Beschreibung
Multiple serious vulnerabilities have been found in Adobe products. Malicious users can exploit these vulnerabilities to bypass security restrictions, gain privileges, cause denial of service, execute arbitrary code or obtain sensitive information.
Below is a complete list of vulnerabilities
- An unknown vulnerability can be exploited remotely via an unknown vectors;
- An unknown vulnerability can be exploited remotely via vectors related to memory address randomization, permissions and same-origin-policy;
- Stack overflow, integer overflow, memory corruption, use-after-free and memory leak vulnerabilities can be exploited remotely via an unknown vectors.
Ursprüngliche Informationshinweise
CVE Liste
- CVE-2015-3108 critical
- CVE-2015-3096 critical
- CVE-2015-3099 critical
- CVE-2015-3098 critical
- CVE-2015-3100 critical
- CVE-2015-3101 critical
- CVE-2015-3097 critical
- CVE-2015-3103 critical
- CVE-2015-3104 critical
- CVE-2015-3105 critical
- CVE-2015-3106 critical
- CVE-2015-3107 critical
- CVE-2015-3102 critical
Mehr erfahren
Informieren Sie sich über die Statistiken der in Ihrer Region verbreiteten Sicherheitslücken statistics.securelist.com
Sie haben einen Fehler in der Beschreibung der Schwachstelle gefunden? Mitteilen!