{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-21T17:49:12.135","vulnerabilities":[{"cve":{"id":"CVE-2017-2955","sourceIdentifier":"psirt@adobe.com","published":"2017-01-11T04:59:01.617","lastModified":"2025-04-20T01:37:25.860","vulnStatus":"Deferred","cveTags":[],"descriptions":[{"lang":"en","value":"Adobe Acrobat Reader versions 15.020.20042 and earlier, 15.006.30244 and earlier, 11.0.18 and earlier have an exploitable use after free vulnerability in the JavaScript engine. Successful exploitation could lead to arbitrary code execution."},{"lang":"es","value":"Las versiones de Adobe Acrobat Reader 15.020.20042 y anteriores, 15.006.30244 y anteriores, 11.0.18 y anteriores tienen una vulnerabilidad de uso después de liberación de memoria explotable en el motor JavaScript. Una explotación satisfactoria podría conducir a la ejecución de código arbitrario."}],"metrics":{"cvssMetricV30":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.0","vectorString":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H","baseScore":7.8,"baseSeverity":"HIGH","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"REQUIRED","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":1.8,"impactScore":5.9}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:M/Au:N/C:C/I:C/A:C","baseScore":9.3,"accessVector":"NETWORK","accessComplexity":"MEDIUM","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":8.6,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":true}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-416"}]}],"configurations":[{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:adobe:acrobat:*:*:*:*:*:*:*:*","versionEndIncluding":"11.0.18","matchCriteriaId":"591061D5-5A3B-4788-9219-E6A267C7F205"},{"vulnerable":true,"criteria":"cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:classic:*:*:*","versionEndIncluding":"15.006.30244","matchCriteriaId":"2DA73DF1-D517-4D01-A901-11C6A410F3F7"},{"vulnerable":true,"criteria":"cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:continuous:*:*:*","versionEndIncluding":"15.020.20042","matchCriteriaId":"1044057B-3C1D-4920-B16E-11E8F43B416D"},{"vulnerable":true,"criteria":"cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:classic:*:*:*","versionEndIncluding":"15.006.30244","matchCriteriaId":"65AE21B3-AF0D-480B-9D1A-4D64D2F749D2"},{"vulnerable":true,"criteria":"cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:continuous:*:*:*","versionEndIncluding":"15.020.20042","matchCriteriaId":"C032D3A4-80F5-4066-97DC-3AED72D6C15A"},{"vulnerable":true,"criteria":"cpe:2.3:a:adobe:reader:*:*:*:*:*:*:*:*","versionEndIncluding":"11.0.18","matchCriteriaId":"8D7F2E90-F6DF-41A3-A1DB-26058BEA2A02"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*","matchCriteriaId":"0FF5999A-9D12-4CDD-8DE9-A89C10B2D574"},{"vulnerable":false,"criteria":"cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*","matchCriteriaId":"2CF61F35-5905-4BA9-AD7E-7DB261D2F256"}]}]}],"references":[{"url":"http://www.securityfocus.com/bid/95343","source":"psirt@adobe.com"},{"url":"http://www.securitytracker.com/id/1037574","source":"psirt@adobe.com"},{"url":"https://helpx.adobe.com/security/products/acrobat/apsb17-01.html","source":"psirt@adobe.com","tags":["Patch","Vendor Advisory"]},{"url":"http://www.securityfocus.com/bid/95343","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securitytracker.com/id/1037574","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://helpx.adobe.com/security/products/acrobat/apsb17-01.html","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"]}]}}]}