VHN-84671"
},
{
"date": "2015-10-13T00:00:00",
"db": "BID",
"id": "77074"
},
{
"date": "2015-10-16T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2015-005267"
},
{
"date": "2015-10-15T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201510-223"
},
{
"date": "2015-10-14T23:59:32.303000",
"db": "NVD",
"id": "CVE-2015-6710"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2015-10-13T00:00:00",
"db": "ZDI",
"id": "ZDI-15-487"
},
{
"date": "2020-05-13T00:00:00",
"db": "VULHUB",
"id": "VHN-84671"
},
{
"date": "2015-11-03T19:59:00",
"db": "BID",
"id": "77074"
},
{
"date": "2015-10-16T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2015-005267"
},
{
"date": "2020-05-14T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201510-223"
},
{
"date": "2025-04-12T10:46:40.837000",
"db": "NVD",
"id": "CVE-2015-6710"
}
]
},
"threat_type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/threat_type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "remote",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201510-223"
}
],
"trust": 0.6
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Windows and Mac OS X Run on Adobe Reader and Acrobat of CBBBRInit In the method JavaScript API Vulnerability that circumvents execution restrictions",
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2015-005267"
}
],
"trust": 0.8
},
"type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "permissions and access control issues",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201510-223"
}
],
"trust": 0.6
}
}
VAR-201510-0354
Vulnerability from variot - Updated: 2025-04-13 23:03Adobe Reader and Acrobat 10.x before 10.1.16 and 11.x before 11.0.13, Acrobat and Acrobat Reader DC Classic before 2015.006.30094, and Acrobat and Acrobat Reader DC Continuous before 2015.009.20069 on Windows and OS X allow attackers to bypass intended access restrictions and obtain sensitive information via unspecified vectors, a different vulnerability than CVE-2015-5583, CVE-2015-6706, and CVE-2015-7624. This vulnerability CVE-2015-5583 , CVE-2015-6706 ,and CVE-2015-7624 Is a different vulnerability.An attacker could bypass access restrictions and obtain important information. Adobe Reader, etc. are all products of Adobe (Adobe) in the United States. Adobe Reader is a free PDF file reader; Acrobat is a PDF file editing and conversion tool; Acrobat Reader DC is a set of tools for viewing, printing and annotating PDF. Security flaws exist in several Adobe products. 30060 and earlier, Acrobat XI Desktop 11.0.12 and earlier, Reader XI Desktop 11.0.12 and earlier, Acrobat X Desktop 10.1.15 and earlier, Reader X Desktop 10.1.15 and earlier
Show details on source website{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"configurations": {
"@id": "https://www.variotdbs.pl/ref/configurations"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-201510-0354",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "acrobat reader dc",
"scope": "gte",
"trust": 1.0,
"vendor": "adobe",
"version": "15.008.20082"
},
{
"model": "acrobat dc",
"scope": "gte",
"trust": 1.0,
"vendor": "adobe",
"version": "15.008.20082"
},
{
"model": "acrobat dc",
"scope": "gte",
"trust": 1.0,
"vendor": "adobe",
"version": "15.006.30060"
},
{
"model": "acrobat reader dc",
"scope": "lt",
"trust": 1.0,
"vendor": "adobe",
"version": "15.009.20069"
},
{
"model": "acrobat dc",
"scope": "lt",
"trust": 1.0,
"vendor": "adobe",
"version": "15.006.30094"
},
{
"model": "acrobat",
"scope": "gte",
"trust": 1.0,
"vendor": "adobe",
"version": "10.0"
},
{
"model": "acrobat reader",
"scope": "lte",
"trust": 1.0,
"vendor": "adobe",
"version": "10.1.15"
},
{
"model": "acrobat reader",
"scope": "gte",
"trust": 1.0,
"vendor": "adobe",
"version": "10.0"
},
{
"model": "acrobat reader",
"scope": "lte",
"trust": 1.0,
"vendor": "adobe",
"version": "11.0.12"
},
{
"model": "acrobat",
"scope": "lte",
"trust": 1.0,
"vendor": "adobe",
"version": "10.1.15"
},
{
"model": "acrobat",
"scope": "lte",
"trust": 1.0,
"vendor": "adobe",
"version": "11.0.12"
},
{
"model": "acrobat reader dc",
"scope": "lt",
"trust": 1.0,
"vendor": "adobe",
"version": "15.006.30094"
},
{
"model": "acrobat",
"scope": "gte",
"trust": 1.0,
"vendor": "adobe",
"version": "11.0.0"
},
{
"model": "acrobat dc",
"scope": "lt",
"trust": 1.0,
"vendor": "adobe",
"version": "15.009.20069"
},
{
"model": "acrobat reader",
"scope": "gte",
"trust": 1.0,
"vendor": "adobe",
"version": "11.0.0"
},
{
"model": "acrobat reader dc",
"scope": "gte",
"trust": 1.0,
"vendor": "adobe",
"version": "15.006.30060"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.9,
"vendor": "adobe",
"version": "11.0.10"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.9,
"vendor": "adobe",
"version": "10.1.4"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.9,
"vendor": "adobe",
"version": "11.0.12"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.9,
"vendor": "adobe",
"version": "11.0.9"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.9,
