Public exploit available
Public proof-of-concept or exploit code exists (ExploitDB / Metasploit / Nuclei).

CVE-2015-3073Improper Access Control in Adobe Acrobat

Severity
10.0CRITICALNVD
EPSS
31.1%
top 3.24%
CISA KEV
Not in KEV
Exploit
PoC available
Public exploit / PoC exists
Timeline
PublishedMay 13
Latest updateMay 17

Description

Adobe Reader and Acrobat 10.x before 10.1.14 and 11.x before 11.0.11 on Windows and OS X allow attackers to bypass intended restrictions on JavaScript API execution via unspecified vectors, a different vulnerability than CVE-2015-3060, CVE-2015-3061, CVE-2015-3062, CVE-2015-3063, CVE-2015-3064, CVE-2015-3065, CVE-2015-3066, CVE-2015-3067, CVE-2015-3068, CVE-2015-3069, CVE-2015-3071, CVE-2015-3072, and CVE-2015-3074.

CVSS vector

AV:N/AC:L/C:C/I:C/A:CExploitability: 10.0 | Impact: 10.0

Affected Packages2 packages

NVDadobe/acrobat_reader25 versions+24
NVDadobe/acrobat25 versions+24

Patches

🔴Vulnerability Details

14
GHSA
GHSA-cf9h-6v77-3345: Adobe Reader and Acrobat 102022-05-17
GHSA
GHSA-fpq5-qvqr-5pw9: Adobe Reader and Acrobat 102022-05-17
GHSA
GHSA-37x6-phq8-3rmq: Adobe Reader and Acrobat 102022-05-17
GHSA
GHSA-6fp3-r4pr-85gr: Adobe Reader and Acrobat 102022-05-17
GHSA
GHSA-p77r-p748-87qx: Adobe Reader and Acrobat 102022-05-17

💥Exploits & PoCs

1
Exploit-DB
Adobe Acrobat Reader - AFParseDate JavaScript API Restrictions Bypass2015-09-28

🕵️Threat Intelligence

1
Zscaler
Zscaler detects Flash Player Vulnerabilities | 05-21-2015
CVE-2015-3073 — Improper Access Control in Adobe | cvebase