Beschreibung
Multiple serious vulnerabilities have been found in Adobe products. Malicious users can exploit these vulnerabilities to write local files, bypass security restrictions, execute arbitrary code or obtain sensitive information.
Below is a complete list of vulnerabilities
- Memory corruption, heap overflow, integer overflow, type confusion, use after free and memory leak can be exploited remotely via an unknown vectors;
- Race condition can be exploited remotely via vectors related to Internet Explorer;
- Unknown vulnerabilities can be exploited remotely via an unknown vectors.
Ursprüngliche Informationshinweise
CVE Liste
- CVE-2015-3044 critical
- CVE-2015-3089 critical
- CVE-2015-3088 critical
- CVE-2015-3084 critical
- CVE-2015-3086 critical
- CVE-2015-3091 critical
- CVE-2015-3078 critical
- CVE-2015-3079 critical
- CVE-2015-3080 critical
- CVE-2015-3081 critical
- CVE-2015-3092 critical
- CVE-2015-3090 critical
- CVE-2015-3087 critical
- CVE-2015-3077 critical
- CVE-2015-3085 critical
- CVE-2015-3083 critical
- CVE-2015-3082 critical
- CVE-2015-3093 critical
Mehr erfahren
Informieren Sie sich über die Statistiken der in Ihrer Region verbreiteten Sicherheitslücken statistics.securelist.com
Sie haben einen Fehler in der Beschreibung der Schwachstelle gefunden? Mitteilen!