"vendor": "adobe",
"version": "11.0.11"
},
{
"model": "acrobat dc",
"scope": "lt",
"trust": 0.8,
"vendor": "adobe",
"version": "(windows/macintosh)"
},
{
"model": "acrobat reader dc",
"scope": "lt",
"trust": 0.8,
"vendor": "adobe",
"version": "(windows/macintosh)"
},
{
"model": "acrobat reader dc",
"scope": "eq",
"trust": 0.8,
"vendor": "adobe",
"version": "classic 2015.006.30094"
},
{
"model": "acrobat",
"scope": "lt",
"trust": 0.8,
"vendor": "adobe",
"version": "11.x (windows/macintosh)"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.8,
"vendor": "adobe",
"version": "xi desktop 11.0.13"
},
{
"model": "reader",
"scope": "lt",
"trust": 0.8,
"vendor": "adobe",
"version": "11.x (windows/macintosh)"
},
{
"model": "acrobat dc",
"scope": "eq",
"trust": 0.8,
"vendor": "adobe",
"version": "continuous 2015.009.20069"
},
{
"model": "acrobat",
"scope": "lt",
"trust": 0.8,
"vendor": "adobe",
"version": "10.x (windows/macintosh)"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.8,
"vendor": "adobe",
"version": "xi desktop 11.0.13"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.8,
"vendor": "adobe",
"version": "x desktop 10.1.16"
},
{
"model": "acrobat dc",
"scope": "eq",
"trust": 0.8,
"vendor": "adobe",
"version": "classic 2015.006.30094"
},
{
"model": "reader",
"scope": "lt",
"trust": 0.8,
"vendor": "adobe",
"version": "10.x (windows/macintosh)"
},
{
"model": "acrobat reader dc",
"scope": "eq",
"trust": 0.8,
"vendor": "adobe",
"version": "continuous 2015.009.20069"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.8,
"vendor": "adobe",
"version": "x desktop 10.1.16"
},
{
"model": "acrobat reader",
"scope": "eq",
"trust": 0.6,
"vendor": "adobe",
"version": "11.0.11"
},
{
"model": "acrobat reader",
"scope": "eq",
"trust": 0.6,
"vendor": "adobe",
"version": "11.0.6"
},
{
"model": "acrobat reader",
"scope": "eq",
"trust": 0.6,
"vendor": "adobe",
"version": "11.0.5"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.6,
"vendor": "adobe",
"version": "11.0.8"
},
{
"model": "acrobat reader",
"scope": "eq",
"trust": 0.6,
"vendor": "adobe",
"version": "11.0.4"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1.14"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1.9"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1.1"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1.13"
},
{
"model": "acrobat reader dc",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "2015.8.20082"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.0"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1.2"
},
{
"model": "acrobat dc",
"scope": "ne",
"trust": 0.3,
"vendor": "adobe",
"version": "2015.006.30094"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1.15"
},
{
"model": "acrobat reader dc",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "2015.6.30060"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.0.3"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1.10"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.3"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.0.13"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.6"
},
{
"model": "acrobat",
"scope": "ne",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.13"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0"
},
{
"model": "acrobat reader dc",
"scope": "ne",
"trust": 0.3,
"vendor": "adobe",
"version": "2015.006.30094"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.10"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.4"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1.3"
},
{
"model": "acrobat",
"scope": "ne",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1.16"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.0.2"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.0.1"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.11"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1.6"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1.11"
},
{
"model": "reader",
"scope": "ne",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.13"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.7"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1.14"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1.3"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1.1"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1"
},
{
"model": "reader",
"scope": "ne",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1.16"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.0.2"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1.5"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.0"
},
{
"model": "acrobat dc",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "2015.007.20033"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1.12"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.1"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1.2"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1.13"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1.4"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1.8"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1.11"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.0.3"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.2"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.08"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.7"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.6"
