First published: Thu Jan 14 2016(Updated: )
Adobe Reader and Acrobat before 11.0.14, Acrobat and Acrobat Reader DC Classic before 15.006.30119, and Acrobat and Acrobat Reader DC Continuous before 15.010.20056 on Windows and OS X mishandle the Global object, which allows attackers to bypass JavaScript API execution restrictions via unspecified vectors.
Credit: psirt@adobe.com
Affected Software | Affected Version | How to fix |
---|---|---|
Adobe Acrobat Dc | <=15.006.30097 | |
Adobe Acrobat Dc | <=15.009.20077 | |
Adobe Acrobat Reader DC | <=15.006.30097 | |
Adobe Acrobat Reader DC | <=15.009.20077 | |
Apple Mac OS X | ||
Microsoft Windows | ||
Adobe Acrobat Reader | <=11.0.13 | |
Adobe Acrobat Reader | =11.0.0 | |
Adobe Acrobat Reader | =11.0.1 | |
Adobe Acrobat Reader | =11.0.2 | |
Adobe Acrobat Reader | =11.0.3 | |
Adobe Acrobat Reader | =11.0.4 | |
Adobe Acrobat Reader | =11.0.5 | |
Adobe Acrobat Reader | =11.0.6 | |
Adobe Acrobat Reader | =11.0.7 | |
Adobe Acrobat Reader | =11.0.8 | |
Adobe Acrobat Reader | =11.0.9 | |
Adobe Acrobat Reader | =11.0.10 | |
Adobe Acrobat Reader | =11.0.11 | |
Adobe Acrobat Reader | =11.0.12 | |
Adobe Acrobat Reader | <=11.0.13 | |
Adobe Acrobat Reader | =11.0.0 | |
Adobe Acrobat Reader | =11.0.1 | |
Adobe Acrobat Reader | =11.0.2 | |
Adobe Acrobat Reader | =11.0.3 | |
Adobe Acrobat Reader | =11.0.4 | |
Adobe Acrobat Reader | =11.0.5 | |
Adobe Acrobat Reader | =11.0.6 | |
Adobe Acrobat Reader | =11.0.7 | |
Adobe Acrobat Reader | =11.0.8 | |
Adobe Acrobat Reader | =11.0.9 | |
Adobe Acrobat Reader | =11.0.10 | |
Adobe Acrobat Reader | =11.0.11 | |
Adobe Acrobat Reader | =11.0.12 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.