First published: Wed Oct 14 2015(Updated: )
The ANRunSharedReviewEmailStep method in Adobe Reader and Acrobat 10.x before 10.1.16 and 11.x before 11.0.13, Acrobat and Acrobat Reader DC Classic before 2015.006.30094, and Acrobat and Acrobat Reader DC Continuous before 2015.009.20069 on Windows and OS X allows attackers to bypass JavaScript API execution restrictions via unspecified vectors, a different vulnerability than CVE-2015-6707, CVE-2015-6708, CVE-2015-6709, CVE-2015-6710, CVE-2015-6711, CVE-2015-6712, CVE-2015-6713, CVE-2015-6714, CVE-2015-6715, CVE-2015-6716, CVE-2015-6717, CVE-2015-6718, CVE-2015-6719, CVE-2015-6721, CVE-2015-6722, CVE-2015-6723, CVE-2015-6724, CVE-2015-6725, CVE-2015-7614, CVE-2015-7616, CVE-2015-7618, CVE-2015-7619, CVE-2015-7620, and CVE-2015-7623.
Credit: psirt@adobe.com
Affected Software | Affected Version | How to fix |
---|---|---|
Adobe Acrobat Reader | >=10.0<=10.1.15 | |
Adobe Acrobat Reader | >=11.0.0<=11.0.12 | |
Adobe Acrobat DC | >=15.006.30060<15.006.30094 | |
Adobe Acrobat DC | >=15.008.20082<15.009.20069 | |
Adobe Acrobat Reader | >=10.0<=10.1.15 | |
Adobe Acrobat Reader | >=11.0.0<=11.0.12 | |
Adobe Acrobat DC | >=15.006.30060<15.006.30094 | |
Adobe Acrobat DC | >=15.008.20082<15.009.20069 | |
Apple macOS | ||
Microsoft Windows |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-6720 has a high severity rating due to its potential to allow attackers to bypass security measures.
To fix CVE-2015-6720, update Adobe Acrobat and Acrobat Reader to the latest versions available.
CVE-2015-6720 affects Adobe Acrobat and Reader versions 10.x before 10.1.16 and 11.x before 11.0.13, among others.
CVE-2015-6720 can be exploited to perform unauthorized actions through the JavaScript API, compromising software security.
CVE-2015-6720 impacts Adobe Reader and Acrobat on both Windows and OS X operating systems.