},
{
"model": "acrobat dc",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "2015.006.30060"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.05"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1.10"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.3"
},
{
"model": "acrobat dc",
"scope": "ne",
"trust": 0.3,
"vendor": "adobe",
"version": "2015.009.20069"
},
{
"model": "acrobat dc",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "2015.006.30033"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1.12"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.1"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.4"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1.9"
},
{
"model": "acrobat reader dc",
"scope": "ne",
"trust": 0.3,
"vendor": "adobe",
"version": "2015.009.20069"
},
{
"model": "acrobat reader dc",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "2015.006.30033"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.12"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.08"
},
{
"model": "acrobat dc",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "2015.008.20082"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1.7"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.0.1"
},
{
"model": "acrobat reader dc",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "2015.007.20033"
},
{
"model": "reader",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "11.0.09"
},
{
"model": "acrobat",
"scope": "eq",
"trust": 0.3,
"vendor": "adobe",
"version": "10.1.15"
}
],
"sources": [
{
"db": "BID",
"id": "77070"
},
{
"db": "JVNDB",
"id": "JVNDB-2015-005262"
},
{
"db": "CNNVD",
"id": "CNNVD-201510-218"
},
{
"db": "NVD",
"id": "CVE-2015-6705"
}
]
},
"configurations": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/configurations#",
"children": {
"@container": "@list"
},
"cpe_match": {
"@container": "@list"
},
"data": {
"@container": "@list"
},
"nodes": {
"@container": "@list"
}
},
"data": [
{
"CVE_data_version": "4.0",
"nodes": [
{
"cpe_match": [
{
"cpe22Uri": "cpe:/a:adobe:acrobat",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/a:adobe:acrobat_dc",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/a:adobe:acrobat_reader_dc",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/a:adobe:acrobat_reader",
"vulnerable": true
}
],
"operator": "OR"
}
]
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2015-005262"
}
]
},
"credits": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/credits#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Joel Brewer, Alex Inf\u00fchr of Cure53.de, AbdulAziz Hariri and Jasiel Spelman of HP Zero Day Initiative",
"sources": [
{
"db": "BID",
"id": "77070"
}
],
"trust": 0.3
},
"cve": "CVE-2015-6705",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "nvd@nist.gov",
"availabilityImpact": "NONE",
"baseScore": 5.0,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 10.0,
"id": "CVE-2015-6705",
"impactScore": 2.9,
"integrityImpact": "NONE",
"severity": "MEDIUM",
"trust": 1.8,
"vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "VULHUB",
"availabilityImpact": "NONE",
"baseScore": 5.0,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 10.0,
"id": "VHN-84666",
"impactScore": 2.9,
"integrityImpact": "NONE",
"severity": "MEDIUM",
"trust": 0.1,
"vectorString": "AV:N/AC:L/AU:N/C:P/I:N/A:N",
"version": "2.0"
}
],
"cvssV3": [],
"severity": [
{
"author": "nvd@nist.gov",
"id": "CVE-2015-6705",
"trust": 1.0,
"value": "MEDIUM"
},
{
"author": "NVD",
"id": "CVE-2015-6705",
"trust": 0.8,
"value": "Medium"
},
{
"author": "CNNVD",
"id": "CNNVD-201510-218",
"trust": 0.6,
"value": "MEDIUM"
},
{
"author": "VULHUB",
"id": "VHN-84666",
"trust": 0.1,
"value": "MEDIUM"
}
]
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-84666"
},
{
"db": "JVNDB",
"id": "JVNDB-2015-005262"
},
{
"db": "CNNVD",
"id": "CNNVD-201510-218"
},
{
"db": "NVD",
"id": "CVE-2015-6705"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Adobe Reader and Acrobat 10.x before 10.1.16 and 11.x before 11.0.13, Acrobat and Acrobat Reader DC Classic before 2015.006.30094, and Acrobat and Acrobat Reader DC Continuous before 2015.009.20069 on Windows and OS X allow attackers to bypass intended access restrictions and obtain sensitive information via unspecified vectors, a different vulnerability than CVE-2015-5583, CVE-2015-6706, and CVE-2015-7624. This vulnerability CVE-2015-5583 , CVE-2015-6706 ,and CVE-2015-7624 Is a different vulnerability.An attacker could bypass access restrictions and obtain important information. Adobe Reader, etc. are all products of Adobe (Adobe) in the United States. Adobe Reader is a free PDF file reader; Acrobat is a PDF file editing and conversion tool; Acrobat Reader DC is a set of tools for viewing, printing and annotating PDF. Security flaws exist in several Adobe products. 30060 and earlier, Acrobat XI Desktop 11.0.12 and earlier, Reader XI Desktop 11.0.12 and earlier, Acrobat X Desktop 10.1.15 and earlier, Reader X Desktop 10.1.15 and earlier",
"sources": [
{
"db": "NVD",
"id": "CVE-2015-6705"
},
{
"db": "JVNDB",
"id": "JVNDB-2015-005262"
},
{
"db": "BID",
"id": "77070"
},
{
"db": "VULHUB",
"id": "VHN-84666"
}
],
"trust": 1.98
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "NVD",
"id": "CVE-2015-6705",
"trust": 2.8
},
{
"db": "SECTRACK",
"id": "1033796",
"trust": 1.7
},
{
"db": "JVNDB",
"id": "JVNDB-2015-005262",
"trust": 0.8
},
{
"db": "CNNVD",
"id": "CNNVD-201510-218",
"trust": 0.7
},
{
"db": "BID",
"id": "77070",
"trust": 0.3
},
{
"db": "VULHUB",
"id": "VHN-84666",
"trust": 0.1
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-84666"
},
{
"db": "BID",
"id": "77070"
},
{
"db": "JVNDB",
"id": "JVNDB-2015-005262"
},
{
"db": "CNNVD",
"id": "CNNVD-201510-218"
},
{
"db": "NVD",
"id": "CVE-2015-6705"
}
]
},
"id": "VAR-201510-0354",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "VULHUB",
"id": "VHN-84666"
}
],
"trust": 0.01
},
"last_update_date": "2025-04-13T23:03:47.616000Z",
"patch": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/patch#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"title": "APSB15-24",
"trust": 0.8,
"url": "https://helpx.adobe.com/security/products/acrobat/apsb15-24.html"
},
{
"title": "APSB15-24",
"trust": 0.8,
"url": "https://helpx.adobe.com/jp/security/products/reader/apsb15-24.html"
},
{
"title": "\u30a2\u30c9\u30d3 \u30b7\u30b9\u30c6\u30e0\u30ba\u793e Adobe Reader \u306e\u8106\u5f31\u6027\u306b\u95a2\u3059\u308b\u304a\u77e5\u3089\u305b",
"trust": 0.8,
"url": "http://www.fmworld.net/biz/common/adobe/20151015.html"
},
{
"title": "Multiple Adobe Product security vulnerabilities",
"trust": 0.6,
"url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=58067"
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2015-005262"
},
{
"db": "CNNVD",
"id": "CNNVD-201510-218"
}
]
},
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "CWE-200",
"trust": 1.9
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-84666"
},
{
"db": "JVNDB",
"id": "JVNDB-2015-005262"
},
{
"db": "NVD",
"id": "CVE-2015-6705"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 1.7,
"url": "https://helpx.adobe.com/security/products/acrobat/apsb15-24.html"
},
{
"trust": 1.7,
"url": "http://www.securitytracker.com/id/1033796"
},
{
"trust": 0.8,
"url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-6705"
},
{
"trust": 0.8,
"url": "http://www.ipa.go.jp/security/ciadr/vul/20151014-adobereader.html"
},
{
"trust": 0.8,
"url": "http://www.jpcert.or.jp/at/2015/at150035.html"
},
{
"trust": 0.8,
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2015-6705"
},
{
"trust": 0.8,
"url": "http://www.npa.go.jp/cyberpolice/topics/?seq=17022"
},
{
"trust": 0.3,
"url": "http://www.adobe.com"
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-84666"
},
{
"db": "BID",
"id": "77070"
},
{
"db": "JVNDB",
"id": "JVNDB-2015-005262"
},
{
"db": "CNNVD",
"id": "CNNVD-201510-218"
},
{
"db": "NVD",
"id": "CVE-2015-6705"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "VULHUB",
"id": "VHN-84666"
},
{
"db": "BID",
"id": "77070"
},
{
"db": "JVNDB",
"id": "JVNDB-2015-005262"
},
{
"db": "CNNVD",
"id": "CNNVD-201510-218"
},
{
"db": "NVD",
"id": "CVE-2015-6705"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2015-10-14T00:00:00",
"db": "VULHUB",
"id": "VHN-84666"
},
{
"date": "2015-10-13T00:00:00",
"db": "BID",
"id": "77070"
},
{
"date": "2015-10-16T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2015-005262"
},
{
"date": "2015-10-15T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201510-218"
},
{
"date": "2015-10-14T23:59:27.457000",
"db": "NVD",
"id": "CVE-2015-6705"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2020-05-13T00:00:00",
"db": "VULHUB",
"id": "VHN-84666"
},
{
"date": "2015-11-03T19:59:00",
"db": "BID",
"id": "77070"
},
{
"date": "2015-10-16T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2015-005262"
},
{
"date": "2020-05-14T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201510-218"
},
{
"date": "2025-04-12T10:46:40.837000",
"db": "NVD",
"id": "CVE-2015-6705"
}
]
},
"threat_type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/threat_type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "remote",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201510-218"
}
],
"trust": 0.6
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Windows and Mac OS X Run on Adobe Reader and Acrobat Vulnerable to access restrictions",
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2015-005262"
}
],
"trust": 0.8
},
"type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "information disclosure",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201510-218"
}
],
"trust": 0.6
}
}